SlideShare a Scribd company logo
1 of 7
Download to read offline
Kento Hayasaka
SW3 tue4 class
 Here is an example of notification of discussion
 Dear Mr.Tanaka,
It‘s been a long time since we have met last time. I hope
you are fine. I am writing you about the our sponsored
meeting in Bali will be held in June. Our budget is very
tight, but we have determined to be held in Bali because
we need to have fresh idea. Our contract travel agent
will offer air ticket to Bali in very reasonable price. Of
course we will buy all your air ticket. Could you send us
copies of all participant ASAP ? Then I will buy air tickets
to Bali. I will let you know the itinerary of the tour when
I get them.
Thank you for support and continuous help.
Kento Hayasaka
 If the subject is not suited to business
e-mail, the reader regard your e-mail
as spam and don’t read it.
 The reader would think you are
trustworthy if your e-mail is
appropriate.
 If your e-mail is not proper as
business e-mail, the reader would not
trust you and you will suffer a loss on
business scene.
 For these reasons, learning business
e-mails is important
 Reading books about English e-mail
You can learn writing English e-mail
practically at low cost.
 Reading websites that teaching
English e-mail
◦ You can read some topics about English
e-mail for free
 Go to English lesson school
 Practice writing e-mail in English
 Writing business e-mail skill is very
important to build a good relationship
of trust in business situation.
 You can improve your business e-
mail skill in many ways.
 E-mail example in slide 2
http://englishmail.org/business/kaigitsuchi_1.
html#mail

More Related Content

Similar to Business e mail (16)

Sw3 7 12 kadai
Sw3 7 12 kadaiSw3 7 12 kadai
Sw3 7 12 kadai
 
Sw10 1
Sw10 1Sw10 1
Sw10 1
 
Sw10
Sw10Sw10
Sw10
 
Assignment #10
Assignment #10Assignment #10
Assignment #10
 
Sw#10
Sw#10Sw#10
Sw#10
 
Sw3 business e mail
Sw3 business e mailSw3 business e mail
Sw3 business e mail
 
Informal letter M. van Eijk
Informal letter  M. van EijkInformal letter  M. van Eijk
Informal letter M. van Eijk
 
Week 10
Week 10Week 10
Week 10
 
BUSINESS E-MAILS
BUSINESS E-MAILSBUSINESS E-MAILS
BUSINESS E-MAILS
 
Sw assignment
Sw assignmentSw assignment
Sw assignment
 
S wpresentation
S wpresentationS wpresentation
S wpresentation
 
Sw3 assignment
Sw3 assignmentSw3 assignment
Sw3 assignment
 
8 Reference Letters Mungunsaran
8 Reference Letters Mungunsaran8 Reference Letters Mungunsaran
8 Reference Letters Mungunsaran
 
Speaking & writing 3 assgnment #10
Speaking & writing 3  assgnment #10Speaking & writing 3  assgnment #10
Speaking & writing 3 assgnment #10
 
Email writing
Email writing Email writing
Email writing
 
Sw7
Sw7Sw7
Sw7
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 

Business e mail

  • 2.  Here is an example of notification of discussion  Dear Mr.Tanaka, It‘s been a long time since we have met last time. I hope you are fine. I am writing you about the our sponsored meeting in Bali will be held in June. Our budget is very tight, but we have determined to be held in Bali because we need to have fresh idea. Our contract travel agent will offer air ticket to Bali in very reasonable price. Of course we will buy all your air ticket. Could you send us copies of all participant ASAP ? Then I will buy air tickets to Bali. I will let you know the itinerary of the tour when I get them. Thank you for support and continuous help. Kento Hayasaka
  • 3.  If the subject is not suited to business e-mail, the reader regard your e-mail as spam and don’t read it.  The reader would think you are trustworthy if your e-mail is appropriate.
  • 4.  If your e-mail is not proper as business e-mail, the reader would not trust you and you will suffer a loss on business scene.  For these reasons, learning business e-mails is important
  • 5.  Reading books about English e-mail You can learn writing English e-mail practically at low cost.  Reading websites that teaching English e-mail ◦ You can read some topics about English e-mail for free  Go to English lesson school  Practice writing e-mail in English
  • 6.  Writing business e-mail skill is very important to build a good relationship of trust in business situation.  You can improve your business e- mail skill in many ways.
  • 7.  E-mail example in slide 2 http://englishmail.org/business/kaigitsuchi_1. html#mail