SlideShare a Scribd company logo
1 of 3
1. How important are communication skills in project
management?
In any organization, communication plays a vital role in
managing the project. When one working as a group the
common complaints which register the most are lack o
communication. On to be successful in being the project
manager he/she should possess excellent communication skills.
Communication is not only about perfection; it must improve
from day to day. The project manager should spend most of the
time in the conversation. Communication speaks not about
speaking or listening to the one’s words; it is about conveying
the content accurately to the opposite persons. Whatever the
person says it should be understandable to a different person.
Better communication improved by adjusting with the
environment, i.e., one should come to know the opposite person
can understand which language by that the person should
express the content in his imperative language then the opposite
person can understand the material quickly. By maintaining the
proper word also helps in achieved excellent communication. If
the above qualities cannot found, then there is a lack of
communication in the member. If proper communication is not
maintained, then it leads to conversation and also points to the
failure of the project. If one possesses poor communication,
then he cannot express the goal of the project by that it results
in the project failure. Usually, communication is of two types
they are active communication, and the other one is passive
communication.
2. Was Herb the right person to be assigned as the project
manager?
According to my opinion, I would not suggest herb as the
project manager one of the reason is he is not interested, and the
other reason is the person was not experienced in the role of the
project manager. As mentioned in the case study, the herb was
the one who possesses the experience in research and
development and also in the subject matter expert (SME) in
manufacturing engineering. So, I prefer to make him the
manager for R&D department. By that, he can deal with the task
which is assigned by the manager of the project. This would be
helpful in future works. As the case study didn’t speak about
Bob, Alice, and Betty so we cannot talk about them so herb
should not be appointed as the project manager. Making herb as
the project manager is not a quick decision.
3. There were communications issues with Alice, Bob, Betty,
and Frank. For each communication issue, where was the
breakdown in communications: encoding, decoding, feedback,
and so on?
Herb didn’t communicate with the team members who are in the
team regarding the project. Being the project manager, he
should talk with everyone who is in the group and should
motivate them regarding project success. The main reason for
miscommunication with Alice is he is not familiar with the
language which Alice speaks coming to Bob he was encoding
because he needed the communication with the engineers. When
coming to Betty, she needs the procurement cost Betty not
included in the meeting which was conducted by the herb.
References
Effective Communication in Project Management. (2018,
January 17). Retrieved March 27, 2019, from
https://www.teamgantt.com/blog/why-communication-is-
important-in-project-management/
Was the herb right person to be assigned for the project
Manager? – yieldstudy. (n.d.). Retrieved March 27, 2019, from
http://www.yieldstudy.com/was-the-herb-right-person-to-be-
assigned-for-the-project-manager/

More Related Content

More from salmonpybus

Discuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxDiscuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxsalmonpybus
 
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxDiscuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxsalmonpybus
 
Discuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxDiscuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxsalmonpybus
 
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxDiscuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxsalmonpybus
 
Discuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxDiscuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxsalmonpybus
 
Discuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxDiscuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxsalmonpybus
 
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxDiscuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxsalmonpybus
 
Discuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxDiscuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxsalmonpybus
 
Discuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxDiscuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxsalmonpybus
 
discuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxdiscuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxsalmonpybus
 
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxDiscuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxsalmonpybus
 
Discuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxDiscuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxsalmonpybus
 
Discuss Edward Saids concept of Orientalism and its relationship .docx
Discuss Edward Saids concept of Orientalism and its relationship .docxDiscuss Edward Saids concept of Orientalism and its relationship .docx
Discuss Edward Saids concept of Orientalism and its relationship .docxsalmonpybus
 
Discuss educational plans for preventing the spread of COVID-1.docx
Discuss educational plans for preventing the spread of COVID-1.docxDiscuss educational plans for preventing the spread of COVID-1.docx
Discuss educational plans for preventing the spread of COVID-1.docxsalmonpybus
 
Discuss e-commerce its development and future perspectives. Sourc.docx
Discuss e-commerce its development and future perspectives. Sourc.docxDiscuss e-commerce its development and future perspectives. Sourc.docx
Discuss e-commerce its development and future perspectives. Sourc.docxsalmonpybus
 
Discuss different encryption methods that are specific to Microsoft .docx
Discuss different encryption methods that are specific to Microsoft .docxDiscuss different encryption methods that are specific to Microsoft .docx
Discuss different encryption methods that are specific to Microsoft .docxsalmonpybus
 
Discuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss critical infrastructure and key resources (CIKR). What are t.docxDiscuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss critical infrastructure and key resources (CIKR). What are t.docxsalmonpybus
 
Discuss differences in research findings regarding sentences imposed.docx
Discuss differences in research findings regarding sentences imposed.docxDiscuss differences in research findings regarding sentences imposed.docx
Discuss differences in research findings regarding sentences imposed.docxsalmonpybus
 
Discuss cultural disparity in health care for the Hispanic commu.docx
Discuss cultural disparity in health care for the Hispanic commu.docxDiscuss cultural disparity in health care for the Hispanic commu.docx
Discuss cultural disparity in health care for the Hispanic commu.docxsalmonpybus
 
Discuss consensus-building activities you have been involved with .docx
Discuss consensus-building activities you have been involved with .docxDiscuss consensus-building activities you have been involved with .docx
Discuss consensus-building activities you have been involved with .docxsalmonpybus
 

More from salmonpybus (20)

Discuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxDiscuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docx
 
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxDiscuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
 
Discuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxDiscuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docx
 
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxDiscuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
 
Discuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxDiscuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docx
 
Discuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxDiscuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docx
 
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxDiscuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
 
Discuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxDiscuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docx
 
Discuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxDiscuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docx
 
discuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxdiscuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docx
 
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxDiscuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
 
Discuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxDiscuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docx
 
Discuss Edward Saids concept of Orientalism and its relationship .docx
Discuss Edward Saids concept of Orientalism and its relationship .docxDiscuss Edward Saids concept of Orientalism and its relationship .docx
Discuss Edward Saids concept of Orientalism and its relationship .docx
 
Discuss educational plans for preventing the spread of COVID-1.docx
Discuss educational plans for preventing the spread of COVID-1.docxDiscuss educational plans for preventing the spread of COVID-1.docx
Discuss educational plans for preventing the spread of COVID-1.docx
 
Discuss e-commerce its development and future perspectives. Sourc.docx
Discuss e-commerce its development and future perspectives. Sourc.docxDiscuss e-commerce its development and future perspectives. Sourc.docx
Discuss e-commerce its development and future perspectives. Sourc.docx
 
Discuss different encryption methods that are specific to Microsoft .docx
Discuss different encryption methods that are specific to Microsoft .docxDiscuss different encryption methods that are specific to Microsoft .docx
Discuss different encryption methods that are specific to Microsoft .docx
 
Discuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss critical infrastructure and key resources (CIKR). What are t.docxDiscuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss critical infrastructure and key resources (CIKR). What are t.docx
 
Discuss differences in research findings regarding sentences imposed.docx
Discuss differences in research findings regarding sentences imposed.docxDiscuss differences in research findings regarding sentences imposed.docx
Discuss differences in research findings regarding sentences imposed.docx
 
Discuss cultural disparity in health care for the Hispanic commu.docx
Discuss cultural disparity in health care for the Hispanic commu.docxDiscuss cultural disparity in health care for the Hispanic commu.docx
Discuss cultural disparity in health care for the Hispanic commu.docx
 
Discuss consensus-building activities you have been involved with .docx
Discuss consensus-building activities you have been involved with .docxDiscuss consensus-building activities you have been involved with .docx
Discuss consensus-building activities you have been involved with .docx
 

1. How important are communication skills in project management

  • 1. 1. How important are communication skills in project management? In any organization, communication plays a vital role in managing the project. When one working as a group the common complaints which register the most are lack o communication. On to be successful in being the project manager he/she should possess excellent communication skills. Communication is not only about perfection; it must improve from day to day. The project manager should spend most of the time in the conversation. Communication speaks not about speaking or listening to the one’s words; it is about conveying the content accurately to the opposite persons. Whatever the person says it should be understandable to a different person. Better communication improved by adjusting with the environment, i.e., one should come to know the opposite person can understand which language by that the person should express the content in his imperative language then the opposite person can understand the material quickly. By maintaining the proper word also helps in achieved excellent communication. If the above qualities cannot found, then there is a lack of communication in the member. If proper communication is not maintained, then it leads to conversation and also points to the failure of the project. If one possesses poor communication, then he cannot express the goal of the project by that it results in the project failure. Usually, communication is of two types they are active communication, and the other one is passive communication. 2. Was Herb the right person to be assigned as the project manager? According to my opinion, I would not suggest herb as the project manager one of the reason is he is not interested, and the other reason is the person was not experienced in the role of the
  • 2. project manager. As mentioned in the case study, the herb was the one who possesses the experience in research and development and also in the subject matter expert (SME) in manufacturing engineering. So, I prefer to make him the manager for R&D department. By that, he can deal with the task which is assigned by the manager of the project. This would be helpful in future works. As the case study didn’t speak about Bob, Alice, and Betty so we cannot talk about them so herb should not be appointed as the project manager. Making herb as the project manager is not a quick decision. 3. There were communications issues with Alice, Bob, Betty, and Frank. For each communication issue, where was the breakdown in communications: encoding, decoding, feedback, and so on? Herb didn’t communicate with the team members who are in the team regarding the project. Being the project manager, he should talk with everyone who is in the group and should motivate them regarding project success. The main reason for miscommunication with Alice is he is not familiar with the language which Alice speaks coming to Bob he was encoding because he needed the communication with the engineers. When coming to Betty, she needs the procurement cost Betty not included in the meeting which was conducted by the herb. References Effective Communication in Project Management. (2018, January 17). Retrieved March 27, 2019, from https://www.teamgantt.com/blog/why-communication-is- important-in-project-management/ Was the herb right person to be assigned for the project Manager? – yieldstudy. (n.d.). Retrieved March 27, 2019, from