The Essential Guide to Business Etiquette

Total Page:16

File Type:pdf, Size:1020Kb

The Essential Guide to Business Etiquette The Essential Guide to Business Etiquette Lillian Hunt Chaney Jeanette St. Clair Martin Praeger The Essential Guide to Business Etiquette The Essential Guide to Business Etiquette LILLIAN HUNT CHANEY AND JEANETTE ST. CLAIR MARTIN Library of Congress Cataloging-in-Publication Data Chaney, Lillian H. The essential guide to business etiquette / Lillian Hunt Chaney and Jeanette St. Clair Martin. p. cm. Includes bibliographical references and index. ISBN 978–0–275–99714–4 (alk. paper) 1. Business etiquette. 2. Interpersonal relations. 3. Business communication. 4. Self-presentation. I. Martin, Jeanette S. II. Title. HF5389.C468 2007 395.5’2—dc22 2007022771 British Library Cataloguing in Publication Data is available. Copyright © 2007 by Lillian Hunt Chaney and Jeanette St. Clair Martin All rights reserved. No portion of this book may be reproduced, by any process or technique, without the express written consent of the publisher. Library of Congress Catalog Card Number: 2007022771 ISBN: 978–0–275–99714–4 First published in 2007 Praeger Publishers, 88 Post Road West, Westport, CT 06881 An imprint of Greenwood Publishing Group, Inc. www.praeger.com Printed in the United States of America The paper used in this book complies with the Permanent Paper Standard issued by the National Information Standards Organization (Z39.48-1984). 10987654321 Contents Introduction xi 1. Job Interview Etiquette 1 Applicant Etiquette 2 Interviewer Etiquette 8 2. Business Dress and Grooming 13 Dress Considerations 14 Attributes of Dress 17 Research Findings Related to Business Dress 18 Business Professional Attire 18 Business Casual Attire 21 Dress for Special Events and Occasions 22 3. Office Politics 25 Self-Promotion 26 Honesty and Truth-Telling 28 Compliments and Flattery 29 Gossip 30 vi Contents Favors and Hidden Motives 32 Dress and Grooming 32 Business Socializing and Etiquette 33 4. Social Sensitivity 37 Office Courtesies 38 Disabled Persons 42 Office Conflict 43 Sexual Harassment 44 Office Romance 46 5. Electronic Communication Etiquette 49 Telephones 49 Speakerphones 52 Cellular Telephones and Pagers 52 Answering Machines and Voice Mail 54 Electronic Mail (E-Mail) 55 BlackBerry Devices 57 Facsimile (Fax) Transmissions 58 6. Manners for Special Occasions and Events 61 Births and Birthdays 61 Illnesses and Injuries 63 Hospital Etiquette 63 Holiday and Office Parties 64 Weddings and Wedding Anniversaries 66 Business Receptions, Conventions, and Trade Shows 67 Promotions and Retirements 68 Funerals 69 7. Written Communication Manners 73 Letter and Memorandum Formats 73 Stationery 75 Writing Guidelines 76 Contents vii Thank-You Notes 77 Condolence Letters 79 Congratulatory Letters 80 Invitations 80 Acceptance or Regrets 81 Announcements 82 Complaint Letters 83 Cards 84 8. Dining Etiquette 85 Styles of Eating and Place Settings 86 Basic Guidelines for Business Dining 86 Problem Dining Situations 89 Manners for Difficult-to-Eat Foods 91 Cultural Variations in Dining Etiquette 92 9. Business Entertaining 97 Restaurant Entertaining 97 Wine and Toasting Etiquette 99 Entertaining at Private Clubs, Sporting Events, and the Theater 101 Cocktail Parties and Receptions 102 Home Entertaining 103 Entertaining International Visitors 104 10. Meeting Etiquette 107 Meeting Planning and Preparation 108 Introductions and Seating Arrangements 109 Chairing Responsibilities 110 Participant Responsibilities 112 Refreshments 113 Follow-Up Activities 113 Business Meal Meetings 114 Conventions 115 viii Contents Virtual Meetings 116 Multicultural Meetings 116 11. Presentations 119 Eye Contact, Posture, and Gestures 119 Presentation Attire 120 Vocal Characteristics 121 Presentation Organization 122 Humor 123 Visual Aids 124 Presenter Etiquette 125 Distracting or Annoying Presenter Behaviors 126 Presenter Introductions 127 Audience Etiquette 128 12. Sports Etiquette 131 Rules of Etiquette for All Sports 131 Handball and Racquet Sports Etiquette 133 Golf Etiquette 134 Water Sports Etiquette 136 Gym or Health Club Etiquette 136 Hunting and Fishing Etiquette 138 Running, Biking, and Rollerblading Etiquette 138 Spectator Etiquette 138 13. Travel Etiquette 143 Suggestions for Business Travel 143 Air Travel Etiquette 144 Bus, Train, and Mass Transit Etiquette 147 Automobile Etiquette 148 Taxicab and Limousine Etiquette 149 Cruise Ship Etiquette 150 Hotel Manners 151 Contents ix 14. Global Manners 155 Travel Preparation 155 Guidelines for Global Interactions 157 Tips for Women Business Travelers 158 Manners for Selected Regions of the World 160 Notes 167 Index 185 Introduction Etiquette alone will not enable you to reach your targeted goal. It will give you the extra edge that will make the difference between you and the competition.1 Business etiquette is the behavior and manners considered appropriate in the business and professional world. Business etiquette involves rules of conduct that allow us to communicate with people in business and to interact with them in a civilized manner. Most people who are successful in the business and professional world conform to these guidelines of expected behavior.2 Research findings indicate that etiquette is important to business suc- cess. Results of a survey of 200 members of the American Marketing Association revealed that a majority of respondents (91.1%) rated eti- quette as either very important or important to business success, regard- less of age, gender, educational level, income, or marital status.3 Despite the acknowledged importance of business etiquette, research has shown that a lack of courtesy and respect for others is currently a serious prob- lem in the United States. In fact, a study by a nonprofit organization revealed that 79% of U.S. persons surveyed expressed the belief that a lack of respect and courtesy was a serious problem in U.S. businesses. In addition, 73% felt that U.S. Americans treated each other with more respect in years gone by than they treat each other today.4 According to corporate trainers who conduct sessions on civility, as well as professors at well-known universities who study workplace behavior, people are becoming increasingly rude to their office col- leagues. They seem oblivious to the fact that a standard of behavior xii Introduction exists.5 Top executives in major corporations agree; many feel that some of the problems their companies are experiencing are directly related to a lack of knowledge about proper business etiquette.6 According to Leon- ard, ‘‘Like it or not, management equates good manners with competence in business and poor manners with incompetence.’’7 Thus, employees will want to invest the necessary time to become knowledgeable about the rules of polite behavior and to practice their etiquette skills in the office environment so that they will not only be perceived as competent but will also be considered as assets to the firm. Confidence comes with knowledge; nothing else quite compares to knowing that you know— how to dress, how to eat, and how to behave in various situations. Know- ing that you will make a positive initial impression is a great confidence booster. Keep in mind that when you make a negative initial impression, about eight subsequent encounters that are positive are needed to reverse an initial bad impression.8 The Essential Guide to Business Etiquette features fourteen chapters on the most critical areas that can help you succeed in your career. It is a practi- cal guide for interacting effectively with colleagues, supervisors, and cus- tomers. The book begins with information essential to getting off to a good start during the job interview by preparing an effective re´sume´ and dressing appropriately; correct behavior during the interview and suggestions for follow-up procedures are also included. In addition to job interview attire, dress appropriate for the work environment, includ- ing both professional dress and business casual attire, are discussed. The chapters on office politics and social sensitivity provide strategies for dealing with situations that go beyond hard work and good perfor- mance; they involve becoming adept at political maneuvering and being sensitive to appropriate behavior in certain situations. The chapters on electronic communication etiquette, manners for special occasions and events, and written communication manners provide guidelines for com- municating electronically and in writing, in addition to the nuances of proper behavior at such special events as birthdays, office parties, wed- dings, business receptions, promotions and retirements, and funerals. Information in the chapters on dining etiquette and business entertaining includes U.S. styles of eating and business entertaining as well as cultural variations in dining and entertaining. The chapters on meeting etiquette and presentations include chair and participant meeting responsibilities and suggestions for making effective presentations, including attire and other nonverbal behavior, use of humor and visual aids, and audience eti- quette. The chapter on sports etiquette addresses the importance of cor- rect behavior as a player and as a spectator. Business executives often find that observing the behavior of potential clients or business partners during these sporting events provides useful information upon which to base business decisions. Introduction xiii Thegrowthininternationaltrade, as well as increased numbers of minorities in the U.S. workplace, has led to more interactions with people from other cultures. Thus, knowledge of the rules of etiquette must be expanded to
Recommended publications
  • Alumni Day Tues. October 12
    ST. VOLUME 5 BROOKLYN, N. Y., OCTOBER, 1943 NUMBER 1 ALUMNI DAY TUES. OCTOBER 12 A REPORT FROM FR. MAHONEY, C.M. FATHER .. TOM .. GORMAN, C.M., TO SPEAK To the Members of the Alumni: The theme, "Our Honored Dead and Our Men in Service," At the annual Alumni banquet last February, we gave you will feature the twelfth annual Alumni Day to be held on Columbus a picture of the effects of war upon our University. In rhe inter­ Day, Tuesday, October 12, 1943. The program will open with a vening months there has been no substantial change in these mass at 10:30 A.M. in the Perboyre Chapel adjacent to St. John conditions. the Baptist Church. A general meeting will follow in DeGray Hall where the principal speaker will be the Rev. Thomas Gorman, C.M., The war has levied a heavy toll upon our student personnel who for many years taught in the College. Other speakers will be and otherwise disrupted the normal college life to which you the Very Rev. William J. Mahoney, C.M., the president of the were so accustomed. Yet we are making every effort to continue to offer to those who can attend the blessed benefits of Catholic Univecsity. Later as guests of the College, luncheon will be served in the cafeteria. higher education. As you are aware, the Armed Forces are making use of the For many years it has been Alumni tradition to remember our facilities of some colleges throughout the country. And we have dead on Alumni Day.
    [Show full text]
  • International Jurisdiction and the Internet in the Age of Cloud Computing Kurt Wimmer, Eve Pogoriler, and Stephen Satterfield COVINGTON & BURLING LLP, WASHINGTON, D.C
    Reproduced with permission from BNA’s Internet Law Resource Center™, Copyright 2011, The Bureau of National Affairs, Inc. (800-372-1033) www.bna.com. International Jurisdiction and the Internet in the Age of Cloud Computing Kurt Wimmer, Eve Pogoriler, and Stephen Satterfield COVINGTON & BURLING LLP, WASHINGTON, D.C. Kurt Wimmer is a partner concentrating in technology and media law, as well as intellectual property and data privacy. He represents digital media, television, mobile, publishing, and new technology companies. Eve Pogoriler is an associate in the communications and media group. She also practices in the area of privacy and data security. Stephen Satterfield is an associate in the global privacy and data security practice group. Covington & Burling LLP’s web address is http://www.cov.com. __________ The internet touches every country in the world and the lives of some two billion people worldwide who use it.1 The internet’s universality is a great part of its strength as a tool for business, but that universality also creates unique business risks. Worldwide access exposes website operators and internet publishers to the possibility of being haled into courts around the globe. A business operating online must therefore account for the risk of being sued in a distant jurisdiction that may provide very different rights and responsibilities than the jurisdiction the business considers its “home.” The immediacy of this risk rises exponentially as businesses and individuals increasingly utilize “cloud computing” services in which data is stored on remote servers that could be located in any country in the world.2 This Article provides an overview of the risks facing businesses in the online space and a description of recent efforts by courts and regulators to diminish that risk—or at least make it more predictable.
    [Show full text]
  • Dead Canaries in the Coal Mines: the Symbolic Assailant Revisited, 34 Ga
    Georgia State University Law Review Volume 34 Article 1 Issue 3 Spring 2018 5-1-2018 Dead Canaries in the Coal Mines: The yS mbolic Assailant Revisited Jeannine Bell Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://readingroom.law.gsu.edu/gsulr Part of the Civil Rights and Discrimination Commons, Constitutional Law Commons, Criminal Law Commons, Criminal Procedure Commons, Fourteenth Amendment Commons, Fourth Amendment Commons, Law and Race Commons, Law and Society Commons, and the Law Enforcement and Corrections Commons Recommended Citation Jeannine Bell, Dead Canaries in the Coal Mines: The Symbolic Assailant Revisited, 34 Ga. St. U. L. Rev. 513 (2018). Available at: https://readingroom.law.gsu.edu/gsulr/vol34/iss3/1 This Article is brought to you for free and open access by the Publications at Reading Room. It has been accepted for inclusion in Georgia State University Law Review by an authorized editor of Reading Room. For more information, please contact [email protected]. Bell: Dead Canaries in the Coal Mines: The Symbolic Assailant Revisited DEAD CANARIES IN THE COAL MINES: THE SYMBOLIC ASSAILANT REVISITED Jeannine Bell* ABSTRACT The well-publicized deaths of several African-Americans—Tamir Rice, Philando Castile, and Alton Sterling among others—at the hands of police stem from tragic interactions predicated upon well-understood practices analyzed by police scholars since the 1950s. The symbolic assailant, a construct created by police scholar Jerome Skolnick in the mid-1960s to identify persons whose behavior and characteristics the police view as threatening, is especially relevant to contemporary policing.
    [Show full text]
  • Dynamics of Change in the US Air Transportation System
    2 Abstract The US Air Transportation System is currently facing a number of challenges including an increasing demand for travel and growing environmental requirements. In order to successfully meet future needs, the system will need to transition from its current state using a combination of technology, infrastructure, procedure, and policy changes. However, the complexities of the air transportation system make implementing changes a challenge. In particular, the multi-stakeholder nature of the system poses a significant barrier to transition. Historically, many changes in the air transportation system were driven by safety concerns and implemented following accidents which provided the momentum to overcome transition barriers. As a result of past changes, the system has become increasingly safe resulting in the emergence of new drivers for change. Security has emerged as a driver following the terrorist attacks of 9/11/2001 in the US and a number of system changes have since been implemented. Currently, capacity is one of the largest drivers of change. Addressing capacity issues requires solutions that can be accepted by stakeholders, and pass the necessary certification and approval requirements for implementation. The contribution of aviation to global greenhouse gas emissions is also becoming a significant driver for change in the system. The goal of this work is to understand how the air transportation system changes in response to safety, security, capacity, and environmental drivers for transition. In order to understand the dynamics of transition, historical cases of system change were studied. Twenty seven such cases have been analyzed to construct a feedback process model of transition and to explore specific change dynamics observed.
    [Show full text]
  • Chaos and Terror – Manufactured by Psychiatry
    CCHR_Terror CVR R25-1.ps 10/22/04 8:25 AM Page 1 “Through the use of drugs, the skilled mind controller could first induce a hypnotic trance. Then, one of several behavior modification techniques could be employed with amplified success. In themselves, without directed suggestions, drugs affect the mind in random ways. But when drugs are combined with hypnosis, an individual can be molded and manipulated beyond his own recognition.” CHAOS AND — Walter Bowart Author, Operation Mind Control TERROR Manufactured by Psychiatry Report and recommendations on the role of psychiatry in international terrorism Published by Citizens Commission on Human Rights Established in 1969 CCHR_Terror CVR R25-2.ps 10/22/04 8:25 AM Page 2 Citizens Commission on Human Rights RAISING PUBLIC AWARENESS ducation is a vital part of any initiative to reverse becoming educated on the truth about psychiatry, and that social decline. CCHR takes this responsibility very something effective can and should be done about it. IMPORTANT NOTICE Eseriously. Through the broad dissemination of CCHR’s publications—available in 15 languages— CCHR’s Internet site, books, newsletters and other show the harmful impact of psychiatry on racism, educa- For the Reader publications, more and more patients, families, tion, women, justice, drug rehabilitation, morals, the elderly, professionals, lawmakers and countless others are religion, and many other areas. A list of these includes: he psychiatric profession purports to be know the causes or cures for any mental disorder the sole arbiter on the subject of mental or what their “treatments” specifically do to the THE REAL CRISIS—In Mental Health Today CHILD DRUGGING—Psychiatry Destroying Lives health and “diseases” of the mind.
    [Show full text]
  • Tandy's Little Wonder the Color Computer 1979-1991
    Tandy's Little Wonder The Color Computer 1979-1991 A complete history and reference guide to the CoCo and all related hardware, software, and support sources. by F.G. Swygert SECOND EDITION - UPDATED FEB 2006 Tandy's Little Wonder page 1 INSIDE FRONT COVER If printing to bind, print only page 1 (front cover) on card stock or heavy colored paper. page 2 Tandy's Little Wonder Tandy's Little Wonder the Color Computer: 1980-1991 (and still going strong into the next century!) Second Edition written & edited by F.G. Swygert The Original Tandy Color Computer First Edition Copyright 1993, Second Edition Copyright 2006 by F.G. Swygert. All rights reserved. Published by FARNA Systems 147 Tom Moore Road, Leesville, SC 29070 e-mail: [email protected] Tandy's Little Wonder page 3 Tandy's Little Wonder the Color Computer SPECIAL ACKNOWLEDGEMENTS: The following individuals have made contributions directly or indirectly to the content of this book : Frances Calcraft Lee Duell Thomas Fann Art Flexser Marty Goodman Frank Hogg Alan Huffman Don Hutchison Carmen Izzi Jr. M. David Johnson Bob Kemper Mark Marlette (Cloud-9) Nicholas Marentes Dave Myers Bob Montowski Alfredo Santos Kelly Thompson Jordan Tsvetkoff Rick Ulland Brian Wright Glenside Color Computer Club Mid-Iowa & Country CoCo Club Banner for the 15th "Last" CoCoFest annually hosted by Glenside Color Computer Club -- true stalwarts of the CoCo Community! This edition is dedicated to all those who continue to collect, use, and enjoy the Tandy Color Computer. All brand/trade names copyright their respective owners. No part of this publication may be reproduced or quoted without written permission from the publisher.
    [Show full text]
  • Commodore - 64 „ Word Processors AJIR
    $2.50 NO. 64 SEPTEMBER 1983 International Edition $3.00 /Acim a g in g . Computer Knowledge x Design your own !\ V educational software Elementary students use Logo Establish an effective computer curriculum in your school system Turtle Graphics for the VIC-20 and C64 More Than in the Valley I Look a\ a Personal Computer See page 28 See page 60 See page 37 Atari Painting Program Wraps Up A Product Catalog for the Atari and Apple Text Compression and Encryption Will Remember (If you . ■* . ,r *■> . *•,*- fCS&p Imagine a system that would record all MAGIC MEMORY4 is built for th&axr^V; the wonderous, valuable information puter rookie Everyone can relate to -/ you have assimilated onto a single tiny MAGIC MEMORY* becauseitsfofrft is^ r disk. (No more scattered bits of paper, familiar. It looks like an address book ''1 business cards, etc.) Imagine the same but its not. Its more. Like the address system giving you a typed sheet you book MAGIC MEMORY" presents an could put into a notebook or print out A thru Z index tabulation on the right for a party and instantly change, or add edge of the video display The user to, at a moments notice. Imagine cross- simply selects a tab and the book is referencing to suit both your business opened to the proper page(s). A second needs and personal desires so that all set of tabs are available that can be your data was organized into one little labeled by the user (i e companies one black book! On top of all this — imagine deals with, birthdays, lists, wines, having fun putting it together.
    [Show full text]
  • The Symbolic Assailant Revisited
    THE SYMBOLIC ASSAILANT REVISITED Jeannine Bell* Abstract The well-publicized deaths of several African Americans—Tamir Rice, Philando Castile and Alton Sterling among others—at the hands of police stem from tragic interactions predicated upon well-understood practices that police scholars have been analyzing since the 1950s. The symbolic assailant, a construct created by police scholar Jerome Skolnick in the mid-1960s to identify persons whose behavior and characteristics the police view as threatening is especially relevant to contemporary policing. This Article explores the societal roots of the creation of a Black symbolic assailant in contemporary American policing. The construction of African American men as symbolic assailants is one of the most important factors characterizing police interaction with African American males. This is not a one size fits all approach to blackness. As the Article discusses, police officers’ treatment of African American women is also fraught, but markedly different. I argue that current strategies for ending police violence do not sufficiently address the prominence of the symbolic assailant in proactive policing strategies. This Article suggests an unusual solution to commonly understood mechanisms of addressing police violence. Based on my experience with police who had productive relationships with crime victims of color, I suggest a reorientation of policing practices predicated on a more reactive model of policing. * Richard S. Melvin Professor of Law, Indiana University Maurer School of Law, Bloomington. A.B. Harvard College, 1991; J.D. University of Michigan, 1999; Ph.D. (Political Science) 2000. This article was presented in draft at U.C. Berkeley, Duke and the University of Wisconsin law schools.
    [Show full text]
  • Mental Illness Frontmatter 3/1/04 8:45 AM Page 1
    Mental Illness Frontmatter 3/1/04 8:45 AM Page 1 Mental Illness OPPOSING VIEWPOINTS ® Mental Illness Frontmatter 3/1/04 8:45 AM Page 2 Other Books of Related Interest OPPOSING VIEWPOINTS SERIES Alcohol An Aging Population Chemical Dependency Child Abuse The Death Penalty Health Care Health and Fitness The Homeless Suicide Teens at Risk CURRENT CONTROVERSIES SERIES Alcoholism Capital Punishment The Disabled Mental Health Suicide Teen Addiction AT ISSUE SERIES Teen Suicide CONTEMPORARY ISSUES COMPANION Depression Eating Disorders Mental Illness Frontmatter 3/1/04 8:45 AM Page 3 Mental Illness OPPOSING VIEWPOINTS ® Tamara L. Roleff and Laura Egendorf, Book Editors David L. Bender, Publisher Bruno Leone, Executive Editor Bonnie Szumski, Editorial Director David M. Haugen, Managing Editor Greenhaven Press, Inc., San Diego, California Mental Illness Frontmatter 3/1/04 8:45 AM Page 4 Cover photo: PhotoDisc, Inc. Library of Congress Cataloging-in-Publication Data Mental illness / Tamara L. Roleff, Laura K. Egendorf, book editors. p. cm. — (Opposing viewpoints series) Includes bibliographical references and index. ISBN 0-7377-0348-2 (hc : alk. paper) — ISBN 0-7377-0347-4 (pbk. : alk. paper) 1. Mental illness—Public opinion. 2. Mental illness—Social aspects. 3. Mental illness—Miscellanea. I. Roleff, Tamara L., 1959– . II. Egendorf, Laura K., 1973– . III. Series. RC454.4 .M463 2000 616.89—dc21 99-055632 CIP Copyright ©2000 by Greenhaven Press, Inc. Printed in the U.S.A. No part of this book may be reproduced or used in any form or by any means, electrical, mechanical, or otherwise, including, but not limited to, photocopy, recording, or any information storage and retrieval system, without prior written permission from the publisher.
    [Show full text]
  • Atari 130XE Machine Language for the Absolute Beginner Kindle
    ATARI 130XE MACHINE LANGUAGE FOR THE ABSOLUTE BEGINNER PDF, EPUB, EBOOK Kevin Bergin | 164 pages | 03 Sep 2020 | ACORN BOOKS | 9781789824322 | English | none Atari 130XE Machine Language for the Absolute Beginner PDF Book M; Ewbank, Kay. OK, as promised, these are the companion programs for the book "Atari xe Machine Language for the Absolute Beginner". Master Memory Map for the Atari Topics: graphics, poke, location, screen, mode, byte, locations, bytes, memory, color, graphics mode, Inside Atari Basic. Then, if you really wish to explore the world of python, learn and master its language, please click the? For example, you could collect procedures to do matrix algebra or create various graphics objects. Condition: Fair. Think of the virtual assistants of smartphones, product recommendations for customers in online shops, the prevention of credit card fraud, spam filters in e-mail programs, the detection and diagnosis of disease symptoms. We all know that Norton's book is very convenient to reed. An Atari 8-bit Extra from A. There is no embarrassment, lots of stuff is being dug up and typed in, fixed and placed into preservation. Topics: Atari, Atari , Atari xl, Mac65, programming, assembly language, receipt. Analysis of popular Python projects templates-? Games For Your Atari. Includes index Topics: poke, atari, display, memory, graphics, color, language, program, assembly language, data, atari What does this price mean? A nice book on programming the Atari computer Topics: atari computer programming retro, Atari Computer , Atari Computer. Posted January 4, You should have seen what it did to the number 0, but that was so obvious it was fixed on the spot.
    [Show full text]
  • College Catalog 2019-2020
    COLLEGE CATALOG 2019-2020 1 This page is intentionally left blank 2 Message from the Chancellor ..................................................................................................................................................................................................5 Student Information .....................................................................................................................................................................................................................7 Academic Calendar ......................................................................................................................................................................................................................8 Campuses/Attendance Sites ...................................................................................................................................................................................................9 College Information ....................................................................................................................................................................................................................21 Clinton Community College ........................................................................................................................................................................................22 Muscatine Community College ..................................................................................................................................................................................24
    [Show full text]
  • Color Basic Unravelled Ii Foreword Origin: Spectral Assoc Revised:12/26/99 Walter K Zydhek
    TABLE OF CONTENTS 1 FOREWORD……………………………………………………………………………………………………1 2 INTRODUCTION…………………………………………………………………………………………3 3 COLOR BASIC - AN INTERPRETER………………………………………………4 4 INTERPRETER MECHANICS…………………………………………………………………6 5 VARIABLES…………………………………………………………………………………………………10 6 CONSOLE INPUT/OUTPUT……………………………………………………………………13 APPENDICES A MEMORY MAP B DISASSEMBLY OF COLOR BASIC C BASIC ROUTINES AND ENTRY POINTS D FLOATING POINT ROUTINES E BASIC’S DATA/ASCII TABLES F MEMORY MAP DESCRIPTION G INTERRUPTS H OPERATOR PRECEDENCE I BASIC 1.0 DIFFERENCES J BASIC 1.1 DIFFERENCES K ASCII CHART COLOR BASIC UNRAVELLED II FOREWORD ORIGIN: SPECTRAL ASSOC REVISED:12/26/99 WALTER K ZYDHEK FOREWORD Due to the many requests for the Unravelled Series produced by Spectral Associates, and the fact that these books are rare and no longer in production, I have taken it upon myself to reproduce them in electronic .PDF (Adobe Acrobatâ) format. I have re-disassembled the ROMs listed in this book, and added all the comments from the Original Extended Basic Unravelled Book. Some changes were made to make the book a little easier to read. 1. The comments have been cleaned up some. In cases where a comments continued onto the next line, a * is placed in the Labels column, as well as a * at the beginning of each line of the comment. In cases where the previous comment used this format, a = was used. This was done in the original, but not all comments stuck to this format. 2. I have renumbered all the line numbers. Each Appendix (with code) starts at Line 0001. 3. Some spell checking, and context checking was done to verify accuracy. 4. I used the Letter Gothic MT Bold Font.
    [Show full text]