Flylib.com
List of Figures
Previous page
Table of content
Next page
Strategy 1: Know Thy Audience
Figure 1-1: PRE-SESSION SURVEY The Seven Strategies of Master Presenters
Figure 1-2: PARTICIPANT INSTRUCTIONS FOR THE DEVELOPMENT OF CASE STUDIES
Strategy 2: Prepare Outstanding Content
Figure 2-1
Strategy 3: Use Superior Organization
Figure 3-1
Figure 3-2
Figure 3-3
Figure 3-4
Figure 3-5
Figure 3-6
Figure 3-7
Figure 3-8
Figure 3-9
Strategy 4: Develop Dynamic Delivery
Figure 4-1
Strategy 5: Make It Memorable, Actionable, and Transferable
Figure 5-1: SAMPLE THREE-BY-THREE FORM
Strategy 6: Manage Yourself, Difficult Participants, and Difficult Situations
Figure 6-1: Peak Performance Curve
Figure 6-2
Figure 6-3: External/Internal Locus of Control
Strategy 7: Total Quality Improvement
Figure 7-1: THE 3 3 FEEDBACK FORM
Figure 7-2: PRESENTATION EVALUATION FORM
Figure 7-3: DAILY EVALUATION FORM
Figure 7-4
Figure 7-5: COMPONENTS PARTS EVALUATION FORM
Figure 7-6
Figure 7-7: SIX MONTHS TO ONE YEAR POST-PRESENTATION EVALUATION FORM
Figure 7-8
Figure 7-9
Previous page
Table of content
Next page
The Seven Strategies of Master Presenters
ISBN: 1564147444
EAN: 2147483647
Year: 2003
Pages: 109
Authors:
Bradley C. McRae
,
David Brooks
BUY ON AMAZON
Qshell for iSeries
Scripting
Using Parameters and Variables
Commands
The Perl Utility
Appendix A Summary of Changes by Release
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Static Library from the Command Line
Making a Constructor Exception-Safe
Finding the Greatest or Least Value in a Container
Notifying One Thread from Another
Working with Xerces Strings
Building Web Applications with UML (2nd Edition)
Activities
Discussion
Virtual and Physical HTTP Resources
Discussion
Implementation
Data Structures and Algorithms in Java
Implementing Stacks and Queues
Problems
Vocabulary
Advanced Trees
Topological Sorting
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 38. Graph Your Wireless Performance
Hack 55. Increase the Range of a PowerBook
Hack 94. Analyze Elevation Profiles for Better Long-Range Wireless Networking
Section A.2. 802.11a: The Betamax of the 802.11 Family
Section A.10. 802.1x: Port Security for Network Communications
Ruby Cookbook (Cookbooks (OReilly))
Printing a Date
Indexing Unstructured Text with SimpleSearch
Validating Data with ActiveRecord
Using breakpoint in Your Web Application
Creating a Windows Service
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies