Premium Essay

Information Paper

In:

Submitted By djefferson1
Words 634
Pages 3
Now you can upload your resume directly to Monster using Word 2007! 1. Install Monster’s Easy Submit add-in by clicking the “Install” icon on the menu ribbon. 2. Once installation is complete, restart Word. 3. Click on the “Upload” icon to upload your resume to Monster.

For any issues or questions, please visit the Easy Submit installation support page.

To close this reminder, click the border and then press DELETE.

Now you can upload your resume directly to Monster using Word 2007! 4. Install Monster’s Easy Submit add-in by clicking the “Install” icon on the menu ribbon. 5. Once installation is complete, restart Word. 6. Click on the “Upload” icon to upload your resume to Monster.

For any issues or questions, please visit the Easy Submit installation support page.

To close this reminder, click the border and then press DELETE.

Demario Jefferson 2kee courtJackson, MS 39212 | Demario.jefferson78@yahoo.com | Home: 601-373-6218Cell: 601-670-3969 |

Dedicated customer service representative for 3+ years; I have been working for Ryder Transportation in the service department and currently overseeing customer service and quality inspection reviews.
Respected builder and leader of customer-focused teams; instill a shared, enthusiastic commitment to customer service as a key driver of company goal attainment. Lead by example and ensure the execution of all safety, security, quality and store operations policies.
Areas of Expertise Customer Service ManagementComplaint Handling & ResolutionRetail Operations Management | Customer Satisfaction Enhancement Front-End SupervisionSales & Margin Improvement | Teambuilding & TrainingCost-Reduction StrategiesOrder Fulfillment |
Professional Experience Ryder Transportation — Jackson, MS | 08/08 to Present |
Customer Service representative, 8/08 to present

Similar Documents

Free Essay

Computer Information Paper

...Computer Information Paper Computer information can be input in several different manners. Data may be input through a keyboard which is a device that allows the user to type the information directly into the computer. The keyboard is the most common and most utilized input device. An example of when the keyboard would be the best input device is printed questionnaires. Answering a questionnaire or conducting a telephone survey could be accomplished quickly and easily by simply typing the necessary information into the computer. Bank Checks are best entered by utilizing scanning technology similar to barcode scanners which are used on retail tags. A scanner reads the bar code and enters the information which the bar code represents. This method eliminates human error and insures the information is entered correctly. If it is necessary to input a long document, an optical scanner is the best choice. The optical scanner scans the entire document, page by page, and sends the document to a file folder for storage on a computer or storage device or to a printer if a printed copy is necessary. This method is fast so it only takes a few seconds to scan a long document into a computer file. Convenience and ease of use is important in for output devices. Hand held computers output information through visual output to video monitor or screen. Photographs are best input utilizing files such as JPEG and a scanner. Resumes and memorandums may best be output to a printer of email...

Words: 320 - Pages: 2

Premium Essay

Information Use Paper

...University of Phoenix INFORMATION USE PAPER IT/205 Ivy Chiangwa Matthew Juliana April 24, 2015 This paper will discuss various aspects related to how information is used and how it flows in an organization. I will try to gain further insight by identifying the information flow in my current place of employment. Other than discussing the use of information, this paper will also discuss the various challenges in controlling the information flow and how can organization keep it safe from unauthorized use. Information flow and use in an organization It is important to first discuss information before describing its uses and how it flows. Information refers to data that has been organized in a way to give meaning and value to the recipient (Rainer & Cegielski, 2011). In an organization, the information can refer to various events, activities in a workplace or various transactions that are recorded and organized to convey a meaning. Information can also be contained in facts, ideas, imagination, opinions which can be present in various media such as print, audio and video (Olowu, 2004). Data is gathered using information systems which further process this data to convert it into useful information. Information is a necessity in every part of the organization such as finance, human resource, management, sales etc. Without information, the organization would collapse since information is the life blood of modern organizations (Opara, 2003). Usually information flows in two ways...

Words: 878 - Pages: 4

Free Essay

Information Use Paper

...Information Use Paper Anthony Michelli IT/205 May 12, 2014 Michael Peterson Information Use Paper Information runs in a circular pattern. Much like how water cycles through a water plant, into a plumbing system, which can then go into different buildings and those buildings pass the water down back into the plumbing system. Organizations use information in a similar fashion where a customer will give information of a purchase, that purchase information is then stored into a database. From the database, the credit card information or other needed information when regarding purchases goes to the appropriate destinations such as banks, warehouses, distribution centers, etc. From those destinations, the information is passed back into a database. These patterns are referred to as information flows. The information flows allow an organization to carry out their services or distribute products. The more effective an information flow, the more effective an organization operates, flourishes, and expands and a business or non profit organization. Due to what information can do for an organization, information is kept closely guarded and is treated as a valuable piece of any organization and is considered a material resource. The information flow patterns are heavily secured as one organization would not want their information, nor their consumer’s sensitive information, to be compromised by an outside entity. Information, when treated as a material resource, helps managers...

Words: 708 - Pages: 3

Free Essay

Information Systems Paper

...Information Systems Gerardo Montano CIS 205 10-11-10 Steven Rubin Information Systems Information systems support the business processes in an organization in many ways. First of all, business today need to have information systems to survive in today’s Internet worked global environment. It has become a major fundamental area of business administration. These systems are useful for managers, business professionals, and all other specialized personnel. By saving time, money, and manpower, information systems handle a big task and are a perfect solution for any business. Whether it is a small business or a big enterprise, this will greatly improve any company. An information system uses the resources of people, hardware, software, data, and networks to perform several tasks. The responsibilities for the information systems are to perform input, to process, execute output, serve as storage, and control activities in the structure. Also, there are information systems’ resources and products, including instructions for people, programs, and procedures. They can create several forms of information with using these tools, such as paper reports, visual displays, multimedia documents, electronic messages, audio responses, and graphic images. The business development at a local corporation, named GPSIT, goes through several procedures before being completely processed. Information systems take a major part of this practice by sending out e-mails to hot...

Words: 764 - Pages: 4

Premium Essay

Information Use Paper

...Information Use Paper Tyler Claire CIS/319 University of Phoenix Facilitator John Ziah October 19, 2012 Information Use Paper The executive summary has critical information Technology. The bullets the author will discuss are as followed. Identifying and describing ways information technology is used in organization today and techniques on organization flow. The organization the author chose is BILO supermarket. The author will describe the software’s organization uses to be safe. Information technology has become a vital and integral part of organization today. Multinational Corporation maintains mainstream mainframe systems to small businesses that hold single computer in role play ("Information Technology & Its Role of Modern Organization", 2012).  Information system managements empower organization to perpetually store and receive data. The system is use to for storing product and customer information for businesses. System varies by the size of the organization. These systems make life easier, organization moves at a faster pace, and makes business are more structured. Types of systems are customer information system, product information system, and employee information system. Customer information system is imperative to organization keeping track of customer is vital to organization success. Company stores customer information for marketing purposes email addresses, mailing addresses, and phone...

Words: 812 - Pages: 4

Free Essay

Assignment Information Use Paper

...How information is used and how it flows in an organization is as follows: Information in an organization is used for a myriad of different processes throughout an organization. Information flow through an organization is a duplicate image of an organizations activities. Making a model of an organizations activities goes a long way in helping to build an effective strategy for competing in today’s business world. The three things that are generally looked at in the process of information flow is cost, time, and the information path. A break down of these three components is as follows: Cost will show how much the present implemented information processes cost. Time would show us the current speed of information being transferred to the user of said information. IE: how much time it would take for management to receive the right information from say a warehouse, etc. The third component is the path. The path gives information about the size of information flow net elements that information goes through to make it to the information user. These three components are closely relative to each other and therefore make any analysis difficult. Essentially, information runs in a circular pattern. It is very similar to how water flows down a drain in a circular pattern. Once the water is in the drainage line, it goes through a series of pipes, of different sizes and direction. Organizations utilize information in a very...

Words: 709 - Pages: 3

Premium Essay

Application and Information Paper

...InFoRmAtIoN aNd SoFtWaRe aPpLiCaTiOnS Danielle Lange BIS/219 Ross Sines 07/11/2011 Today there are many software applications and information systems that are available to the organizational departments within a company. This paper will give an overview of what software applications and information systems for the accounting, human resources, and marketing departments. It will describe their use and how they relate to the departments mentioned. Software and applications are developed and specialized for each department to help the organization as much as possible. Accounting department has to have an information system that measures, processes, and communicates financial information. They need this so they can keep track of the money the organization makes, spends, and has in the bank. In the human resources department their primary job is to recruit, train, and retain the employees of the organization. Then the marketing department’s job is to research the competitors, research the products, promotion, pricing, and selling of the product. All the departments in an organization play important roles that keep the organization running efficient. The software for the accounting department has functions that manage accounts receivable and payable, ledger, inventory, billing, purchasing, and sales. The software called Intuit Quickbooks, which helping the accounting department do the things they need to do. Human resources have software that keeps track of hours...

Words: 322 - Pages: 2

Premium Essay

Information Systems Paper

...“Information Systems Proposal” July 9, 2012 Axia University BIS 220 – “Introduction to Computer Applications and Systems” Alicia Snedeker A&R Records Inc. Table of Contents 1. Introduction 2. Table 3. Benefits of Information Systems 4. Drawbacks of Information Systems 5. Conclusion Operating a business is hard and what makes it harder is not being familiar with the information systems being used. A business owner should have the understanding of which information systems work best for the business. I am writing this proposal to better inform you of how the knowledge of these information systems most benefits A&R Records Inc. Times have changed and we need to meet the times head on and maximize our value. The systems I am proposing we use are Transaction processing system, Functional Area IS, Management Information Systems, E-commerce systems, Office Automation Systems and Expert Systems. Different types of Information Systems | Benefits | Drawbacks | Transaction Processing Systems | Will allow us to ring up customers through check, credit, debit or even cash in an automated fashion. | If the system goes down it takes us longer to ring up the customers and only cash will have to be the choice of payment. | Functional Area Information System | Will allow us to make sure employees clock in to make sure payroll is being tracked. | System Crashing would not allow our employees to clock in and ensure the right amount of hours is...

Words: 1259 - Pages: 6

Premium Essay

Information Systems Paper

...Martin E-Mail: Kirndeep.sangha@gmail.com | | Table of Contents There are many Information Systems that could be beneficial to our company but I have narrowed the list to the 5 most valuable to use. They are listed below in the order that they will be discussed from most advantageous to least. * Office Automation System- This system would help us because it supports the clerical staff, lower and middle managers, and knowledege workers. Our employees would develop word processing and desktop publishing software which could help us from scheduling customers to checking our email. * Transaction Processing System- The TPS is very helpful in that it would allow us to monitor, collect, store, and process data from our basic business transactions. * Management Information System- This would help us produce reports that are summarized from transaction data from the sales we record to customers. * Supply Chain Management System- This system will help us record how the flow of our materials are transported from suppliers to factories to the customer. * Funtional Area IS- This supports the activities within a specific functional area and could be used as setting up a process for payroll. Information System | Cons | Office Automation System | Does not support Executives | Transaction Processing System | Mostly done online now, need computer knowledge necessary | Management Information System | Can be expensive to install and requires maintenance | Supply Chain Management...

Words: 255 - Pages: 2

Premium Essay

Southwest General Hospital Information System Paper

...The purpose of this paper is to discuss the process used by a local health care facility, Southwest General Hospital, to acquire a new information system. System acquisition is the process that occurs from the time the decision is made to select a new system (or replace an existing system) until the time a contract has been negotiated and signed (Wagner, Glass, & Lee, 2013). Implementing and acquiring an information systems in a health care organization is a complicated investment. This entire process plays a vital role to the success of the organization, therefore careful planning and monitoring of all stages is needed to accomplish the anticipated goals. In order to continue promoting optimal patient care and safety, Southwest General Hospital embarked on an innovative technological journey over five years ago. Debbie Mora, Director of Information Systems states, “The Electronic Medical...

Words: 638 - Pages: 3

Premium Essay

Information Technology White Paper

...Tan Pham CSIA 303 Information Security White Paper Professor Gupta Information Security White Paper The internet and its technology have brought many advantages and disadvantages for information system of businesses, whether public or private. There is no denying that the business world will move further and further into the cyber world, where information are available just by a click of a finger. No matter how large of a scale a business is, private restaurant or large Banking Corporation, the truth is every single one of these business is at risk. Risk of losing trade secret and risk of losing employee’s confidential data are some of a few risks that a business must address. These risks originally come from sources calls vulnerabilities and threats. Vulnerabilities in plain definition are weaknesses of an information system. These weaknesses later can be translated and exploited by attackers, insider or outsider. These attackers are generally can be seen as threats. Businesses must find solutions to mitigate these threats by eliminating vulnerabilities of their system in order to reduce risk of their information and information system. Information security addresses the three following components: confidentiality, integrity and availability, which are the main goal for business toward protecting their information and information system. Confidentiality is basically to ensure no confidential data...

Words: 1157 - Pages: 5

Premium Essay

It 205 Information Use Paper

...Assignment: Information Use Paper Student: Josey Wayne Hudson Class: IT/205 Professor: Li Lo The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work. I work for the government in IT, as a Part Timer. Every morning getting in my building I use My CAT card to enter the building, then I start my day. My occupation is information system, I will begin off with information system, and my obligations are figure out what the association needs in a system and PC framework before...

Words: 647 - Pages: 3

Premium Essay

Information Security White Paper

...Information Security White Paper UMUC In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical and information technology assets, and to ensure that all information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as: Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High | |Unauthorized...

Words: 697 - Pages: 3

Premium Essay

Information Intelligence Act Paper

...Federal Information Security Management Act, 2002 (FISMA) and Electronic Communications Privacy Act, 1986 (ECPA) had advances in information technology that resulted in new ethical issues necessitating the creation of the acts. FISMA was created to protect government information, and assets against natural or man-made threats, while the EPCA was created to revise federal wiretapping and electronic eavesdropping. FISMA is responsible for making sure different agencies are working to ensure the security of data in the federal government. The jobs of these agencies varies from keeping risk at or below specified acceptable levels in a low costing timely manner, and they must also review their information technology security programs yearly. These programs must include provisions for identification and resolution of current IT security weaknesses and risks, as well as protection against future vulnerabilities and threats (gtsi.com). In previous years the federal government received poor marks, and poor cyber security grades that were publicized, there is still improvements in security of information systems. EPCA is composed of three other acts, known as the Wiretap Act, the Stored Communications Act, and the Pen-Register Act. Together these acts contain protections that are useful and important. The Wiretap act deals with the stopping of communication before it goes too far, while the Stored Communication act deals with stored communications not being used, and finally...

Words: 407 - Pages: 2

Premium Essay

Internet and Information Paper

...Internet and Information Paper Melinda Whitfield HUM/176 07/04/2014 Janet Swiggart University of Phoenix Hello friend I am writing this letter to you to explain the ease of finding information on the Internet. I will also identify ways you can check the reliability of the information found. Not leaving out the part, you asked about the term digital divide. This letter will end with me telling you ways to bridge the digital divide gap and I hope you will have everything you need to know on Internet and Information. According to (computer hope.com), “Most information is found on the Internet by utilizing search engines. A search engine is a web service that uses web robots to query millions of pages on the Internet and creates an index of those web pages. Internet users can then use these services to find information on the Internet”. (www. Computer Hope.com) As researched by (Robert Harris) “Information is everywhere on the Internet existing in large quantities and continuously being created and revised. This information exists in a large variety of kinds (facts, opinions, stories, interpretations, and statistics) and is created for many purposes (to inform, to persuade, to sell, to present a viewpoint, and to create or change an attitude or belief). For each of these various kinds and purposes, information exists on many levels of quality and reliability. It ranges from very good to very bad and includes every shade in...

Words: 773 - Pages: 4