Premium Essay

Pdf Communication Modes

In:

Submitted By rosemary16
Words 365
Pages 2
DECEMBER 2014
BUSINESS MANAGEMENT & ADMINISTRATION
Instructions to candidates:
a)
Time allowed: Three hours (plus an extra ten minutes’ reading time at the start – do not write anything during this time)
b)
Answer any FIVE questions
c)
All questions carry equal marks. Marks for each question are shown in [ ]
1.

2.

3.

‘Business Management and Business Administration are NOT the same.’
With the aid of examples and reference to at least TWO theories on the subject, evaluate whether you think this statement is true.
a)
b)
a)
b)

Briefly describe Line, Functional and Staff types of authority.
With the aid of examples and diagrams, show how these types of authority are applied in an organisation. [3 each]
[11]

Outline the main features of: i a sole trader ii partnerships
Explain the main differences between Private Limited Liability Companies and Public Limited
Liability Companies.

[5 each]

[8]
[4 each]

4.

a)
b)

With the aid of a diagram, briefly describe the main features of a procedure for ordering goods.
Evaluate the importance of THREE of the main documents used in such a procedure.

5.

a)
b)

Evaluate the factors which influence the size of the market for a particular good or service.
With the aid of examples, appraise which media outlets are most suitable for the following: i An electrical goods retailer ii An internet-based travel agent iii A motor car manufacturer

6.

[20]

[10]

[8]

[4 each]

There are many sources that a Purchasing Officer can use to identify potential suppliers. With the aid of examples: a) list the main sources
b) evaluate the benefits of using EACH source
c) evaluate the disadvantages of using EACH source

[6]
[7]
[7]

7.

With the aid of suitable examples:
a) appraise the ways in which new ideas can be generated for updating existing products and developing new ones.
[10]
b) describe the procedures that could be employed for

Similar Documents

Premium Essay

Into Computer and Technology

...It can connect several devices, overcoming problems of synchronization. Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 19,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics.[4] Bluetooth was standardized as IEEE 802.15.1, but the standard is no longer maintained. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks.[5] To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG.[6] A network of patents is required to implement the technology, which is licensed only for that qualifying device. Contents • 1 Name and logo • 2 Implementation o 2.1 Communication and connection • 3 Uses o 3.1 Bluetooth profiles o 3.2 List of applications o 3.3 Bluetooth vs. Wi-Fi (IEEE 802.11) o 3.4 Devices • 4 Computer requirements o 4.1 Operating system implementation • 5 Specifications and features o 5.1 Bluetooth v1.0 and v1.0B o 5.2 Bluetooth v1.1 o 5.3 Bluetooth v1.2 o 5.4 Bluetooth v2.0 + EDR o 5.5 Bluetooth v2.1 + EDR o 5.6 Bluetooth v3.0 + HS...

Words: 9683 - Pages: 39

Premium Essay

Inbound & Outbound Logistics

...Executive Summary Many companies are looking for third party logistics providers to help them so they can focus more on their business development. PKT is one of the Malaysia successful third party logistics company. PKT was established and founded by Dato’ Michael Tio’s father in 1974 and they provide freight forwarder services. The company has branches in Malaysia and other countries like Korea and Taiwan. PKT’s head office is located at Shah Alam and it is a large building called “One Logistics Hub”. The warehouse can be separated into The Ship, The Waves and The Lighthouse. Different warehouses have different functions. PKT use different transportation modes to deliver goods to specific destinations, including road, air and sea. Various communication technologies are used to manage and exchange information, such as computerized system, RFID, EDI system and satellite vehicle tracking system. I strongly believe that PKT will successfully achieve its target and expend its marketplace to provide more international trade services. Introduction Inbound logistics refers to the transport, storage and delivery of goods coming into a business. It is the primary process of logistics. The company concentrates, purchase and arranges the flow of raw materials or finished goods from suppliers to manufacturing plants, warehouses and retail shops. Outbound logistic refers to the same for goods going out of a business. It is a process that related to storage and movement of finished...

Words: 1568 - Pages: 7

Premium Essay

Lab 8

...Mobile worker laptop is stolen (Kim & Solomon, 2012). • Multiple logon retries and access control attacks (Kim & Solomon, 2012). 2. What default configuration should be placed on host-based firewalls when accessing the network remotely? The deny-by-default rulesets for incoming traffic should be placed on host-based firewalls when accessing the network remotely to prevent malware incidents (Wikia, n.d.). 3. What risks, threats, and vulnerabilities are introduced by implementing a Remote Access Server? Risks, threats, and vulnerabilities introduced by implementing a Remote Access Server are: • External hosts gain access to internal resources (Scarfone, Hoffman, & Souppaya, 2009) • An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009) • Partially patched remote access servers (Scarfone, Hoffman, & Souppaya, 2009) 4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service? Using multi-factor authentication is a recommended best practice when implementing a Remote Access Policy server user authentication service (Scarfone, Hoffman, & Souppaya, 2009). 5. What is a Remediation LAN? A Remediation Local Area Network (LAN) is a network with devices like a Remediation Server that quarantines non-compliant computers from an...

Words: 917 - Pages: 4

Premium Essay

International Supply Chain-Inkawa

...finished televisions to the warehouse, and the retailers purchase the finished goods from warehouse. Finally, customers buy the finished good in the stores. Therefore, Inkawa take the manufacturer as the central, and according to the products of the production and inventory, Inkawa sells goods to the customer in a planned way, its driving force is from the upstream of supply chain, which is the push system. Inkawa’s organizational aims is to further consolidate the domestic market position and expand the overseas market. According to Yannopoulos (2011) found that increasing market share and profitability can consolidated companies' position in market. Therefore, Inkawa focus on increasing sales, which make Inkawa chose make-to-stock (MTS) mode. MTS used by...

Words: 2906 - Pages: 12

Free Essay

Wireless Speed Control of Motor Using Rf

...approach is that if load on the motor increases, the motors operating current also increases, creating a larger voltage drop across that series resistor and supplying less voltage to the motor terminals when it is needed the most. This “vicious circle” usually results in the motor stalling at high load conditions. So what we need is a controller that will give the motor a kick of supply voltage for a variable amount of time to achieve the proper speed without the series dropping effect. A PWM (Pulse width modulation) wave can be used to control the speed of the motor. CHAPTER 2 WIRELESS COMMUNICATIONS Wireless communication is the transfer of information over distance without the use of electrical conductors or “wire”. The distances involved maybe short (a few meters as in television remote control) or long (thousands or millions of kilometers for radio communications). Wireless communication is generally considered to be a branch of telecommunications. It encompasses various types of fixed mobile and portable two way radios, cellular telephones, personal digital assistants (PDAs) and wireless networking. Other examples of wireless technology include GPS units, garage door openers and or garage doors,...

Words: 3592 - Pages: 15

Free Essay

La Politique de Diversité Et La Grh

...| | La politique de diversité et la GRH | | | | Avril 2013 INTRODUCTION De nos jours, la diversité est devenue un terme de plus en plus populaire dans le domaine de la GRH. Alors qu’auparavant les discriminations reposaient essentiellement sur les différences économiques (bourgeois et prolétaires, riches et pauvres…), aujourd’hui elles se fondent sur des classifications identitaires telles que la couleur de peau, le sexe, la culture… Le concept de diversité poursuit l’idée d’une organisation sans discriminations ni injustices. Beaucoup clament que la diversité est source de performance pour l’entreprise. D’autres défendent l’idée suivante : alors que la diversité est d’abord implémentée dans une optique de suppression de toute forme de discrimination au sein de l’organisation, elle contribuerait au contraire à la consolidation des différences, incitant même certaines minorités à mettre en avant des attributs non observables (l’appartenance religieuse, par exemple). L’objectif de ce travail est donc d’analyser dans quelle mesure ces deux points de vue peuvent être considérés comme ayant une influence réelle sur l’organisation. Est-ce une réelle philosophie intégrée ou une stratégie commerciale ? Concept de diversité Le mot diversité intègre une dualité : * D’une part, les caractéristiques démographiques (origine, nationalité…) et les particularités sociologiques du personnel (sexe, âge, culture, handicap…). La diversité augmente la complexité de...

Words: 5178 - Pages: 21

Premium Essay

Engl114

...line class. Although popular, these classes have their advantages and disadvantages. Breaking news just in, it has been confirmed that “in support of creating standards for online learning, the U.S. Department of Education will be providing 1.8 million dollars to the National Center for Accessible Media. This seems to be an appropriate announcement that could have been made on any news channel back in 2001. As most do not realize, the internet and education have been linked together extensively for a period of time. In fact, online classes have already assumed a role in college bound student’s lives. The question is whether professors and universities are willing to take the extra step in making the internet the primary source of communication for the classes they teach. This piece will provide an insight to the benefits of online classes from several different points of views. Online teaching is defined as any educational activity that requires a student to complete some learning or assessment activity via a personal computer and a connection to a network. This network connection is to the Internet. It is a seen by the Murdoch University Academic Council as a teaching and learning technology, not a method of study (2003), but this depends on how it is to be used and by whom. For example, a distance education student using online teaching would be more inclined to see it as a study method than a student who uses online teaching to download and print lecture...

Words: 826 - Pages: 4

Free Essay

Digital Forensics - Uganda’s Preparedness

...Digital Forensics: Uganda’s Preparedness Dennis Tusiime Rwatooro 2014-M142-2002 Dept of Computer Science Abstract — The more our lives continue to depend on digital communication networks and media to perform daily activities such as communication, access to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented...

Words: 7291 - Pages: 30

Free Essay

Business

...SECTION A Activity 1 Curriculum Vitae: Roocshana Mohamed Home Phone Number: 011-4773698 Work Phone Number: 011-3099256 Cell Number - Personal: 0812782540 E-Mail Address - Work: mohamem@telkom.co.za E-Mail Address - Personal: Roocshanam@gmail.com Personal Information Surname: Mohamed First Name(s): Roocshana Known as: Shana ID Number: 7604250250083 *Race: Coloured *Gender: Female Driver's License: C1 Disability: Not Indicated HEALTH: Excellent Address: 1090 Camelia Court Westbury Johannesburg 2093 Languages Afrikaans-Speak Afrikaans-Read Afrikaans-Write English-Speak English-Read English-Write Secondary Education School: Westbury senior Secondary Highest Standard / Grade: GRADE 12 (STANDARD 10/MATRIC) Year of Completion: 1994 Subjects Passed: Afrikaans (HG) English (HG) Geography (HG) Biology (HG) Mathematics (SG) Science (SG) Tertiary Education Studies Completed 1. Institution: Varsity College Qualification: Management Accounting and Finance (Diploma) Year of Graduation: 1998 2. Institution: Atcor UK Qualification: Accounting Technician (Diploma) Year of Graduation: 2008 Major Subjects: Financial Accounting Cost accounting Taxation Studies in Progress 1. Institution: ...

Words: 3074 - Pages: 13

Premium Essay

Vark Essay

...Introduction Learning style is a person’s preferred means of acquiring knowledge. Stewart and Felicitti (1992) define learning styles as those “educational conditions under which a student is most likely to learn”. It’s not what you learn; it’s how you learn it. Anybody who does the VARK questionnaire can get to know his or her learning preferences. Visual, auditory, read/write and kinesthetic are the four learning categories identified through VARK. After doing this questionnaire, those with poor learning skills can improve themselves by knowing their learning style. You can then stick on with or improve the modes you desire and let alone those that you do not like. VARK analysis of yourself and others can be a helpful device for better understanding and communication at workplace and home. The VARK questionnaire results proved that I have an aural learning preference (score-12). In auditory learning style, we better learn by hearing information and talking aloud. I have always been good at group learning, where information’s are verbally passed and learned. Those things that are heard are better remembered. Mind reading is difficult for them. Lectures and discussions are often their best venue for learning, where lots of materials are delivered in a short time. Reading aloud any written material or verbal repetition of words helps to stick them in mind. Auditory learners would score best in oral exams and will be good orators or spokespersons. Class notes are often poor;...

Words: 925 - Pages: 4

Premium Essay

Gcu/Aacn Mission

...critical thinkers, effective communicators and responsible leaders by providing an academically challenging, values-based curriculum from the context of our Christian heritage. Global citizenship means that by understanding others one can understand himself or herself. Critical thinkers are those who work to master clarity and logic in thought by asking questions and pursuing knowledge to avoid delusion and blind acceptance of ideas, to reduce vulnerability and to work to find solutions rather than dwell on problems. Effective communicators are those who work toward and develop excellence in proficient language use, understand how the written word impacts others intellectually and emotionally, and are challenged to employ new venues or modes of communication. Responsible leaders are those who are grounded in the reality of the world, accept the consequences of choice and strive unselfishly to help others meet their highest potential through servant leadership. AACN Certification Corporation contributes to consumer health and safety through comprehensive credentialing of nurses to ensure their practice is consistent with established standards of excellence in caring for acutely and critically ill patients and their families. The values areproviding leadership, acting with integrity, Committing to excellence, Promoting leading edge, research-based credentialing programs and Demonstrating stewardship. When comparisons made between the Grand Canyon University (GCU)...

Words: 374 - Pages: 2

Premium Essay

Business Finance

...Services with or without other SQL Server ... Hardware and Software Requirements for Installing SQL Server 2008 R2. Download Microsoft® SQL Server® 2008 R2 Reporting ... www.microsoft.com/en-us/.../details.aspx?id=622 Microsoft Corporation Oct 23, 2014 - The Microsoft® SQL Server® 2008 R2 Reporting Services Add-in for Microsoft SharePoint® Technologies allows you to integrate your ... Create a Report Server Database (SSRS Configuration ... https://msdn.microsoft.com/.../ms157285.a... Microsoft Developer Network Reporting Services Native mode uses two SQL Server relational databases to store ... The report server database is not a public schema. ... SQL Server 2008 R2. [PDF]Providing Postmarket Periodic Safety Reports in the ICH ... www.fda.gov/.../drugs/.../ucm346564.pdf Food and Drug Administration Reports in the ICH E2C(R2) Format. (Periodic Benefit-Risk Evaluation Report). Additional copies are available from: Office of Communications. Division of Drug ... Report: Samsung Will Release 2 Versions of the Galaxy S6 ... www.ign.com/.../report-samsung-will-release-2-versions-of-the-gala... IGN Feb 11, 2015 - By Jordan SiraniA new report suggests Samsung is gearing up to release both a curved-display and standard-display version of the Galaxy...

Words: 252 - Pages: 2

Premium Essay

Problem Solution: Intersect Investments

...been established to advance the telecommunication industry with this process Crys Tel is likely to face technological and administrative changes regularly. Team members have been organized to have brainstorming sessions to develop an implementation strategy that will be beneficial to shareholders, management, and employees. This implementation process will be done in stages to ensure any defects will be caught early in the project and corrected prior to finalizing the go live time. Situation Analysis Issue and Opportunity Identification Crys Tel has decided to implement a transition plan to optimize flexibility, promote innovation, and sustain change. By the end of the initiation phase of the Project Delivery Framework (PDF), teams must complete the Project Charter. The Project Charter aims to achieve two key objectives: 1. To facilitate early engagement of the known cross-impacted teams and work together to finalize the high-level scope of the project. Although this high-level scope will be elaborated on in later phases and deliverable, a critical milestone is associated with locking the high-level scope. Formalizing this step ensures that expectations are set and agreed upon across the project sponsors and among the existing team. 2. To plan “Who” the project team consists of currently and what other groups should be involved from a cross-impact perspective and “How” that...

Words: 2788 - Pages: 12

Premium Essay

Non-Verbal Communication and Culture

...People act in different ways depending on how they were raised-according to their culture in other words. This also means that their use of verbal and non-verbal communication is affected by their culture which is the different ways in which people behaves, acts or think towards themselves, families and other people in society or simply a set of values and assumptions that are shared by people. It needs not said that the use of non-verbal ways of communicating are directly linked to ones culture hence the conclusion non-verbal communication is culturally bound and culture biased. Non verbal-communication, which involves all external stimuli other than the use of the written or spoken Sword, involves among other things the use of colour, use of space, touching, gift giving and time in conveying a message. The use of colour in communicating is widely used nowadays but its use started a long time ago. For instance, we grew up with the notion that the red colour means danger and that black is associated with darkness. Colours nowadays are used by manufacturers of says pesticides to warn users of the effectiveness of the poison. In communication by colour, colour tells us about people and their culture. They use red to denote a dangerous chemical. At funerals moaners wear black conveying a message of the unpleasant and disheartening death of a loved one. White is associated with purity hence its use at weddings with the bride wearing a wide gown to send the message of her purity and...

Words: 1631 - Pages: 7

Premium Essay

Students’ Perception Towards Odl Compared to Conventional Mode of Learning

...Theme: Students’ perception towards ODL Compared to Conventional Mode of Learning Competitor’s name: MUKIIBI, Ibrahiim Current education level: GRADUATE Course offered at OUT: ODDEOL Year of study: I Course duration: 2 YEARS OUT Essay writing competition, 2012 Theme: STUDENTS’ PERCEPTION TOWARDS ODL COMPARED TO CONVENTIONAL MODE OF LEARNING 1. Introduction Open and Distance Learning (ODL) has so far proved to be more of a promising and practical strategy than being a stagnant and theoretical strategy especially in the developing world. The more research ODL is given, the more the success attained in addressing the challenges of widening access to education. Consequently, it has most of the time increased participation in especially higher education. The inexistence of structured face-to-face contacts between the students and teachers is the main difference between ODL and ordinary conventional educational delivery methods. Study centres, counselling services and self directed learner-centred instructional materials are some of the main features of ODL, though there is some distinction between open learning and distance education. The main interest here however, is the mode of education where the learner and the tutor are at a distance from each other for most of the time. Just like any other mode of learning, ODL has definitely got both challenges and successes...

Words: 4413 - Pages: 18