Unit 2 Assignment 11

In: Business and Management

Submitted By haywardjordan
Words 1011
Pages 5
Unit 2 Assignment 1
Job Description for Customer Service Assistant at Thorpe Park.
I work as a Business Advisor for Business Link in the South East. Business Link provides advice and support to people who are thinking about starting a business, or to those who run an existing business and need advice on how to deal with a business issue or how to make the business grow.
a.

b. Here is a print screen from the Thorpe Park jobs website.
The job involves excellent customer service in all areas of Thorpe Park; this is the main duties of Thorpe Park. Guest satisfaction is essential because if the guest has a disappointing time they will complain and it will affect all merlin attractions which will reduce profit.
c. In an application form they ask for certain information
PERSONAL INFORMATION 1. Personal Details
Human Resources ask for personal details such as Full name and Title, Address, Telephone, Postcode, DOB, etc. This is so they contact you if needed; they’ll also need to know how far you live from the actual work place. They’ll also need to know your Date of Birth to make sure you are old enough to work in the job. 2. General
Human Resources ask for Skills for life, the basic skills are GCSE English Language, Maths. This is because you need these skills for communication, reading, writing, and working out simple sums and equations during the work ethic. 3. References
Human Resources ask for two references so they know what your previous skills are, whether it is at a job or school. This helps the recruiters to discuss whether the job role is right for the person and whether they are a reliable and good worker. 4. Previous Employment
Human Resources ask for employment history for records to show your experience and so they can contact the employer and see how well you worked in previous jobs. 5. Criminal Convictions
Human Resources…...

Similar Documents

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active......

Words: 257 - Pages: 2

Unit 2 Assignment

...Unit 2 Assignment: St Atanagio Name: - Heather Wilson Course Number: - AU224 Section Number: - 01 Unit Number: - 2 Date: - 12/14/13 St Atanagio is a remote island in the Atlantic. The inhabitants grow corn and breed poultry. The accompanying table shows the maximum annual output combinations of corn and poultry that can be produced. Obviously, given their limited resources and available technology, as they use more of their resources for corn production, there are fewer resources available for breeding poultry. Maximum annual output options | Quantity of Corn(pounds) | Quantity of Poultry(pounds) | 1 | 1200 | 0 | 2 | 1000 | 300 | 3 | 800 | 500 | 4 | 600 | 600 | 5 | 400 | 700 | 6 | 200 | 775 | 7 | 0 | 850 | 1. Draw a production possibility frontier with corn on the horizontal axis and poultry on the vertical axis illustrating these options, showing points 1–7. 2. Can St. Atanagio produce 650 pounds of poultry and 650 pounds of corn? Explain. Where would this point lie relative to the production possibility frontier? No, because if they produced 650 pounds of poultry then they’d only be able to produce 550 pounds of corn. 3. What is the opportunity cost of increasing the annual output of corn from 800 to 1000 pounds? If they increase the annual output or corn to 1000 then they would lose 200 pounds of poultry. 4. What is the opportunity cost of increasing the annual output of corn from 200 to 400 pounds? If you......

Words: 424 - Pages: 2

Unit 2 Assignment 2

...person can see. The device has more than two hundred fifty six electrodes that helps see images with larger number of pixels. It is a device with sixty electrodes that help people who are blind to read words on a screen. Hopefully in the next ten years macular degeneration and retinitis pigmentosa will be a thing of the past. Macular degeneration affects older adults that loss vision in the center of the visual field because of damaged retina. Retinitis pigmentosa is a inherited eye disorder that severe vision impairment. The Boston Ritnal implants project was founded in 1980 and was working with Bionic Eye Technologies inc along with Visus Technologies inc. to develop state of the art devices to assist visual impaired people. (Newswire, 11/14/2013)...

Words: 251 - Pages: 2

Unit 2 Assignment

...Unit 2 Assignment: St Atanagio Name: - Course Number: - Microeconomics Section Number: - Unit Number: - 2 Date: - St Atanagio is a remote island in the Atlantic. The inhabitants grow corn and breed poultry. The accompanying table shows the maximum annual output combinations of corn and poultry that can be produced. Obviously, given their limited resources and available technology, as they use more of their resources for corn production, there are fewer resources available for breeding poultry. Maximum annual output options | Quantity of Corn(pounds) | Quantity of Poultry(pounds) | 1 | 1200 | 0 | 2 | 1000 | 300 | 3 | 800 | 500 | 4 | 600 | 600 | 5 | 400 | 700 | 6 | 200 | 775 | 7 | 0 | 850 | 1. Draw a production possibility frontier with corn on the horizontal axis and poultry on the vertical axis illustrating these options, showing points 1–7. See Attached. 2. Can St. Atanagio produce 650 pounds of poultry and 650 pounds of corn? Explain. Where would this point lie relative to the production possibility frontier? No, because producing 650 pounds of poultry then they would only be able to produce 550 Pounds of corn. 3. What is the opportunity cost of increasing the annual output of corn from 800 to 1000 pounds? To go from 800 to 1000 = 200 pounds of corn which requires going from 500 to 300 = 200 pounds of poultry. 4. What is the opportunity cost of increasing the annual output of corn from 200 to 400 pounds? ...

Words: 421 - Pages: 2

Unit 2 Assignment 2

...Unit 1 Research Paper 1 Injectable Tissue Engineering Brand Zae GS1140 Injectable Tissue Engineering Introduction Every year more than700,000 Americans undergo a form of joint replacement surgery. The procedure-in which a knee or a hip is replaced with an artificial implant-is highly invasive, and many patients delay said surgery for as long as they can. A doctor by the name of Jennifer Elisseeff , a biomedical engineer at Johns Hopkins University, hopes to change that with a simple and quick procedure that does away with surgery entirely. Dr. Elisseeff and her colleagues have developed a way to inject joints with specially designed mixtures of polymers, cells, and growth stimulators that solidify and form healthy tissue. This form of technology can eliminate the need for many expensive and dangerous surgeries. Surgeries involving muscle development, the cardio vascular system, and even limb repair after a traumatic incident. This form of technology can improve our health care system dramatically and open new windows of opportunity for new forms of medicine. Even the possibility for new cures for diseases that we currently fight every day such as cancer and possibly even HIV, eliminating the need for long and expensive treatments. As well as repairing worn or damaged tissue, this form of engineering can also be used in the future for growing new organs or limbs to replace old damaged or missing ones. If a patient is in need of a new......

Words: 427 - Pages: 2

Unit 2 Assignment Nt1430

...Unit 2 Assignment NAME NT1430 DATE 1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? -tail What command displays the first 10 lines of a file? -head 4. What is a Process? What Utility provides communication between processes where output of one process provide input for another? 1.) A process is the execution of a command by Linux. They have the ability to communicate with eachother. 2.) | (Pipe) 5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access...

Words: 529 - Pages: 3

Unit 2 Assignment 1

...Unit 2 Assignment 1: Strengths and Challenges Reflection Letter Course Objectives and Learning Outcomes Define terms and concepts related to strategies for technical professionals. Communicate information using Microsoft Office productivity tools and email. Assignment Requirements This assignment coordinates with Unit 2 Lab 1: Introductory Word Lab. Create and send a letter to your instructor executed in MS Word that discusses your questions, concerns, and what you look forward to in Strategies for the Technical Professional. As a part of your letter, make an assessment of your strengths, such as the skills and experience you bring to the class. Also discuss your challenges, perhaps your circumstances, habits, or past academic history, as well as the parts of the curriculum that may be new to you, may not appear as relevant to your goals and objectives, or may be difficult for you to learn and apply. Required Resources Computer with Internet access and MS Word installed. Submission Requirements Your letter should meet the following specifications: Orientation: Portrait Font: 12-point Times New Roman or 10-point Arial Spacing: Double spaced Margins: Normal, Narrow, or Moderate Length: Two to five paragraphs Header: Right justified, including your name, the course number, day, and time Text format: Body of letter left justified Salutation: Appropriate greeting to open letter Closing: Appropriate sign-off and full name as......

Words: 1181 - Pages: 5

Nt1210 Unit 2 Assignment 2

...Joseph V. Stewart NT1210 Unit 2 Assignment 2 Computer Basics Review 1. C. Datacom 2. B. Bob’s incoming email server 3. B. The call uses only digital electrical signals, D. The call represents short sounds as a unique set of bits 4. C. The call uses both analog and digital electrical signals, E. The call represents each spoken word as a unique set of bits. 5. D. A choice for the number of frames per second 6. B. Use an incoming video server 7. D. None of the answers is correct 8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser. 9. A. A website typically contains many web objects, C. A web page typically contains many web objects, D. A website typically contains many web pages. 10. C. The operating system on the PC, D. The PC’s NIC 11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages 12. A. Web browsers 13. A. http 14. C. Node 15. B. Cable, D. Switch 16. D. SMB Network 17. A. Router 18. D. The Internet 19. A. Internet service provider 20. B. Any ISP’s network Key Terms Computer Networking-the stuff that works together Computer network-the process of the stuff working together Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device Email-electronic......

Words: 483 - Pages: 2

Unit 2 Research Assignment

...Unit 2 Assignment: Research 1. What are the variable naming rules of Visual Basic, Python, and Java? * Visual Basic requires you to use a letter as your first character. You are unable to use spaces, periods, exclamation marks, and other special characters within the name, consisting of: @, &, $, #. The name also can’t exceed 255 characters. You can’t repeat the same names within the same level of scope. There’s also a few other minor rules to follow as well. * Python allows you to use either a letter or underscore character as the first character in a line. You can use an unlimited amount of letter, numbers, or underscore characters following that. Python is also case sensitive and therefore makes upper and lower case characters important. Any digit number will work including and between the numbers 0 through 9. * Java can use Unicode letters, digits, and two special characters such as an underscore and dollar sign. Java is also case sensitive. A variable’s name can be any legal identifier. The length of a variable name can also be any number. The beginning variable can consist of either letters or underscore characters. White space isn’t permitted, special characters aren’t allowed, and digits cannot be used at the start. Subsequent characters are able to be letters, digits, dollar signs, or underscore characters. Finally, variable names must not be a keyword or reserved word. 2. List three similarities and differences between the three......

Words: 337 - Pages: 2

Unit 2 Assignment 1

...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is......

Words: 274 - Pages: 2

Unit 2 Assignment 2

...Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves......

Words: 598 - Pages: 3

Unit 5 Assignment 2

...Unit 5 Assignment 2 Ethernet Local Area Networks Review PT1210 Introduction to Networking Christopher B. Young ITT Tech – Tempe Campus Instructor: Mr. Larry Douglas Oct 16, 2015 1.C | 11.C | 2.D | 12.C | 3.B | 13.C | 4.A | 14.A | 5.B | 15.A | 6.E | 16.A | 7.D | 17.D | 8.A | 18.C | 9.A | 19.B | 10.A | 20.C | Ethernet LAN: A collection of devices including user devices, LAN switches, routers, old hubs and cables all of which use IEEE Ethernet standards at the physical and data link layers so that the devices can send Ethernet frames to each other 802.3: The name of the original IEEE Ethernet standard as well as the overall base name of all IEEE Ethernet LAN working committees Fast Ethernet: The informal name for one particular Ethernet standard originally defined formally as 803.3u which was the first Ethernet Standard to surpass the original 10-Mbps speed to run at 100 Mbps. Gigabit Ethernet: The informal name for one particular Ethernet standard defined formally in 802.3z(for fiber) and 802.3ab(for UTP) with a speed of 1 Gbps Autonegotiation: A process defined by the IEEE so that nodes on the same etherent link can exchange messages for the purpose of choosing the best speed and duplex option that both nodes support Ethernet Frame: The bytes of data that flow in an Ethernet LAN which begins with the Ethernet header followed by data and ends with the Ethernet trailer. Ethernet LANs deliver Ethernet frames from one Etherent device to......

Words: 327 - Pages: 2

Unit 2 Assignment 2

...Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced labour -Right to a fair trial -No punishment without law -Respect for your private and family life, home and correspondence -Freedom of thought, belief and religion -Freedom of expression -Freedom of assembly and association -Right to marry and start a family -Protection from discrimination in respect of these rights and freedoms -Right to peaceful enjoyment of your property -Right to education -Right to participate in free elections This act promotes anti discriminatory practice in a way that it gives everyone the rights they deserve which can’t be taken away from anyone, therefore everyone is equal in what they can do. Data protection act- The data protection act defines UK laws on processing data on identifiable living people. It covers any data which can identify a person such as address, name, Humber, email, information is to be used fairly and lawfully. It is only used for limited specific purposes and in a way that is relevant, adequate and excessive. This promotes anti discriminatory practice as it helps protect......

Words: 4206 - Pages: 17

Unit 11 Assignment 1

...Safeguarding Adults and Promoting Independence Abuse is an action in which one individual intentionally harms another, whether it may be physically, mentally/psychologically or verbally. Abuse is something that happens all around us on various occasions sometimes it is not as recognisable as other times because it is done discreetly and the victims of the abuse are too intimidated to speak up about their issues. In this task/assignment I will be focusing on safeguarding adults and promoting independence. Adults can experience various types of abuse, such as: Physical abuse; sexual abuse; neglect; emotional or psychological abuse; institutional abuse; domestic abuse; self-neglect/harm, exploitation, discriminatory abuse and verbal abuse. Physical abuse is the use of physical violence towards an individual that may result in a body injury or physical pain this includes: hitting, punching, slapping, throwing certain objects, pulling hair, biting and scratching etc… Or it could be a threat of a physical force to intimidate another person. It is Illegal to be using force or any types of physical contact to a resident preventing them to do what they plead. For example restraining an adult by pushing them down and locking them in their room is a sign of physical abuse. However an indication that an adult might be experiencing physical abuse would be for example unexplained injures over their body, withdrawn......

Words: 2384 - Pages: 10

Unit 2 Assignment 2

...Unit 2 Assign.2 Last 5 Published or Updated Security Advisories: Microsoft Security Advisory (2737111) Vulnerabilities in Microsoft Exchange and FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution Published or Last Updated: Wednesday, July 25, 2012 Microsoft Security Advisory (2728973) Unauthorized Digital Certificates Could Allow Spoofing Published or Last Updated: Wednesday, July 11, 2012 Microsoft Security Advisory (2719662) Vulnerabilities in Gadgets Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2719615) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2491888) Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of Privilege Tuesday, March 08, 2011 2. Do any vulnerability involve privilege elevation? Is this considered a high priority issue? Yes one, but its importance was not considered a high priority issue as asked 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Advisory Number: 977981 Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.......

Words: 337 - Pages: 2

انصراف قالیباف و عکس العمل جهانگیری | Pearce Joza | Macklemore & Ryan Lewis - Downtown.