Erstellt von Lewis Leverett
vor mehr als 7 Jahre
|
||
Frage | Antworten |
Examples of functional areas | Finance Marketing Human Resources |
Reasons for business success (5) | Having products that customers want to buy. Finding the maximum price that customers are happy to pay. Having a good relationship with suppliers. A good location for their shops. Employing high-quality staff and making them feel valued. |
Reasons for business failure | Failing to do the reasons for success. |
What is benchmarking? | Comparing the performance of your shops to the standards set by others. |
Methods of measuring customer satisfaction? | Secret shoppers Website feedback forms Product testing by customers e.g. taste tests Benchmarking |
Current most popular type of printer? | Inkjet - Sprays ink directly on to a sheet of paper. |
Professional name for a checkout? | Electronic Point Of Sale (EPOS) Devices |
Parts of an EPOS device | Barcode Reader. Computer with database of product prices, that calculates the total cost of all the products and that checks with the customer's bank to see if the payment card is valid. Screen displaying price of each product being sold and total cost. Card reader. |
Steps of an EPOS device | Cashier scans a barcode on a product using a barcode reader. The barcode contains data which defines the product being sold. This data is used to connect to the business's stock and product databases. The product database is used to display the price of each product being sold. The EPOS device calculates the total cost of all the products bought by the customer and displays the total price. The customer enters their payment card into the EPOS device's card reader. The EPOS device checks with the customer's bank that the payment card is valid. If it is valid the customer is asked to authorise the payment by entering their personal identification number (PIN) using a keypad. If they enter the correct number then the payment is deducted from their bank account. The quantity of sold items is deducted from the shop's stock database. |
How do hard disks work? | A read/write head passes over the rotating software of the disk and ether reads the data stored or adds data to it. |
Advantages of hard disks? | A large memory capacity The read/write head can move at great speed, making it possible to locate a specific piece of data very quickly. |
Disadvantage of hard disks? | The disks are very fragile and can be damaged. |
Advantage of magnetic tape? | It has a very large memory capacity at a cheaper price than other forms of data storage. |
Disadvantage of magnetic tape? | It takes a long time to locate a specific item of data on the tape, (making it unsuitable for use as the main storage device. However, it is still used today by many organisations to store large volumes of back-up computer data.) |
Examples of flash drives? | USB memory sticks + memory cards. |
A drawback with flash drives? | Data can only be written to them a limited number of times. After this they will stop working. |
Drawbacks of optical disks? | Easily stolen Can take a long time to have data written to them. Each new type of disk technology cannot be used on older players and recorders. |
The two ways to back up data? | Manually (e.g. by copy and pasting files) or by using an automated process (e.g. setting a schedule that data is backed up every Friday night). |
Disadvantage of manual back-ups? | People may forget |
Disadvantage of automated back-up systems? | They are not always successful, so need to be checked for accuracy. |
Spyware definition | Software designed to monitor the ways the computer is used and then report this back to someone. |
Example of spyware and explanation? | Keystroke software - Records what's typed on a computer (used to find common words that could be passwords) |
Adware definition | Software designed to monitor your internet use and then display adverts based on your web-browsing habits. |
Why do some software producers include adware in their programs? | To get back some of the costs of developing their products. |
Disadvantage of adware? | Many people believe that it is an invasion of privacy. |
Phishing definition | SPAM emails that imitate a bank or other business and request that you visit their website and input your password or other personal data. |
Employment law (pay, conditions, recruitment and employees with family) | All employees should be paid the same as their colleagues doing similar work of equal value. All employees are entitled to at least 4 weeks of paid holidays. Employers must provide a healthy and safe working environment. Employers must not discriminate against any employee because of age, sexual orientation, ethnic group, disability, gender, religion or because they might be pregnant, when recruiting or afterwards. All employees are entitled to belong to a trade union. Parents are entitled to paid maternity (mothers) and paternity (fathers) leave. Mothers are entitled to paid leave from work in the weeks leading up to the birth of their baby and for a time afterwards. |
Employment law (leaving employment) | Employers can make an employee redundant but only if they can prove the work is no longer required. Employers should explain the rules for redundancy to the staff (how they are deciding who to remove) Employers should provide sufficient notice to staff they are making redundant and compensate them with redundancy pay. Employers can dismiss a worker for breaking company rules, if the employer has a discipline procedure. Most discipline procedures require the business to issue a verbal warning, then a written warning, then a dismissal after 3 repeat offences. Or an instant dismissal can be carried out if the offence is serious - gross misconduct. Employees can leave employment but they are also required to give a period of notice to the employer. |
Implications of employment law to the employer | Raises the cost of employing staff e.g. holiday pay. However, all employers have to implement employment law and so everyone has to face similar costs so every business will have to increase prices to customers to compensate, so no single business will lose customers because it has to follow the laws. |
Health and safety at work act (1974) | Employers are responsible for the health and safety of their employees and other users of their business premises (such as visitors and customers) Employers should provide health and safety training and information to their employees, for example how to use a new piece of equipment safely. Employees are responsible for their own health and safety and that of other people that their work might affect e.g. a fork-lift truck driver should be aware of the movements of other workers in a warehouse. Employers should carry out risk assessments of the workplace. Employers should appoint health and safety officers to be responsible for seeing that the law is followed. Employers should keep an accident book to record health and safety incidents and report them to the Health and Safety Executive. |
The Health and Safety (Display Screen Equipment) Regulations (1992) | Employers are required to: Analyse the workstation where the display screen is used and identify any health and safety risks. Ensure that all equipment used by workers meets legal minimum health and safety standards, this includes providing adjustable computer chairs and suitable lighting. Plan the daily routine of their workers so that they are given breaks from using computer equipment. Provide regular eye-sight tests for employees who use computer display equipment. Provide information and training to employees in the healthy and safe use of computer display equipment, for example the correct way to sit when working at a computer workstation. |
5 main laws that protect consumers? | Sale of Goods Act 1979 Supply of Good and Services Act 1982 Sale and Supply of Goods Act 1994 The Consumer Protection (Distance Selling) Regulations 2000 Sale and Supply of Goods to Consumers Regulations 2002 |
Principles/regulations of consumer protection laws? | Products must be of merchandisable quality - (fit for purpose) Product descriptions must be accurate. All advertising must be accurate and provide correct information. All good must be safe and not cause injury or harm. |
Principles/regulations of consumer protection laws for goods bought by telephone, post, TV or online? | The consumer should receive clear information about the goods and services before deciding whether to buy them. This should include a description of the product, its price, the delivery time and any delivery charges. This information should be confirmed by the seller in writing. The consumer can change their mind and cancel the purchase for up to seven working days after buying their product. The supplier must have n place measures designed to minimise the risk of credit card fraud. |
Implications for businesses of consumer protection laws? | It can be time-consuming to learn about all of the laws as there are so many, especially for new, small businesses. The cost for putting problems right e.g. having to pay compensation if taken to court by a consumer. |
The Data Protection Act - 8 principles an organisation must follow? | Data subjects should be told who will be processing their data and why. The data should not be used for any illegal purpose. Organisations must only use the data for the reasons stated when it was collected. Irrelevant info must not be collected. Data must be accurate and up-to-date. Data no longer needed must be deleted. If you change your mind about the organisation using your data it must comply. Data should be secure. Data should not be transferred to other countries unless they have similar levels of data protection to the UK. |
The Data Protection Act - What conditions must be met for the data subjects to view their personal data? | The data subject makes a written request. The data subject can prove their identity. A fee is paid if required by the organisation. The rights of other data subjects are not broken (e.g. can't show them a page with other people's data on it.) |
Within how many days must organisations provide a data subject's requested data? | 40 |
Other rights of data subjects? (other than the right to view their personal data.) | The right to change any inaccurate personal data. The right to prevent data being used for direct marketing (e.g. telephone calls and mail shots/junk-mail.) The right to prevent data being used in ways that cause distress to the data subject. |
Activities made illegal by the Copyright, Designs and Patents Act (1988)? | Making an unauthorised copy of copyrighted computer data such as a computer program, a piece of music, an image or a video clip. Copying and pasting text from a copyrighted source without permission. Making small changes to a copied item of text or an image (e.g. by cropping it or changing colours) and claiming it as your own work. |
Activities allowed under the Copyright, Designs and Patents Act (1988)? | Using copyrighted materials for educational purposes (providing the copyright owner is acknowledged.) Making a single copy of a computer program for back-up purposes only. |
What is a software audit? | A check conducted by a business on their own computers and network to make sure that they are not using unauthorised computer software (e.g. without a license or downloaded it on more computers than allowed.) |
The main areas made illegal under the Computer Misuse Act (1990)? | Gaining access to a computer or network or computers without permission (hacking). Gaining unauthorised access to a computer with the intention of committing a crime. Making unauthorised changes to a computer system e.g. deleting data. |
What is the WEEE Directive? | The Directive on Waste Electrical and Electronic Equipment. Requires manufacturers and suppliers of electrical and electronic equipment to take responsibility for their safe disposal when they reach the end of their useful life. This means producers have to pay for their products to be collected from customers and either recycled or safely disposed of. |
What is the intention of the WEEE directive? | Producers will try to save money by either designing products that last longer or contain more parts which can be reused. In this way the impact of these products on the environment is reduced. |
Other environmental regulations? | Packaging and packaging waste End of life vehicles regulations |
Requirements of packaging and packaging waste regulations? | Products should be enclosed in the minimum amount of packaging needed to make sure the product is transported safely and in good condition. In addition, producers are required to pay a contribution towards the cost of recycling packaging in the UK. |
Requirements of end of life vehicles regulations? | The last owner of a vehicle must be able to dispose of their vehicle free of charge (with the costs borne by the car's producer). The regulations also set targets for how much of a car must be reused or recycled to make new cars. Restricts the use of hazardous substances in both new vehicles and replacement vehicle parts. |
Implications of environmental regulations? | Manufacturers are likely to face higher costs e.g. in recovering products from their customers, disposing of them and reusing parts. Producers may have to increase prices of products to make up for these extra expenses. |
Examples of social responsibility? | Investing in local communities e.g. sports teams. Working with local communities e.g. promoting equal opportunities. Responsible advertising e.g. not producing advertisements that persuade people under the legal age to buy their product such as alcohol. Designing and using environmentally friendly products. Allowing employees time off for family commitments etc. and to obtain new qualifications. |
Explain the term "ethics"? | The moral principles that help to decide whether something is right or wrong. The guidelines for how someone or something should and shouldn't behave. |
The function of a firewall? | To prevent unauthorised access to a computer or network from other computers attached to it or connected over the internet. |
How does a firewall work? | The firewall monitors all incoming and outgoing traffic to and from the computer or network. Any incoming or outgoing data that has not been requested by the computer is blocked. |
Steps of encryption? | Data to be transmitted from Computer A to Computer B is scrambled into a secret code by computer A's encryption software, using an encryption key. The scrambled data is then transmitted over the internet to computer B. Computer B receives the scrambled data and then unscrambles it using the same encryption key used by Computer A. |
Another way encryption is used? (other than to protect transmitted data) | Data stored on a computer is encrypted and an encryption password is needed before the computer decrypts the data for them to use. |
What is a web browser? | A special software which is used to convert the HTML code in to a visual image displayed on the monitor. |
What is a modem? | A device which sends and receives data over the internet. |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.