Tuesday, January 21, 2020
Primary School Capers :: essays research papers
It seems so long ago now, since the mischievous days of mid-primary school. Since the days I never did homework, and was ever so surreptitious to avoid getting caught ââ¬â well trying to anyway. And the days when my little ploys of ââ¬Å"forgettingâ⬠to have done homework, were discovered in the most humiliating of ways. There was on specific day this happened, I can vividly remember. It was grade 3, half way through primary school, a time I never contemplated high school or my future, a time when the concept of homework was a joke. Like the facetious Hyena, I was in hysterical laughter at peoplesââ¬â¢ earnestness toward school. But life is not without karma, as I now understand the importance of homework and schooling. Today school is about ââ¬Å"ENTERâ⬠scores and getting ââ¬Å"A+â⬠. Back then it was about staying away from the ââ¬Å"Goodie, Goodiesâ⬠, who would always have the homework completed for question time the next day. ââ¬Å"Goodie, Goodiesâ⬠to us little ââ¬Å"blokesâ⬠, were usually girls in the class, or a boy we considered to be a girl ââ¬â a ââ¬Å"pussyâ⬠. Why is it that the majority of human beings have a lackadaisical approach to school? All those cliched comments like ââ¬Å"I hate homeworkâ⬠or ââ¬Å"school sucks big time manâ⬠, reinforce a wide spread inclination to not do homework. Is that what it is, or is it all about image and ego to us ââ¬Å"blokesâ⬠ââ¬â earnestly trying to avoid the dreaded label: ââ¬Å"Goodie, Goodieâ⬠. It is therefore not half-obvious why schools such as Camberwell Grammar experience horrific cases of school bullying. Occupied with maintaining our ââ¬Å"toughâ⬠image, we ââ¬Å"little tackersâ⬠never took heed to these important issues. Nor did we take heed to doing homework. During grade 3, our Math homework became accustomed to rotting away at the depths of our school bags, along with the mould ridden sandwiches and three-year-old bananas. One day ââ¬Å"judge dreadâ⬠(the teacher), was going through the homework question by questionâ⬠¦ ââ¬Å"Math books open at least nights homeworkâ⬠in what sounded like a vultures screech. I opened at some pretend page and stayed low key, whilst the teacher mercilessly pointed her finger around the room. It was terrifying as she always seemed to sense an ââ¬Å"evaderâ⬠in the room ââ¬â her eyes a radar, and her finger a laser, ready to embarrass her victim at any moment. All the ââ¬Å"Goodie, Goodiesâ⬠held their fingers in the air back at the teacher, which seemed like some tribal link between teacher and ââ¬Å"Goodie, Goodieâ⬠ââ¬â it was the ââ¬Å"Kripendorfs Tribeâ⬠of St.
Monday, January 13, 2020
Payless Service Blueprint
Payless Shoe Source is a discount footwear retailer with over 4,572 retail stores in 15 countries. This company does not only focus on providing different fashion possibilities for the family at a great price, but distinguishes themselves by offering an engaging, easy-to-shop experience and outstanding customer service. Our group chose this company to blueprint because it has a very elaborate customer service process.This company focuses heavily on providing the customer with a great shopping experience by following a series of ââ¬Å"critical actionsâ⬠that must be delivered to one hundred percent of the customers during their journey in the store. In addition, one of our group members works in this company and therefore, it would be easier to grasp an in depth understanding of the service process and be able to have easier access to all the information we needed.When shopping at the store, the customer goes through five different steps in their shopping experience. The company calls this process the ââ¬Å"customer journey,â⬠consisting of the following stages: Enter, Browse, Try-on, Check-out, and Walk-out. When the customer approaches the store, the customer is impacted by the storeââ¬â¢s physical evidence for the first time. The first physical evidence the customer comes across is the storeââ¬â¢s outer appearance. They may ask themselves does the store look in good condition and/or is it open.Once they get that established, they notice the parking lot to see if there are any available spaces to park and also if itââ¬â¢s clean. Once they park, the first thing they see on the store is big posters on the windows. The store always has advertisements on the windows to show customers what sales they have going on during that time. The sale posters alone can influence a customer to walk in the store and that alone can make a customer walk in the store with certain expectations, such as prices and brands. As the customer walks in the store, the Enter stage begins.The customer walks into a lobby area, which contains a little jewelry/sunglasses section slightly to the side and in front of them, there are displays of the latest or ââ¬Å"hottestâ⬠shoes for customers to view at first. To the left or right wall of the store, there would be handbags/purses for the customer to see, many which match certain shoes. Payless Shoesource as the name says it, is mainly to shop for shoes, but all these extra items that the customers come across in their shopping experience influence a customer who initially went in for a pair of shoes to walk out with two or three extra items, or ccessories they might not even need or did not realize they needed. Once the lobby area has been viewed, the customers are offered assistance and are directed to their size. If they are shopping for children, an associate offers to measure the childââ¬â¢s feet and then directs them to the kidââ¬â¢s aisle. This is where the Browse stage begins. The ai sles are divided by menââ¬â¢s, women, and children. The aisles containing the shoes should be well-organized, put in correct order by size and department, and should be color-coded. This helps the customer and employees to find things easier.In this stage of the customer journey, an associate approaches the customer and initiates interaction. The salesperson asks the customer an open ended question such as, ââ¬Å"What type of shoes are you looking for todayâ⬠to better understand the customerââ¬â¢s needs. The associate then suggests the customer styles for them to try on and helps them find the right size. Furthermore, in this stage the associate also ensures that the customer understands the promotion that the store has in case they were not yet given that information at the Enter stage.If a certain style is not found in the aisles, the associate checks the inventory system (support process) with a handheld computer device called a scanner. With this device the associat e can check inventory, prices, and in what other payless locations the shoe is in stock. This device is very important physical evidence because it can influence a customerââ¬â¢s experience positively. This allows the employees to give a faster and more accurate service. After the customer begins trying on shoes, the associate goes back to check on the customer and delivers the critical actions for the try-on stage.This stage is very important because the company has determined that sixty-four percent of customers who try on shoes make a purchase. The associate begins by complementing their selection. This can change the sixty-six percent to eighty-eight after a customer receives follow-up. The associate then offers the customer a second style or a matching accessory to increase the units per transaction. Once the customer picks the products they want to buy, the associate offers to take the shoes to the registers which are at the front of the store, where the Check-out stage beg ins.In the beginning of the transaction a customer is asked for personal information such as name, address, and email address that is input in to the registration system in the support process. This data is stored and used for marketing purposes and comes up every time the customer shops in the store, allowing for a more personalized service. The cashier then proceeds by checking that the correct shoe mates are taken. This is done verbally to reassure that the customer is taking what they want and to avoid any returns.Underneath the registers, are shoelaces and shoe care merchandise for the customer to purchase at last minute. In the Check-out stage, these items are offered by the cashier because the company determined that one out of five attempts to sell additional items at the register is successful. The shoe care merchandiser influences the customers experience because they are strategically placed to create additional needs to consumers, making them purchase at the last minute. This helps the company, but it also satisfies the customer because they now have an item that can improve the life of their product.Finally, the customer is thanked and invited back. The last stage of the customer journey is the Walk-Out stage. This is whenever a customer is leaving the store without making a purchase. An associate stops the customer and asks then an open-ended question, such as ââ¬Å"Did you find everything you were looking for. â⬠Many times an associate prevents the customer from leaving and directs them back to the aisles for further help and may actually save a sale. If not, they give the customer a reason to come back by informing them of an upcoming promotion or the day new shipment arrives.Of course, even the best process has potential fail points where problems may occur and/or bottlenecks where backups or slow delivery may occur. There are three different types we can identify. The first bottleneck is the handling of uncooperative customers. All the critical actions that the service employees need to deliver during the customer journey require cooperation from both ends; the customer and the firmââ¬â¢s employees. Customer participation is crucial in effectively delivering all aspects of the service delivery the company wishes to give all of its customers.However, sometimes the company comes across ââ¬Å"difficultâ⬠customers, or often called ââ¬Å"get out of my faceâ⬠customers that can slow the delivery process or even cause a fail point. There are times that customers do not want to be offered assistance and they will either keep walking, ignoring the salesperson, or they will respond with a quick phrase like, ââ¬Å"I am just looking. â⬠For instance, during the Browse stage, the employee is required to interact with the customer.If they are explaining the current promotion to the customer, but a customer refuses to respond to the employees help by not listening to them, then this part of the service del iver creates a fail point if the associate gives up or it makes the process slow down is the associate later attempts to explain the same information once again during a different stage, to avoid the customer arriving at the register not understanding the promotion. Another instance would be at the Enter stage, where the associate offers to measure childrenââ¬â¢s feet.It is the salespersonââ¬â¢s job to deliver this critical action, however how successful this is also depends on the customerââ¬â¢s participation. If a customer does not allow the associate to measure their childââ¬â¢s feet, then the whole purpose of this part of the service delivery fails because the associate will not be able to give the customer this service. The purpose of doing this is to allow the associates to interact with the children as well as the parents in order to create a pleasurable experience for the whole family.This is a service that many competitors donââ¬â¢t offer, so it is a competit ive advantage. The only solution to this bottleneck is for the front line managers to exercise continuous training with their employees. This will help them gain ease in talking to customer in general. It will provide the associates with practice that will help them learn to enhance customer participation and to effectively deliver good service. That way if a customer shuts down an associate, the associate will be trained to not give up and instead exercise the learned ways to gain a customerââ¬â¢s trust.Unenthusiastic employees are another fail point we identified. Employeeââ¬â¢s unwillingness to participate in delivering the customer service can be a potential fail point in the service delivery process. Uncooperative employees can be the result of a variety of things. The first is that the company was involved in an ineffective hiring process. Another is that the company failed to exercise proper training. The employee must be trained to switch from tasks to customer service whenever a customer walks in.Fortunately, this fail point is somewhat controllable by the company. To avoid this, the company should hire the right people from the start. A solution is for the company to develop strategies to determine who is right for this position. Another alternative is to treat their employeeââ¬â¢s right. The company must know when to reward their employees and must provide motivation that will drive them to try their best. A third fail point identified is out of stock merchandise. Not meeting the demands of the ustomers can be a big problem that can lead to many lost sales. The solution to this is to exercise more effective communication during the support process where the manufacturer sends the merchandise to the pool point and from there it is sent to the store, and it is received and input into the inventory system. Every time an associate uses the inventory to search for a shoe and prints out a receipt for the customer to go to another location is valu able information that should be used in benefit of the company.This is additional information that should be considered when making the inventory and should be effectively and accurately communicated within the support process to successfully meet the specific demands of customers. A service blueprint not only allows for a quantitative description of critical service elements, such as time, logical sequences of actions and processes, but also specifies both actions/events that happen in the time and place of the interaction and actions/events that are out of the ââ¬Å"line of visibilityâ⬠for the users, but are fundamental for the service.With the realization of the importance and the domination of services in the worldââ¬â¢s economies, there is a growing emphasis in business practice on creating meaningful, memorable customer experiences. Payless Shoe Source has reinvented itself and repositioned its brand as a business that is as passionate about helping customers as they are about the products they sell. By using a detailed service blueprint, Payless can strengthen its Marketing, HR Management, and Operations areas and achieve a stronger bond with its customers.The companyââ¬â¢s blueprint showcases key points where customers are more attracted to, spend more time at, and are more likely to focus on promotions, ads, and its products. This will especially be helpful to the storesââ¬â¢ ââ¬Å"extensive media plan. â⬠Measuring the stores traffic in customers, sales, and productivity, the company develops the plan which determines what amount of advertising impressions would be the most effective in T. V, radio, magazine, and newspapers. It was this plan that led them to be awarded the ââ¬Å"2006 Marketer of the Yearâ⬠by Footwear News among other recognitions. Another important aspect of the organization is itsââ¬â¢ employees.Payless is proud of its associates and has a culture that encourages personal, informal feedback between al l employees and includes programs in its stores and corporate offices to recognize excellence by individuals and teams. Through the blueprint Payless can evaluate associates, their relationships with customers, and manage their Development, Recognition, and Compensation Programs. For example the quarterly and annual Pinnacle Awards program recognizes top store and district performers in their three regions. Payless is also an organization looking to innovate their service to customers.Its store operations are a critical, important area in its service process. A blueprint will be helpful to create performance standards for workload scenarios, improve alignment among key business functions, and implement new technologies where needed the most. An example of how payless optimized itââ¬â¢s workforce was the creation of KRONOS. Kronos is a an integrated, analytical workforce management system which pulls data from various sources such as the POS, traffic counters, supply chain systems , and associate preferences to create automated, optimized work schedules.Through this assignment we learned how significant a service blueprint can be to an organization for it to be successful among its customers. The blueprint allows firms to visualize the service process, points of customer contact, and the physical evidence associated with their services from their customersââ¬â¢ perspective. The uniqueness of this technique is its continuous focus on the customer as the center and foundation for innovation, service improvement, and experience design. That doesnââ¬â¢t mean that customers are the source of innovation, but rather that value to the customer is the central purpose of innovation.The service blueprint helps firms improve and innovate their service and create a ââ¬Å"customer-focusedâ⬠design for the firm, which in turn increases customer retention, creates a competitive advantage and mainly increases brand equity. Payless Shoesource is a perfect example o f how a blueprint can be successfully used to innovate, improve, and communicate the firmsââ¬â¢ philosophy of great service to its customers.Works Cited Bharat Book Bureau. February 2009. 5 July 2010 http://g51studio. com/parsons/ServiceBlueprinting
Sunday, January 5, 2020
George Orwell s Plea For Understanding - 2384 Words
Kervick 10 Orwell?s Plea for Understanding George Orwell has gone done in history as one of the greatest novelists of the Twentieth Century. His works Animal Farm and 1984 have been acclaimed masterpieces of social commentary. While his less known work ?Shooting an Elephant? is perceived as imperial criticism, it is actually much more. It constitutes his public declaration of why he chose to leave his job, live for years with the poorest of the poor and flip his political views upside down. Born Eric Arthur Blair in Motihari Bengal1, Orwell was always acutely aware of his social position. His father, Richard Walmesly Blair, worked as an administrator in the Opium Department of the Indian Government. Richards marriage to Ida Mabel Limouzin Blair2, the daughter of an unsuccessful teak merchant, firmly established his family as members of the landless gentry which constituted a large part of the Sahib class. This being the case, Orwell was born into an ?atmosphere of impoverished snobbery.?3 he would later try to pinpoint his family?s social standing by calling it the ?lower-upper-middle class.?4 This position divided him from his peers when he finally started school. Returning to England in 1905 at age two with his mother and brother, it wasn?t until his father retired and joined them in 19115 that Orwell started his education.6 Despite the scarcity of money, Orwell was sent to St. Cyprian?s, a prestigious boarding school in Eastbourne7, along the southern coast of England.Show MoreRelatedDifferent Forms Of Government Treat Their Citizens2121 Words à |à 9 Pagesdifferent ways. George Orwell illuminates a society in which the government has complete control and people are forced to follow any and all demands from their leaders. This dystopic society shows how a completely totalitarian government connects with the people. Oceania, the country in which the main character Winston lives, is ruled by ââ¬Å"The Partyâ⬠. In order to stop a revolution there is surveillance at all times and citizens are ââ¬Å"vaporizedâ⬠if they are believed to be nonconformists (Orwell). In the novelRead More Terrorism Essay2696 Words à |à 11 PagesGeorg e Orwell once said, ââ¬Å"Political languageââ¬â with variations this is true of all political parties, from Conservatives to Anarchistsââ¬âis designed to make lies sound truthful and murder respectable, and to give an appearance of solidity to pure wind.â⬠In todayââ¬â¢s modern society, the world is continuing to become smaller and more interconnected than ever before due to media networks such as Cable News Network (CNN) providing round-the-clock news coverage and the Internet. In the last few decades, bothRead MoreHistory of Social Work18530 Words à |à 75 Pages....................4 Understanding History through Historical Phases .......................................................................................................5 Photos of Walter Friedlander Simon Patten 9who used the term social work first time) ....................................9 The Settlement House ..................................................................................... .......................................................10 Understanding the History of Social Welfare
Saturday, December 28, 2019
Role of Project Management Information Systems in Project...
ROLE OF PROJECT MANAGEMENT INFORMATION SYSTEMS IN PROJECT MANAGEMENT. INTRODUCTION 1. Background of Management Information Systems The concept of Management information system (MIS) has been in existence as early as the 19th Century. Works of majorly were in the form of tabulated cards which could be counted and sorted commonly referred to us punch ââ¬â cards. The punch-cards still remembered by many, could capture elements of information keyed in on punch-card machines; the cards were then processed by other machines some of which could print out results of tallies. Each card was the equivalent of what today would be called a database record, with different areas on the card treated as fields. The initial idea of MIS was toâ⬠¦show more contentâ⬠¦Itââ¬â¢s used to support all aspects of project management cycle, from initiating to closing and can include both manual and automated systems. ii. Project management software which involves wide alterations, configurationsââ¬â¢, or customization before itââ¬â¢s applied. ROLE OF PROJECT MANAGEMENT INFORMATION SYSTEMS IN PROJECT MANAGEMENT. Collaboration software: centralized stores of intergraded information with rules for access that serve the project team. Or a tool used in project management to deliver information. ROLE OF PMIS a) Guiding collaboration with policies and work flow diagrams. PMIS is a control tool and therefore owners can prime it with policy or regulatory requirement that govern workflow and institutionalize best practices specifically designed for their organization. Policies: If team members were to collaborate they need to know the rules of engagement i.e. how to work together. They must understand policies that govern interaction workflow and decision making. Passing of information from one person to another, organization to organization properly honed, clearly documented but flexible procedures improve efficient and effectiveness of a team. Individuals are more productive when they have a clear idea of what to do. Therefore, when these policy and procedure manuals are electronic. They can use allShow MoreRelatedImplementing A New ERP System Into The Enterprise: Best Practices In Project And Change Management1396 Words à |à 6 PagesImplementing A New ERP System Into The Enterprise: Best Practices in Project and Change Management Introduction The role of Enterprise Resource Planning (ERP) systems in companies today is rapidly changing from just providing after-the-fact reporting of results to delivering analytics and intelligence on how to succeed with new products and services. ERP has in the past been relegated to just managing the interactions and interconnections between supplier, manufacturing operations and to aRead MoreProject Risk Management Of Information Technology1492 Words à |à 6 Pages PROJECT RISK MANAGEMENT IN INFORMATION TECHNOLOGY By POURUSPA ANKLESARIA 18154704 Executive Summary This report revolves around the risks in Information Systems Project and also gives a brief idea on Information technology project management. The project also shows and discusses the importance and the role of project manager in making the project a success. Risk and how to deal with it, risk management using Work Breakdown Structure Read MoreCase Study Management Principles Of Palm Trees Spa964 Words à |à 4 PagesIntroduction: Project is the organized way of achieving organizational goals and objectives by employing different tools and techniques, involve planning, organization, management of different resources of organization and is initiated to achieve specific goals and objectives. In order to understand the project management principles, case study of Palm Trees Spa is selected and project of implementing and installing Management Information System was planned and designed. Historical Perspective ofRead MoreImplementing Project Management Techniques Essay1275 Words à |à 6 Pages There are many methods and techniques for a project manager (PM) can use to run a successful project. Some of these include: identifying the stakeholderââ¬â¢s roles and responsibilities, tracking measureable business outcomes, apply project controls and view monitoring the dynamics of a working project. These project management techniques are used in order to improve the project model in a baseline project plan. As a PM employs these techniques it can help keep track and account for items more efficientlyRead MoreRoles And Responsibilities Of A Project1174 Words à |à 5 Pages1.0 Introduction The role-holding actors of a project determine its eventual success. While projects are regarded as information processing systems, the actors shape the outcome of the project mainly because they are involved in the intricacies of planning, assessing and implementing (Winch, 2012). This is despite any technical automotive system used since the controller is responsible for configuring the system. Consequently, the delegation of roles and responsibilities is crucial to attaining theRead MoreDenver Airport Communication Plan Essay1328 Words à |à 6 PagesDenver International Airport Project Communication Plan Prepared by: Date: 6/15/12 Version: Master Plan Document Purpose Communication is a critical component in project delivery. It must be delivered in a timely and effective manner to all project stakeholders in order to meet objectives and achieve project goals. This document will detail the execution of all communication regarding the Denver Airport Project. This includes, but is not limited to, communication to and from executivesRead MoreStages Of The Software Development Life Cycle Essay1519 Words à |à 7 Pagesthe initial step where both system requirements and user requirements are analyzed. Problem to be solved by the system is identified and the steps to be followed are put in place. It is one of the most critical step because failure to understand user requirements may lead to delivery of a totally different project. 2. Software design ââ¬â after identifying the problem and verifying all the necessary requirements design phase involves defining elements of the proposed system, security levels to be usedRead MoreThe Denver International Airport Project1281 Words à |à 6 PagesDocument Purpose Communication is a critical component in project delivery. It must be delivered in a timely and effective manner to all project stakeholders in order to meet objectives and achieve project goals. This document will detail the execution of all communication regarding the Denver Airport Project. This includes, but is not limited to, communication to and from executives, managers, and the project team. It will also discuss the means and frequency by which communication will be deliveredRead MoreThe Responsibilities Involved With The Project Management1371 Words à |à 6 Pagesdescribes in brief the responsibilities involved with the project management. It also states the minimum educational qualification, skills, certifications needed and the salaries given to people in this role in todayââ¬â¢s world. Keywords: [Click here to add keywords.] University of Houston Clear Lake A project is basically an assignment which has a definitive start and end times. It is a task undertaken to create a product or a service. Every project usually performs a unique set of operations which is performedRead MoreProject Charter Example1602 Words à |à 7 PagesProject Charter Example Project Name: LMT/PEL LIMS Deployment Project Prepared by John Doe and Mary Smith Date: 8/22/06 |Initiation: | | | |LABORATORY INFORMATION MANAGEMENT SYSTEMS (LIMS) DEPLOYMENT | | |February 6, 2006 (Supersedes
Friday, December 20, 2019
The E Commerce Companys Strategy - 1724 Words
The e-commerce companyââ¬â¢s strategy focus allowed it to differentiate itself by providing better services to its customers. The company put an innovative business model in which customers would try out the companyââ¬â¢s services without any cost. As time progressed, the company was able to generate revenue from alternative means. In addition, the company began to generate revenue from an increase in the willingness of its users to pay for additional services. First mover advantage is referred to as a competitive advantage because it allows the first company to acquire superior brand recognition and customer loyalty, while allowing the company to perfect its product or service. Alibabaââ¬â¢s operations stated when e-commerce was at infancy stage inâ⬠¦show more contentâ⬠¦Credit cards may have been used in China, but they had yet to be trusted by the community, the Chinese were not comfortable with them and preferred different mediums of transaction. Thus, Alibaba est ablished the payment system to provide the Chinese with a sense of safety, contributing to the Chinese willingness to participate in online transactions. Regulations can pose a challenge for businesses operating in emerging markets like China. For example, the internet was highly regulated and was a reason why some foreign companies struggled to succeed in China. Alibaba navigate the posed challenges well and took advantage of the opportunities while at the same time mitigating the risks of operating. The popularity of Alibaba and the growth of e-commerce in China attracted foreign e-commerce companies. In 2002, eBay entered the Chinese e-commerce market through an acquisition of 33% of EachNet, creating eBay EachNet. That same year eBay EachNet merged as the leader in online auctions, leading to the capture of 79% of the online auction market by 2003. In consideration of the growth in the online auction market, Alibaba launched Taobao.com as a rival to eBay EachNet. Taobao.com was launched to capture the opportunities in C2C e-commerce market in China. Having already established a dominance in B2B e-commerce, Alibaba was hoping its local knowledge would help it dominate the C2C e-commerce market, toppling the newcomer eBay
Thursday, December 12, 2019
Law of Business Organization Productivity Commission
Question: Discuss about the Law of Business Organization for Productivity Commission. Answer: When a company has to get registered, the person planned for the registration must primarily apply with the ASIC. The ASIC is one of the most important key and rather aspect when a new business is going to take its form. The ASIC is the unique number provided to the applicant so that they can protect their business from violation of privacy and it also helps to protect some important business news (Rahman 2013). The explanation of the ASIC is mentioned under the section of 117 of the corporation act. After the registration under Sec 117 of the Act, the question comes in about the formation and type of business set up as mentioned under Sec 112. So, in this matter, the type of company: Proprietary Limited Company. The next factor explained here is the limited form of company mainly limited by the shares explained under 601CW of the corporation act which can be summed up as: The mentioned section applies to the registered body subjecting to the Subclause(2). When the registrable body is same as the Australian registrable body, then the application of the section will have no validity concerning to the place of origin. Clause 9- all the other body except the Australian ADI, there must be an affix of the name in front of the corporating outlet whether in the painted form or in any other form which is legible to all. The name of the company is compulsory to have the display in front of all other corporating offices including the registered office. Along with the other mentioned criteria, the company must also put the suffix sign of Limited or Ltd. And proprietary or pty. The actual liability of the entity must be well understood to the newly registered organizations (australia.gov.au 2016). The next step that follows after the determination of the type of company is done concerning the sec 117(2) in this Act. In this step, the following things must cover up to complete the registration: The new business entity must indicate the liability of all the person within the corporation: The set up of the company to mentioned in suffix form, Suggestive names of the company (not registered under the name of business), Names must be in such form to get the sanction from ASIC since it will not approve the name of any corporation existing in the era of business, The consent of the members involved with such entity since it is mandatory to keep a record of all the valid consents. The consent must be made from the following persons: The director of the registered company expected to be over the age of 18 years. All the members of the company acting with the present set up. The necessity of the consent from the from the secretary is not neede for the proprietary form of the business. Once the step gets over with undertaking of the valid consents from the part of the company, the fulfillment of the registration comes in after the following details provided: The registration of the application must contain the following: details of the applicant: Name: Company name: Position: Address (residential and proposed registered office): Contact details ( residential and official): Details of the company: Company name (proposed in preference): Suffixed name: State of incorporation: Registered address of office: Business address: Superannuation acting trustee: Seal: Company presentation: Seal: Bank kit: Verification made prior that the same name is not registered elsewhere: Actual role of the applicant whether he will act as an agent or with the compliance of the ASIC: Shareholder: Type: Name: A.C.N or A.B.N.: Address: Personal details: Position in the company: number of shares: Whether beneficially owned or trustee: The pattern to be followed for all the other shareholders and must have a record of such submission. Apart from that any additional notes: Next step is to deal with the payment: General fees are $738 GST: Pattern of payment: After the completion of the registration, some internal procedures governing constitution constructed which includes the procedure for governing the same. The clause of the internal management is mentioned under section 134 of the corporation act (legislation.gov.au 2016). There are replaceable rules as mentioned under the sec of 135 of the act which is essential for the include in the making of the constitution and the members are expected to work with the concern to the mentioned regulations. Although it is not mandatory for the proprietary company to form a constitution, yet it is advisable for the same so that the effective regulation of the members can get maintained and the directors can work with good faith. Constitutions are mainly based on the redeemable with the option of the shareholders (Anderson et al. 2015). The legal authority of the members ensures that the company was acting in the good faith with all the important necessity. Sec 124 defines about the legal capacity that the members or the directors acting get the control to carry on with some activities for which may not need any forum and the act based on the situation. This section has a critical role in the formation of the business (Bakan 2012). It is paramount for the members acting members since such legal authority given the concern of the situation as well as for the purpose of the security policy (abr.gov.au 2016). Sec 129(1): the essential of the company constitution with the replaceable rules compiled together is mandatory since there must be scope for the amendment made as there are some of the situation which may not comply with the situation that takes place in the business. The combining of the replaceable rules with the actual constitutions helps the company to make the essential changes during the time of the situation when such changes become an absolute necessity (austlii.edu.au 2016). Section 588(M) (3): the clause arises some necessity to the act after the introduction of this section. Here there is an explanation of the creditor who is not liable to get the damage in means of compensation from the directors of the company. The creditors are also known as the investors of the company. Hence, they are liable to get the compensation to the loss occurred to them due to the insolvency of the company as mentioned under the subdivision B. Concerning the section of the act, and the amount is equal to the amount of loss occurred (Dobson 2014). Also, the liquidator of the company is also liable for the compensation provided that the director has been proved for his insolvency (Wright 2014). So, all the three sections mentioned here hold a major role in the carrying out of the business. References: Abr.gov.au. 2016. For Business, Super funds Charities | Australian Business Register. [online] Available at: https://abr.gov.au/For-Business,-Super-funds---Charities/ [Accessed 23 May 2016]. Anderson, C., Howell, N. and Mason, R.F., 2015. Submission to the Productivity Commission issues paper business set-Up, transfer and closure. Asic.gov.au. 2016. Lodging paper forms | ASIC - Australian Securities and Investments Commission. [online] Available at: https://asic.gov.au/online-services/lodging-paper-forms/ [Accessed 23 May 2016]. Austlii.edu.au. 2016. CORPORATIONS ACT 2001 - SECT 129Assumptions that can be made under section 128. [online] Available at: https://www.austlii.edu.au/au/legis/cth/consol_act/ca2001172/s129.html [Accessed 23 May 2016]. Australia.gov.au. 2016. ABN, ACN, business management | australia.gov.au. [online] Available at: https://www.australia.gov.au/information-and-services/business-and-industry/abn-acn-business-management [Accessed 23 May 2016]. Bakan, J., 2012.The corporation: The pathological pursuit of profit and power. Hachette UK. Dobson, R., 2014. Liquidation Winding up a company.Busidate,22(4), p.5. Human, S.E., Clark, T., Baucus, M.S. and Eustis, A.C.S., 2015. Idea or Prime Opportunity? A Framework for Evaluating Business Ideas for New and Small Ventures.Journal of Small Business Strategy,15(1), pp.59-80. Legislation.gov.au. 2016. Corporations Act 2001. [online] Available at: https://www.legislation.gov.au/Details/C2014C00519 [Accessed 23 May 2016]. Rahman, A.R., 2013.The Australian Accounting Standards Review Board (RLE Accounting): The Establishment of Its Participative Review Process. Routledge. Wright, C.J., 2014.A critical enquiry into the need for avoidance provisions in business rescue proceedings.
Wednesday, December 4, 2019
VBScript IP File Lab Essay Sample free essay sample
AimIn this lab. pupils will finish the undermentioned aims. * Create a VBScript plan utilizing NotePad++ .* Write a planar array of IP addresses to a text file. * Read the IP Addresses text file into a book.* Append new Room/PC/IP reference informations to the text file.* Use the object Scripting. FileSystemObject. Element K Network Connections For this lab. we will merely necessitate to link to vlab-PC1. The computing machine vlab-PC1 is the computing machine on the left side while vlab-PC2 is on the right. If you leave the pointer on the Personal computer icon for a few seconds. a tool-tip message will look bespeaking the hostname of the Personal computer. Open vlab-PC1 and log in as Administrator with the watchword watchword. Lab OverviewWe are traveling to get down our lab with the same planar array of IP references. Rather than accessing this array of IP reference utilizing the room and computing machine index values. We will write a custom essay sample on VBScript IP File Lab Essay Sample or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page we are traveling to compose the array of IP addresses to a Text file named IP_Addresses. csv where each line of the file will incorporate the Comma Separated Values ( CSV ) for room # . computing machine # . IP_Address. We will so compose a separate VBScript plan that will add on four new lines of informations that will stand for the four computing machines in the new room 106 to the IP_Addresses. csv file. Last. we will open and read the freshly appended IP_Addresses. csv and expose it contents in a meaningful manner. Note: All gaining controls must be text onlyââ¬âDO NOT capture the NotePad++ application window or the bid prompt window. Use transcript and paste of text merely. Undertaking 1: Download and Open IP_ArrayFile_start. vbs in NotePad++ * Open NotePad++ and from the bill of fare. choice File/Open. Open the fileIP_File_start. vbs in the C: Scripts directory. If you do non see this file. you can download it and pull out it from the eCollege Doc Sharing file IP_File_start. nothing. * Modify the Programmer Header as needed and Save As the VBScript file as IP_FileWrite. vbs. * The line dim ipAddress ( 5. 3 ) declare 6?4 planar array. The 5 and 3 give the maximal index value. Since indices ever start at 0. this is a 6?4 array. * The lines that follow initialise the array locations with IP references. The first index ( 0. . 5 ) represents the suites 100 through 105. The 2nd index ( 0. . 3 ) represent the four computing machines in each room. * The IP reference of the 3rd computing machine in room 104 can be found in the array component or constituent ipAddress ( 4. 2 ) . This value is ââ¬Å"192. 168. 10. 45â⬠. Look at the array carefully to find the significance of the index values. Note: If you need to upload a file into the C: Scripts directory on vlab-PC1 or download a file from the vlab-PC1 C: Scripts file. unfastened Windows Explorer ( E ) . As you can see on the right. your local computing machine thrusts ( in this instance. the C: and D: ) are mapped to register transcript and paste ( or retarding force and bead ) easy to carry through. Undertaking 2: Add the Code to Write the Array Data to a FilePseudocode| Comments|Specify the undermentioned constantsREAD = 1. WRITE = 2. APPEND = 8. ASCII = 0Define the variable filename and initialise it to ââ¬Å"IP_Addresses. csvâ⬠Define the variable ipAddrStr and initialise it to ââ¬Å"â⬠Set fso to the ââ¬Å"ScriptingFileSystemObjectâ⬠utilizing CreateObject Set ipFileObj = fso. CreateTextFile ( file name. True. ASCII ) For room = 0 to 5 For computing machine = 0 to 3 ipAddrStr = CStr ( room+100 ) A ; ââ¬Å" . â⬠A ; CStr ( computer+1 ) A ; ââ¬Å" . â⬠A ; ipAddress ( room. computing machine ) A ; vbCrLf Use ipFileObj to Write ( IpAddrStr ) NextNext Close the fileSet ipFileObj = fso. OpenTextFile ( filename. READ. ASCII ) WScript. Echo ipFileObj. ReadAllipFileObj. Close | Named invariables should be all caps and the Const prefix should be used to distinguish it from a variable whose value can alter. filename is a variable that contains the nam e of the file we will compose. ipAddrStr will be used subsequently to hive away single records that we will compose to the file ââ¬Å"C: ScriptsIP_Addresses. csvâ⬠. You ever need to utilize ââ¬Å"ScriptingFileSystemObjectâ⬠to read. compose. or append files. The CreateTextFile method has one required statement and two optional statements. The first statement value is the file name as twine invariable or variable. The statement set to True agencies we will over-write the file if it exists. The 3rd statement specifies the textfile format -1=Unicode. 0=ASCII. 1= system default format. Note the usage of the variable file name. Once ipFileObj is linked to a file. it can be used merely like WScript. StdOut. You can utilize the Write ( ) . WriteLine ( ) . and WriteBlankLines ( ) methods. Nested For cringles are used to entree the planar array of IP references. The outside cringle specifies the room 0. . 5 ( stand foring suites 100. . 105 ) and the inside cringle specifies the computing machine 0. . 3 ( stand foring computing machines 1. . 4 ) . In the first base on balls through the cringle when room = 0 and computing machine = 0. ipAddrStr is set to the valueâ⬠100. 1. 192. 168. 10. 11â⬠. Close the IP_Addresses. csv file utilizing ip FileObj. Near Here we are opening the IP_Addresses. csv file and exposing its contents to verify the File Creation and data format. . | Add the codification indicated by the pseudocode shown below to compose the Array to a text file. Actual codification and identifiers for variables and methods within the pseudocode will be in bold fount. Carefully read the remarks to the right of the pseudocodewill be in italics. * Save your plan with S. * Press and enter cscript FileWrite. vbs. Click OK to get down your book run. Your book will run in a docked Console window in NotePad++ as shown below. * Another option for running this plan is to open a Windows Command Prompt ( CLI ) . alteration directory to the C: Scripts folder and run the plan by come ining the bid cscript IP_FileWrite. vbs. * Execute the dir * . csv bid to verify the being of the IP_Addresses. csv file. * If your tally has any mistakes or your file does non incorporate the informations shown above. debug your plan and re-run it until you have the right consequences. When you have achieved the right consequences. transcript and glue your IP_FileWrite. vbs plan from NotePad++ into the specified textbox in your lab-report papers. Besides copy the Windows bid prompt tally and file confirmation into the specified textbox into your lab-report papers. | Undertaking 3: Make the IP_AppendRead. vbs Plan The IP_AppendRead. vbs plan will make informations for a new room with four computing machines with assigned IP references. The plan will add on these four records ( one for each IP reference ) to the IP_Addresses. csv file. Then the plan will open the IP_Addresses. csv file and expose the contents of the file in a 1 record per line descriptive format. The new room records that were appended should be displayed. * Open NotePad++ and make a new file called IP_AppendRead. vbs. Salvage this new book file in the C: Scripts directory. Do non copy and glue any codification from your IP_WriteFile. vbs plan. This plan should be written from abrasion. * Add the codification indicated by the pseudocode shown below to add on the new room informations to IP_Addresses. csv. Actual codification and identifiers for variables and methods within the pseudocode will be in bold fount. Carefully read the remarks to the right of the pseudocode ; they will be in italics. Pseudocode| Comments|Add an appropriate coder heading Specify the undermentioned constantsREAD = 1. WRITE = 2. APPEND = 8. ASCII =0Define the variable filename and initialise it to ââ¬Å"IP_Addresses. csvâ⬠Define the variable ipAddrStr and initialise it to ââ¬Å"â⬠Define newRoom and initial it to ââ¬Å"106â⬠Define comp1_IP and initialise it to ââ¬Å"192. 168. 10. 59â⬠Define comp2_IP and initialise it to ââ¬Å"192. 168. 10. 60â⬠Define comp3_IP and initialise it to ââ¬Å"192. 168. 10. 61â⬠Define comp4_IP and initialise it to ââ¬Å"192. 168. 10. 62â⬠Set fso to the object ââ¬Å"Scripting. FileSystemObjectâ⬠| Named invariables should be all caps and the const prefix should be used to distinguish it from a variable whose value can alter. filename is a variable that contains the name of the file we will compose. ipAddrStr will be used to construct the record twine that will be written to the file ââ¬Å"C: ScriptsIP_Addresses. csvâ⬠. The variables newRoom. comp1_IP. comp2_IP. comp3_IP. and comp4_IP are set to values that represent a new room ( 106 ) that contains four computing machines with specific IP references. Use the CreateObject ( ) method to Set fso as an object of type: ââ¬Å"Scripting. FileSystemObjectâ⬠. | Pseudocode| Comments| ipAddrStr = _ newRoom A ; ââ¬Å" . 1. â⬠A ; comp1_IP A ; vbCrLf A ; _ newRoom A ; ââ¬Å" . 2. â⬠A ; comp2_IP A ; vbCrLf A ; _ newRoom A ; ââ¬Å" . 3. â⬠A ; comp3_IP A ; vbCrLf A ; _ newRoom A ; ââ¬Å" . 4. â⬠A ; comp4_IP A ; vbCrLfIf file identified by filename does non be Then Beep Speaker Twice Display Message:ââ¬Å"File Does Not Exist! ! ! â⬠A ; newline A ; ââ¬Å"You Must Create the File Before You can Read the File! ! â⬠Quit ProgramEnd IfSet File object ipFileObj utilizing fso. OpenTextFile ( ) make certain file is set APPEND and ASCII format Use ipFileObj object to add on ipAddrStr to stop of the file identified by fileNameClose the file| ipAddrStr is set to a value that represents the four Personal computers in the new room 106. Note the usage of the Line continuance character _ . Files can be checked for being utilizing the fso method FileExists ( ) . The NOT Boolean operator may be utile here. If C: ScriptsIP_Addresses. csv does non be. Beep talker twice and expose mistake message. Exit the plan with WScript. Quit. Set ipAddrFile to register filename for APPEND and ASCII. Set ipFileObj =fso. OpenTextFile ( filename. APPEND. ASCII ) Once ipFileObj is linked to a file. it can be used merely like WScript. StdOut. You can utilize the Write ( ) . WriteLine ( ) . and WriteBlankLines ( ) methods. Use the Close method of ipFileObj| * At this point. Salvage your IP_AppendRead. vbs book utilizing S. Run your plan in NotePad++ with come ining cscript IP_AppendRead. vbs or from the Windows Command Prompt in the C: Scripts directory. * After running your plan. utilize the type IP_Addresses. csv bid from the Windows Command Prompt in C: Script or open the file in NotePad++ to verify that the new informations for room 106 has been written. Degree centigrades: Scripts gt ; type IP_Addresses. csv100. 1. 192. 168. 10. 11100. 2. 192. 168. 10. 12 Important Note: After you have verified that the room 106 information has been 100. 3. 192. 168. 10. 13sucessfully written to IP_Addresses. csv. re-run your antecedently written 100. 4. 192. 168. 10. 14IP_FileWrite. vbs plan to reconstruct the original informations. 101. 1. 192. 168. 10. 19 101. 2. 192. 168. 10. 20101. 3. 192. 168. 10. 21101. 4. 192. 168. 10. 22102. 1. 192. 168. 10. 27102. 2. 192. 168. 10. 28102. 3. 192. 168. 10. 29102. 4. 192. 168. 10. 30103. 1. 192. 168. 10. 35103. 2. 192. 168. 10. 36103. 3. 192. 168. 10. 37103. 4. 192. 168. 10. 38104. 1. 192. 168. 10. 43104. 2. 192. 168. 10. 44104. 3. 192. 168. 10. 45104. 4. 192. 168. 10. 46105. 1. 192. 168. 10. 51105. 2. 192. 168. 10. 52105. 3. 192. 168. 10. 53105. 4. 192. 168. 10. 54106. 1. 192. 168. 10. 59Return to your plan in NotePad++ and finish composing the balance of your plan 106. 2. 192. 168. 10. 60using the pseudocode found on the following page. 106. 3. 192. 168. 10. 61106. 4. 192. 168. 10. 62 The pseudocode shown below will the stairss needed to open and read the appended file IP_Addresses. curriculum vitae and expose the information in the format â⬠The IP Address in Room â⬠room # â⬠for Computer â⬠computing machine # â⬠is â⬠ipAddress Pseudocode| Comments|Using fso. OpenTextFile ( ) . make the ipFileObj object that has opened file name for Reading in ASCII format. Make Until ipFileObj is at EndOfStream room = ipFileObject. Read 3 characters ipFileObj. Skip 1 character computing machine = ipFileObj. Read 1 character ipFileObj. Skip 1 character ipAddress = ipFileObj. Read 13 characters ipAddrFile. Skip newline Display Message: ââ¬Å"The IP Address in Room â⬠A ; room A ; â⬠for Computer ââ¬Å" A ; computing machine A ; â⬠is â⬠A ; ipAddressEnd LoopClose File| Set ipFileObj to open filename for Reading in ASCII format. Set ipFileObj = fso. OpenTextFile ( filename. READ. ASCII ) Once ipFileObj is linked to a file. it can be used merely like WScript. StdIn. You can utilize the Read ( ) . ReadLine ( ) . Skip ( ) and SkipLine methods. The Do/Until cringle will expose all of the IP_Addresses. csv records including the room 106 records that were added. Use the Close method of ipFileObj where room # . computing machine # and ipAddress are values read from the IP_Addresses. csv file. Undertaking 4: Finish Program and Run it Showing Error-Handling * Finish composing your plan and salvage it. Run your plan utilizing in NotePad++ or open a Windows Command Prompt and run it from the C: Scripts directory. Your tally should look like the undermentioned. Note the highlighted records in the tally. These are the appended records for room 106. * If you did non acquire the consequences shown on the right. you will necessitate to debug your plan and run it once more until you get these consequences. To take duplcate records or reconstruct the original informations in the IP_Addresses. csv file. re-run the IP_FileWrite. vbs plan. When you have achieved the right consequences transcript and glue your IP_AppendRead. vbs plan from NotePad++ into the specified textbox in your lab-report papers. Besides copy the Run run into the specified textbox in your lab-report papers. | The. csv extension that we used on our IP_Addresses file indicates a Comma Separated Value format. This sort of file can be opened by Microsoft Excel and Microsoft Access. The file could be easy edited utilizing Excel or even made into a database in Access by adding some field names. Below is our IP_Addresses. csv file opened in Excel ( left ) and Access ( right ) .
Subscribe to:
Posts (Atom)