Nt1330 2.3

Improved Essays
1.1 Describe ways of recognising when a business problem exists
Within our company, you can recognise if a business problem exists by observation. If you’re clients are leaving and if you are not getting new customers, then this is a way of recognising that a problem exists.
In a larger company, I would imagine that they recognise business problems by keeping management reports on everything you do and then compare them with the businesses expectations. If anything is below the expectation then it should be looked into further to see where the problem is.

1.2 Explain how to identify possible causes of business problems
Within our organisation, as there is only me and the boss, we identify when a business problem exists is by observation of our own work and each other’s and also get told by our clients if they think there is a problem. From there we can try and identify cause of the problem.
Within a larger
…show more content…
Within our organisation we write down using bullet points in order, what we are going to do and once we have finished each step we cross it off so we can focus on the next step.

2.2 Describe different ways of solving business problems
In a business environment, there are many different types of problems that you end up faced with and each problem has its own method to solve it. For each problem to be solved you need to come up with targets, strategies, resources, communication, decisions and commands.
One of the problems that occur frequently within our business is that clients have brought in bank statements with sheets missing. To solve this problem we have to get in touch with the client and tell them exactly what we are missing and tell them to send this on to us as soon as possible.

2.3 Give reasons for having support and feedback from others when problem

Related Documents

  • Decent Essays

    Nt1310 Lab 3.07

    • 103 Words
    • 1 Pages

    1 Specialized mats and wrist straps help protect electronic components from __________. ESD or static electricity 2 What device is used to monitor temperature in the fuser assembly in a laser printer? Thermistor 3 __________ bundle wires to help keep them organized inside electronic devices.…

    • 103 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 2

    • 703 Words
    • 3 Pages

    During the laboratory section two devices were used; these were the DE2-115 board and a computer, containing the software system Quartus II. Each of these devices were very significant for gathering information during the duration of the lab and shall be explained further. The DE2-115 board was the device provided in the lab that displayed the output for viewing by the student. The portions of the DE2-115 board that were used during the duration of the lab were the switches, the LEDs, and the seven segment displays.…

    • 703 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 2

    • 234 Words
    • 1 Pages

    1. Who will participate in the evaluation? The person that will participate in this evaluation is my cousin. 2.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 2

    • 280 Words
    • 2 Pages

    1. What does the floor look like? Some food craps and foot prints are on the whitish-brown flooring. 2. What’s on the menu?…

    • 280 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    There are a number or problems which were identified that would act as a guide to diagnosing and understanding their root causes. Customers’ dissatisfaction with the new procedures for freight handling, lack of efficient carrier for shipping products, lack of keenness in using correct…

    • 1998 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 961 Words
    • 4 Pages

    The problem is to ensure that elderly medical patients take their medication and recommended dose at the proper time to ensure that they receive the necessary treatment, and prevent the condition from worsening in the process. To solve this problem, a device will need to be implemented that allows the user to be reminded when to take the medicine, and also be sure that the patient is taking the correct amount of medication. Our first idea was to develop a portable watch device with built in audio and visual cues to remind the patient of their need to take the medication. The device could be programmed ahead of time by a technician, and instruct the user to take the recommended dosage at the correct time.…

    • 961 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 676 Words
    • 3 Pages

    There are several possible types of terrorist attacks using Weapons of Mass Destruction (WMD), using conventional firearms and explosives, or ”other means of attack (including low-tech devices and delivery, attacks on infrastructure, and cyber terrorism)”, (FEMA, 2002, P. 9). Each type of attack or a combination of several will need its own action plan by emergency managers and emergency responders, making the identification of the type of attack and weapon used critical. If an attack occurs, one tool available to a jurisdiction is the Threat and Hazard Identification Risk Assessment (THIRA), which summarizes the “threats and hazards of concern showing how they may affect the community” (DHS, 2013, P.1). The THIRA will outline the possible risks that would be facing emergency responders after a specific disaster and what they might face (FEMA, 2002). For example, the guide describes the threat of radiation after a nuclear/radiological attack, or the threat of contamination after a chemical or biological attack.…

    • 676 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The Future of Tim’s Coffee Shoppe AB299: Associates Capstone in Management January 20, 2015 Denise A. Brown Executive Summary Tim’s Coffee Shoppe has the ability to become as successful as he wishes. With the recommendations on the following pages, Tim can do just that. With improvements across the board from technology to repairs, Tim will increase his sales and profits. Along with his staff their supporting him and vice versa, he will only continue to grow in the right direction. Regulations and Management…

    • 1878 Words
    • 8 Pages
    Great Essays