• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

A Report on My Office Job Environment

Extracts from this document...


A Report on My Office Job Environment To: Mrs McAulay From: Richard Jones Date: Autumn 2002-09-27 Introduction: 1. The aim of the coursework is to investigate how a real business communicates within the business and with the out side world. Then I will make decisions to decide weather the way they communicate is the best way or if it can be improved. I will look at different ways in which the business I choose communicates internally and externally. After I analyse my data I will decide if there could be improvements. 2. The business I am going to use is Industrial Fork truck Parts Ltd, the contact I have I have chosen is my mum she is a personal assistant at the work place and she uses forms of communication mostly to contact clients in other countries. ...read more.


Findings: [image002.gif] In this pie chart it shows me that the most popular form of communication used is the telephone. It also tells me that the least used type of communication is a meeting. [image004.gif] From this graph I can tell that telephone and email are the most frequently used type of communication inside the work place. The type of communication, which is used least inside the work place, is a meeting. Strengths and weaknesses: [image006.jpg] * Letters * Advantages of using letters are that they can provide a permanent record for future reference. * Accurate, clear messages can be sent * Disadvantages are they can be less personal * There is no immediate feedback * Memoranda * Advantages are short and to the point * They can provide a permanent record for future reference * Disadvantages there is no immediate feedback * Reports * Advantages are reports can be copied and ...read more.


made between users * Disadvantages are that users need a modem and a computer * Connections can be sometimes be lost Data Protection Act: The Data Protection Act is an Act of Parliament, which controls the use and storage of personal data. This will affect the ways in which people communicate as company's will not be able to store a lot of information about one company which limits them to only being able to keep in storage the name and address of the company. Unless there is a very good reason to withhold more information they are limited which would cause problems when information gained, is either forgotten or lost. Health and Safety: The health and safety act is an act of parliament, which supports people who have been injured in the work place. If the health and safety act is not visible in the work place the company can be sued. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report describes how the business uses a number of different communication methods, both internally and externally. However the report doesn't give a detailed view on the Data Protection Act or the Health And Safety aspect. The aims ...

Read full review

Response to the question

In summary, the report describes how the business uses a number of different communication methods, both internally and externally. However the report doesn't give a detailed view on the Data Protection Act or the Health And Safety aspect. The aims of the report are clear, and this is quite good. Although for high marks, the report could explain a little information regrading their case study. Such as 'HMV is a retailer which markets a number of entertainment products to consumers, such as DVD's, Blu-Rays, Music and Games'. The report shows a number of visual graphs/charts, and this is quite good, as this allows the examiner to visualise the report. However the report could include the data as well as the visual charts/graph to support these. As it's important to state where the data was from and the actual data used to format the visual display. The Data Protection Act has eight main principles, and these are missing from the report. These eight principles should each be explained using a small but detailed paragraph on each of the eight sections of this regulation.

Level of analysis

The report mentions that one of their sources is going to be their Mother. This is quite good, as this is explaining the advantages of the source. However the other resources, such as Books and the Internet is quite limited. Thus, the report could state something on the lines of 'With the Internet and Books, I may not be able to find relevant information on the business's practices, as each business is different and using these two resources are aimed at an ideal business and this may not be as useful compared to other resources for the report'. The report lists a number of methods, however doesn't fully explain why it's an advantage or a disadvantage. For instance, the report could include 'E-Mails allows the business to keep a record of all the communication between the client and the business, this is a real advantage to the business, as it provides quick access if the business ever needs to re-look back on their previous work to confirm that an event has occurred'.

Quality of writing

The report lists a number of technical terms, such as 'Letters' and 'E-Mail' and describes these using detail. In addition, the student also states whether each of these methods are an internal or external communication within the business. This is quite good, as the examiner is able to understand what each method is and understand how the business uses the method within their business.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 25/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    At the design stage of the life cycle, I will produce details on how I will meet the requirements that I set for the system at the analysis stage. I will specify what files will be required, their structures and storage method used for them.

  2. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    Many hours can be wasted on problem customers which affects overall productivity. ________________ Freedom of information act The freedom of information act came into effect in 2005. The act gives the public the right to knowledge and access to any information held about them.

  1. Feasibility Report

    The delivery scooters are kept at main office, before any money is made; they have to travel between sites to pick up customer orders. Within Perfect Pie Company, the methods of storing information are very disorganized and information is always being lost or misplaced.

  2. ICt coursework evaluation

    It should be possible to provide reports in less than 1 minute in each in the following. * Customer details. * Total sales by customers. * Total amount of the Sales. � This system will give relevant information in the form of report in less than 1 minute. l.

  1. The data Processing Cycle and processing methods

    The CPU is very fast and performs the tasks quickly after it has performed its task it will divide it's time to all users. An operating system has time-sharing software to do this. This type of processing is possible because the CPU is quicker that the peripheral devices.

  2. Threats to Data

    Threats from outside the Organisation Threats from outside the organisation tend to be mainly from hackers. These are people who try to get into someone else's computer. There are four major types of hackers: The first type of hacker do it mainly to show people that they can and do

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    own do their own research and can clearly show to their employers that they are a worthy employee. Usually independent workers can work independently as well as work efficiently in a team and play key roles in order to do their job at the very best.

  2. Applied ICT in business scenario answers

    A mobile phone to contact with his colleagues. He also needs the laptop to organise his appointments of each month. For this he can use a run time management software. He also needs to store contact numbers in this laptop.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work