Lo.1 Flashcards

1
Q

What is the definition of protocol

A

Procedures or rules that must be followed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a liner manager

A

The superior to whom an employee reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does embezzlement mean

A

Theft by an employee of assets that belong to the employer. Such as money, stock and stationary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does plagiarism mean

A

Using someone else’s work and leading others to believe that it is your own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does payment terms mean

A

When the payment should be made by the buyer/customer to the supplier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the formula for variance

A

Actual - Budget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is this formaula for variance%

A

Variance - Actual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does budget mean

A

Planned income and expenditure over a period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does favourable variance mean

A

Where the actual figure is better than the budgeted figures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does adverse variance mean

A

Where the actual figure is worse than the budgeted figures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the organisational procedures to maintain confidentiality

A
  • Only those who need to see specific information have access to it
  • Using the blind copy (bcc) line in emails to several external recipients so that email addresses are not shared
  • Requiring employees to sign a non-discourse agreement (NDA) E.g. If they have signed it they have access to confidential information
  • businesses can include in a job description that disclosing confidential information will be deemed gross misconduct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the implications of breaching confidentiality

A
  • Gross misconduct which can result in an employees dismissal
  • if the breach includes confidential information such as personal or bank details then implications include risk of identity and loss of trust in the business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the voluntary constraints

A
  • organisational - businesses may have specific requirements to ensure consistency in all employees
  • ethical - businesses have guidelines relating to stereotypes, whistle-blowing or privacy that affect how some documents are worded
  • codes of practice - some job roles and business have codes to follow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who should check documents

A
  • more senior employees - to check financial figures
  • specialists eg solicitor for a legal contract
  • those to whom the document refers e.g. A mangers report
  • a proofreader eg to ensure the professionalism of a report for shareholders
  • external communications company e.g. A press release
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should happen when arrangements are made

A

When arrangements are made e.g. For meeting, training or travel, arrangers must ensure that all relevant staff have received the details themselves have been copied accurately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the implications of poor checking of documents

A

The repercussions can be serious, it can lead to a bad reputation on the company and be a lack of communication, for example if travel arrangements have been provided incorrectly then an flight or train could be missed, wasting time and money and even business opportunities

17
Q

What peotection can be used so information doesn’t get accessed by unauthorised people

A
  • password protecting documents, computers and networks
  • installing anti virus software that constantly searches a computer to identify any activity or threats a from a computer virus
  • installing anti-spyware software, which monitors incoming data from emails, websites and downloads
  • granting staff different levels of access rights
  • having a screen saver time-out for when computers are left unattended, which requires a password to unlock the screen
  • positioning computer screens so that no one else can see it
18
Q

What are the inappropriate uses of IT equipment and software

A
  • using social media
  • installing games
  • installing software that is licensed only for business use on home computers
19
Q

What are the employment protocols

A
  • health and safety legislation
  • equal opportunities legislation
  • contractual obligations
  • minimum standards of professionals behaviour