M1 - Use Business Software Applications Flashcards

1
Q

Discuss business technology common to an organisation/workplace in the business services industry.

A

Computers: Researching, sending and receiving emails, storing information

Filing systems: Storing information either paper-based or electronic

Printers and fax machines: Turning electronic information into paper-based visa-versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are business technology and software applications maintained?

A
  • Qualified technicians should regularly services devices and repair faults
  • Device alerts when service is required
  • Help function to independently resolve issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Discuss relevant business technology and software applications to complete tasks common to an organisation/workplace in the business services industry,

A

Digital communication: (emails) exchanging messages using computers.

Presentation: vicually present information

Word processing: Creating, storing and printing written documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What 4 things should be considered when using an application?

A

Purpose, audience, format and presentation requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are internal sources? provide examples

A

Data and information from those inside of the workplace. This includes managers team leaders and colleagues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are external sources? provide examples.

A

Data and information from those outside of the workplace. This includes suppliers, clients, ATO and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the points to consider before responding to requests

A

Level of authority, reasons for request, confidentiality, privacy and security issues, expected timeframes, workplace procedures for responding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What requirements do collected data and information need?

A

It must be appropriate to workplace needs, from liable sources and accurate by law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the methods for checking validity of data and information and it’s sources

A

– Repeating
– asking customer supplier client to confirm information
– having identification processes
– only obtaining information from reputable sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the methods of collecting data and information?

A

Email, fax, telephone inquiries, customer surveys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why must information and data be collected in a timely and resource efficient manner?

A

Collecting information and records accurately allows records to be beneficial for the business. Completing this in a timely matter insures deadlines are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the significance of confidentiality and security of data and information?

A

Confidentiality is essential in a highly competitive workplace. Failure to properly protect business information can lead to loss of businesses/clients as well as loss of employee trust, confidence, loyalty and productivity. Confidential information can also be miss used for illegal activity such as fraud which can result in costly lawsuits for employers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should document data and information be collated and recorded?

A
  • All laws and regulations regarding privacy and confidentiality adhered to
  • Consistent, logical, predictable file naming methods, easy access, identification
  • Version control
  • Agree on one method for organization
  • Review information stored regularly, no duplicate, out of date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of security processes?

A

Security cameras, passwords, alarms, backup system, security personnel, lock the doors, antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What formats can data and information be organised in?

A

Location, alphabetically, chronologically, categorically, hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three methods of distributing information?

A

Face-to-face: group or individual meetings

Hardcopy: letters memos reports

Electronic: emails, conference calls, intranet, blog post

17
Q

Explain the security protocols for providing access to files and releasing files

A

Inactive/dead files are documents no longer referenced on regular basis
Identification
Removal: from filing or storage
Relocation and/or archive:

18
Q

What are the factors affecting choice of storage of data and information?

A
  • Cost
  • Future expansion needs
  • storage space available
  • how often files access
  • security system
19
Q

What are some forms of storage?

A

– Fixed: internal media on computers (hard drive)
– portable small hard drive design to hold any digital data e.g. USB
– on site and offsite: business premises or storage units apart from business premises
– data backup and restoration: power failure, equipmet breakdown -> cloud service to backup

20
Q

Name and explain three sources of support for software failure

A

– Documentation (workplace manual training material training booklet/manual)
– online help
– technical support

21
Q

Why is maintenance important?

A

– Minimising costs
– managing cash flow
– making wise business decisions
– knowing current financial position of the business
– protecting business and compliance to legal issues

22
Q

What is a version control system and explain its importance

A

A collection of files with monitored access, checking every change made by who, when and why. This allows collaborative projects to be done efficiently as changes can be reversed.

23
Q

What are processes for tracking the location of movement of files

A

– Locking up hardcopy files
– requiring authorization
– using strong passwords
– using encryption