Month: September 2017
Teaching English through Role Play
Cite this page
Teaching English Through Role Play. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Fatal Attraction
Cite this page
Fatal Attraction. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Native American Position Paper
Cite this page
Native American Position Paper. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Thesis: Gender Role
Cite this page
Thesis: Gender Role. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Relationships between Men and Women
Cite this page
Relationships Between Men and Women. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Legal Issues in Multimedia
Nowadays, these resources have been illegible used by many people without knows by the original maker. People who used or copy other people media works is one of the illegible law of Multimedia that frequently happens. All of Multimedia product must be copyrighted and most of them already have it, but it was very disappointed because the product is originally implemented wrongly and without permission by the original makers.
Leone Woodcock (2000) from the survey 21. 1% people who agree that use the copying Multimedia product was legal, but the other 33. % said that they are disagree perceive copying and illegally used Multimedia product and other 46. 6% agree to copying and perceive the activity is either ethical or not. There are many legal issues in Multimedia that are the laws of the intellectual property, moral rights and infringement of the ethics in Multimedia.
Background paragraph
The legal issues in Multimedia products/ resources are already known by people. Multimedia are the combination of interactive media that include pictures, sound, video, animation and text. It was interrelated with modality (the way Multimedia occur that communicate to our sense such as hearing, touch and etc), channel (the information that contain a modality) and medium (a set of harmonized channel such as television).
These are the related functions that make up the Multimedia that interact together to make interactivity in our live. Many Multimedia resources that have been produce through television channel, radio and website, but there already have a law in producing Multimedia resource.
The Commissioner of Law Revision (2006)
Any media products such as Journals, e-book, articles, software, websites, CDs, DVDs, books or even songs that have been license and copyrighted cannot be copied without permission unless that product is not Under Copyright (Amendment) Bill 1997. This is because, Copyright is illegally used by any person who avoid or causes any other person to avoid any efficient technological measures that are used by authors in connection with the resource of their rights. Under this Act it will be restricted the acts to respect of their works which are not authorized by the original maker or authors concerned or permitted by law.
These problems of copyright happen because any ideas such as articles, Journals and especially DVDs and CDs are easy to find. DVDs and CDs are most copied or plagiarize media products because it were a good business to get profit for a people who selling these products. In addition, university students also use various media to create work items provided by the lecturer.
Therefore, a more simple way to get information is through media such as online. Only visit a few articles and journals this can help them perform a tasks. However, the disadvantages are many students just want a simple way by using the “copy and paste” each verse or statements taken regardless of the consequences.
University’s student always used articles, books and any writing materials to do their works and copied illegally some sentences that originally from the author or writer.
Intellectual Property (IP) of Multimedia is very important to protect personal Multimedia products. There are some examples of IP that are quotation books, articles, journals and interactive courseware. All of these are the original works that create personally by the authors or creator and that is the originally come out from their ideas this is actually called Intellectual Property (IP).
Intellectual property covers many things, but this time we will present information about the copyright, trademark, and open source. This means that most countries in the world has been related to the Law of IPR (Intellectual Property Right), and therefore enforce IPR protection in their respective countries International treaties in the field of IPR as set in the Trade Related Aspect of Intellectual Property Rights (TRIPs), which later became a package deal in the WTO agreements, currently approve by around 183 countries. The individual creator (Creator) and interviewed (Inventor) a product, it can be submitted grounds that creation and discovery of a product essentially requires prudential energy, cost, time, and mind.
IPR protection, principally intended as one of the award (reward) for a person who has ideas and ideas into a work, and of course the issue of sacrifice.
Protection IPR, thus also intended as an effort to encourage people to innovate in the creation and discovery of a product. Various information whether true or false, ideas, ideology, propaganda and not about pornography spread through the Internet. Many ideas that have been created such as journals, videos and other media materials have been changed from the original form to the new form that applied from the previous form.
That material changed a bit but still has the same parts of it that can be considered as plagiarism. Other than that, internet hacker also one of the IP intruded through system. They intruded the program and steal any data that important to them or harming the data or resources so that the product can be used by them freely. Therefore to need a protection Multimedia product publishers need to ensure that the status of all rights involved before signing any purchase rights / assignment / Licensing Agreement is necessary to obtain these rights. This is where the services of a lawyer are very much needed entertainment.
In order to protect personal rights, moral rights are used to define other personal right. Moral rights are the identification, paternity, integrity, media pluralism and diversity of cultural expression. This related to an act that violates the law in terms of writing and communication and many people do these things with a purpose to protest works, films, articles, and intellectual property.
Besides that, the media products also have their own moral rights and protected by law. Therefore, if there are things that diffuse insult, they can refer to the Copyright (Amendment) Bill 1997. This is because there are many people who misuse media as a channel to express opinions that insulting writers. In other words, this issue has touched a person regardless of personal feelings and the effects of these acts. In addition, cyber offenses such as using photos or any property of the owner such as websites, blogs and the program can also be defined as an offense of moral rights.
Use of personal rights of others impacts the depth and enshrined in law All Rights Reserved offense that can lead to plagiarism. Daily News, (2009) Minister of Information, Communication, Arts and Culture Datuk Seri Dr Rais Yatim, said “If the information is accurate and true to the community, like any concept can be successful and it will be more bad news or the fact that when rotated believe or mistaken sense that some people can raise racial sentiments.
Therefore, we want accurate information disseminated to the public so that they understand and respect the law” He said the ministry will not take action against government critics while not violating the Communications and Multimedia Act, but only act against he dissemination of false facts, false and untrue it. Body paragraph 3 Other than that, infringement of ethics in Multimedia is a behavior of rights or wrongs in the world of internet. Juriah (2001) This is due mostly Multimedia products are easily found and used without having a permission, but cracking the system or copied it into another resource.
The Commissioner of Law Revision
There are acts that protect the product from the Multimedia user program that irresponsible, for example, Communications and Multimedia Act 1998 and Cyber Laws of Malaysia. All of these act responsible to provide protection to the rights and property of a product such as legal act of Patents, Trade mark and other property-related. Although there are many protecting acts, but user of internet especially programmer hacks the other user, such as website system and software by separately the malware or virus that can be harm other people property.
They also might use code program that can genuinely the copyright software and application without bought or asked for permission. This will affect the publisher revenue because many people cannot especially hackers and programmers used it for their own benefit. Thus, many software and application such as computer windows (XP, Vista, window Seven) does not get by the user genuinely but pirated it illegally.
Conclusion
There are three legal issues in Multimedia that are Intellectual Property (IP), moral rights, and infringement of the ethics in Multimedia. In the world that sophisticated today we should respect the original work of people who invent the Multimedia product despite the media which is easily obtained from the actual inventor. As a multimedia user, we should give countenance to have a legitimate Multimedia product.
We also have responsibilities as a user to maintain ethics and comply with deeds that have been contained in state law. As proposed, the government should build a technology system that can protect the rights of owners and also the right products to consumers. So, both benefit equally and protect their personal rights and any people who may maltreat by other people will get their justice.
<Cite this page
Legal Issues in Multimedia. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
The Cabinet and Legislative of Malaysia
The Cabinet Definition of Cabinet A Cabinet is a body of high ranking members of the government, typically representing the executive branch. It can also sometimes be referred to as the Council of Ministers, an Executive Council, or Executive Committee. First Malaysia Cabinet The first cabinet of Malaysia traces its history back to 1955, it was formed to save temporarily before Malaya’s independence in 1957. The Cabinet Board 1955 Portfolio| Name| Chief Minister| Tunku Abdul Rahman Putra| Education| Tun Abdul Razak Hussein| Natural Resources| Tun Dr Ismail Datuk Abdul Rahman| Transport| Tun Henry Lee Hau Shik| Health and Social Welfare| Tun Leong Yew Koh| Posts and Telecoms| Tun Omar Yoke Lin Ong| Labour| Tun V. T. Sambanthan| Works| Tan Sri Haji Sardon Jubir| Housing, Local Government and Town Planning | Datuk Suleiman Abdul Rahman| Agriculture and Cooperative| Abdul Aziz Ishak| Following the independence of Malaya in 1957, a new and independent cabinet was formed with additional positions added. The Cabinet Board 1957 Portfolio| Office Bearer| Minister, Defence, Foreign Affairs| Tunku Abdul Rahman Putra| Deputy Prime Minister, Defence| Tun Abdul Razak Hussein| Agriculture and Cooperative| Abdul Aziz Ishak| Security/ External affair| Tun Dr Ismail Datuk Abdul Rahman| Finance| Tun Henry Lee Hau Shik| Labour and Social Welfare| Tun Omar Yoke Lin Ong| Health| Tun V. T. Sambanthan| Works, Posts and Telecoms| Tan Sri Haji Sardon Jubir| Natural Resources and Local Government | Datuk Suleiman Datuk Abdul Rahman| Transport| Abdul Rahman Talib| Justice| Tun Leong Yew Koh| Education| Tan Sri Mohamad Khir Johari| Trade and Industry| Tun Tan Siew Sin| The Latest Cabinet Board 2008 – 2010 The Barisan Nasional coalition won the general elections to the 12th Malaysian Parliament on March 8, 2008 and formed the government. Following Abdullah Ahmad Badawi’s resignation as Prime Minister, a new Cabinet was announced by new coalition leader, Najib Tun Razak, on April 9, 2009 and were sworn in on April 10, 2009. Najib reshuffled his Cabinet on June 1, gress, swapping two ministers.
The 3 main Parties of Barisan Nasional are * United Malays National Organisation (UMNO) * Malaysian Chinese Association (MCA) * Malaysian Indian Congress (MIC) Members Of Cabinet – Ministers Y. A. B. DATO’ SRI MOHD. NAJIB BIN TUN HAJI ABDUL RAZAK PRIME MINISTER, MINISTER OF FINANCE Y. A. B. TAN SRI DATO’ HAJI MUHYIDDIN BIN MOHD. YASSIN DEPUTY PRIME MINISTER, MINISTER OF EDUCATION Y. B. SENATOR TAN SRI DR. KOH TSU KOON MINISTER IN THE PRIME MINISTER’S DEPARTMENT Y. B. TAN SRI BERNARD GILUK DOMPOK MINISTER OF PLANTATION INDUSTRIES AND COMMODITIES Y. B. DATO’ SERI MOHAMED NAZRI BIN ABDUL AZIZ MINISTER IN THE PRIME MINISTER’S DEPARTMENT Y. B. DATO’ SERI HISHAMMUDDIN BIN TUN HUSSEIN MINISTER OF HOME AFFAIRS Y. B. DATO’ SERI UTAMA DR. RAIS YATIM MINISTER OF INFORMATION, COMMUNICATION AND CULTURE Y. B. TAN SRI NOR MOHAMED BIN YAKCOP MINISTER IN THE PRIME MINISTER’S DEPARTMENT Y. B. DATUK PETER CHIN FAH KUI MINISTER OF ENERGY, GREEN TECHNOLOGY AND WATER Y. B. DATO’ SERI HJ. MOHD SHAFIE BIN HAJI APDAL MINISTER OF RURAL AND REGIONAL DEVELOPMENT Y. B. DATO’ SERI MOHAMED KHALED BIN NORDIN MINISTER OF HIGHER EDUCATION Y. B. DATO’ SRI MUSTAPA BIN MOHAMED MINISTER OF INTERNATIONAL TRADE AND INDUSTRY Y. B. DATUK SERI DR. MAXIMUS JOHNITY ONGKILI MINISTER OF SCIENCE, TECHNOLOGY AND INNOVATION Y. B. DATO SRI DOUGLAS UGGAH EMBAS MINISTER OF NATURAL RESOURCES AND ENVIRONMENT Y. B. DATO’ SRI DR NG YEN YEN MINISTER OF TOURISM Y. B. DATUK SERI HAJI NOH BIN OMAR MINISTER OF AGRICULTURE AND AGRO-BASED INDUSTRY Y. B. DATO’ SERI DR. AHMAD ZAHID BIN HAMIDI MINISTER OF DEFENCE Y. B. DATO’ SHAZIMAN BIN ABU MANSOR MINISTER OF WORKS Y. B. DATO’ SRI LIOW TIONG LAI MINISTER OF HEALTH Y. B. DATO’ AHMAD SHABERY CHEEK MINISTER OF YOUTH AND SPORTS Y. B. DATUK DR. S. SUBRAMANIAM MINISTER OF HUMAN RESOURCES Y. B. DATO’ SRI ISMAIL SABRI BIN YAAKOB MINISTER OF DOMESTIC TRADE, COOPERATIVE AND CONSUMERISME Y. B. DATO’ SERI HAJI AHMAD HUSNI BIN MOHAMAD HANADZLAH MINISTER OF FINANCE (II) Y. B. DATO’ SERI KONG CHO HA MINISTER OF TRANSPORT Y. B. SENATOR DATO’ SERI SHAHRIZAT ABDUL JALIL MINISTER OF WOMEN, FAMILY AND COMMUNITY DEVELOPMENT Y. B. DATO’ SRI ANIFAH BIN HJ. AMAN MINISTER OF FOREIGN AFFAIRS Y. B. SENATOR DATO’ RAJA NONG CHIK BIN DATO’ RAJA ZAINAL ABIDIN MINISTER OF FEDERAL TERRITORIES AND URBAN WELLBEING Y. B. SENATOR MEJAR JENERAL DATO’ SERI JAMIL KHIR BIN BAHAROM MINISTER IN THE PRIME MINISTER’S DEPARTMENT Y. B. SENATOR DATO’ SRI IDRIS JALA MINISTER IN THE PRIME MINISTER’S OFFICE Y. B. DATO’ WIRA CHOR CHEE HEUNG MINISTER OF HOUSING AND LOCAL GOVERNMENT Summary of Cabinet Board Portfolio| Office Bearer| Party| Prime Minister of Malaysia Deputy Prime Minister of Malaysia| Najib Tun Razak Muhyiddin Yassin| UMNO UMNO| Ministers in the Prime Minister’s Department National Unity and Performance Management Law and Parliament Economic Planning Unit (EPU) Islamic Affairs Performance Management and Delivery Unit (Pemandu) CEO| Koh Tsu Koon (Senator) Nazri Aziz Nor Mohamed Yakcop Jamil Khir Baharom (Senator) Idris Jala (Senator)| GERAKAN UMNO UMNO UMNO Independent| Minister of Finance Minister of Finance II| Najib Tun Razak Ahmad Husni Hanadzlah| UMNO UMNO| Minister of Education| Muhyiddin Yassin| UMNO| Minister of Transport| Kong Cho Ha| MCA| Minister of Plantation Industries and Commodities| Bernard Dompok| UPKO| Minister of Home Affairs| Hishammuddin Tun Hussein| UMNO| Minister of Information, Communications and Culture| Rais Yatim| UMNO| Minister of Energy, Green Technology and Water| Peter Chin Fah Kui| SUPP| Minister of Rural and Regional Development| Mohd Shafie Apdal| UMNO| Minister of Higher Education| Mohamed Khaled Nordin| UMNO| Minister of International Trade and Industry| Mustapa Mohamed| UMNO| Minister of Science, Technology and Innovation| Maximus Ongkili| PBS| Minister of Natural Resources and Environment| Douglas Uggah Embas| PBB| Minister of Tourism| Ng Yen Yen| MCA| Minister of Agriculture and Agro-based Industry| Noh Omar| UMNO| Minister of Defence| Ahmad Zahid Hamidi| UMNO| Minister of Works| Shaziman Abu Mansor| UMNO| Minister of Health| Liow Tiong Lai| MCA| Minister of Youth and Sports| Ahmad Shabery Cheek| UMNO| Minister of Human Resources| Subramaniam Sathasivam| MIC| Minister of Domestic Trade, Co-operatives and Consumerism| Ismail Sabri Yaakob| UMNO| Minister of Housing and Local Government| Chor Chee Heung| MCA| Minister of Women, Family and Community Development| Shahrizat Abdul Jalil (Senator)| UMNO| Minister of Foreign Affairs| Anifah Aman| UMNO| Minister of the Federal Territories and Urban Well-being| Raja Nong Chik Zainal Abidin (Senator)| UMNO| Cabinet of Malaysia is the executive branch of Malaysia’s Government which led by the Prime Minister. The cabinet is a council of members of ministers who are accountable collectively to the parliament according to the Article 43 of the Constitution, members of cabinet can only be selected from members of either houses of Parliament. Yang di-Pertuan Agong Appoints all Ministers on the advice of the Prime Minister. Members of Cabinet shall not be a member of state legislative assembly, a cabinet member shall resign from the Assembly before exercising the functions of his office. Ministers other than the Prime Minister shall hold office during the pleasure of the Yang di-Pertuan Agong, unless the appointment of any Minister shall have been revoked by the Yang di-Pertuan Agong on the advice of the Prime Minister but any Minister may resign his office. Cabinet Appointments By convention, members of the Cabinet are typically appointed from the lower house of Parliament, the Dewan Rakyat.
Although Deputy Ministers may be appointed to each portfolio, they are not included in the Cabinet. The Cabinet used to meet weekly every Wednesday, but after the position of Parliamentary Secretary was removed and partial live telecast of Parliament proceedings began in 2008, the meetings were moved to Fridays whenever Parliament sat, to allow Ministers to personally answer questions during Question Time in Parliament Cabinet Composition The composition of Cabinet and the number of portfolios depends mainly on the wishes of the Prime Minister at the time. The Post of Finance Minister was one of the important most and so important as to be a necessity.
The Deputy Prime Minister is one that exists by convention, and a Prime Minister could theoretically form a Cabinet without a Deputy. Deputy Ministers exist although they are not considered members of the Cabinet. None Parliamentary Secretary were appointed after 2008 Malaysia General Election. Deputy Ministers and Parliamentary Secretaries are also appointed from members of Parliament. Political Secretary exists and need not be members of Parliament.
Members of Cabinet – Deputy Ministers Portfolio| Office Bearer| DEPUTY MINISTER OF NATURAL RESOURCE AND ENVIRONMENT| Y. B. TAN SRI DATUK SERI PANGLIMA JOSEPH KURUP| DEPUTY MINISTER IN THE PRIME MINISTER’S DEPARTMENT| Y. B. DATUK LIEW VUI KEONG| DEPUTY MINISTER OF DEFENCE| Y. B. DATUK DR. HAJI ABDUL LATIFF BIN AHMAD| DEPUTY MINISTER OF INFORMATION, COMMUNICATION AND CULTURE| Y. B. DATO’ JOSEPH SALANG ANAK GANDUM| DEPUTY MINISTER OF RURAL AND REGIONAL DEVELOPMENT| Y. B. DATUK JOSEPH ENTULU ANAK BELAUN| DEPUTY MINISTER OF AGRICULTURE AND AGRO-BASED INDUSTRY| Y. B. DATO’ MOHD. JOHARI BIN BAHARUM| DEPUTY MINISTER OF HOME AFFAIRS| Y. B. DATUK WIRA ABU SEMAN BIN HAJI YUSOP| DEPUTY MINISTER IN THE PRIME MINISTER’S DEPARTMENT| Y. B. SENATOR DATO’ DR. MASHITAH BINTI IBRAHIM| DEPUTY MINISTER OF WORKS| Y. B. DATO’ YONG KHOON SENG| DEPUTY MINISTER OF DOMESTIC TRADE, COOPERATIVE AND CONSUMERISME| Y. B. DATUK HAJJAH ROHANI BINTI ABDUL KARIM| DEPUTY MINISTER OF ENERGY, GREEN TECHNOLOGY AND WATER| Y. B. PUAN NORIAH BINTI KASNON| DEPUTY MINISTER OF INTERNATIONAL TRADE AND INDUSTRY| Y. B. DATO’ JACOB DUNGAU SAGAN | DEPUTY MINISTER OF EDUCATION| Y. B. DATUK IR. DR. WEE KA SIONG| DEPUTY MINISTER OF TRANSPORT| Y. B. TUAN JELAING ANAK MERSAT| DEPUTY MINISTER OF SCIENCE, TECHNOLOGY AND INNOVATION| Y. B. TUAN HJ. FADILLAH BIN YUSOF | DEPUTY MINISTER OF FEDERAL TERRITORIES AND URBAN WELLBEING| Y. B. DATUK SARAVANAN A/L MURUGAN | DEPUTY MINISTER OF FOREIGN AFFAIRS| Y. B. SENATOR TUAN A. KOHILAN PILLAY A/L G. APPU| DEPUTY MINISTER OF HIGHER EDUCATION| Y. B. DR. HOU KOK CHUNG | DEPUTY MINISTER OF PLANTATION INDUSTRIES AND COMMODITIES| Y. B. DATO’ HAMZAH BIN ZAINUDIN | DEPUTY MINISTER OF HUMAN RESOURCES| Y. B. SENATOR DATO’ MAZNAH BINTI MAZLAN| DEPUTY MINISTER OF HOUSING AND LOCAL GOVERNMENT| Y. B. DATUK SERI PANGLIMA HAJI LAJIM BIN HAJI UKIN| DEPUTY MINISTER OF FINANCE| Y. B. SENATOR DATUK DR. AWANG ADEK HUSSEIN| DEPUTY MINISTER OF WOMEN, FAMILY AND COMMUNITY DEVELOPMENT| Y. B. SENATOR PUAN HENG SEAI KIE | DEPUTY MINISTER OF HEALTH| Y. B. DATUK ROSNAH BT. HAJI ABDUL RASHID SHIRLIN| DEPUTY MINISTER OF YOUTH AND SPORTS| Y. B. SENATOR TUAN GAN PING SHOU @ GAN PING SIEU| DEPUTY MINISTER OF TOURISM| Y. B. DATO’ DR. JAMES DAWOS MAMIT| List of Ministry and Role Ministry| Role| Finance| Helps to form the government budget, stimulate economy, and control finances. | Education| Responsible for Malaysian educational matters| Plantation Industries And Commodities| Formulate policies and strategies for development of plantation and commodity. Home Affairs| Security governance in state administer to ensure the security and public welfare| Information, Communication and Culture| Combines the three previous ‘Ministry of Information’, ‘Ministry of Energy, Water and Communications’ and ‘Ministry of Unity, Cultures, Arts and Heritage’| Green Technology and Water| Improves Power Sector, Building Sector, Water Sector and Handling Time, Transport Sector| Higher Education| Encourage the growth of premier knowledge center and individuals who are competent, innovative with high moral values to meet national and international needs| Science Technology and Innovation| To ensure knowledge generation, wealth creation and societal well being| Agriculture and Agro-based Industry| Transformational leader Agriculture| Defense| Strengthening the management of strategic importance to national defense, national sovereignty and integrity secure. Health| Protecting and promoting public health and providing welfare and other social security services| Transport| Develop efficient, safe and effective transport systems and services| The legislative The legislative body is to draw up, amend and pass laws. It exists in both federal and state level. The delegated legislation is embodied in the Constitution permits the Cabinet to draw up and pass the laws on behalf of the Parliament . It consist of Yang di-Pertuan Agong and two assemblies of Parliament which is the House of Representative (HOR) and Senate. Yang di-Pertuan Agong does not involve in making the laws but the House of Representative and the Senate. The process of making laws is carried out with a great care.
Composition and Power House of Representative consist of 222 member of Parliament elected based on the population in general election (which held every 5 years or Parliament is dissolve by YDPA with Prime minister advice). When a member dies or been disqualified or even resign a by-election will be held in order to choose another suitable member but if the tenure general election is less than two year then the place will be left empty until then. Seats from each party| No. | National Front | 137| United Malays National Organization (UMNO)| 78| Malaysian Chinese Association (MCA)| 15| Malaysian Indian Congress (MIC)| 4| Malaysian People’s Movement Party | 2| United Traditional Bumiputera Party (PBB)| 14| Sarawak United People’s Party ( SUPP)| 5| Sarawak Progressive Democratic Party ( SPDP)| 4| Sarawak People’s Party ( PRS)| 6| United Pasokmomogun Kadazandusun Murut Organisation(UPKO)| 4| United Sabah Party (PBS)| 3| United Sabah People’s Party (PBRS)| 1| Liberal Democratic Party (LDP)| 1| People’s Progressive Party (PPP)| 0| People’s Pact (Pakatan Rakyat)| 76| People’s Justice Party (PKR)| 24| Islamic Party of Malaysia (PAS)| 23| Democratic Action Party (DAP)| 29| Socialist Party of Malaysia (PSM)| 1| Sabah Progressive Party (SAPP)| 2| Non-partisans/independents (and others)(1) Konsensus Bebas (Free Consensus)| 6| Vacant| 0| Overall total| 222| The list of Members Bil. | Name| 1| Ab Aziz bin Ab Kadir, Y. B. Tuan Haji| 2| Ab. Halim bin Ab. Rahman, Y. B. Dato’ Haji| 3| Abd Khalid bin Ibrahim , Y. B. Tan Sri Dato’ Seri| 4| Abd. Hadi bin Awang, Y. B. Dato’ Seri Haji| 5| Abd. Rahman bin Bakri, Y. B. Datuk| 6| Abdul Ghapur bin Salleh, Y. B. Datuk Seri Panglima Haji| 7| Abdul Latif bin Ahmad, Y. B. Datuk Dr. Haji| 8| Abdul Manan bin Ismail, Y. B. Dato’ Haji| 9| Abdul Rahim bin Bakri, Y. B. Datuk Haji| 10| Abdul Rahman bin Haji Dahlan, Y. B. Dato’ Haji| 11| Abdul Wahab bin Haji Dolah, Y. B. Datuk Haji| 12| Abdullah bin Haji Ahmad Badawi, Y. B. Tun Haji| 3| Abdullah bin Md Zin, Y. B. Dato’ Seri Dr. | 14| Abdullah Sani bin Abdul Hamid, Y. B. Tuan| 15| Abu Bakar bin Taib, Y. B. Dato’ Paduka| 16| Abu Seman bin Haji Yusop, Y. B. Datuk Wira| 17| Ago Anak Dagang, Y. B. Datuk| 18| Ahmad bin Haji Hamzah, Y. B. Datuk Wira Haji| 19| Ahmad bin Haji Maslan, Y. B. Datuk Haji| 20| Ahmad bin Kasim, Y. B. Tuan Haji| 21| Ahmad Husni bin Mohamad Hanadzlah, Y. B. Dato’ Seri| 22| Ahmad Lai bin Bujang, Y. B. Tuan Haji| 23| Ahmad Shabery bin Cheek, Y. B. Dato’| 24| Ahmad Zahid bin Hamidi, Y. B. Dato’ Seri Dr. | 25| Alexander Nanta Linggi, Y. B. Datuk| 26| Amran bin Ab Ghani, Y. B. Tuan| 27| Anifah bin Haji Aman @ Haniff Amman, Y. B. Dato’ Sri| 28| Anwar bin Ibrahim, Y. B. Dato’ Seri| 29| Azalina Dato’ Othman Said, Y. B. Dato’ Sri| 30| Azan bin Ismail, Y. B. Tuan| 31| Azmi bin Khalid, Y. B. Dato’ Seri Haji| 32| Baharum bin Haji Mohamed, Y. B. Datuk Haji| 33| Bernard Giluk Dompok, Y. B. Tan Sri| 34| Billy Abit Joo, Y. B. Datuk| 35| Bung Moktar bin Radin, Y. B. Datuk| 36| Charles Anthony a/l R. Santiago, Y. B. Tuan| 37| Che Rosli bin Che Mat, Y. B. Dr. | 38| Che Uda bin Che Nik, Y. B. Tuan| 39| Chong Chieng Jen, Y. B. Tuan| 40| Chong Eng, Y. B. Puan| 41| Chor Chee Heung, Y. B. Dato’ Wira| 42| Chow Kon Yeow, Y. B. Tuan| 43| Chua Soon Bui, Y. B. Datuk| 44| Chua Tee Yong, Y. B. Tuan| 5| Chua Tian Chang, Y. B. Tuan| 46| Devamany a/l S. Krishnasamy, Y. B. Dato’| 47| Ding Kuong Hiing, Y. B. Tuan| 48| Douglas Uggah Embas, Y. B. Dato’ Sri| 49| Dzulkefly Ahmad, Y. B. Dr. Haji| 50| Edmund Chong Ket Wah @ Chong Ket Fah, Y. B. Datuk Ir. | 51| Enchin bin Majimbun @ Eric, Y. B. Datuk| 52| Er Teck Hwa, Y. B. Tuan| 53| Fadillah bin Haji Yusof, Y. B. Tuan Haji| 54| Fong Chan Onn, Y. B. Tan Sri Datuk Seri Dr. | 55| Fong Kui Lun, Y. B. Tuan| 56| Fong Po Kuan, Y. B. Puan| 57| Fuziah binti Salleh, Y. B. Puan Hajah| 58| Gobalakrishnan a/l Nagapan, Y. B. Tuan| 59| Gobind Singh Deo, Y. B. Tuan| 60| Gwo-Burne Loh, Y. B. Tuan| 61| Halimah binti Mohd Sadique, Y. B. Datuk| 62| Hamim bin Samuri, Y. B. Tuan Ir. Haji| 63| Hamzah Zainudin, Y. B. Datuk| 64| Hasan bin Malek, Y. B. Dato’ Haji| 65| Hasbi bin Habibollah, Y. B. Tuan Haji| 66| Hee Loy Sian, Y. B. Tuan| 67| Henry Sum Agong, Y. B. Dato’| 68| Hiew King Cheu, Y. B. Tuan Dr. | 69| Hishammuddin bin Tun Hussein, Y. B. Dato’ Seri| 70| Hou Kok Chung, Y. B. Dr. | 71| Ibrahim Ali, Y. B. Dato’| 72| Idris bin Haji Haron, Y. B. Datuk Ir. Haji| 73| Ismail bin Haji Abd Muttalib, Y. B. Dato’ Haji| 74| Ismail bin Haji Mohamed Said, Y. B. Dato’ Haji| 75| Ismail bin Kasim, Y. B. Dato’| 76| Ismail Sabri bin Yaakob, Y. B. Dato’ Sri| 77| Jacob Dungau Sagan, Y. B. Dato’| 8| Jamaludin bin Dato’ Mohd Jarjis, Y. B. Datuk Seri Dr. Haji| 79| James Dawos Mamit, Y. B. Dato’ Dr. | 80| Jelaing Anak Mersat, Y. B. Tuan| 81| Johari bin Abdul, Y. B. Dato’| 82| John a/l Fernandez, Y. B Tuan| 83| Joseph Entulu Anak Belaun, Y. B. Datuk| 84| Joseph Kurup, Y. B. Tan Sri Datuk Seri Panglima| 85| Joseph Pairin Kitingan, Y. B. Tan Sri Datuk Seri| 86| Joseph Salang Anak Gandum, Y. B. Dato’| 87| Juslie Ajirol, Y. B. Datuk| 88| Kamarudin bin Jaffar, Y. B. Dato’ Haji| 89| Kamarul Baharin bin Abbas, Y. B. Dato’| 90| Karpal Singh a/l Ram Singh, Y. B. Tuan| 91| Khairy Jamaluddin, Y. B. Tuan| 92| Khalid bin Abd Samad, Y. B. Tuan| 93| Kong Cho Ha, Y. B. Dato’ Seri| 4| Lajim bin Haji Ukin, Y. B. Datuk Seri Panglima Haji| 95| Lee Boon Chye, Y. B. Dr. | 96| Lee Chee Leong, Y. B. Dato’| 97| Liang Teck Meng, Y. B. Tuan| 98| Liew Chin Tong, Y. B. Tuan| 99| Liew Vui Keong, Y. B. Datuk| 100| Lilah bin Yasin, Y. B. Dato’| 101| Lim Guan Eng, Y. B. Tuan| 102| Lim Kit Siang, Y. B. Tuan| 103| Lim Lip Eng, Y. B. Tuan| 104| Liow Tiong Lai, Y. B. Dato’ Sri| 105| Lo’ Lo’ binti Hj Mohamad Ghazali, Y. B. Dr. | 106| Loke Siew Fook, Y. B. Tuan| 107| M. Kulasegaran, Y. B. Tuan| 108| M. Saravanan, Y. B. Datuk| 109| Mahfuz bin Haji Omar, Y. B. Dato’ Haji| 110| Makin @ Marcus Mojigoh, Y. B. Datuk Dr. | 111| Manikavasagam a/l Sundaram, Y. B. Tuan| 12| Manogaran a/l Marimuthu, Y. B. Tuan| 113| Masir Anak Kujat, Y. B. Tuan| 114| Matulidi bin Jusoh, Y. B. Tuan| 115| Maximus @ Johnity Ongkili, Y. B. Datuk Seri Dr. | 116| Md Sirat bin Abu, Y. B. Datuk| 117| Micheal Jeyakumar Devaraj, Y. B. Dr. | 118| Mohamad bin Haji Aziz, Y. B. Datuk Haji| 119| Mohamad Shahrum bin Osman, Y. B. Dato’ Dr. | 120| Mohamed Azmin bin Ali, Y. B. Tuan| 121| Mohamed Khaled bin Haji Nordin, Y. B. Dato’ Seri| 122| Mohamed Nazri bin Tan Sri Abdul Aziz, Y. B. Dato’ Seri| 123| Mohammad Nizar bin Jamaluddin, Y. B. Dato’ Seri Ir. | 124| Mohd Abdul Wahid bin Haji Endut, Y. B. Tuan Haji| 125| Mohd Firdaus bin Jaafar, Y. B. Tuan| 26| Mohd Hatta bin Md Ramli, Y. B. Dr. | 127| Mohd Hayati bin Othman, Y. B. Dato’ Dr. Haji| 128| Mohd Jidin bin Shafee, Y. B. Dato’| 129| Mohd Johari bin Baharum, Y. B. Dato’ Wira| 130| Mohd Najib bin Tun Abdul Razak, Y. A. B. Dato’ Sri| 131| Mohd Nasir bin Ibrahim Fikri, Y. B. Datuk| 132| Mohd Nasir bin Zakaria, Y. B. Tuan| 133| Mohd Nizar bin Zakaria, Y. B. Tuan| 134| Mohd Nor bin Othman, Y. B. Tuan Haji| 135| Mohd Puad bin Zarkashi, Y. B. Dr. Hj| 136| Mohd Radzi bin Sheikh Ahmad, Y. B. Dato’ Seri| 137| Mohd Shafie bin Hj. Apdal, Y. B. Dato’ Seri Hj. | 138| Mohd Yusmadi bin Mohd Yusoff, Y. B. Tuan| 139| Mohd Zin bin Mohamed, Y. B. Dato’ Sri Ir. | 40| Mohsin Fadzli bin Haji Samsuri, Y. B. Tuan| 141| Mojilip bin Bumburing @ Wilfred, Y. B. Datuk Seri Panglima| 142| Muhammad bin Husain, Y. B. Tuan| 143| Muhammad Leo Micheal Toyad Abdullah, Y. B. Dato’ Sri Dr. | 144| Muhyiddin bin Mohd. Yassin, Y. A. B. Tan Sri Dato’ Haji| 145| Mujahid Yusof Rawa, Y. B. Dr. | 146| Mukhriz bin Tun Dr. Mahathir, Y. B. Dato’| 147| Mustapa bin Mohamed, Y. B. Dato’ Sri| 148| Nancy binti Haji Shukri, Y. B. Puan Hajah| 149| Nasharudin bin Mat Isa, Y. B. Tuan Haji| 150| Ng Yen Yen, Y. B. Dato’ Sri Dr. | 151| Nga Kor Ming, Y. B. Tuan| 152| Ngeh Koo Ham, Y. B. Dato’| 153| Noh bin Haji Omar, Y. B. Dato’ Seri Haji| 54| Nor Mohamed Yakcop, Y. B. Tan Sri| 155| Norah binti Abdul Rahman, Y. B. Datuk Hajah| 156| Noraini binti Ahmad, Y. B. Dato’| 157| Noriah binti Kasnon, Y. B. Puan| 158| Nur Jazlan bin Mohamad, Y. B. Datuk| 159| Nurul Izzah binti Anwar, Y. B. Puan| 160| Ong Ka Chuan, Y. B. Dato’ Seri| 161| Ong Ka Ting, Y. B. Tan Sri| 162| Ong Tee Keat, Y. B. Dato’ Sri| 163| Ooi Chuan Aun, Y. B. Tuan| 164| P. Kamalanathan a/l P. Panchanathan, Y. B. Tuan| 165| P. Ramasamy a/l Palanisamy, Y. B. Prof. Dr. | 166| Peter Chin Fah Kui, Y. B. Dato’ Sri| 167| Rafidah binti Abd. Aziz, Y. B. Tan Sri,| 168| Raime Unggi, Y. B. Datuk| 169| Rais Yatim, Y. B. Dato’ Seri Utama Dr. | 70| Rashid bin Din, Y. B. Dato’| 171| Razali bin Ibrahim, Y. B. Dato’| 172| Richard Riot Anak Jaem, Y. B. Datuk| 173| Rohani binti Haji Abd. Karim, Y. B. Datuk Hajah| 174| Ronald Kiandee, Y. B. Datuk| 175| Rosnah binti Haji Abdul Rashid Shirlin, Y. B. Datuk| 176| S. Subramaniam, Y. B. Datuk Dr. | 177| Saifuddin bin Abdullah, Y. B. Dato’| 178| Saifuddin Nasution bin Ismail, Y. B. Tuan| 179| Salahuddin bin Haji Ayub, Y. B. Tuan| 180| Salleh bin Kalbi, Y. B. Tuan Haji| 181| Sapawi bin Haji Amat Wasali @ Ahmad, Y. B. Datuk| 182| Shahrir bin Abdul Samad, Y. B. Datuk Seri Utama| 183| Shamsul Anuar bin Nasarah, Y. B. Dato’| 184| Shaziman bin Abu Mansor, Y. B. Dato’| 85| Sim Tong Him, Y. B. Tuan| 186| Siringan bin Gubat, Y. B. Datuk| 187| Siti Mariah binti Mahmud, Y. B. Dr. Hajah| 188| Siti Zailah binti Mohd Yusoff, Y. B. Puan| 189| Sivarasa a/l K. Rasiah, Y. B. Tuan| 190| Sulaiman Abdul Rahman Taib, Y. B. Dato’ Sri| 191| Syed Hamid bin Syed Jaafar Albar, Y. B. Tan Sri Datuk Seri| 192| Taib Azamudden bin Md Taib, Y. B. Tuan| 193| Tajuddin bin Abdul Rahman, Y. B. Dato’ Haji| 194| Tan Ah Eng, Y. B. Puan| 195| Tan Kok Wai, Y. B. Tuan| 196| Tan Lian Hoe, Y. B. Dato’| 197| Tan Seng Giaw, Y. B. Dr. | 198| Tan Tee Beng, Y. B. Tuan| 199| Tekhee @Tiki anak Lafe, Y. B. Datuk Dr. | 200| Teng Boon Soon, Y. B. Tuan| 01| Tengku Adnan bin Tengku Mansor, Y. B. Datuk Seri| 202| Tengku Azlan Ibni Almarhum Sultan Abu Bakar, Y. B. Dato’ Seri| 203| Tengku Razaleigh bin Tengku Hamzah, Y. B. | 204| Teo Nie Ching, Y. B. Puan| 205| Teresa Kok Suh Sim, Y. B. Puan| 206| Tiong King Sing, Y. B. Datuk Seri| 207| Tiong Thai King, Y. B. Datuk| 208| Tony Pua Kiam Wee, Y. B. Tuan| 209| Wan Abd. Rahim bin Wan Abdullah, Y. B. Dato’ Haji| 210| Wan Junaidi bin Tuanku Jaafar, Y. B. Datuk Dr. | 211| Wee Choo Keong, Y. B. Tuan| 212| Wee Jeck Seng, Y. B. Datuk| 213| Wee Ka Siong, Y. B. Datuk Ir. Dr. | 214| William @ Nyallau Anak Badak, Y. B. Tuan| 215| William Leong Jee Keen, Y. B. Tuan| 216| Wong Ho Leng, Y. B. Tuan| 217| Yong Khoon Seng, Y. B. Dato’| 218| Yussof bin Haji Mahal, Y. B. Datuk Haji| 219| Zahrain Mohamed Hashim, Y. B. Dato’ Seri| 220| Zulhasnan bin Rafique, Y. B. Dato’ Sri Haji| 221| Zulkifli bin Noordin, Y. B. Tuan| 222| Zuraida binti Kamaruddin, Y. B. Puan Hajah| Members sitting in meeting Senate consist of 90 members (26 elected from 13 states,4 appointed by YDPA federal territories which is Kuala Lumpur ,Putrajaya and Labuan. To be eligible as a member: 1. be a Malaysian citizen; 2. be not less than 30 years old; 3. be of sound mind; 4. not be an undischarged bankrupt; and 5. not have a criminal record The role of the president is to preside over the sittings of the Senate, responsible for the observance of the rules in the Senate, ensure the relevancy of the points raised during the Debate, to interpret the Standing Orders in case of disputes and the decision is final The list of the President YB Dato’ Haji Abdul Rahman b. Mohamed Yassin 11. 09. 1959 – 31. 12. 1969 YB Tuan Syed Sheh bin Syed Hassan Barakhah 27. 01. 1969 – 05-. 02. 1969 YB Dato’ Haji Mohamad Noah bin Omar 24. 02. 1969 – 28-07. 1970 YB Tan Sri Haji Abdul Hamid Khan bin Haji Sakhawat Ali Khan 20. 02. 1971 – 22. 02. 1973 Y. A. Bhg. Tun Datuk Haji Omar Yoke Lin Ong 23. 02. 1973 – 31. 12. 1980 YB Tan Sri Ismail Khan 05. 01. 1981 – 13. 04. 1985 YB Tan Sri Datuk Benedict Stephens 15. 04. 985 – 11. 04. 1988 YB Tan Sri Datuk Abang Haji Ahmad Urai bin Datu Hakim Abang 11. 07. 1988 – 09-07. 1990 YB Tan Sri Dato’ Chan Choong Tak 17. 12. 1990 – 31. 03. 1992 YB Tan Sri Dato’ Vadiveloo s/o Govindasamy 13. 04. 1992 – 12. 06. 1995 YB Dato’ Adam bin Kadir 13. 06. 1995 – 30. 11. 1996 YB Tan Sri Dato’ Haji Mohamad bin Ya’acob 10. 12. 1996 – 05. 12. 2000 YB Tan Sri Dato’ Michael Chen Wing Sum 07. 12. 2000 – 11. 04. 2003 YB Tan Sri Dato’ Seri Dr. Abdul Hamid Pawanteh 07. 07. 2003 – 06. 07. 2009 YB Dato’ Ir Wong Foon Meng 07. 07. 2009 – 14. 04. 2010 YB Tan Sri Abu Zahar bin Dato’ Nika Ujang 6. 04. 2010 – present | | Members sitting in meeting Members of Parliament is permitted to speak on any subject as the Parliament immunity takes effect from the moment the member is sworn in and only applies when the statement made inside the house. But there are one rules that must be obeyed is never touch the social contract.
The Process of the Federal Legislating Process 1st Ministry level will come up with draft proposal after consultation and discussion with related ministries and department under its ministries. 2nd Stamped with the Royal Seal. 3rd The bill that is approved by both Houses will be presented to the YDPA for approval. 4th The bill is presented to the House of Representative or the Senate; 3 readings * 1st reading – the Minister to read the bill * 2nd reading – the principle of the bill will be discussed * 3rd reading – the bill will be discussed at the level of the House Committee (The bill that passed by HOR will be brought to the Senate for approval and goes the same process) 5th The Minister and the officers of his ministry will frame the bill with advice from the Attorney General’s Office. 6th After being agreed by the Cabinet, with or without amendment the bill is printed and presented to Parliament. 7th The Minister will get Cabinet to pass the bill policy explaining the importance of presenting it in Parliament.
Cite this page
The Cabinet and Legislative of Malaysia. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Quality Control
UNDERSTANDING QUALITY CONTROL ? Quality Control is a process by which entities review the quality of all factors involved in production. This approach places emphasis on three aspects: o Elements such as controls, job management, defined and well managed processes, performance and integrity criteria, and identification of records o Competence, such as knowledge, skills, experience, and qualifications o Soft elements, such as personnel integrity, confidence, organizational culture, motivation, team spirit, and quality relationships The quality of the outputs is at risk if any of these three aspects is deficient in any way. Quality control is a major component of total quality management; and the quality-control cycle consists of four steps: quality planning, data collection, data analysis, and implementation. o Quality planning consists of defining measurable quality objectives. Quality objectives are specific to the product or service and to the phase in their life cycle, and they should reflect the customer’s requirements o The collection of data about product characteristics that are relevant to the quality objectives is a key element of quality control. These data include quantitative measurements (measurement by variables), as well as determination of compliance with given standards, specifications, and required product features (measurement by attributes). Measurements may be objective, that is, of physical characteristics, which are often used in the control of the quality of services.
Since quality control was originally developed for mass manufacturing, which relied on division of labor, measurements were often done by a separate department. However, in the culture of Total Quality Management, inspection is often done by the same individual or team producing the item. The data are analyzed in order to identify situations that may have an adverse effect on quality and may require corrective or preventive action. The implementation of those actions as indicated by the analysis of the data is undertaken, including modifications of the product design or the production process, to achieve continuous and sustainable improvement in the product and in customer satisfaction Data Analysis: The methods and techniques for data analysis in quality control are generic and can be applied to a variety of situations. The techniques are divided into three main categories: diagnostic techniques; process control, which includes process capability assessment and control charts; and acceptance sampling. Diagnostic techniques serve to identify and pinpoint problems or potential problems that affect the quality of processes and products, and include the use of flowcharts, cause-and-effect diagrams, histograms, Pareto diagrams, location diagrams, scatter plots, and boxplots Process-control methods are applicable to systems that produce a stream of product units, either goods or services. They serve to control the processes that affect those product characteristics that are relevant to quality as defined in the quality objectives.
For example, in a system that produces metal parts, some of the processes that might need to be controlled are cutting, machining, deburring, bending, and coating. The relevant product characteristics are typically spelled out in the specifications in terms of physical dimensions, position of features, surface smoothness, material hardness, paint thickness, and so on. In a system that produces a service, such as a telephone help line, the relevant processes could be answering the call, identifying the problem, and solving the problem.
The characteristics that are relevant to quality as perceived by the customer might include response time, number of referrals, frequency of repeat calls for the same problem, and elapsed time to closure. Process control focuses on keeping the process operating at a level that can meet quality objectives, while accounting for random variations over which there is no control. There are two main aspects to process control: control charts and capability analysis. Control charts are designed to ascertain the statistical stability of the process and to detect changes in its level or variability that are due to assignable causes and can be corrected. Capability analysis considers the ability of the process to meet quality objectives as implied by the product specifications.
Acceptance sampling refers to the procedures used to decide whether or not to accept product lots or batches based on the results of the inspection of samples drawn from the lots. Acceptance sampling techniques were originally developed for use by customers of manufactured products while inspecting lots delivered by their suppliers. These techniques are particularly well suited to situations where a decision on the quality level of product lots and their subsequent disposition needs to be made but it is not economic or feasible to inspect the entire production output. ? The ISO definition states that quality control is the operational techniques and activities that are used to fulfill requirements for quality. This definition could imply that any activity whether serving the improvement, control, management or assurance of quality could be a quality control activity. What the definition fails to tell us is that controls regulate performance. They prevent change and when applied to quality regulate quality performance and prevent undesirable changes in the quality standards. Quality control is a process for maintaining standards and not for creating them.
Standards are maintained through a process of selection, measurement and correction of work, so that only those products or services which emerge from the process meet the standards. In simple terms quality control prevents undesirable changes being present in the quality of the product or service being supplied. The simplest form of quality control is illustrated in the Figure below. Quality control can be applied to particular products, to processes which produce the products or to the output of the whole organization by measuring the overall quality performance of the organization. [pic] Quality control is often regarded as a post event activity. i. e. means of detecting whether quality has been achieved and taking action to correct any deficiencies. However, one can control results by installing sensors before, during or after the results are created. It all depends on where you install the sensor, what you measure and the consequences of failure.
Some failures cannot be allowed to occur and so must be prevented from happening through rigorous planning and design. Other failures are not so critical but must be corrected immediately using automatic controls or fool proofing. Where the consequences are less severe or where other types of sensor are not practical or possible, human inspection and test can be used as a means of detecting failure. Where failure cannot be measured without observing trends over longer periods, one can use information controls. They do not stop immediate operations but may well be used to stop further operations when limits are exceeded. If you have no controls then quality products are produced by chance and not design. The more controls you install the more certain you are of producing products of consistent quality but there is balance to be achieved. Beware of the law of diminishing returns. It is often deemed that quality assurance serves prevention and quality control detection, but a control installed to detect failure before it occurs serves prevention such as reducing the tolerance band to well within the specification limits. So quality control can prevent failure.
Assurance is the result of an examination whereas control produces the result. Quality Assurance does not change the product, Quality Control does.
Quality Control is also a term used as a name of a department. In most cases Quality Control Departments perform inspection and test activities and the name derives from the authority that such departments have been given. They sort good products from bad products and authorize the release of the good products. It is also common to find that Quality Control Departments perform supplier control activities which are called Supplier Quality Assurance or Vendor Control. In this respect they are authorized to release products from suppliers into the organization either from the supplier’s premises or on receipt in the organization. Since to control anything requires the ability to effect change, the title Quality Control Department is in fact a misuse of the term since such departments do not in fact control quality. They do act as a regulator if given the authority to stop release of product, but this is control of supply and not of quality. Authority to change product usually remains in the hands of the producing departments. It is interesting to note that similar activities within a Design Department are not called quality control but Design Assurance or some similar term. Quality Control has for decades been a term applied primarily in the manufacturing areas of an organization and hence it is difficult to change people’s perceptions after so many years of the terms incorrect use. In recent times the inspection and test activities have been transferred into the production departments of organizations, sometimes retaining the labels and sometimes reverting to the inspection and test labels.
Control of quality, or anything else for that matter, can be accomplished by the following steps: 1. Determine what parameter is to be controlled. 2. Establish its criticality and whether you need to control before, during or after results are produced. 3. Establish a specification for the parameter to be controlled which provides limits of acceptability and units of measure. 4. Produce plans for control which specify the means by which the characteristics will be achieved and variation detected and removed. 5. Organize resources to implement the plans for quality control. 6. Install a sensor at an appropriate point in the process to sense variance from specification. 7. Collect and transmit data to a place for analysis. 8. Verify the results and diagnose the cause of variance. . Propose remedies and decide on the action needed to restore the status quo. 10. Take the agreed action and check that the variance has been corrected. We may wonder QC is the same as QA? Let’s discuss…… Quality Control & Quality Assurance F I R S T . . . . Quality control emphasizes testing of products to uncover defects, and reporting to management who make the decision to allow or deny the release, whereas Quality assurance attempts to improve and stabilize production, and associated processes, to avoid, or at least minimize, issues that led to the defects in the first place. Quality assurance, or QA for short, refers to a program for the systematic monitoring and evaluation of the various aspects of a project, service, or facility to ensure that standards of quality are being met. Quality assurance includes regulation of the quality of raw materials, assemblies, products and components; services related to production; and management, production and inspection processes. It is important to realize also that quality is determined by the intended users, clients or customers, not by society in general: it is not the same as ‘expensive’ or ‘high quality’. Even goods with low prices can be considered quality items if they meet a market need. QA is more than just testing the quality of aspects of a product, service or facility, it analyzes the quality to make sure it conforms to specific requirements and comply with established plans. S E C O N D . . . . Quality control means checking a finished product against the specification and rejecting anything that does not meet the specifications. Checks can be on every item or on a sample. Quality assurance means checking the inputs to a manufacturing process, things like raw materials, measuring devices that are used and machine settings. If QA is done correctly, you should make little or no product out of specification. | | |TOTAL QUALITY MANAGEMENT | |In recent years, National Kidney and Transplant Institute has assumed a trailblazing role in renal healthcare and | |organ transplantation in the Philippines and Asia and the Institute has constantly walked the path of service | |quality. | | |The Institute’s Total Quality Management advocacy was formally launched on March 28, 2001, a defining milestone in | |our delivery of quality healthcare. As supported by the Institute’s Quality Policy and Quality Objectives, we | |maintain service quality in all areas of the hospital. Quality Management is seen in all aspects of our daily | |operations: from the Medical, Para-Medical, Patient Safety, Infection Control and to the Nursing Services, quality | |permeates all activities. Incorporating the five pillars of Total Quality Management – 5S, Suggestion Scheme, | |Quality Circles, ISO – to our Institute has allowed us to be more responsive to the needs of our patients and their| |families, visitors, and express genuine concern for their utmost comfort, welfare and self-esteem. | | |We acquired our ISO 9001 : 2000 Certification (Comprehensive Specialty Healthcare Services) in April 25, 2002, and | |up until now remain the only Philippine Tertiary Government Hospital who has attained the ISO global seal of | |quality standard. As a result, we have embraced and actualized the concept of Continual Quality Improvement in our | |services; and we acknowledge that it is through a competent workforce with selfless teamwork, dedication, and sense| |of accountability that quality improvement and service quality can be achieved. | | |For the past two years, as part of our service quality, we are implementing an efficient Hospital Information | |System that ensures smooth and prompt processing of your transactions – from Admission until Discharge, requests | |for diagnostic procedures and release of results, requests for medical supplies and pharmaceuticals, etc. | | | |At NKTI, we make sure that your expectations from us are met; and our commitment to Quality also guarantees that we| |will exceed your expectations. |[pic] | | | | | | | | | |Quality Policy | | | |To fulfill the Vision-Mission of National Kidney and Transplant Institute, we shall provide the most appropriate, | |comprehensive, effective health care services to exceed our customers’ expectations. | | | |Our success will be achieved through full participation of our employees at all levels of the organization guided | |by our Quality Objectives. | | |National Kidney and Transplant Institute shall commit to ensure compliance to all regulatory, statutory, | |environmental, and health / safety requirements of the government and other recognized world organizations like the| |WHO, etc. | | | |The Quality Policy shall be communicated to and made understood by all employees through orientations, meetings, | |circulars, posters and other related means. | | | |This Quality Policy shall be reviewed annually or as necessary by management to adapt to current developments / | |requirements through continual improvement. | | |Quality Objectives | | | |T he objectives of the Quality Assurance Program of National Kidney and Transplant Institute is the preservation | |and enhancement of the high quality patient-centered care by ensuring that : | | | |HUMAN RESOURCES have optimum skills and competencies. | |TECHNOLOGY and FACILITIES are state-of-the-art and properly maintained. | |SERVICES are delivered in the safest and most efficient manner. | |SYSTEMS are effective, well-defined and continually improved to meet customer requirements. | |AFFORDABILITY shall not compromise the cost of QUALITY. | |REQUIREMENTS OF INTERESTED PARTIES shall be observed with maximum compliance at all times. | | |Above-mentioned Quality Objectives are inspired by the following CORE VALUES of TOTAL QUALITY MANAGEMENT : | | | |“Customer-First” Attitude | |Commitment and | |Competence Development | |Long-Term Perspective | |Process and Results | |Orientation | |Prevention | |Continuous Improvement | |Learning from Others | |Fast Response | |Management by Fact | Nursing services department Vision | | | |Imbued with compassion, professionalism and excellence, we shall be the role model in the entire nursing profession| |and its allied health care services, globally recognized in the delivery of effective and efficient quality care to| |everyone we serve. | | | |Mission | | | |We are dedicated to serve and share our expertise to everyone with integrity and with partiality to none. | | |Quality Objectives | | | |PATIENT CARE | | | |Provide individualized quality patient care using the nursing process to meet patient care needs from admission to | |home management. | | | |EDUCATION | | | |Establish a continual program in quality training and education to provide the staff with the cutting edge | |knowledge, skills and values to effectively and efficiently care and interact with the patients. | | | |CONTINUOUS QUALITY IMPROVEMENT | | | |Review, evaluate and revise processes and practices, to achieve best outcomes. | | |RESEARCH | | | |Develop and implement research-based strategies on identified patient care needs and job performance needs. | | | |LEADERSHIP | | | |To provide competent, responsible, and accountable leadership aimed at developing and sustaining a creative and | |positive culture and milieu for professional nurses and support staff. |Core Values | | | |Competence & Compassion | |Timeliness | |Accountability | |Empowerment | |Respect & Integrity | |Innovation | |Qualification |Graduate of Bachelor of Science in Nursing | |Standards / Eligibility: |B. Licensed to practice nursing in the Philippines | |Position: NURSE I (SG 11) |C. Member, Philippine Nurses Association | | |D. Licensed Basic Life Support (BLS) Provider | | |E. Licensed Intravenous Therapy (IVT) Practitioner | | |F. 4-months Basic Skills Training mandatory for non-practicing nursing graduates of | | |more than 5 years ago or 6 months hospital experience of no less than 100 bed | | |capacity | | |G. Computer Literate | |Qualification |Completion of two years studies in college relevant to the job or have undergone a | |Standards / Eligibility: |relevant post secondary or required training course: ELIGIBILITY: MC 12 Medical | |MST 1 SG 6 |Equipment/Services Technician | |Qualification |- Bachelor’s degree relevant to the job; | |Standards / Eligibility: |- 2 years of relevant experience; | |Statistician III SG 18 |- 8 hours of relevant training | | |- Career Service ( Professional ) | | |- 2nd level Eligibility | |Qualification |Bachelor’s Degree in Radiologic Technology | |Standards / Eligibility: |2 years relevant experience | |Radiologic Technologist II SG 13 |8 hours relevant training | | |ELIGIBILITY: R. A. 080 | |Qualification |Bachelor’s degree | |Standards / Eligibility: |3 years supervisory experience | |Department Manager III SG 26 |ELIGIBILITY: CES | |Qualification |Bachelor’ s degree relevant to the job | |Standards / Eligibility: |2 yrs.
Experience in cadaver organ retrieval |Transplant Coordinator I |16 hours of relevant training/administrative, proficiency, kills development | |SG 16 |Career Service Professional or relevant Eligibility for 2nd level position | |Qualification |Licensed Engineer | |Standards / Eligibility: |1 year relevant experience | |Engineer II SG 16 |8 hours relevant training | PRESIDENTIAL DECREE No. 807 October 6, 1975 PROVIDING FOR THE ORGANIZATION OF THE CIVIL SERVICE COMMISSION IN ACCORDANCE WITH PROVISIONS OF THE CONSTITUTION, PRESCRIBING ITS POWERS AND FUNCTIONS AND FOR OTHER PURPOSES ARTICLE VIII PERSONNEL POLICIES AND STANDARDS Section 20. Qualification Standards. (a) A qualification standard expresses the minimum requirements for a class of positions in terms of education, training and experience, civil service eligibility, physical fitness, and other qualities required for successful performance. The degree of qualifications of an officer or employee shall be determined by the appointing authority on the basis of the qualifications standard for the particular position. Qualification standards shall be used as basis for civil service examinations for positions in the career service, as guides in appointment and other personnel actions, in the adjudication of protested appointments, in determining training needs, and as aid in the inspection and audit of the agencies personnel work programs. It shall be administered in such manner as to continually provide incentives to officers and employees towards professional growth and foster the career system in the government service. (b) The establishment, administration and maintenance of qualification standards shall be the responsibility of the department or agency, with the assistance and approval of the Civil Service Commission and in consultation with the Wage and Position Classification Office. [pic][pic][pic]
Cite this page
Quality Control. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Experiments with Metals
Cite this page
Experiments With Metals. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
A Computer Virus
A computer virus is a computer program that can copy itsel and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
The term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system’s hosted data, functional performance, or networking throughput, when they are executed.
Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or go unnoticed.
Infection strategies
In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs.
If a user attempts to launch an infected program, the virus’ code may be executed simultaneously. Viruses can be divided into two types based on their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started.
Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.
Nonresident viruses Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file Resident viruses Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. This module, however, is not called by a finder module.
The virus loads the replication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to perform a certain operation.
The replication module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer. Resident viruses are sometimes subdivided into a category of fast infectors and a category of slow infectors. Fast infectors are designed to infect as many files as possible.
A fast infector, for instance, can infect every potential host file that is accessed. This poses a special problem when using anti-virus software, since a virus scanner will access every potential host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory the virus can “piggy-back” on the virus scanner and in this way infect all files that are scanned.
Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently.
Some slow infectors, for instance, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably and will, at most, infrequently trigger anti-virus software that detects suspicious behavior by programs.
The slow infector approach, however, does not seem very successful.
Stealth Some viruses try to trick antivirus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the antivirus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the antivirus software, so that it seems that the file is “clean”. Modern antivirus software employs various techniques to counter stealth mechanisms of viruses.
The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean Spyware is a type of malware that is installed on computers and collects little bits information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect.
Typically, spyware is secretly installed on the user’s personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. While the term spyware suggests that software that secretly monitors the user’s computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity.
Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.
In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user’s computer.
The US Federal Trade Commission has placed on the Internet a page of advice to consumers about how to lower the risk of spyware infection, including a list of “do’s” and “don’ts. ” Routes of infection Malicious websites attempt to install spyware on readers’ computers. Spyware does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. Instead, spyware gets on a system through deception of the user or through exploitation of software vulnerabilities.
Most spyware is installed without users’ knowledge. Since they tend not to install software if they know that it will disrupt their working environment and compromise their privacy, spyware deceives users, either by piggybacking on a piece of desirable software such as Kazaa, or by tricking them into installing it (the Trojan horse method).
Some “rogue” spyware programs masquerade as security software. The distributor of spyware usually presents the program as a useful utility—for instance as a “Web accelerator” or as a helpful software agent.
Users download and install the software without immediately suspecting that it could cause harm.
For example, Bonzi Buddy, a program bundled with spyware and targeted at children, claims that: He will explore the Internet with you as your very own friend and sidekick! He can talk, walk, joke, browse, search, e-mail, and download like no other friend you’ve ever had! He even has the ability to compare prices on the products you love and help you save money! Best of all, he’s FREE! Spyware can also come bundled with other software. The user downloads a program and installs it, and the installer additionally installs the spyware. Although the desirable software itself may do no harm, the bundled spyware does. In some cases, spyware authors have paid shareware authors to bundle spyware with their software.
In other cases, spyware authors have repackaged desirable freeware with installers that slipstream spyware. Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware.
The spyware author would also have some extensive knowledge of commercially-available anti-virus and firewall software. This has become known as a “drive-by download”, which leaves the user a hapless bystander to the attack. Common browser exploits target security vulnerabilities in Internet Explorer and in the Sun Microsystems Java runtime.
The installation of spyware frequently involves Internet Explorer. Its popularity and history of security issues have made it the most frequent target. Its deep integration with the Windows environment and scriptability make it an obvious point of attack into Windows. Internet Explorer also serves as a point of attachment for spyware in the form of Browser Helper Objects, which modify the browser’s behavior to add toolbars or to redirect traffic.
In a few cases, a worm or virus has delivered a spyware payload. Some attackers used the Spybot worm to install spyware that put pornographic pop-ups on the infected system’s screen. By directing traffic to ads set up to channel funds to the spyware authors, they profit personally. Examples of spyware
- CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.
com. It displays pop-up ads, rewrites search engine results, and alters the infected computer’s hosts file to direct DNS lookups to these sites.
- Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising.
When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.
- HuntBar, aka WinTools or Adware. Websearch, was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements Computer worm A computer worm is a self-replicating computer program.
It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to the poor security the computers infected have. Unlike a virus, it does not need to attach itself to an existing program.
Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted compute Worms with good intent Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft’s website to fix vulnerabilities in the host system – by exploiting those same vulnerabilities.
In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer’s owner or user. Some worms, such as XSS worms, have been written for research to determine the factors of how worms spread, such as social activity and change in user behavior, while other worms are little more than a prank, such as one that sends the popular image macro of an owl with the phrase “O RLY? ” to a print queue in the infected computer.
Most security experts regard all worms as malware, whatever their payload or their writers’ intentions.
Protecting against dangerous computer worms Worms spread by exploiting vulnerabilities in operating systems. All vendors upply regular security updates (see “Patch Tuesday”), and if these are installed to a machine then the majority of worms are unable to spread to it. If a vendor acknowledges a vulnerability, but has yet to release a security update to patch it, a zero day exploit is possible. However, these are relatively rare.
Users need to be wary of opening unexpected email, and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running a malicious code. Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended. In the April-June, 2008, issue of IEEE Transactions on Dependable and Secure Computing, computer scientists describe a potential new way to combat internet worms.
The researchers discovered how to contain the kind of worm that scans the Internet randomly, looking for vulnerable hosts to infect.
They found that the key is for software to monitor the number of scans that machines on a network sends out. When a machine starts sending out too many scans, it is a sign that it has been infected, allowing administrators to take it off line and check it for viruses A Trojan horse (sometimes shortened to trojan[n 1]), is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system.
The term is derived from the Trojan Horse story in Greek mythology. Purpose and operation Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
Operations that could be performed by a hacker on a target computer system include:
- Use of the machine as part of a botnet (i. e. to perform spamming or to perform Distributed Denial-of-service (DDoS) attacks)
- Data theft (e. g. passwords, credit card information, etc.
)
- Installation of software (including other malware) Downloading or uploading of files
- Modification or deletion of files
- Keystroke logging
- Viewing the user’s screen
- Wasting computer storage space
Trojan horses require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed, that the hacker can then use to control the target computer. A trojan differs from a virus in that only a file specifically designed to carry it can do so. edit] Installation and distribution Trojan horses can be installed through the following methods:
- Software downloads (i.
e. a Trojan horse included as part of a software application downloaded from a file sharing network)
- Websites containing executable content (i. e. a Trojan horse in the form of an ActiveX control)
- Email attachments
- Application exploits (i. e.
flaws in a web browser, media player, messaging client, or other software that can be exploited to allow installation of a Trojan horse)
Also, there have been reports of compilers that are themselves Trojan horses. citation needed] While compiling code to executable form, they include code that causes the output executable to become a Trojan horse.
[edit] Removal Antivirus software is designed to detect and delete Trojan horses, as well as preventing them from ever being installed. Although it is possible to remove a Trojan horse manually, it requires a full understanding of how that particular Trojan horse operates.
In addition, if a Trojan horse has possibly been used by a hacker to access a computer system, it will be difficult to know what damage has been done and what other problems have been introduced. In situations where the security of the computer system is critical, it is advisable to simply erase all data from the hard disk and reinstall the operating system and required software. [edit] Current use Due to the growing popularity of botnets among hackers, Trojan horses are becoming more common.
According to a survey conducted by BitDefender from January to June 2009, “Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the wild”
Cite this page
A Computer Virus. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Advantage and Disadvantage of City Life
Big city is where you can see many vehicles, many skyscrapers, many peple with a hurry pace of life. That place can fascinate us very much due to its light and luxury. Nowadays, more and more pople want to live there because they see many advantages. Indeed, in a big city, people can have the best chances to work as well as can enjoy the best service and entertaiment. In a big city, people can take the chaces to study and work best.
There are many good University for u to choose in a big city. There you can express your ability to study what you like. Moreover, when you graduate, you also find it easier to find chances to get a good job with good salary, that is quite difficult in small cities or countrysides; because there concentrates many big companies and groups. Hence, many graduate students choose big cities to live and work. In short, it is where you can take advantages f yourself. In addition, in a big city you can enjoy the best service and entertainment. Because there are many rich people here, they can invest much money to get the best for them. Lives in a big city are quite luxurius but you don't have to be worried when you are sick or suffer a disease because there you can find good doctors for you, as long as you have muich money. What's more, in a big city you can enjoy new entertainment such as new games or luxury games.
Many people can argue that living in a big city makes them tired with noise and dash. They like the slow pace of life in a countryside. But I think that you can live there for a long ime because the young always like to enjoy new things and want to have much money, which is very difficult to do in a countryside. However, when you get older, especially when you retire, a countryside wll the best choice to live. In summary, living in a big city has many advantages. However, you have to try your best to overcome all difficulties such as hard competition in workplace or polluted environment.
Cite this page
Advantage And Disadvantage Of City Life. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Russia’s Rulers in the Late 19th Century
Cite this page
Russia's Rulers in the Late 19th Century. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Security Testing from Agile Perspective
Security testing from perspective of scrum development Rudra Prasad Tripathy Ph. D. scholar, Utkal university Technical architect, JDA india software(P) Ltd. Hyderabad,India Rudra1in@yahoo. com Ranjit Kumar Panda Senior Engineer, MindTree Limited Bangalore, India panda. ranjitkumar@gmail. com Abstract— We are trying to show how security testing plays predominant role in secured development and through agile methodology-particularly scrum is a suitable development process. Keywords-scrum;security testing. 1. Introduction Application security is in attention for last few years where security no more allures to network security and transcen. Security testing is also crux of secured development though it’s not getting its due importance. In this paper we would discuss issues involved in security testing in traditional software development lifecycle approach like waterfall and would compare with scrum methodology, which is a agile methodology to see how it would smoothen few issues and would facilitate security testing. We would take cross-side scripting as the example to illustrate the study. 1. 1What is security testing? Application security would basically deals with the situation to try to break the software as what an attacker would do. This is different from traditional testing because of following idiosyncratic features. a. Traditional testing doesn’t deal with what happens if it fails, where as security testing objective to break the system and would play a role of antagonist. Hence it requires dexterity and experience to draw suitable test cases apart from tools and frameworks.. b. This would be part of risk management and hence need to reckon the cost involved. We may need to define adequate security
[1] parlance to application’s business domain and value proposition aimed at. For example definition of adequate security a online credit card application and online healthcare system would differ.
Hence prioritization and budgeting of resources are few factors need to be considered. c. Testing of different possible vulnerabilities [2]. 1. 2Security testing approaches. Currently application security testing has been done as a white box testing, may be with help of few tools like static analysis tools to study the vulnerability. Apart from that non functional testing has been conducted to see chance of failures against vicarious attack of adversary. 1. 3Cross-Site Scripting Cross-Site Scripting (XSS) vulnerabilities were verified as executing code on the web application. This occurs when dynamically generated web pages display user input, such as login information, that is not properly validated, allowing an attacker to embed malicious scripts into the generated page and then execute the script on the machine of any user that views the site. XSS can generally be subdivided into two categories-stored and reflected attacks. Stored attacks are something like form stored on the target server, such as in a database, or via a submission to a bulletin board or visitor log. Reflected attacks, on the other hand, come from somewhere else.
This happens when user input from a web client is immediately included via server-side scripts in a dynamically generated web page. Insufficient filtering of client-supplied data that is returned to web users by the web application is the major cause. In many cases, the client-supplied data is being used in the HTTP headers, which could be exploited by using carriage return-linefeed sequence-an attacker can add HTTP headers to the response and completely write the body of the HTTP request. 2. MOTIVATION In one of the web application, an XSS was found through use of third party tool.
This was a critical defect. Design had been made and after implementation code had been tested by security compliance team. Cross-site scripting carried out on websites were roughly 80% of all security vulnerabilities documented by Symantec as of 2007. A full security review usually involves more than just seeking out XSS vulnerabilities. it also involves overall threat modeling, testing for different threats like overflows, information disclosure, error handling, SQL injection, authentication, and authorization bugs. The nice thing is that doing a thorough job in any one area often overlaps with another. Like, while testing for XSS vulnerabilities, you will very often identify error handling and information disclosure problems as well.
Though automated tool like webinspect were available, we did some manual testing through a tool called Paros
[8] for HTTP traffic interception. Intercepting the client GET and POST requests is extremely important. One could circumvent any sort of client-side JavaScript input validation code that may have been pushed down. A simple test will be changing a get parameter in the request. Let the URL is as below https://www. yoursite. com/index. html? param=test. One would modify the URL like https://www. yoursite. com/index. html? name=alert(‘XSS’), and subsequently, if a popup opens up saying XSS then this parameter is open to XSS vulnerable. Paros Proxy is used to intercept the request parameter.
Using this tool we will inject some malicious javascript code into the cookies, header or form parameters. If the code will be executed while the response is displayed in the browser, the application is vulnerable to XSS. 2. 1 Security testing models There are many methodologies proposed by SEI
[5] like SSE-CMM, TSM for secured development. Following are the steps for secured development life cycle
[4] followed at Microsoft. Stage 0: Education and Awareness Stage 1: Project Inception Stage 2: Define and Follow Design Best Practices Stage 3: Product Risk Assessment Stage 4: Risk Analysis Stage 5: Creating Security Documents, Tools, and Best Practices for Customers Stage 6: Secure Coding Policies Stage 7: Secure Testing Policies Stage 8: The Security Push Stage 9: The Final Security Review Stage 10: Security Response Planning Stage 11: Product Release Stage 12: Security Response Execution This best suits to development practice like waterfall model. 2.. 2 Techniques for security testing Though security testing requires some level of craftsmanship, still we could derive some common techniques for analysis. We can broadly divide insecurities into two categories –insecurity by design and insecurity by implementation [7]. Analyses of bugs are another way of identifying the problem and deriving the solution, to some extent general use of this could be ascribes to already available taxonomies. We could see how following agile practice would better tackle the problems and techniques could be applied in a better way. 3. ACHIEVING AGILITY Many enterprises like Microsoft [9], IBM have presented skewed steps of normal life cycle to achieve agility Followings are mapping between steps provided for agile development features of scrum process. In above mentioned works authors try to explain from waterfall perspective of agile. In the following points, we are trying to show how agile is inherently suitable for secured development and particularly for security testing. . Short development period A typical development period is 2-3 weeks which means at end of every sprint one would test the software. In various papers, limitation of seven plus minus two has been advocated. Duration of 2-3 week development would make it easier for a security tester to identify impacted area, hence would help in fuzz testing. ii. Incremental development As the development is incremental, work like threat modeling. It also help in planning when to implement requirement exceptions and hence security review. iii.
Cross functional team As there is paucity of security experts, one would conduct sprints specific to implement security features. As output application size is incremental developer would find it easy to do code review and rectify cryptographic error code. iv. Defining done Though 2-3 weeks is a small amount of time, we cannot really achieve everything. But we could define what we mean by done. We may define identifying issues as done only, may be through static analysis tool. There is a flexibility to inject short sprints in between where we could pick up security implementation instead of product features. Hence agile is a natural choice for secured development. v. No Documentation Maintaining document for threat modeling and other security test cases would be redundant and overhead maintaining documents for satisfying process requirement would not be required. Hence from process perspective we don’t need to do agile, secured testing can be agile. 4. CONCLUSION There is a gap in understanding of scrum from quality perspective. We tried to bridge the gap and to make development process more secured. Further empirical studies and experience papers would help to buttress use of agile for development of secured applications and products. References 1]Bruce Potter and McGraw Gary, “Software Security Testing” [Article], IEEE Security and Privacy. 2004. pp. 32-35. 2]C. E. Landwehr et al. , “A Taxonomy of Computer Program Security Flaws,with Examples”, tech. report NRL/FR/5542—93/9591, Naval Research Laboratory, Nov. 1993. 3]Allen Julia, Barnum Sean, Ellison Robert, McGraw Gary and Mead Nancy. “Software Security: A Guide for Project Managers”, Addison-Wesley, 2008. 4]Steve Lipner,Michael Howard,”The Trustworthy Computing Security Development Lifecycle”,Security Engineering and Communications Security Business and Technology Unit,Microsoft Corporation, March 2005. 5]Noopur Davis,”Secure Software Development Life Cycle Processes”, Software Engineering Institute ,2009. 6]K Tsipenyuk, B Chess, G McGraw – IEEE Security & Privacy Magazine, 2005 7]OWASP Top Ten Most Critical Web Application Security Vulnerabilities, https://www. owasp. org/documentation/topten. html 8]https://www. parosproxy. org 9]https://www. blackhat. com/presentations/bh-dc-10/Sullivan_Bryan/BlackHat-DC-2010-Sullivan-SDL-Agile-wp. pdf
Cite this page
Security Testing from Agile Perspective. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Organizational Behavior
Cite this page
Organizational Behavior. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Different Types of Accounting
Cite this page
Different Types of Accounting. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Shakey’s Research Paper
- Chapter I
- RESULTS ORIENTED
- UNQUESTIONED INTEGRITY
- COMMITMENT TO EXCELLENCE
- CHAPTER II MARKETING STRATEGY ASPECT FRANCHISING AT SHAKEYS
- NATIONWIDE STORE SYSTEM
- FINANCIAL INVESTMENT
- CHAPTER III TRAINING/OPERATING/MANAGEMENT METHOD TRANING DEVELOPMENT
- CHAPTER IV ADVERTISEMENT/PROMOTION ACTIVITIES •
- ORGANIZATIONAL STRUCTURE CHAPTER VI SWOT ANALYSIS, CONCLUSION, AND RECOMMENDATION ?SWOT ANALYSIS
- RECOMMENDATION
- CURRICULUM VITAE
- CURRICULUM VITAE
- CURRICULUM VITAE
Introduction Shakey’s is the first successful pizza restaurant chain in the Philippines. In the 70s-80s, they use to feature bands, in their restaurants. try any of their thin- crust pizzas. Shakey’s the number 1 pizza restaurant in the Philippines. For the generations, Shakey’s has been the neighborhood gathering place, where family and friends come together to share great food and good times. Where Shakey’s things cup and growing with anew generation of family fun. Sherwood “Shakey” Johnson and his partner big Ed Plummer opened the first Shakey’s pizza parlor more than 10 years ago. It all started in a remodeled grocery store on 57th and “j” streets in Sacramento California back in 1954. Shakey and Ed wanted to open all pizza and beer joint, but with a little something unique. They provided delicious Shakey’s pizza, the cold beer and live Dixieland music for the entertainment, Shakey’s pizza quickly become known as they world greatest pizza. Today, Shakey’s still serves the delicious pizza made famous by ours founders, using the best ingredients and dough prepared fresh, everyday.Keeping the tradition of great food and family entertainment, Shakey’s is giving up with exciting changes, newly remodeled restaurants, improved and expanded menus, state of the art game rooms and expansion plans to open new Shakey’s nationwide. Since its establishments, stands to be the perfect gathering place for friends and families, and indeed for anyone to enjoy great food.
Chapter I
Company profile In 1954, Sherwood “shakey” Johnson pooled his funds with those of college friend, Ed Plummer, to open the first Shakeys outlet. The building was a remodeled grocery store located at “57th and “j” streets in Sacramento, California. The parlor opened on Friday evening, april 30 with the help of their friends. As the ovens, were not complete, only beer was sold the first weekend. Johnson entertained guests by playing the piano and Plummer serves the beer. With the money from the beer sales, the partners bought pizza products and began selling pizzas o0n Monday. Ten (10) days later, they had fourteen employees and month later, Dixieland entertainment jazz was added.
The restaurant at “57’ and ‘j” streets has grossed millions of dollars and still a successful Shakey’s today. With success of the first Sacramento restaurant, Johnson and Plummer opened a second Shakey’s two years later in a remodeled mattreys factory on foster road in Portland Oregon. The Shakey’s name and concept were already familiar due to the nightly jazz radio program they sponsored. In 1957 Shakey’s service companies began franchising. Opening that year were franchised restaurants in settle, Washington, Albany, Oregon, Carmichael, concord and Marysville, California. The franchise units also introduce a standed Shakey’s building design. Prior to it, the restaurants have always been located in existing remodeled structures. Shakey’s began to expand outside the United States with the opening of Mexico City restaurant on May 7, 1968. The first Japanese restaurant opened in Osaka, Japan on July 26, 1976. Expansion continued with a restaurant in Makati, Philippines in 1975.
Today there are over 500 Shakey’s restaurant world wide. Pizza is stilled the mainstray at today’s Shakey’’s, whether it’s our original thin crust version with its crispy, crunchy taste or the classic hand tossed pizza with dough bake thick and chewy. Shakeys guests also find a wide spectrum of ala-carte items including marinated pressure fried chicken, our exclusive mojo potatoes and pasta. MISSION To always exceed expectations and become the best in class by making things happen and getting things done. We will wow them all! VISION To be the leading and preferred pizza restaurant by consistently serving the best tasting, high quality food through fast, efficient and friendly service in a clean, fun environment. We provide our guests the best value for their money and very memorable experiences. CORE VALUES: GUEST FOCUSED To wow our guests( external and internal), exceeding….. not just meeting their expectations. ANALYTICAL We apply “critical thinking” in all major decisions. e are a thinking organization. PASSION We are self-driven, intense and persistent. We have the ability to energize ourselves and everyone around us.
RESULTS ORIENTED
We make things happen…….. We get things done.
UNQUESTIONED INTEGRITY
We are ethical, honest, just, reliable and honorable. our integrity is beyond doubt.
COMMITMENT TO EXCELLENCE
We will do things better than before, better than the others and better than expected. Good enough is never enough.. RESPECT We create on environment where everyone will be appreciated and recognized for the effort they put in. SENSE OF OWNERSHIP Loyalty, dedication, commitment and malasakit to the business.. thinking and deciding like an owner does for his business.
CHAPTER II MARKETING STRATEGY ASPECT FRANCHISING AT SHAKEYS
Shakeys business is a great business. Shakeys share its opportunities with the right partners who trust in the shakeys name. we have grown to 100 stores nationwide and still growing. •Proven brand and track records for more than 32 years with attractive store design. •Low investment cost, great margins, one of the best return on investment, (ROI) rate. •Fantastic growth opportunities. •Wide array of the well love products . A committed team who has the vision of making the company the leading and preferred pizza restaurant in the Philippines.
NATIONWIDE STORE SYSTEM
Easy to operate with simplified operations systems. Integrated points of sales and inventory system. Number one delivery systemin metro manila. Investors have been attracted to the business because of its low capital investment resulting to quick and high yielding returns . expertise unwavering support and an exciting blue print for growth and success arte just some of the reasons that sets itself apart from other franchise opportunities. As part of the family, resources are your disposal and these include • Strategic planning and site selection •Marketing and advertising services •Standardize financial system •Centralize purchasing and distribution •Operations, Standard, System and support
FINANCIAL INVESTMENT
The financial requirement for a franchising restaurant range from P 8,000,000. 00 to P 10,000,000 depending on store size, location, and other factors (but does not include site acquisition cost) . The investment well be for the : •Construction of the restaurant (interiors and exteriors) •Purchase and nstallation of kitchen equipment, furniture and fixtures •Pre-operating expenses •Franchise Fee TERMS OF RENEWAL The franchise grant is for 10 year period applicable to a specific location only with an option to renew another 5 years based on mutual agreements. PRODUCT LIFE CYCLE The product life cycle of shakey’s pizza is on a “ first in first out “ bases (FIFO) just like the other food chains. APPLICATION PROCESS An application form will be provided to the franchise applicant who then undergoes a three(3) based application process. •The screening •The validation Final review WORLD FAMOUS MENU •Pizza •Starters, soup and salads •Chick ‘n’ chips •Pasta •Family meals and combos
CHAPTER III TRAINING/OPERATING/MANAGEMENT METHOD TRANING DEVELOPMENT
Shakeys has a tradition of developing and promoting employees through their many years of creating the shakeys experience. We continually evaluate our employees skills and talents and create development plans to help them grow personally and professionally. COACHING Study of the art of providing feedback, encouragement, appreciation and performance expectations. GUEST SERVICE Understand the contrast between a guest and costumer, how to define guest service, guest expectations, how to create a hospitality culture, service leaders and how to resolve guest concerns. LIFE IS A SERIES Learn how to inspire, inform and influence anytime, anywhere.
CHAPTER IV ADVERTISEMENT/PROMOTION ACTIVITIES •
Enjoy their different pizza product •Enjoy promotional activities that company offered CHAPTER V CORPORATE SOCIAL RESPONSIBILITY General Santos City Shakey’s outlet are made their own corporate responsibilities and it is affiliated on the top which is from Manila. hey also varying strategies, ideas and etc in order to achieve their goal as a corporate itself. The responsibility initiated through their internal management as to fulfill their specific interest in one direction. Shakey,s Pizza known for its products and how they handling customer according to taste preference of it. The prestigious stores want more menus for them to increase their sales and profits. The categorize idea of internal affairs are big help to the company to persuade and create sales to the customers. The management of Shakey’s Pizza here in General Santos City re valued their customers, their product, their reputation and of course the company’s locality are still exercised so that it will not be vanished till tomorrows operations. They are also engaging in society’s congestion so that it maintain the good customer relationship. And it is big help also to their company to retain their specialty of the product of Shakey’s.
ORGANIZATIONAL STRUCTURE CHAPTER VI SWOT ANALYSIS, CONCLUSION, AND RECOMMENDATION ?SWOT ANALYSIS
•STRENGTH ?Product ?System ?services WEAKNESSES ?Location ?Price •OPPORTUNITIES ?Products ?Location •THREATS ?Competitors CONCLUSIONS The researcher conclude that their trusted crew are simply treats to their company’s, in reason in possible not cater the possible costumers. Their management are quite working because the researcher observe their environment inside the store. As we can say costumers’ are called them “guest” for the purpose of respect as they welcome through their store. They highly trained in terms of this kind of business but don’t think the possible diversifying their product offered. It is interested issue to the franchisee why that they didn’t offered another type of product in order to increase their profits. The management should create the demand of the costumers because the Filipino buying behaviors are preferred to new products. Then why did not exercise this strategies to add a use as their strength. They better go on the diversity of the product offered. The proponents has marketing major, we should create demand to the costumers in order to satisfy the unsatisfiable individual should we say that they are limiting their product as in modern time of business. The researcher know that the product of Shakey’s pizza are quite expensive compare to the competitor that offering the same kind of product. The researcher offer the management of Shakey’s pizza that they must relocate their location into the crowded place or open area so that it recognize by the costumers.
RECOMMENDATION
The researchers recommend that the location of Shakey’s pizza at Barrio Gaisano is not prefer to go through to the costumers because it is behind back at the mall of Gaisano. It is better that from the time of their renewal of their contract much better that the owner lease the area inside the mall or in crowded place so that their store is being recognize by possible costumers.
CURRICULUM VITAE
Personal data: Name: Bryan S. Brigole Date of birth: March 04, 1984 Place of birth: Bula zone 1-A General Santos City Sex: Male Civil status: Single Home Address: Prk. Roberto blk. 3 labangal G. S. C. Family: Father: Florencio Brigole Mother: Anita Brigole Brothers: 2 Sisters: None Educational Attainment: Elementary Education: Basag Sen. Ninoy Aquino Sul. Kud. Year: 1998-1999 Secondary Education: Fatima National high school Year: 2001- 2002 College Education: GenSantos Foundation College inc, Year: 2001-2011(current 4th year student of BSBA-MM) Affiliation: Former authorized agent of Globe broadband Gensan, Mindanao Personal researcher of Mr. Carl Minoza(OSMIUM LOUDBIKES) Training and seminar: Product management (GLOBE),Bus. exposure(ASIALINK)
CURRICULUM VITAE
Personal data: Name: Mary Grace Damalerio Date of birth: August 01, 1990 Place of birth: Asai Village Bula. G. S. C. Sex: Female Civil status: Single Home Address: Prk. 12 Blk 2, Asai Village Bula, Bula G. S. C. Family: Father: Efipanio Damalerio Mother: Corazon Damalerio Brothers: Erwin Damalerio Sisters: Educational Attainment Elementary Education: Dadiangas South Central Elementary School Year: 2002- 2003 Secondary Education: Irineo l. Santiago National High School of Metro Dadiangas Year: 2006-2007 College Education: Gensantos Foundation College Inc Year: 2010-2011 Affiliation: @ Port cafe 2nd floor Gaisano Mall of Gensan Training and Seminar:
CURRICULUM VITAE
Personal data: Name: Jennifer E. Lubrico Date of birth: October 18,1991 Place of birth: Labo, Lika, Mlang North Cotabato Sex: Female Civil status: Single Home Address: #23 Blk8 Dadiangas Heights Subd. G. S. C. Family: Father: Nestor C. Lubrico Mother: Vivina E. Lubrico Brothers: Jaypee E. Lubrico and Jose Nestor E. Lubrico Sisters: Josephine E. Lubrico Educational Attainment: Elementary Education: Lika Elementary School Year: 2002-2003 Secondary Education: Lika High School Year: 2006- 2007 College Education: Gensantos Foundation College Inc. Year: 2010-2011 Affiliation: None Training and Seminar: None
Cite this page
Shakey's Research Paper. (2017, Sep 25).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Otis Elevators
Cite this page
Otis Elevators. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Hero Honda Environmental Analysis
Cite this page
Hero Honda Environmental Analysis. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Rin Vs Tide
RIN v/s TIDE FACULTY:PROF. UDAY SHANKAR MODULE: AD SALES AND MANAGEMENT DATE: 6TH SEPTEMBER,2010 SHRUTI TYAGI ROLL NO:51442 The tussle between the big two P&G and HUL has been causing ripples in the industry since the launch of its Rin versus Tide comparative advertisement. HUL has been under pressure since quite some time due to the launch of similar products backed by aggressive advertisement by its competitors. The latest conflict appears to have started when P&G introduced its brand Tide washing powder (in orange packaging), which ate into the sales of HUL’s Rin washing powder. In the first move of its kind by HUL, homecare brand Rin has openly taken on rival P Tide, without the typical airbrushing or pixellation to hide the rival brand name on TV and ads on radio. The current high profile aggressive stand of Rin has a background story.
There was a proxy war going on between Rin and Tide since December 2009. In order to retain its market share, in December P introduced a low-cost detergent, Tide Natural, claiming in its ads that it provided “whiteness with special fragrance”. The product was positioned against HUL’s Rin and Wheel. Tide Naturals was priced significantly lower to the Rin. Tide Naturals was launched at Rs 50 per Kg , Rs 10 for 200 gms and Rs 20 for400 gms. Rin was priced at Rs 70 per Kg at that time. The reduced price of the Tide variant was an immediate threat to Rin. Since Tide already has an established brand equity, Rin was bound to face the heat. Although HUL had another low priced brand Wheel priced at Rs 32/Kg, Tide was not in the same category of Wheel.
Rin had to cut the price to resist the market share erosion. HUL was facing a steady erosion in the market share in most of the categories. In the detergent category itself, the brand faced a market share fall of 2. % in December 2009. With P&G starting a price war, HUL had to react and it did by cutting the price of Rin by 30% to Rs 50 per Kg. HUL also reacted to the Tide Natural’s price war in a ‘ Guerrilla Marketing ‘ way. It took P to the court regarding the Tide Natural’s advertisement. The contention was that Tide Naturals was giving the impression to the consumers that it contained natural ingredients like Sandal.
The court ordered P&G to modify the campaign and P&G had to admit that Tide Naturals did not contain any Natural ingredients. While P&G opened a war in the price front, HUL retaliated by opening two war fronts. One was the direct comparative ad and other through the court order asking P&G to modify Tide Naturals Ad and to admit that Tide Naturals is not ‘ Natural’. So we can that HUL retaliated with an aggressive two-pronged strategy. * First, it challenged Tide’s claim of whiteness with special fragrance in the Chennai High Court, which passed an order on 25 February 2010 (CS 189/2010), directing P to modify the advertisement since it was not really able to substantiate the claim of “whiteness with special fragrance”. The court has granted an injunction and directed P to respond within three weeks. Three days later on 28 February, HUL launched an aggressive TV campaign aired during prime time It was Rin which won the Round 1 of this war. It generated enough Buzz about the brand with all the media talking about the campaign. Rin was also able to neutralize the aggression of P to certain extent.
Tide chose not to respond because further fuel to the fight can highlight the fact that Tide Naturals does not contain any ‘Natural Ingredients ” which may negatively affect the brand’s standing in the consumer’s mind. So it is better to play the role of a “poor” victim at this point of time. P&G can celebrate because of the free advertisement it got for Tide Naturals because of the comparative ad of Rin. Although Indian marketing world have seen lot of comparative ads, the Rin Vs Tide is a rare case of direct comparative ad where the brand has taken the competitor brand’s name and challenging it head on. That is the main reason behind the media noise about the campaign. P India always was a laid back competitor in the FMCG market. Despite having the product portfolio and market strength, it never realized its potential. The company was happy with their minuscule market share in the various categories in the FMCG business. For television viewers, it was hard to miss the now infamous Rin commercial, which was unleashed on Indian television screens on Thursday (February 25, 2010). Perhaps bombardment would be a better word: the high-voltage TVC was supported by a media plan that included primetime slots across all major GECs and news channels, in an effort to deliver maximum impact over the long weekend. The ad shows two mothers waiting at a bus stop for their children, who are returning from school. They spot each other’s shopping baskets – one woman’s basket sports a packet of Rin, while the other has purchased Tide Naturals. The Tide lady looks proudly at her purchase and brags about Tide’s ‘khushboo aur safedi bhi’ offering (fragrance combined with whiteness). The Rin lady simply smiles.
When the school bus rounds the corner and drops off the two children, the Tide lady’s boy is wearing a visibly dull shirt, while behind him emerges a boy clad in a spotless white shirt, who runs past the shocked Tide lady, over to his ‘Rin’ mother. To make things cheekier, the boy asks his mother, ‘Aunty chaunk kyun gayi? ‘ (Why is aunty so shocked? ), where the word ‘chaunk’ could easily be a reference to Tide’s punch line, ‘Chaunk gaye? The voiceover concludes that Rin is ‘behtar’ or superior to Tide, when it comes to whiteness, and at a ‘chaunkane wala’ price of Rs 25, at that. A super, ‘Issued in the interest of Rin users’, completes the commercial. Comparative advertising is, quite obviously, not a new phenomenon by any standards. Every other brand has dabbled with it at some point, while it is almost formulaic for some categories. However, to make comparisons with competition involves discretion in execution, such as air-brushing or pixelating a competitor’s brand name/pack shot, and most definitely, keeping away from referring to rival brand names. With this ad, however, Rin seems to have broken every rule in the book.
But what may seem like a publicity stunt to some, is, in all probability, a well-thought out strategy on the part of Rin’s makers, Hindustan Unilever (HUL). There are two debatable issues in this advertisement: * The advertisement clearly shows a packet of Tide Naturals, which has green packaging and is a cheaper extension of Tide, which orange packaging) whereas the woman in the commercial says ‘Tide se kahin behatar safedi de Rin’ (Rin gives better whiteness than Tide)- Does this amount to misleading the public as per the Indian Law? At the end of the advertisement, a line is displayed on the bottom stating that ”this claim is based on laboratory tests done through globally accepted protocols in independent third-party laboratories’ and Schematic representation of superior whiteness is based on Whiteness Index test of Rin Vs Tide Naturals as tested by Independent lab” . The challenge is whether the present statement(s) can be substantiated by way of evidence and if yes, whether such tests if conducted by any independent laboratory continue to be the same. Legal eagle The Advertising Standards Council of India (ASCI) has, over the last few days, received several complaints from customers/viewers, who feel that the comparison is “not fair”. According to the ASCI spokesperson, “We are writing to the advertiser concerned about the complaints received and are seeking a response. ” In order to make comparatively superior claims, an advertiser has to keep the ollowing ASCI Code in mind, which states that advertisements containing comparisons with other manufacturers or suppliers or with other products, including those where a competitor is named, are permissible in the interests of vigorous competition and public enlightenment, provided:
• It is clear what aspects of the advertiser’s product are being compared with what aspects of the competitor’s product.
• The subject matter of comparison is not chosen in such a way as to confer an artificial advantage upon the advertiser, or so as to suggest that a better bargain is offered than is truly the case. The comparisons are factual, accurate and capable of substantiation.
• There is no likelihood of the consumer being misled as a result of the comparison, whether about the product advertised or that with which it is compared.
• The advertisement does not unfairly denigrate, attack or discredit other products, advertisers or advertisements directly or by implication. While no official confirmation could be obtained at the time of filing this report, sources reveal that there are sufficient grounds for HUL to be taken to court over this matter. An HUL spokesperson justifies the commercial, stating, “Rin is a household detergent brand and is used by millions of consumers across India for its promise and delivery of superior whiteness since its launch in 1969. The latest advertisement of Rin brings alive the superior whiteness delivery of Rin, vis-a-vis competing brands in the market. ” Further, HUL adds that this advertisement reinforces the promise to consumers that Rin delivers superior whiteness. This claim is based on laboratory tests done through globally accepted protocols in independent third party laboratories,” the spokesperson adds, to substantiate the claim made in the TVC. Knockout or washout? Unleashing this communication on a long weekend (Eid-e-Milad on Saturday and Holi on Monday) is no coincidence; industry watchers even feel that Indian courts being shut over the weekend has helped Rin’s cause, as anyone taking offence to the commercial could not do much about it during this period. In the meantime, Rin gained with high visibility on TV. Harish Bijoor, CEO, Harish Bijoor Consults, calls this the “putting your finger in competition’s eye” kind of advertising. “Of course, this is a gimmick to create ‘hungama’ or noise. But if the facts are correct and Rin is able to prove them in the buckets of the nation, then its job is done.
But I see the chances of that proof as slim,” he says. On the flip side, HUL is considered a “buzz generating, edgy and trend-setting” company, so there isn’t any reason to not tom-tom about its superior products, Bijoor adds. Ask him if the ad is distasteful, and Bijoor shakes his head in the negative. “What was distasteful 20 years ago isn’t now, and the younger generation’s palate of what is acceptable is fast changing,” he muses. And so, Rin’s well-planned strategy – both of taking on competition head on, as well as a weekend release – may not be a bad thing at all. | But there are contrarians like ad guru Alyque Padamsee, CEO, AP Advertising, who, incidentally, is the brain behind Rin’s trademark lightning strikes and whiteness positioning.
This is comparative advertising to its extreme,” he declares. To him, this is equivalent to hurling stones at another in a manner that doesn’t say, ‘I am better’, but that ‘You are worse’ – a tonality that hurts both brands. “My guess is, a significant dent in the sales of Rin, much due to Tide, may have led to this blatant, gloves-off approach,” he reflects. Ask him how Tide should react, and Padamsee says, “When people throw stones, it is because they have nothing to say. If I were Tide, I would not launch a counter-communication, which itself should put Rin in its place. The adman is also dissatisfied with the ‘faded shirt versus white shirt’ mnemonic used to bring out Rin’s ‘superiority’. “The consumer is not a moron (as David Ogilvy said), but the advertising agency that uses such tactics, is,” he signs off. | Naresh Gupta, director, strategy and planning, Dentsu Marcom, too, feels the only reason for such an attempt by Rin could be Tide’s entry into its whiteness territory. The fact that it targets Tide Naturals, a variant, and not Tide itself, may just be a ‘by the way’ thought, or a way to avoid some legal problems. To Gupta, the marketer in this case has shown gumption to say ‘I do this, they don’t. ‘ Air-brushing and other such means are, in fact, the coward’s way of doing things. “At the end of it all, it does evoke a chuckle or two,” he shrugs. “This is better than a lot of competitive advertising out there. ” As an analogy, Gupta muses that such an ad is akin to the two marketers picking up the phone and talking down to each other – something that is so interesting in itself, that the lack of a big creative idea (Padamsee’s ‘faded shirt’ grouse) can be forgiven. Brand experts conclude that this could well spark off a trend, to release controversial, capsule-duration advertising campaigns, which do their job by the time they are pulled up. But on the other hand, brands with limited, finite budgets may not have the financial muscle, or the gall, to walk this path. In my personal opinion, Rin chose a wrong way of telling its superiority to the consumer.
Last time I saw a direct comparative ad war was between Horlicks and Complan. Horlicks started the direct comparative ad and got a very very aggressive reply from Complan. The current status is that Horlicks stopped the comparative ad and Complan is continuing its aggression against Horlicks. It was an unnecessary move from Horlicks which woke up a laid-back competitor like Complan. I think that in that ad war, Complan won over Horlicks (not in sales terms but in share of noise ). The same thing is going to happen with Rin. It is going to lose this war primarily because there was no need for a direct comparison with Tide atleast in the ads. . If you observe the ad, 22 seconds of the 30 second ad is dedicated to Tide alone. That means in around 75% of the time, the ad talks about Tide. Interestingly the ad even mentions the USP of Tide as “It has fragrance and has whitening property”. Then the rest of the 8 seconds talks about Rin. So if HUL has blasted some 30 lakh in the current promo, 22. 5 lakh of it was spent on promoting Tide. Why should you ever mention your competitor in your ads??? Watching the ad, one homemaker commented ” I never knew Tide and Rin was from the same company, otherwise how can they show these two brands together in the same ad? “. The current campaign lacks any long term objectives. The brand is choosing a short-term path when the issue was a long-term competitive threat. Instead of spending such money on this ad, HUL could have run some serious sales promotional campaigns which could have prompted consumers to opt for Rin. It could have filled the retail outlets with Rin POPs. It could have run retailer campaigns to fill the shelves with Rin rather than Tide. HUL still has a huge distribution reach and strength compared to P&G, it could have won the war hands down had it capitalized on the retailer support alone. If Rin was too worried, it could have bought back Big B as the brand ambassador which could have added punch to the tagline “Chamakte Rahna”. Now the outcome of the ad war will be that HUL will be retrained by ASCII or the Court from further playing the ad. It means that Rin had adapted an unethical means against the competitor which will cause an unwarranted blemish on the brand reputation.
Second outcome is that it will encourage Tide to be more aggressive in the market. Tide now has been officially and publically acknowledged as the competitor for Rin. Third outcome is that an ad war will start which will benefit the respective advertising agencies and the media.
Cite this page
Rin vs Tide. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Lesson Plan – “the Necklace” and “Cinderella”
Cite this page
Lesson Plan – “the Necklace” and “Cinderella”. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Neil Perry
Cite this page
Neil Perry. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Effects of Modern Technology
Cite this page
Effects Of Modern Technology. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Influence of Global Business
| Cross cultural influence of global business | | | |Contents | |1. Introduction | |2. Reed Elsevier | |3. The emergence of a company culture | |4. Products of a company culture | |5. Transference of a company culture | |6. Leadership and Structure | |7. Types of corporate culture | |8. Analysis of values | |9. Future projection | |10. Conclusion | |11. Bibliography | | | |1. 0 Introduction | |Culture is a term that encompasses areas of human activity and interest. It is ‘The integration pattern of human behaviour that includes thoughts, communications, actions, customs, beliefs, values and | |institutions of a race, ethnic, religious or social group. ’1 | |If cultural settings are misunderstood or ignored in different regions, then the risk of failure to a business is enormous. In this age of the global marketplace, aided by the use of the Internet, the need to | |understand and adapt to cross-cultural issues is at its greatest. |In business terms, specifically a global business with offices throughout the world, culture becomes critical to a firm’s success. It is ‘…where balance between consistency and adaptation is essential’2 and must| |be addressed in a cohesive and intelligent sense. | |This case study will outline the importance of culture and its influence on Reed Elsevier (RE), in terms of its organization, its values and its success. | |It will analyse RE’s organizational structure, its global reach and the cultures it is influenced by. It will identify the emergence of defining its own specific corporate culture and the unique elements that | |have emerged from the formulation of its values. | |I will also cover the role of the company’s CEO and his influence in producing a cultural change within the business. An analysis of the products of this change will be presented and an analysis of the values | |and characteristics of RE and where the company will have to maintain its focus in the future. | |2. 0 Reed Elsevier | |Reed Elsevier (RE) is an amalgamation of two publishing companies. They originally date back to a Dutch business being formed in Rotterdam in 1880 (Elsevier) and Reed being formed in 1894 in Kent, England. Both | |companies enjoyed success for the best part of the next 100 years and in 1993 Elsevier NV and Reed International PLC merged. 3 | |‘Reed Elsevier’s corporate goal is to be the indispensable information provider for our target customers in selected professional markets. 4 | |Those markets include Science, Education, Legal and Business. Since the merger it has employed an aggressive expansion strategy resulting in being a global publishing presence, employing over 38,000 people | |across all continents. | |The merger of the two companies may have been a troubled time were it not for the fact that the two companies shared many cultural similarities.
The management structure of the board of directors represents both| |the Netherlands and the UK. The reserved British attitude was well matched to the cautious and considered approach of the Dutch. | |Today the company is composed of the US, Singapore, Japan and the rest of Europe. Expansion into China and India means cross-cultural factors must be noted and acted upon if success is to occur. | |3. 0 The emergence of company culture | |Culture within an organisation can often be sensed within a few minutes of talking to the company’s employees. It is ‘…the emergent result of the continuing negotiations about values, meanings and properties’5. |The company power structure, the rituals, symbols, organisation, and control systems give an identity to the business to the environment outside as well as internally. | |This paradigm, or ‘…constellation of concepts, values, perceptions and practices shared by a community’6, can be a company’s secret to success or its undoing. | |In 1999, RE employed Sir Crispin Davis as CEO, restructured the management hierarchy and announced a new strategy. At the core of this were the company’s five values that would be at the core of every division | |across the world. |The RE values are; | |Passion for winning | |Innovation | |Boundarylessness | |Customer Focus | |Valuing our people | |It is important to note that this change or tipping point in a company’s culture nearly always involves a new face and new ideas. Change, in this case, occurred over a period of years. Establishing a new look | |for the brands of the different divisions (Science, Legal, Education and Business) encouraged a change in culture. Innovation working groups and project teams collated ideas from around the world and backed | |those ideas financially. |Although it took some time to implement, the initial effects were felt within months.
The business took on a global air that enabled people from different countries and cultures, to become part of a group that | |spoke the same language, held the same values7 and achieved goals that were shared by different business units. The emergence of these shared values that were agreeable to every employee facilitated a workforce | |with a strong unilateral voice.
People in Europe understood that those in the US and Asia would be aiming at an RE way of doing business. | |It can be said that the re-structuring removed barriers and enabled channels to be opened, thus allowing change to become possible. By creating a vision of the future that employees subscribe to and act upon, an| |imprint of RE’s philosophy is placed upon all those who work there. They may not believe in it but the power of corporate values; crystallize the messages that the heads of a business wish to convey onto all | |their staff. | |‘Quantitative analyses have shown that firms with strong cultures out perform firms with weak cultures. ’8 | |4. 0 Products of a company culture | |The generation of global values brings together different cultures under a common set of beliefs. A physical product of this includes the Personal Development Plan that every employee, in every country, | |undergoes each year. It monitors performance aligned to the core values of the company. | |Internal awards recognise achievements within the business allowing reward for those who exemplify RE’s corporate manifesto. The Reed Employee Opinion Survey allows staff to comment critically on their working | |environment and their superiors in an anonymous online survey. | |Corporate Social Responsibility has become a very significant embodiment of what RE tries to communicate by helping charities and operating in an environmentally aware capacity. Scholarships have been set up to | |allow children of employees to benefit from education. | |5. 0 Transference of a company culture | |These products of company culture are powerful in transferring the values onto the employees, sometimes without their knowledge. The values are echoed down the hierarchy and taken on to each business unit. It | |could be argued that a company culture is so strong that it begins to replace more localized cultures because of its strength. | |RE is an Anglo-Dutch business with its main areas of commerce in the US and Northern Europe. It could be said that these cultures interact with each other on a basis of understanding. The management style of RE | |is objective orientated; indeed the whole organisation is geared up from the PDP to attain goals agreed between managers and sub-ordinates. | |6. 0 Leadership and structure | |‘Leadership: Good managers start with a personal agenda and use their leadership skills to spread it throughout the organisation’9. | |When Crispin Davis arrived at RE in 1999 his impact was felt immediately.
After ridding the company of expensive and inefficient business units he embarked on a process of changing the organisational culture. He| |personified the organizations values by personally presenting them to the board members of the four individual divisions. By having a long term vison and great organisational capacity he was able to project | |areas in the company future where he would like specific objectives to be met. | |In 2000 the strategy was communicated throughout the business. A five year plan was orchestrated that provided cohesion, a brand identity and a clarity of purpose to a global group. | |Davis became the company’s tone of voice; he has embodied how the company talks to its employees. From the position of CEO he has communicated across the board to each of the four business divisions. They in | |turn have spoken to each of their global boards that have then cascaded the message through each country’s business unit. | |7. Types of corporate culture | |Trompenaars identified four types of corporate culture: Family, Eiffel Tower, Guided Missile or Incubator culture. The structure of RE is very hierarchical so has elements of the Eiffel Tower, the highest levels| |can be seen below, and below each division more layers of management reside. Even in a small department of 25 people, four layers of management may exist. | |However, the company also has a strong family culture, based on authority through experience. A firm in Japan and Italy employs this way of doing business, where business leader exerts their power through | |sub-ordinates of like minds. This can also be seen in RE although it stops short of the sort of adoration that is notable in staff for highly charismatic leaders.
General Electric’s highly acclaimed Jack Welch | |whose ‘…word ran like Holy Writ throughout the GE organisation’10 felt a huge impact when he left the firm. Such was his influence in all areas of the business a vacuum was left when he retired. | |A notable point here is that in an ideal firm the top echelons find the best people and delegate the responsibilities down to them. They must still lead in one respect, ‘The objectives, ethos and principles of | |the organisation are, …determined by the words, examples and actions of those at the very top. 11 | |Reed Elsevier PLC | |[pic] | |Reed Business Global | |[pic] | |Reed Business UK | |[pic] | |In a company of the size of RE, the words and actions of the CEO are always under scrutiny, from the press, the shareholders or the employees. It is hugely important to lead by example in these environments. |The company is largely goal orientated and project led and so the guided missile culture of objective orientated tasks features highly. However, the typical set up of this type of culture normally has a flat | |structure with a strong emphasis on being cross-disciplinary with a reliance on specialists. 12 | |Although this occurs in RE, particularly in the environments of Marketing, Creative and IT where all departments must work together to deliver projects, individuals are still noticed and changes are made due to | |seniority and rank. In these scenarios it is often like having two leaders, your departmental boss and the project head. You must try to please both, and risk pleasing neither for the sake of achieving the | |project goals. | |This forms a matrix organisation, where RE has the culture of the Family in terms of authority through experience, the Eiffel Tower in terms of role orientated hierarchy and the Guided missile culture of object | |orientated goals. | |RE shows least similarities with the Incubator culture where self-expression and self-fulfilment are the most important elements to the structure and where existence precedes organisation.
The process of | |innovation and creation is its main focus and although RE has this at its core value, a company of its size finds it hard to embrace this culture. RE is very aware of the power of these types of business and has| |invested and bought Incubator companies that are useful, from around the world13. | |RE exhibits all types of organisational culture as it has so many different types of division across the world. The HQ, in London, and the board of directors are responsible for ensuring that different units are| |co-ordinated, learn from one another and stay true to the values and identity that gives them a common business language. | |RE is a truly international company and not a transnational organisation. The offices around the world are very much in tune and act accordingly, not so much instructed but using the HQ as consultants. |Transnational operations lose their centre in favour of influences from their specific regions, IKEA being a good example of this. 14 | |8. 0 Analysis of values | |A challenge to RE is its own culture, simply by being strong and successful. It is easy for it to become complacent and proud of its achievements whilst ignoring potential ways to cross the cultural divide and | |become more successful. A strong culture may find it difficult to recognise the need for change. | |It has a Universalist view of the world where a right way applies to all. This is opposite to the particularist view of studying relationships and putting these first where necessary. Cultures in the Middle East| |and Asia are more likely to be particularist and this must be noted if business is to grow in such areas. | |A large part of RE is US, a culture that has always proclaimed the way of the individualist, or as Eisenhower put it, ‘individual self-realisation is the central goal of American civilisation’15. However RE is | |more aligned to communitarianism. ‘As the information society develops, those with a communitarian ethos disseminate information faster’16. | |The company deals with the supply and creation of information and its success relies on the collective and not on the individual. The speed at which knowledge is shared ensures the profitability of an | |organisation, quick response times with ‘boundarylessness’ being at the core of the business values. | |Employees within RE operate on an outwardly neutral level, in that business discussions are conducted in the North European way of the brain controlling the emotions. An emotive element does become evident with | |caring for colleagues in an almost family atmosphere of trust and concern for each other’s well being. This feature of RE culture is captured in ‘valuing our people’. This is a mark of perhaps a global company | |taking the best elements from all cultures: the business focus on making calculated decisions but the emotive side making sure people are valued and cared for. |This blurring of types of cultures reoccurs where RE’s approach is specific in its objective but also diffuse in its attitude to what is needed from its customers. ‘Customer focus’ in all countries means | |tailoring your product to fit the requirements of the market and RE does this well, adapting their approach dependant on what type of culture they are dealing with, from oil companies to pig farmers. | |Achievement is a value held in high regard at RE, ‘passion for winning’ bears testament to this. As a FTSE 100 company it has a responsibility to shareholders to keep achieving goals and succeeding.
The culture | |of success then breeds a network of employees who work with others in similar companies and in similar positions in different countries. This is where the ascription factor of the RE culture may begin to occur, | |where deals are done on the basis of knowing business connections rather than finding better deals. RE categorically states that this practice is in contravention of contract. | |‘Innovation’ is a value that captures the company’s future focused approach to technology, new working practices and products. It also encapsulates the Dutch and American view of time being about present | |performance and future targets. 17 Planning, strategy and investment are hinged upon the company’s perception of time. Other cultures, including the UK, focus on tradition a lot more, where the past is held up as| |a benchmark or an ideal. Disregard for this approach towards these countries may be seen as arrogant and confrontational. | |Finally the environment is something that RE is aware of and alongside its CSR program is heavily involved in. Its response to the global demand for tighter controls on corporate waste is not surprising.
Its | |policy follows the United Nations Global Pact, ‘…a voluntary corporate responsibility initiative intended to ensure the protection of human rights, fair and non-discriminatory labour practices and care of the | |environment. ’18 | |9. Future projection | |‘In the economy of the future, knowledge is king and influence flows from wherever that knowledge resides’19 | |With e-business becoming a focus for all units, the RE structure may need to adapt quickly if certain opportunities are not to be missed. The Incubator culture is one that the business would do well to adapt to,| |if only in relevant areas such as online products. The current structure is too rigid and not flexible enough to follow the changes in technology that occur every few months. | |Another risk in approaching new cultures such as the Chinese is that we do not go with preconceptions about what we expect in terms of their business behaviour. We risk missing each other as they try to adapt to| |our culture and we adapt to theirs. The Chinese may be pro-western in their views already and so our stereotypes must not stand in the way of what we wish to communicate. | |10. 0 Conclusion | |RE displays all types of organisational structure, elements of all the seven key dimensions of business behaviour but does not fit within a stereotypical type of western company, perhaps because of its global | |nature. It combines the strength of its size with the nationalities of its employees and tries to take the best influences from different cultures. |The business must be aware that agility will be key in the coming years.
The ability to respond quickly to opportunities or threats in the global marketplace will be a crucial factor to RE’s continual success | Additional info: How Do Labor Forces Influence International Business? International Business is when corporations conduct business within in the global market. In order to be successful, international business requires a great deal of strategy. It is important to understand not only the political, cultural, monetary aspects but also the basics of labor forces and how they influence international business. Labor Quality Labor quality is an essential component to consider. Prior to finalizing business contracts and moving to expansion, the labor force should be analyzed in order to determine whether the right skill levels are available to profitable conduct business. There are several factors that influence the quality of labor such as education, experience and proficiency. There are also factors that affect the price of labor for example larger supplies of labor, lower demand for labor, lack of labor unions and lack of governmental rules & regulation. Labor Quantity The same factors that affect thequality of labor also affect the quality of labor.
Factors such as capability, creativity, managerial skills, knowledge, ability to learn new things and adaptability to changing environment must be considered while hiring candidates. Labor Mobility Labor mobility “consists of changes in the location of workers both across physical space (geographic mobility) and across a set of jobs (occupational mobility). ” Labor mobility allows the workers to improve economic conditions if where they live is not a match for their skill. Minorities and or traditional societies are another important group to consider. This group is defined as “a relatively smaller number of people identified by race, religion, or national origin who live among a larger majority. ” An advantage for to hiring minorities in a foreign country would be the immediate availability of labor. A disadvantage would be discrimination as they may be viewed as inferior to the majority
Cite this page
Influence of Global Business. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Presentation Skills
BUSINESS COMMUNICATION ASSESSMENT FILE TOPIC: PRESENTATION SKILLS Submitted to: SUBMITTED BY: Ms Eeshani saraswat Priyanka tewari A0101909377 Section a-02 PRESENTATION SKILLS Good presentation skills are essential in today’s workplace. Being MBA students delivering presentations on a regular basis would be an important part of our job. Public speaking, even in a business setting among coworkers one see every day, can be stressful for many of us. It is important to understand certain things about presentation if we want to deliver effectively in public. COMMUNICATING WITH THE AUDIENCE: The first step in your business presentation should be to form your message to meet the needs and expectations of your audience.
Ask yourself what the purpose of your presentation is and what your audience is supposed to gain from it. Write this into a timed script and ask yourself if it’s something that you would find appropriate if you were an audience member hearing it from someone else. Check to make sure the information you need to convey is logical and complete, yet also interesting to hear. Tone is one of the most important presentation skills. Make sure your prepared script is natural-sounding and isn’t pompous or insulting to anyone in any way. Practice your script a few times a day and then make simple bullet points of key words from the script on an index card. You can then begin practicing your presentation using the bullet points to prompt you if you get stuck.
Having the card beside you on the actual presentation day can be a real confidence booster. USING PRESENTATION TOOLS EFFECTIVELY: Whether you’ll be using something like PowerPoint or just large charts, these visual tools can enhance your presentation skills in several ways. They can help take some of the visual focus off of you and this can make you feel more relaxed.
Visual tools can also make the contents of your presentation easier for your audience to understand. Even a handout with bullets outlining your main points can help your audience gain clarity on what you’re saying. Taking cues from respected higher ups at your company about which types of presentation tools to use can also enhance your corporate professionalism. ANTICIPATING AUDIENCE QUESTIONS: Thinking like your audience can really improve your presentation skills. Anticipate the questions the audience could ask at the end of your presentation and have good answers ready. It’s also very important to prepare yourself for how you’ll answer any unexpected questions by practicing how you’ll respond to questions you may feel are irrelevant or impossible to answer.
Again, when you attend presentations by respected higher ups in your company, take cues from them. Notice how they deal with difficult questions and apply their techniques to suit your own position and style. The Seven Laws of Presentation Skills Audiences sleep! There is one thing one really needs to know about audiences, audience interaction, handling questions or anything else involving them: That they sleep! That is their function and your is to keep them awake and invole them during the process * Repetition is death! A gesture used over and over again becomes at first irritating and then all consuming; your audience won’t be able pay attention to anything else. * Feelings are a poor indicator of how you are doing! It is really important how we feel about ourselves when we are presenting. This is the area of self-image and confidence. Here, there is also a hard route and an easy one. The hard route is to do everything yourself. To be your own critic and to monitor your own performance.
This means that you have to learn to be objective about yourself. For any type of performer this takes years of dedicated work. The problem is that we are always the worst person to give ourselves advice about how we are doing. * The job is to get them to want more of what you’ve got! Presentation works if you impact your audience in some way. They can even be impacted in a way you don’t want and didn’t choose and the act of presentation is still working. Not as you’d like, but it is still working.
The point of a presentation is to get the audience to want what you’ve got. * When you’re on, you’re in charge! This means it is on you to give the direction you want to give to your delivery while presentation. * There is always a message! Everything we do communicates. The experts who study the way communication works will tell you that in your typical face to face presentation situation, the words you say are actually a very small part of the communication. How you say them will often convey more meaning than the words themselves. Passion is mandatory! If you have to present something you have no real feeling for, then you need to find something you do have some feeling for and relate it to the subject you are presenting. The reason I say passion is mandatory is simple.
You can get everything else perfect, but if it doesn’t have as sense of your commitment behind it, it will be dead. If it’s dead, I can ignore it Informative Mind Map on Presentation skills STEPS TO PREPARE AN EFFECTIVE PRESENTATION * Presentation: 1. Determine the Purpose of the objective/purpose of the presentation. a. General purpose Informative Transfer of information from speaker to audience * Persuasive Attempt to change attitude, belief, or action b. Realistically define the results expected: * Realistic in scope * Realistic in view of receivers’ knowledge, culture, status, etc. * Realistic in view of possible actions by receiver * Realistic in terms of what you can reasonably expect to accomplish c. Specific outcomes you desire from the communication. Very specifically complete the following: When the presentation is finished, the audience will: d. Hidden objectives of the presentation that the presenter is aware of but does not share with the audience.
Sometimes the presenter has objectives that the presenter chooses not to share with the audience. It is important that the presenter is aware of them and prepares the speech accordingly. For example, if you were training on a safety procedure. You might have as your obvious purpose to inform the audience about the safety procedure. Your hidden objective might be to persuade the audience to follow the new safety procedure. 2. Determine and analyze the audience, occasion, and credibility Before beginning the “writing” of the presentation, there are some things that need to be considered.
Advanced analysis by the presenter can make a huge difference in the outcome of the presentation. e. Audience Analysis * In analyzing the audience ask some of the following questions: * Who are the key people in the audience? (Decision makers, etc. ) * What knowledge does the audience already have concerning the subject of the presentation? * What do you know about the language level of the audience? In general? * In relationship to the subject? * What are the cultural similarities between the audience and presenter? * What are the cultural dissimilarities between the audience and presenter? * What can the presenter do to minimize these? * How does the status of the audience compare to the presenter? * What are the status relationships within the audience that might affect understanding? * What attitudes do the audience members hold toward: * The subject? * The speaker? * What positive attitudes does the presenter have toward the audience? What can the presenter do to highlight those attitudes? * What negative attitudes does the presenter have toward the audience? What can the presenter do to de-emphasize those attitudes? * What is the age of the audience and what effect will it have on the presentation? * What is the predominant gender of the audience and what effect will it have on the presentation? f. Occasion Analysis * Do I have a choice on the time of day? * If so, what would be the best choice? * If not, what can be done to turn the time of day into an advantage? * What is the location? * Advantages of that location? Disadvantages of that location? * Will there be interruptions? * What can be done to eliminate the interruptions? * What can be done to reduce the effect of the interruptions? * What is the physical layout of the front of the room? * What effect will the layout of the room have on the presenter’s notes? * What effect will the layout of the room have on the presenter’s visual aids? * Can the room be rearranged to improve the presentation? If so, how? * Is the speaking occasion a special occasion? If so, should it be emphasized or de-emphasized? * What can be done by the presenter to emphasize the occasion? What can be done by the presenter to de-emphasize the occasion? g. Speaker Credibility * What does the audience know about the presenter’s credibility in the subject area of the presentation? * What does the audience know about the presenter’s credibility in other subject areas, other than that of the presentation? * What can the presenter do to enhance his or her credibility before the day of the presentation? * What can the presenter do to enhance his or her credibility right before the beginning of the presentation? * What can the presenter do to enhance his or her credibility early on in the presentation? What clothing would enhance the credibility of the presenter? Organization of the Presentation: 3. State main ideas or concepts the audience must get if objectives are to be met Review the objectives of the presentation. In order to attain those objectives, what aspects of the subject must be covered by the presenter? What must the audience know in order to attain those objectives? 4. Develop the main points of the presentation Organize the material that must be covered into a limited number of main points. Remember that in a presentation you can seldom cover an entire subject. Therefore, you must determine what aspects of the subject must be covered in order to reach your objectives. 5. Clear preview of what you want to accomplish in the presentation A sentence that clearly previews for the listener what you are going to cover in the presentation helps the listener focus during the presentation. This sentence should be stated early in the presentation, at the end of the introduction. It helps the speaker stay focused on the aspects of the subject that are going to be covered in the presentation and does the same for the listener. This is the single most important sentence of the entire presentation. 6. Determine, gather and group together the main points you want to communicate Group your ideas into 3, 4, or 5 main points. Don’t have a long list of main points. It is more difficult for you and for the audience to remember 10 main points! 7. Determine the presentation theme or tie your presentation to the theme of the program If you are a part of a program that has a theme, tie your presentation theme into that of the program. 8. Arrange main points in a logical order Think through the best way to arrange your 2 – 5 main points. Some possibilities are: chronological (time ordered), topical (by topic), spacial (by place in space, e. g. top to bottom), difficulty (from the simplest concept to the most difficult),etc. 9. Prepare introduction and conclusion Beginning the preparation of the speech with the introduction is difficult at best. The introduction and conclusion of the presentation should be prepared only after the main part of the presentation (the body) has been somewhat developed.
There is frequently unnecessary frustration caused by beginning the presentation preparation with the introduction. 10. Selection of supporting material Back when we were in school, we went to the library to gather supporting material for a presentation. In the business world, the support you need is frequently at your finger tips or right within your organization. Don’t overlook the use of trade journals. h. Find appropriate arguments to support your main points. For each of your main points you must develop the reasons that substantiate that point. Just saying something does not make it so. You need to back up your ideas with arguments that support them. i. Select appropriate language choice. * Use proper grammar Avoid technical language that the audience may not be familiar with * Avoid jargon (language specific to a profession or field, including acronyms) * Avoid fillers (e. g. “ah”, “um”, “you know”) j. Evidence as support.
Whether the presentation is informative or persuasive, you need to support your main points with evidence. k. Sources of evidence. * Fact * Example, real life or hypothetical * Authority, experts * Statistics l. Visual Aids as resource material. * Think through the various kinds of visuals that are available * Size of visuals. If the visual is too small, do not pass it around during your presentation. It will serve as much more of a distraction than an aid. * Handling of visuals. Plan in advance how you are going to handle your visual, when you will pick it up, how you will display it, etc. * If using presentation software, be careful to fight the tendency to put too many words on the screen at a time. The audience will tend to read the screen instead of listen to you. * Determining factor in decision to use visuals: Is presentation better with the visual? If not, do not use visual. A. Delivery of the Presentation: 11. Influence of non verbal on overall communication. More than half of what you communicate is communicated non verbally. You must make sure that your non verbal messages do not conflict with the words you say, otherwise your words will loose most of their effect. In preparing for your presentation, think about your non verbal as much as you think about the words you are to say. 12. Dealing with nervousness m. Accept that nervousness is very natural.
Even the most trained and experienced speakers and entertainers have some level of nervousness. n. The key to nervousness is to have it work for you not against you. . Use nervousness to your advantage. Nervousness causes our body to produce extra adrenalin and therefore “pumps” us up for the presentation.
Without nervousness you would not do as well as you can with nervousness. p. The difficult part is to make that nervousness work for you. Become aware of how your body responds to the nervousness and learn to control any negative effects of the nervousness. If, for example, you get extra energy that causes you to walk all over the place during your presentation, become aware of that nervous movement, control it and turn it into meaningful movement. Use it to help display enthusiasm about your subject. 13. Speaking notes . It is strongly advised that you do not write out your speech word for word. It is usually most effective for you to work from an outline of what you want to cover. When you write your presentation out word for word, you have a tendency to read it, believing that what you wrote is the very best way to say it. You may very likely find yourself reading from your notes when you know the subject very well. 14. Eye contact . One of the most important aspects of delivery is direct eye contact with the listeners. You should be looking at your audience at least 3/4 of the time. Keep your focus on your audience and glance at your notes instead of the reverse of that. q. Eye contact is a wonderful tool for getting feedback from your audience. An audience will communicate much to you if you are looking at them and reading their non verbal messages. r. Another advantage of eye contact is that it communicates to the audience your desire for them to pay attention to your presentation. It also makes paying attention to you much easier for them. Attention is much easier to pay to a speaker who is maintaining good eye contact than to a speaker who is looking away from the audience. s. If you were ever taught to look at the back wall, above the heads of the audience, forget that! Look right at the audience. 15. Handling of notes. t. Plan in advance where you are going to place your notes, how you are going to handle them. u. DO NOT staple your notes together. In doing so, you make it almost impossible to discretely get from one page of your notes to another. v. If you have more than one page of notes, number them. It is easy to get pages mixed up before the presentation.
Numbering them gives you a quick way to check that they are in the right order right before you go to give your presentation. w. If you have more than one page of notes and are using a lectern, have two pages of notes side by side on the lectern. Then you don? t have to turn the page at one specific point in the presentation. When you are finished with the page on the left and speaking from the page on the right, you can simply slide the page on the right over on top of the page on the left. This technique gives you more flexibility. 6. Gestures . You should not plan your gestures, or they will look planned. Instead, keep your hands about waist height so that they are free to gesture and then relax and see what happens.
You might be surprised to see that you naturally gesture. And if you don’t, then as long as you keep your hands relaxed and don’t do something distracting with them, they will not take away from the presentation. 17. Posture . Good postures are important but avoid stiff posture. Stand straight on both feet (which make nervous shifting back and forth from one foot to the other impossible to do). 8. Movement. Movement is good but only if it is natural for you. Be careful to watch for nervous movement that is very distracting to the audience.
Continuous pacing back and forth makes it difficult for the audience to listen to you. 19. Vocal quality. If you have ever listened to a monotone speaker, you do not question the need for vocal variety! Without vocal variety, it is difficult for the audience to listen and more difficult for them to believe that you are excited about, or even interested in, the subject. 20. Practice, practice, ractice! Practice may not make perfect, but it does increase the chance of success. When you do practice, try to create a similar physical environment to what you will have on the day of your presentation. For example, if you are going to do your presentation standing up behind a lectern, don’t practice sitting in a chair. Be creative! For example, when practicing your speech in a hotel room where you surely don’t have a lectern, use the ironing board as a lectern. The closer to the physical environment of your speech, the better! Think through the possible reactions of the receiver and then practice your reaction to the various receiver reactions. Compile a list of the possible reactions of your listeners.
Then, plan how you are going to react to them. If you do practice, you may still be surprised by a reaction or question from the audience but you will be more prepared to respond to it. Just planning your reaction to certain situations will help you react to those you did not even think of. * Handling of question and answer period 21. Restate question: Restating buys you a few seconds to think about your answer to the question. 2. Clarify vague questions 23. Answer questions directly but keep in line with your presentation objectives 24. Choose wisely questions to be answered privately, after the presentation * Time speaking is only one part of the presentation 25. Pay close attention to the way you are approaching and leaving the front of the room. Carry yourself with confidence even if you don’t feel confident. 26. Think about your verbal and non verbal cues when not speaking. Be aware of the tremendous impact on your presentation that your non verbal cues can have on the audience
Cite this page
Presentation Skills. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Synopsis Conveyor Belt System with Accident Preventer
Cite this page
Synopsis Conveyor Belt System with Accident Preventer. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
The Ten Point Agenda
- The creation of six million jobs in six years via more opportunities given to entrepreneurs, tripling of the amount of loans for lending to small and medium enterprises and the development of one to two million hectares of land for agricultural business.
- The construction of new buildings, classrooms, provision of desks and chairs and books for students and scholarships to poor families,
- The balancing of the budget,
- The “decentralization” of progress around the nation through the use of transportation networks like the roll-on, roll-off and the digital infrastructure,
- The provision of electricity and water supply to barangays nationwide,
- The decongestion of Metro Manila by forming new cores of government and housing centers in Luzon, Visayas and Mindanao,
- The development of Clark and Subic as the best international service and logistic centers in the region,
- The automation of the electoral process,
- A just end to the peace process,
- A fair closure to the divisiveness among the Edsa 1, 2 and 3 forces. (Arroyo strolling in the region of the Subic-Tarlac Express way)
Description And Analysis Beat The Odds
B – balanced budget E – education for all A – automated elections T – transportation and digital infrastructure. T – terminate hostilities with the MILF and NPA H – heal the wounds of EDSAs I, II and III E – electricity and water for all. O – opportunities for livelihood and ten million jobs D – decongestion of Metro Manila DS – develop Subic and Clark.
Description
“The development of Clark and Subic as the best international service and logistic centers in the region” (This part nman. description ng project. iniwan ko na toh.
pra me gagawin nman kau. mas mhaba. mas okei. joke. ewan.
kayo na bhala kung brief but straight to the point or elongated but florid statement. hahaha)
Analysis
( Guys. In this part. I don’t know if we must concentrate on our assigned agenda or we must also look at the overall view of the ten point agenda.
hat I’ve searched is ung sa overall kasi di rin ako mkahanap ng about sa subic echos. sana kayo mkahanap. then place it under this overall analysis. kayo na bhala)
Beating The Odds is an analytical close up of policy making, decision making, and action taking by a Philippine President under the most challenging circumstances. Through rigorous research and study, we students as researchers have been able to consolidate a portrait of leadership centralizing hounding budget deficit and economy downfall. Beating the odds is composed of many issues but we concentrated on the issue of budgeting, governance and the tenth agenda.
President Arroyo presided over 34 quarters of uninterrupted growth in the Philippine economy, drastically cut the deficit and set the basis of financial stability through the global financial crunch of 2009. The budget was in a dismal state when she first took over the reins of power in 2001. Revenues were low, debt was high, and inefficiencies and corruption drained the country’s coffers. She took steps to ensure the proper ranking of government expenditures and allocations and implemented tax reforms to improve collections. By supporting and pushing the revenue and customs agencies to ferret out tax evaders, she stepped up revenue collections.
Working closely with Congress, she pushed for the approval of fiscal reforms to further increase revenues and balances the budget. Her actions sustained the economy as it ushered in a period of sustained growth that has shielded the Philippines from global financial upheavals. Inheritance of GMA to the motherland, the positive side (Strength) President Gloria Macapagal Arroyo, in her 112th Independence Day speech, said she will leave the Filipino people a legacy of a strong and stable economy.
In her speech at the Quirino Grandstand in Luneta Park, her last as head of state, the outgoing President said her reform programs “now offer more economic opportunities and support the aspirations of our heroes who all dreamt of a national vision of attaining prosperity, freedom and justice for all. Since the start of her administration in 2001, the President said poverty alleviation became the centerpiece of her 10-point agenda the so-called beat the odds.
Beat The Odds stands for a Balanced budget; Education for all; Automated elections; Transportation and digital infrastructure; Terminate hostilities with the MILF and NPA; Heal the wounds of EDSAs I, II and III; Electricity and water for all; Opportunities for livelihood and ten million jobs; Decongestion of Metro Manila; Develop Subic-Clark. She said the implementation of these pro-poor programs were all achieved through economic reforms that resulted to a lower budget deficit, better economic growth and generated much needed funds to finance vital infrastructure projects such ports, seaports, airports, bridges, highway networks and the roll-on roll-off ferry system.
The President said the May 2010 automated elections also delivered the most modern and open election that will lastingly change the face of Philippine politics such as the earliest proclamation in history of the President and Vice President. In the course of her speech, beneficiaries thanked the President for her numerous programs. Mrs.
Arroyo presented them one-by-one and then talked to them in their dialect, and then cited her administration’s achievements in the last 9 years. Among these achievements are on transportation, job creation, expanding business opportunities, education, addressing the Communist and Moro rebellion, implementation of the May 10 automated elections, generating more electricity and improving water supply, developing the call center industry, and the transformation of the Subic-Clark economic zone. The President said these beneficiaries are among the millions of Filipinos who benefited and gained employment from BEAT THE ODDS. The negative side (Weaknesses)
- The first Chief Executive to be formally accused in Congress of cheating, lying and stealing.
- The highest level of public debt (P6 trillion) and the biggest amount of foreign borrowing (more than Presidents Corazon Aquino, Fidel Ramos and Joseph Estrada combined).
- The biggest number of downgrades of American, British and Japanese credit rating firms.
- The No. most corrupt country in Asia in a survey of 102 countries according to the World Economic Forum and Asian Development Bank. Now also confirmed in the CBCP statement calling for “reforms” in her “graft-ridden” government. Estimates of amounts lost to corruption reach as high as P200 billion.
- The most dangerous place for journalists in the whole world, 2nd only to war-torn Iraq according to the New York- based Committee to Protect Journalists (CPJ) and earlier the London based ICJ. And the killings of judges, prosecutors and lawyers are also common. Index crimes are up 15 percent over last year.
- The new shabu-manufacturing center in Asia with the number of drug users multiplying rapidly. Marijuana plantations in the highlands are increasing.
- The harshest repression of freedom of speech and of assembly topped by a no permit, no rally policy. Control of media is Malacanang’s policy.
- The highest unemployment rate (20. 3 percent adult unemployment rate as reported by SWS) and the highest underemployment rate (26 percent) including the collapse of the garment industry. UP Economics professor Dr. Ernesto Pernia found out that with 1. 4 million new entrants to the labor force yearly, GMA created only 800,000 new jobs annually, many of them casual or part-time.
- The weakest link in the war on terror and the loss of standing and respect in the international community accompanied by a deterioration of US-Philippine relations. Mindanao has been tagged as a terrorist training ground.
- The most expensive and the most fraudulent elections held ever on May 10, 2004, now documented on tape and prefabricated election returns and certificates of canvass.
A ranking DBM official has now revealed that P750 million was released to Phil Health before the elections and more than P3 billion has been spent for the alagaan mo ang kalsada natin election gimmicks. 11) The fastest deterioration in the poverty line from 32 percent under President Erap to 53 percent in four years of GMA with a Ph. D.
in Economics. Hunger stalks the land with 58 percent saying they are not eating properly, with many saying they eat only once a day. Many are even selling their bodies or their organs just to survive.
Interference with the Supreme Court and other inferior courts highlighted by mediocre appointments to the judiciary stressing political paybacks and personal loyalty to GMA. The most number of casinos and gambling establishments and proliferation of gambling operations nationwide topped by an importation of 60,000 slot machines and a jueteng payola reaching billions of pesos. We are now one big gambling parlor.
Evaluation
(this part. gagawa ntin. if ntapos na ntin ung mga primary parts.
mdali na lang toh)
Expressway drives Subic-Clark-Tarlac growth Manila Bulletin (The National Leading Newspaper) May 30, 2010 The full operation of the Subic-Clark-Tarlac Expressway has been cited as one of the major factors that have driven investments into the country’s premier free ports Clark Freeport Zone and Subic Bay Freeport Zone, a special report said. The 93. 77 kilometer SCTEX was cited as a legacy of the administration of President Gloria Macapagal Arroyo.
Since its full operations in 2008, the 93. 7-km expressway was cited as the “key to the evolution of the mega logistics hub within the parts of the Subic-Clark corridor,” a special report on the Subic Freeport said. Edgardo Pamintuan former chairman of the Subic-Clark Alliance for Development (SCAD) earlier said that the Subic-Clark corridor has been expanded with the extension of the expressway to Tarlac. “One of the features of the SCAD corridor framework is the production-oriented logistics corridor with three equidistant hubs—Subic, with its sea port as the sea hub, DMIA as the air hub, and Tarlac as the land hub,” Pamintuan said.
The same report said that Subic-Clark-Tarlac makes Asia’s largest logistics hub and this has been made possible by the construction and completion of SCTEX. At least 150,000 jobs have been created by businesses along the Subic-Clark corridor alone. Subic Bay had been earlier transformed as a bustling seaport that has drawn investments from global players which wanted to cash in on the highly developed cargo handling and seaport management capabilities and facilities of the former Naval base of the United States.
Clark has now become a magnet for investments in light industries, taking advantage of the presence of the entire expanse of airport facilities in this former US military base.
Tarlac, with its vast agricultural and industrial areas, completes the “troika” of major development forces in Central Luzon. All three hubs require a road infrastructure that is ideal for cargo movement from Subic Bay and Clark to many destinations, and that is where SCTEX “fits into the picture–to expand and enhance the cargo reach our clients on time,” said one locator. Overall, SCTEX has positive impact on the economic growth of the entire Central Luzon region, which the National Economic Development Authority (NEDA) said is third highest in regional gross domestic product, next to the National Capital Region and Calabarzon.
Central Luzon contributes 40% to the country’s Services sector, 35% to the agricultural sector, and 24. 5% to agricultural output. Subic Bay Freeport, which boasts of two container terminals with a combined capacity of 600,000 TEUs, is expected to make full use of the modern SCTEX.
Subic Bay Freeport has been positioned as “the maritime gateway for Luzon. Clark Freeport is home to the Diosdado Macapagal International Airport (DMIA) and its burgeoning businesses in business process outsourcing (BPO), health and wellness, logistics and port development, food, agribusiness, tourist destination and facilities development and ancillary services and products to locators within the industrial estates.
<Cite this page
The Ten Point Agenda. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Brita Case Study
Cite this page
Brita Case Study. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Is Shylock a Victim or Villain?
Cite this page
Is Shylock a Victim or Villain?. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/
Hr Questions and Answers
HR QUESTIONS
What is your greatest strength?
My greatest strength includes my analytical approach, my strong logics and my patience my greatest strength is helping who r not interested in working and make them to workhard and enjoy the work with sincere. my greatest strength is my strong and positive thinking. honesty is my policy and i am hardworking... My greatest strength is my ability to lead a team, delegate work and help them deliver and keep the team highly motivated. my strengths are i'm adaptable and flexible .. i can very well adjust with new situations and circumstances i consider my patience as my very big strength.. I think my greatest strength includes my mental strength as well as my honesty,patience,intelligence,confidence and adjusting capability. I am hardworking and I have a will to walk the extra mile to achieve excellence in my life.. as far my greatest strength is concerned it comprises of 7C's. My greatest strength is determination & dedication towards my work. I learn from my mistakes very quickly and soon realise that "the world is my oyster". My greatest stength is Hard working, Punchualty, honesty and analysing the situation and take a reaction on the behalf on firm with effective and efficient manner.
Tell me about yourself: firstly tell ur name , what u r doing now, education qualification, technical qualification if u have, ur interest on other activities ,ur likes dislikes,hobbies, ur achievement , and then go for ur parents description only if it is necessary.
I am hard working, thorough, innovative. my strength is my patient adjustable attitude that keeps me working even in difficult situations. like reading and am inquisitive about learning new things. i am determined to use my creativity and knowledge in the corporate world benefiting myself and moreover the organization i will be working for.
What is more important to you: the money or the work?
Money and work both are like siblings. But I believe when you work hard; money will flow to you. So work is more important than money. Only hard work can help you put another feather in your success cap. Perhaps satisfaction is the most important one.. ,not just the money or work.. We may not be satisfied even if we have the money.. ut our performance will definitely give us the satisfaction as wel as the money.. So ultimately,we must go for satisfaction and decide which of our action is going to give us the same.. It is the work and the performance of an individual's that determine the success and the money. so. it will be more benefical for an individual to focus on the work. Both work and money are important to me, it is the matter of preferance, I will prefer work, because of work I will be getting money, no work no money, ultimately work harder and you can gain more and more money.
SHOULD I HIRE U?
You have published this vacancy in open market. I have applied for it. You have shortlisted me. So, I think that I am one of the best deserving candidates for this job. Because I am hard working & I think I have all necessary qualities that are required for this job. Since I am a organized and self motivated person I can do my level best to improve your company's standards without much supervision and also I have physical and mental fitness to face any stress condition. I may not be able say why should you hire me but could definitely say how I could strive for the better interests of the company... I enjoy working in this(so and so)field. Enjoying work comes with passion, learning new things etc.. And also i am really good at getting habituated to new environments very fast. I believe everybody may be good at this. But the race is about how fast you do that... and I can assure u that i ca do it in best way. Give some example and alll..... Explain how you would be an asset to this organization You should be anxious for this question. It gives you a chance to highlight your best points as they relate to the position being discussed. Give a little advance thought to this relationship. Am hardworking, self motivated and committed person which I can tackle critical situation in ease of time together with my positive attitude towards anything makes me best in Industry.
Where would you like to be after five years?
After five years i would find myself settled in an reputed organization like yours and serving it with my hard work, knowledge and sincerity. i never live in future. I live in present and i believe that my hardworking nature,my maturity in doing work will help me in seeing myself at a more secure,more successful human being . PRESENT IS A FRUIT OF PAST .. BUT ITS ALSO A SEED FOR FUTURE. SO HOW GOOD WE ARE IN FUTURE DEPENDS ON HOW WELL WE PERFORM NOW. BUT I CAN SAY AS AN AMBITION TAT IN NEXT FIVE YEARS I WOULD LIKE TO EXCEL IN WAT EVER FIELD I AM IN AND AS A RESULT OF MY HARDWORK I WOULD LIKE TO BE IN A COMFORTABLE AND LEADING POSITION IN NEXT FIVE YEARS
Tell me about yourself
Good morning sir! I am Arun currently pursuing my Third year BE computer science engineering in Srinivasa technology near poonamallee. I did my schooling in Avichi Hr secondary school located at virukambakkam and passed out with 80% marks. My strengths are I can easily mingle with people and can communicate easily with others. I am an organized and self motivated person. I have enough confidence and will power to do any kind of functions that are assigned to me. I have potential to grasp things easily. I learn new information and data easily. My weakness is that I am a very short-tempered person and nowadays I am practicing yoga to overcome that. My hobbies are (If u have any hobbies please mention here). (Please mention if u are really interested in a particular game or sports) I love traveling and visiting different kinds of people. I like people who are really dedicated to their tasks and I hate people who deny opportunities. After telling all these things just relax yourself and say I believe that A good name is better than riches (it s a proverb it may attract the HR) so wherever I go I will do my level best to get a good name.
Are you applying for other jobs?
Of course, I am. I am looking for the best place to apply my abilities, and so far this place looks excellent. Side note - if you sent the resume, rather than went on a recommendation from a friend, it would be obvious you sent it to other places as well.
WHAT ARE YOUR WEAK POINTS?
The best answer to this question is staying away from negative aspects of your life. If you answer this question it should look like a positive thing even though you quote it as your weakness. For example, you can say that sometimes you stick with your work till it is completed 'coz you can not leave it pending or you can quote as looking for the minutest details in the work as your weakness. Your answer must sound positive to the employer though you quote it as a weakness. 2. You can say that you do not have any particular weakness that you remember.
Why did you leave your last job?
Stay positive regardless of the circumstances. Never refer to a major problem with management and never speak ill of supervisors, co-workers or the organization. If you do, you will be the one looking bad. Keep smiling and talk about leaving for a positive reason such as an opportunity, a chance to do something special or other forward-looking reasons.
What irritates you about co-workers?
Nothing irritates me, Every individual is different. Everybody has negative as well as positive points. If u look at things from their angle, things would seem more clear and analytical. Tell me about your dream job. A job where I love the work, like the people, can contribute and can't wait to get to work. Do you have any questions for me? Usually Employer asks this question to test your interest in the company. Hence you should ask questions to show keen interest to join the company. e. g. , Do you provide any training, if I am employed?
What do you expect from the prospective employees in this job? What is the criterion for growth in this company? etc... Remember that dont ask too many questions and whatever you ask, the question should be genuine and inquisitive. How long would you expect to work for us if hired?
I worked for my previous employer ... years. That demonstrates my loyalty. So, as long as the work is challenging, and I will have growth and training potential, I will be happy to work here
Are you a team player? While answering this question, try to keep yourself on both sides. For example, if the interviewer asks if you prefer to work alone or on a team, he may be trying to get you to say you are one way or the other. But you don't have to play this game. The reality is that most jobs require us to work both independently and in teams. Your response to this question should show that you have been successful in both situations
Why do you want to work for this organization?
I wanted to work for this company because you are a leading and fastest-expanding company. Hence it is a logical progression for me to join this company with my abilities I wanted to work for this company because you are a leading and fastest-expanding company. Hence it is a logical progression for me to join this company with my abilities. " Want to know about KRA & KPA KPA means Key Process areas which are useful for measuring the CMM levels of the organization Key Role Activity both KPA both are same
Answered By: sagar Date: 4/2/2008 KPA is nothing but KEY PERFORMANCE AREA and KRA IS KEY result area, both are used to define job profile for perticular employee in an orgnization.
If you had enough money [pic] to retire right now, would you?
I don't think so that I would retire full time because if I do retire, I would stop learning and that day, my brain will be dead. I would rather opt for going into Research and Development and have my brain cells burn more.
Do you know anyone who works for us?
If this question is for reference/favor, i say NO. but if it's for records/formalities, i say YES.
What qualities do you look for in a boss?
The main thing that should be present is that at no point of time, i should feel like i have nothing to learn from him either proffesionally or personally. He should be co-operative towards employees and should pe patience if any freshers took time to do work.
Do you think you are overqualified for this position?
TRAPS: The employer may be concerned that you'll grow dissatisfied and leave. BEST ANSWER: As with any objection, don't view this as a sign of imminent defeat. It's an invitation to teach the interviewer a new way to think about this situation, seeing advantages instead of drawbacks. Example: I recognize the job market for what it is a marketplace. Like any marketplace, it's subject to the laws of supply and demand. So overqualified can be a relative term, depending on how tight the job market is. And right now, it' s very tight. I understand and accept that.I also believe that there could be very positive benefits for both of us in this match.Because of my unusually strong experience in ________________ , I could start to contribute right away, perhaps much faster than someone who'd have to be brought along more slowly. There's also the value of all the training and years of experience that other companies have invested tens of thousands of dollars to give me. You'd be getting all the value of that without having to pay an extra dime for it. With someone who has yet to acquire that experience, he'd have to gain it on your nickel.I could also help you in many things they don't teach at the Harvard Business School. For example, how to hire, train, motivate, etc. )
When it comes to knowing how to work well with people and getting the most out of them, there's just no substitute for what you learn over many years of front-line experience. You company would gain all this, too.From my side, there are strong benefits, as well. Right now, I am unemployed. I want to work, very much, and the position you have here is exactly what I love to do and am best at. I'll be happy doing this work and that's what matters most to me, a lot more that money or title.Most important, I'm looking to make a long term commitment in my career now. I've had enough of job-hunting and want a permanent spot at this point in my career. I also know that if I perform this job with excellence, other opportunities cannot help but open up for me right here. In time, I'll find many other ways to help this company and in so doing, help myself. I really am looking to make a long-term commitment.
NOTE: The main concern behind the overqualified question is that you will leave your new employer as soon as something better comes your way. Anything you can say to demonstrate the sincerity of your commitment to the employer and reassure him that you've looking to stay for the long-term will help you overcome this objection
What have you learned from mistakes on the job?
Here you have to come up with something or you strain credibility. Make it small, well intentioned mistake with a positive lesson learned. An example would be working too far ahead of colleagues on a project and thus throwing coordination off.
Would you be willing to relocate if required?
If you say you need to go to moon. My very next question would wen i hav to leave . Change in location helpz a person to learn and grow as an individual.
What motivates you to do your best on the job?
First of all i am a workohlic and i cannot sit idle. So the motivation to do the best work comes to me naturally. But if asked what actually motivates me then i would say its the Satisfaction that i get after a whole day of work that keeps me going.
Do your skills match this job or another job more closely?
I would try to utilise my skills according to the job given to me. Tell me about your ability to work under pressure. I have always enjoyed working under pressure it is like a tonic which boosts me but i always keep it under contorl so it does not take a a toll on me.
Cite this page
Hr Questions and Answers. (2017, Sep 24).
Retrieved November 3, 2025 , from
https://studydriver.com/2017/09/page/4/