Skip to content

assignment university online

Question 1
A rite of the passage can be considered as the ceremony which does mark the individual
transition from being one part of life to another. This is the ceremonial event which does exist
to the societies which are historical known and which can mark the passage from being on
social status to another religious status all over the world it gives great attention to the general
types of rites that do explain the purpose from people’s perspectives which do observe the
rites and do discuss the cultural, social and psychological significance gets seen by the
scholars for having the human behavior understanding (Haimon, 2018).
According to the saying of Dan Milliman, Positive change can jump to the energy of high
level and awareness and it can involve the rite of passage.
We should go through a time of hardship, or introduction, every time we rise to a greater rung
on the ladder of self-development. Quota; Birth for a child, becoming a wife for a woman,
graduation parties, and retirement plans are all instances of initiation rites. As a result, we
might argue that passing throughout every phase of life is a rite of passage. The majority of
rites of passage are religious or cultural. They serve to promote the prevalent cultural and
religious norms.

Question 2
There can be a good example for the rite of passage is about turning to the adulthood
According to me, a school graduation ceremony is considered as the rite of passage that I
have experienced first-hand. This was the formal ceremony according to me.
I have received the formal invitation card which has been received by the school one week
before the event. The invitation card has been accompanied by the letter which contained the
rules of the conduct and chart of the event happening. We have been permitted for arriving at
the venue at least 1 hour before the event starts. We were informed to wear formal attire. This
event has been started at 10 am having silent prayer. The director, vice-principal, principal,
and the class teachers were present there at the event. They have been given formal speeches
which outline the growth academically and the expectations of all of us. Representatives of
our class have shared their experience in school on behalf of students. Parent teachers’
association members have delivered the speech on parents’ behalf. Then formal felicitation ceremony has been conducted in which all students’ names have been called out and we have
been lined there for receiving. Then after that entire batch photograph with the teachers has
been taken. After completion of the ceremony, the teacher has given the vote of thanks and
then ends the ceremony (Forth, 2018).

Question 3
This individual does go by the transition from the teenager to the adult. It is considered that
going to adulthood having means going to the other part of life. In this reflection to the
definition 1 is considered as Rite if the passage can be the ceremony which can mark the
individual transition from one step of the life to the other step of the life and being turned to
the adult can be the example of the rites of the passage. Being an adult can make the person
mature emotionally and physically as gets done by puberty. Challenges that get met by adults
besides the things people have been expecting from the adult can help in growing as a person.
This has been said by Dan Millman in the ascending for the higher rung on the personal
evolution ladder. As a person goes by so many different steps of life and by this there is more
experience and knowledge get experienced which can help in better physical, emotional and
mental person (Glozah & Lawani, 2014).

Question 4
As there are some generally recognized rites of the passage can be cultural and religious. It is
really important as it can reinforce cultural values and religious views. Rites of passage can
give can mark the individual transition from one step of life to the other step of life. This does
describe the expectations of society for the individual on a particular step of life. Rite of
passage can give someone a sense of belonging and identity. This can be seen in the societies
as different children can socialize and group with children and new roles approval. As an
example, a person can take participate in the election when the person gets reached the legal
age. Giving birth can indicate that wife and husband can become the father and mother. As
the native American societies can celebrate the first menses of the girl. For example, girls’
parents among Luiseno and southern California Indians can announce to the community that
their daughters of them have started menstruating and becoming women. Girls have been
buried partly in the heated sand. They have not been permitted for scratching and eating the
slat and they have been provided instruction by the older women about changes related to the
psychology which has been occurred and how wives and women can behave. For the North American girls, announcements of the public which has begun menstruating can be
considered as humiliating. This is the matter of the family and personal pride in the Native
American cultures. As boys do not experience clear markers of the psychology of the
transition to adulthood menstruation and the rites of the passage to the culture’s new status
can be more severe than the girls. Rite of the passage is really important in societies as before
history has been recorded. The Rite of the passage can indicate womanhood and manhood. In
so many religions all over the world could be determined by the rite of the passage that how
close we are to god and what is the social status in the religious community (Van Gennep,
2013).

References
Forth, G. (2018). Rites of Passage. The International Encyclopedia of Anthropology, 1-7.
Glozah, F. N., & Lawani, S. (2014). Social change and adolescent rites of passage: A cross
cultural perspective. Journal of Human Sciences, 11(1), 1188-1197.
Haimson, O. (2018). Social media as social transition machinery. Proceedings of the ACM on
Human-Computer Interaction, 2(CSCW), 1-21.
Van Gennep, A. (2013). The rites of passage. Routledge.

Abstract— Due to the constant worldwide technical progress and the various opportunities for computer usage, data encryption has now become a serious concern in recent years. Cyber dangers are increasing at a rapid pace, coinciding with the increased usage of cell phones and laptops worldwide. This paper examines the condition of the cyber security new threats ecosystem by reviewing related works available in the literature during 2011 and 2013 by customers and professionals in the information technology (IT) sector. Diverse types of cyber developing dangers have been discovered, including harmful occurrences, system occurrences, and networked abuse, with the focus on the virus, Spyware, Spam, and internal abuse, to name a few. It has already been determined that while these Cybercriminals’ instruments exhibit a similar degree of complexity and development as phone and computer software solutions advance. Although the currently offered mitigation strategies have been found to be satisfactory, cybercriminals are emerging new means to evade security mechanisms. It is also probable that as knowledge progresses, a development of cyber dangers must emerge as a result. As a result, a few managements and IT governments’ strategic strategies for fighting cyber risks were proposed.

⦁ Introduction (Heading 1)
The amid growing concerns about cybercrime nowadays has had a significant impact on the perceived benefit of information technology.
This is a significant threat to the online world’s security. Cyber security is described as “a set of technologies, practiced via a synchronized set of movements, meant to protect networking, computer, software application software, and information from just an attack, destruction, or unauthorized access”.
Cyber Emergent Threats include malicious attacks, sophisticated persistent vulnerabilities, and network abuse, according to researchers. Any effort to utilize another person’s computer to infect the version of windows via viruses, Trojan horses, malware, or other malicious programs is considered malevolent conduct. Network attacks are acts that aim to impair or interrupt a system database structure information flow on a Managed Security service account, with effects such as Denial of Service (Dos), Session Hijacking, Identity Fraud, and many others. Spam, scamming, computer viruses, and others known as network abuse may all be used to take advantage of the point of interaction on a net. Computer security is typically thought of as being illicit online activities. Because of the rapid advancement of these forms of cyber-attacks, a report from the International Telecommunications Union (ITU) found that around $1 trillion was lost to Computer crimes frauds internationally in 2012, with $390 billion being unaccounted for internationally. The first part of this study will include a thorough evaluation of the science on the increasing development and disingenuousness of computer security possible attacks, which pose specific challenges to both information assets and congress cyber security operations. The evaluation will critically examine the existing condition and future prediction of information technology, as well as the existence of an online danger panorama in public administration.

Classification of Techniques

Professionals within cyber security are continuously shielding processor systems contrary to numerous procedures of cyberattacks. Each day, cyber assaults board companies and private networks, and various kinds of assaults are quickly expanding. “There are many 2 kinds of internet organizations,” told the paper Cisco CEO John Chambers, “those who’ve gotten attacked covers the entire that haven’t yet realized they were attacked.”
Cyber assaults take a change of inspiration. Cash is one of them. Cybercriminals’ whitethorn knocks a show is as well as entitlement money to reenergize it. Ransomware, a sort of cyberattack which strains currency to reinstate amenities, is much additional classy always than before [12].
Consumers, including companies, were susceptible to cyber assaults, frequently as they except confidential info on private cellular telephones besides utilizing unsecure data services.
There are 7 types of cyber security threats which are as follows:
1) Malware
2) Emoted
3) Denial of Service
4) Man in the Middle
5) Phishing
6) SQL Injection
7) Password Attacks

1. Malware
This is a malicious software which is known as Ransomware, worms, viruses and also extra like Spyware and it is activated himself whenever someone tries to clicking on the link as well as trying to clicking on any attachment that helping in installing of various software which is not good for the system. Reports of Cisco provide malware whenever it activated could:
This will install the harmful software
The components network is blocked permanently [12].
The system will become inoperable due to the disruption of individual parts.

2. Emoted
This is an Emoted which is basically designed for the malware of the banking as well trying to attempt of the sneaking of computers as well as the sensitivity of the information which is private and also its late versions is basically including of software in the appropriate manner of spamming and also delivery of malware services and as well as banking towards the Trojans.

3. Denial of service
A denial-of-service (Do’s) reaction is a form of cyber-attack that prevents people from accessing computers equipment, organizations, businesses, or any other information technology (IT) infrastructure. Within those kinds of cyber assaults, their attackers generally flood application servers, platforms, or networking using information, overloading the victim’s capabilities thus finding it tough or dangerous for others to utilize these [11].

4. Man in the Middle
Whenever cybercriminals inject themselves together into the two-party exchange, also called as man-in-the-middle (MITM) assault. As per Cisco, once blocking transmission, attackers could analyze but also take data. Whenever someone guest utilizes any unencrypted Wi-Fi network, MITM attacks are common. Assailants create a barrier between clients as well as the internet, then just use ransomware to download apps and steal data. This type of attack was mainly done by the person who has knowledge of both the parties and with the help of various communication method he tries to communicate between them and create a problem for both of them. This type of attack mainly with the help of conversation and communication methods [10]

5. Phishing
Phishing attacks were using intentionally forged transmission, along with emails, to attempt to persuade the recipient to accept this and follow the procedure therein, like submitting a credit card number. “This same purpose is to acquire user’s credit card and logins and to infect the perpetrator’s laptop with software,” according to Cisco. This attack helps the attacker to earn money or stealing of money from the respective owner of that bank and in this with the help of proper personal information like knowledge of several credit cards, information of the bank as well as knowledge of password help the attacker to easily hack the bank and stealing money from the appropriate bank [11].

6. SQL Injection
This injection is a type of cyber-attack and also results in the proper manner of inserting code that is malicious and the server is using that kind of SQL in it. Whenever it is infected properly, the information is released by the server. The submission of the malicious code could be simple as well as easy it will be entered inside the search box of the website. This is also known as an attack that is common and vendor and also which is used for malicious code for SQL and also for the database information of backend and manipulation for accessing of knowledge and information which is not intentionally is displaying properly [10].

7. Password Attacks
A cyber attacker can gain access to various material only with an appropriate password. Information Insight describes social programming as a ” tactic cyberattacks utilize that depends primarily on human interactions and frequently entails luring people into breaching basic security practices.” Obtaining a credential repository or remembering a passcode are two further sorts of phishing scams .
Some application which is included is as follows:
Brute Force attackers
Injection Attackers
Malware and other attacks
This type of attack using by the hackers for thinking of appropriate password use for application which is important .

 

Challenges of cyber security

1. Ransomware attacks- Ransomware attacks entail trying to gain access to a public cloud and elimination him from using it till a threat has been paid. Attacks of Ransomware are unsafe for exact users, but they’re much more unsafe for organizations that can’t entree the info they need to conduct their everyday activities. In most extortion assaults, though, the hackers refuse to publish the data after a payment has been made, rather than attempting to extract additional money.

 2. IoT attacks- IoT devices can be digital, computing, and motorized devices which can transmit the data to the network [2].

3. Cloud Attacks– In the cloud attacks, it exposes the celebrity’s private photos if this attack has been carried out the enterprise data, then it can pose the threat for the organization and can lead to the collapse

 4. Phishing attacks- These are the social engineering attack types that get used for stealing the user data do include the credit card number, login credentials.

 5. Cryptocurrency and blockchain attacks
Cryptocurrency and blockchain attacks cannot have meant so much for the internet user and technologies do have a huge deal for such business. These attacks on the frameworks can pose challenges in the business’s cyber security
6. Software vulnerabilities- Software are having so many vulnerabilities and some challenges in cyber security and which is the adoption of the digital device can be more than the before [2]

 7. AI and machine learning attacks- AI and machine learning is been proven as beneficial for the development in different sectors. This also has vulnerabilities. This technology could be exploited by the individuals for carrying the cyber threats and can pose threats in the business [1]

 8. BYOD policies- Having has your own devices can pose various challenges in the field of cyber security. If the device has been running the pirated and outdated version of software then this is a good medium for accessing the hackers

9. Insider attacks– So many challenges of cyber security can be external for the business and there are some instances of the inside job. Employees having malicious intent could leak and export the confidential data of individuals and competitors.

10. Outdated hardware– With the software developers do realize the software vulnerabilities risk, this does offer the periodic update.
⦁ Cyber Défense
⦁ Despite their widespread use in the mass press and also in domestic and international organization declarations there have been no uniform meanings for Cyber phrases. They are perceived to signify numerous things by various countries and peoples.
⦁ However, provides the definition and full explanation of the word cyber defense: For corporations, federal agencies, as well as other conceivable systems, cyber defense is indeed a government computer defense system that involves reaction to activities, key infrastructure security, and information security [4]
⦁ Since no hardware or information is affected, cyber defense works to avoid, recognize, and respond to threats or risks in a timely basis. Cyber defense has become more crucial for most firms in securing vital services and data as the number and sophistication of attacks increases.
⦁ People-Centric Security
⦁ People-centric security varies from standard data security because it focuses on humans. PCS aims for a balance of risk reduction with employee adaptation. In this proactive method for data security, individual liberty and confidence take precedence over rigid, preventative security measures. The traditional control structure for data security has become progressively unsustainable in quick intricate scientific, financial, or risk environments. [1]
⦁ PCS is founded on the set of core values as well as personal rights and duties. Workers have special rights, according to PCS’s principle. Others, on the other hand, are tied to particular obligations. Such rights and obligations are predicated on the concept that when a person fails to fulfil their responsibilities or fails to act in a way that sets out the rights from his or her co-workers as well as the company’s current shareholders, that person would face consequences.
⦁ (1) This agreement of rights and duties fosters a sense of collaborative co-dependency amongst workers, leveraging the company’s social value.
⦁ (2) PCS concepts assume that investigative and proactive measures, as well as open preventive controls, will take precedence over the deployment of invasive prophylactic control systems [3]
⦁ (3) PCS advocates for the creation of a trust zone that promotes individual liberty and innovation.
⦁ (4) PCS assumes a transparent, confident business culture, as well as executive resources and expertise.
⦁ (5) The PCS concepts assume that people have the necessary information to comprehend entitlements, obligations, and choices.

Acknowledgment
The causes for the prevalence of various forms of threats have been explained in this article, which has impacted the condition of Cyber security.
The purpose of this study is to examine and assess the current status of cyber security new threats, as well as the best way to prevent cyber system vulnerabilities. The following conclusions may be derived from the current study: governments and major organizations across the globe should really be mindful of the rising threat of cybercrime there in near future. A huge increase in the number of surgical strikes on organizations and big government collaboration has been recorded and predicted in this investigation. This is predicated on the projection that cybercriminals’ strategies will become more intricate and harder to avoid, identify, and handle in the coming years than they are currently.
Companies and government organizations, on the other hand, are now impacted by the main assaults, but the more security is responsive today, the more Cybercriminals are interested in enhancing that vulnerability. From the pertinent research, it was deduced that whatever was in store in 2012 was a quick summary of the risks. Apps and the landscape are shifting to our portable apps. As the use of handheld phones grows, as the number of assaults targeting these devices rises, so will the number of attacks directed at them proportionally. According to the study, the year 2013 was a watershed moment in the cyber threat landscape, with statistically significant developments, but the dynamic race among both center backs and attackers has chosen to continue, and the estimation is that it will help to propagate beyond Southwest England and the United States, starting to affect Eastern Europe, the Arabian Peninsula, and Latin America and the Caribbean.

References

1) [1]V. Rizov, “Information Sharing for Cyber Threats”, Information & Security: An International Journal, vol. 39, no. 1, pp. 43-50, 2018. Available: 10.11610/isij.3904.
2) [2]M. Lehto, “The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies”, International Journal of Cyber Warfare and Terrorism, vol. 3, no. 3, pp. 1-18, 2013. Available: 10.4018/ijcwt.2013070101.
3) [3]H. Hettema, “Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence”, Computers & Security, vol. 109, p. 102396, 2021. Available: 10.1016/j.cose.2021.102396.
4) [4]D. Broeders, “Private active cyber defense and (international) cyber security—pushing the line?”, Journal of Cybersecurity, vol. 7, no. 1, 2021. Available: 10.1093/cybsec/tyab010.
5) [5]P. Håkon Meland and F. Seehusen, “When to Treat Security Risks with Cyber Insurance”, International Journal on Cyber Situational Awareness, vol. 4, no. 1, pp. 39-60, 2018. Available: 10.22619/ijcsa.2018.100119.
6) [7]L. Fichtner, “What kind of cyber security? Theorising cyber security and mapping approaches”, Internet Policy Review, vol. 7, no. 2, 2018. Available: 10.14763/2018.2.788.
7) [8]S. Hopkins and E. Kalaimannan, “Towards establishing a security engineered SCADA framework”, Journal of Cyber Security Technology, vol. 3, no. 1, pp. 47-59, 2019. Available: 10.1080/23742917.2019.1590920.
8) [9]E. Buenrostro, D. Cyrus, T. Le and V. Emamian, “Security of IoT Devices”, Journal of Cyber Security Technology, vol. 2, no. 1, pp. 1-13, 2018. Available: 10.1080/23742917.2018.1474592.
9) [9]”Online Password Guessing Attacks by Using Persuasive Cued Click Points”, International Journal of Science and Research (IJSR), vol. 4, no. 12, pp. 1186-1188, 2015. Available: 10.21275/v4i12.nov152165.
10) [10]A. S.S., “SQL Injection Detection Using Machine Learning”, Revista Gestão Inovação e Tecnologias, vol. 11, no. 3, pp. 300-310, 2021. Available: 10.47059/revistageintec.v11i3.1939.
11) [11]A. Bonguet and M. Bellaiche, “A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing”, Future Internet, vol. 9, no. 3, p. 43, 2017. Available: 10.3390/fi9030043.
12) [12]J. Jang, H. Kang, J. Woo, A. Mohaisen and H. Kim, “Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information”, Digital Investigation, vol. 14, pp. 17-35, 2015. Available: 10.1016/j.diin.2015.06.002.
13)

1)
2)

Section A – Skills Activity
1. The piece of legislation that is selected here is the Fair Work Act 2009. This legislation is
maintained at our workplace and it is one of the most important legislation of Australia which
emphasizes protecting rights including workplace rights, as well as engaging in industrial
activities and being free from unlawful discrimination. The Fair Work Act 2009 also provides
the legal framework for the employer as well as employee relations at the workplace
(Golding, 2021).

2. The next step is to consult with stakeholders – Meeting with stakeholders
The meeting will be conducted on 30-03-2022 and the time of the meeting will be 10:30 AM.
The location decide for the meeting is Conference Hall, and attendees of the meeting will be
HR Manager, Project Manager, Risk Manager, Marketing Manager and all the employees of
the organization, CEO.
Risk Manager – Good Morning Sir and all the staff members of our organization!
CEO – Good Morning, so what we are going to discuss today?
Risk Manager – Today we are going to discuss the most important legislation of our
organization and what are the possible risks that are incurred, how these risks can be
eliminated as well as what are the risk priorities, and risk management strategies.
Marketing Manager – Okay great, so we can start now and discuss in brief.
Risk Manager – yes, so we know that a lot of workplace hazards are incurring at our
workplace so we need to prepare for them and identify the risk management strategies as well
as risk priorities. Also, we need to ensure that all the risk management strategies will be
implemented and communicated all the strategies. Also, I have prepared the work breakdown
structure which will directly show the duration in what time what activities will be conducted
and implemented in the organization.

CEO – Okay great, so you can show what activities are added in the Work Breakdown
Structure?
Risk Manager – The activities include identifying risks, assessing risks, analyzing the risks,
evaluating them, and determining different ways to eliminate the risks.
CEO – Okay and what is the time duration you gave to all these activities?
Risk Manager – For Identifying risks – 2 weeks are required because in that we analyze and
identify what are the risks coming in the organization, 1 week for assessing the risks, 2 weeks
for analyzing the risks, 1 week for evaluating the risks, and 2 weeks to eliminate the risks.
Also, the most important legislation is the Fair Work Act 2009 and which focuses on
implementing fair work strategies at our workplace and ensuring that all the objectives are
achieved fairly. Also, I want to ask whether any legislation you want to add or any of the
suggestions you want to give for the risks that can be beneficial in the organization, and how
can we eliminate those risks.

3. Adhere to organizational policies and procedures
It is essential to identify all the risks that are occurring in the organization for adhering to
organizational policies and procedures as well as making sure that all employees are safe at
the workplace and they are not facing any kind of risks, also if any risks are incurred at the
workplace, then determine that what actions to be taken to reduce the risks and their impact
on the working of operations of the organization(Golding, 2021).
I was a risk manager ensuring that all the risks are identified and taking every possible action
to reduce or eliminate the risks and ensuring that risk management strategies that are
implemented must be properly communicated to all the staff members in the organization.
Also, my responsibilities include inspecting the machinery and all the equipment that is used
at the workplace that whether all the machinery is working properly or not, and providing full
information to all the employees that how their safety will be maintained.
Different Communication methods are used to communicate with all the team members
including meetings will be conducted with all the team members, and training sessions will
be conducted for all the employees where they will be getting training of eliminating the
risks. Also, if any new machinery or technology is introduced at the workplace then they
must get the proper training that how to install and use the technology or machinery without
any risks.
For implementing the method of communication, workers and employees in the organization
are getting aware of all the information, and the method that is very suitable for assessing the risks, risk assessment, and risk management plan will be prepared for ensuring that workers
are safe in the organization, and provide them a safe working environment, and the risks
should not be of any type including financial risks, market risks or no any hazards must be
incurred at the workplace.
For implementing this method, proper information must be communicated and hazards must
be monitored and the risks must be mitigated as well as transferred so that its impact will be
reduced(Rane, et al., 2019).

 

Section B – Knowledge Activity
Question 1
1. Health and Safety:
It Refers to the industrial safety and health hazard is that an individual might be injured and
hurts opposing healthiness disturbs if unprotected to a hazard. Reductions, Mistakes, and
outings are mutual risks at all workplaces.
Dangerous constituents, Asbestos, Physical management, and spiritual health are properties
of health and safety. Occupied from height is one of the main damages including falls from
rooftops and ladders.
2. Human Resources:
It identifies probable operative connected risks to your corporate so you can diminish any
difficulties previously they rise. The several hazards related to human resources as Staff are
not getting spaces arranged by the regulation, some personnel occupied additional than their
decided-upon times, and they are being waged less than their colleagues.
3. Project assumptions:
A project assumption is an effect that we can trust to be accurate for the project at a
workplace. The various types of risks that can assumable as main project staff obtainability,
employee's presentation for the project, exactness of the development agenda times,
salespersons distribution time, and also comprised operate associates' action or knowledge
services (Rane, et al., 2019).
Question 2
The key components of a Risk management plan are:
1. Monitoring the risk – It refers to the frequent assessment of the hazards recognized in the
organization's risk record. It is the procedure of which paths and estimates the stages of
hazard in an association(Jacobson, et al., 2020).

2. Identify the risk – It is the method of influencing the hazard that might evade the database,
creativity, or outlay from accomplishing its purposes.
3. Evaluation of risk – It is the progression that is used to compare the valued hazard against
the specified hazard conditions, therefore, to regulate the implication of the danger.
4. Treatment of risk – The procedure of risk treatment is to execute and choosing of events to
adjust the hazards. Its actions comprise improving and recollecting the hazard.

Question 3
Industry-standard risk framework includes that risk assessment model will apply to the
organization where all the employees will be interacting together so that returns can be
maximized, also the risk management is focusing on institutions' growth and minimize the
incidents, as well as risks, can be reduced(Abdel-Basset, et al., 2019).
The Risk Management framework for the construction industry includes preparing the risk
management process for the construction industry where all the workers and employees are
involved in constructing a building, as well as the building of projects (Abdel-Basset, et al.,
2019).
Conditions that are affecting the construction project are such as –
1. Human resources and depending on their skills and availability,
2. Quality of the supply system
3. Quality and availability of the equipment will also be affecting the construction project
risks.

4. Site layout and the site location are the conditions that must be considered for the project
of construction of the building.
5. Another one is the financial resources of the project including the financial plan, and the
risk assessment model(Keers, et al., 2018).
The Risk Management process includes –
1. Evaluation of risks, and analyzing the probability as well as its implications.
2. Identification of risks that are preventing the organization and staff members from
preventing our objectives.
3. Another one is risk treatment, and determining the positive and negative effects of the
risks.

Question 4
Quantitative and Qualitative risk management techniques and approaches include-
1. Quantitative risk management is focusing on measuring the performance and data by using
quantitative techniques and the data that can be measured must be quantitative data.
2. Qualitative data must be based on subjectivity.
3. Examples of the quantitative risk management analysis technique are interviewing as well
as cost and time estimates, as well as Delphi technique, expert judgment the examples of the
qualitative risk management analysis, includes historical data, risk rating scales, as well as to
conduct the SWOT Analysis and brainstorming session. The qualitative risk analysis
technique can be SWIFT Analysis, Bow-Tie Analysis, Consequence matrix, Probability
matrix (Willumsen, et al., 2019).
4. Sensitivity Analysis, as well as expected monetary value, modeling, and simulation are the
quantitative risk analysis techniques.
Strategies to assess the risks include risk probability as well as determining the possibility of
risks, as well as how it is impacting the project, and what are the project goals, budget
productivity, budget schedule(Willumsen, et al., 2019).

Risk categorization includes risks that will be divided into categories as well as to reduce the
risks, and find all the solutions to the risks and problems that are incurring in the
organization.

 

Section C – Performance Activity
The project that is chosen here is the construction of the building and I am playing a major
role in the organization is Risk Manager Role, and carry the risk analysis for it.
Risk Analysis will be done and they can also be ranked as the high risks, moderate risks as
well as low risks.

Strategies that are taken to minimize the risks for all the workers who are working on the
construction of the project include –
1. Firstly take the consultation from all the employees, and workers for working on the
project and ensure that the schedule of the project must be proper which include all the dates
and deadlines that on which date the project will be completed as well as who has the roles
and responsibilities for completing the project and leads to proper communication between all
the workers and all the managers, contractors, builders, as well as investors who are investing
in the project.
2. The design of the building must be communicated properly so that no errors in the design
of the building occur as well as no omission made in the design of the building (Keers, et al.,
2018).
3. If employees are consulted along with the workers that whether they are willing to work on
the project then they must be using their ideas as well as there will be optimum utilization of
resources, and generating all the ideas as well as maintaining the costs of the organization.
4. Performance of workers will be regulated and monitored daily so that if any changes are
required then workers can make it immediately so that feedback can be communicated to
them, and it leads to organizational growth, and the design of building in which all the
employees and workers are working must be monitored regularly because once the design of
the building is done, major changes cannot be made in it, only a few changes can be made.
Also, monitoring of work and workers can reduce the delay in the project because when
monitoring is made, areas of improvement can be made, and the cost can also be monitored
while monitoring the project and resources(Birkel, et al., 2019).
5. It is very essential to provide training to employees so that their performance can be
improved and they get the information when any new technology is introduced at the
workplace as it will directly inform employees and workers that how this technology will be
implemented and how it will be beneficial to all the employees and workers (Birkel, et al.,
2019).

6. For managing the risks, the risk management plan, and risk assessment model can be
prepared as well as analysis of the environment can be done properly, and it includes the
internal as well as external environment analysis of the project on which all the workers are
working so that if there any issues are coming then they must be realized.
7. Contingency plan must be prepared for every project because it includes all the possible
risks as well as actions that can be taken to reduce those risks and provide training to all the
workers before working on the project so that they can work collaboratively and they can also
identify what are the possible risks that are coming in the project while they are working in
the organization and then they can directly report to their seniors as well as supervisors, and
possible actions can be taken immediately to reduce those risks.
7. Once the risks are identified, their assessment would be done properly, also the ratings and
consequences of the risks will be identified after the type of risk can be determined. Ratings
of the risks can be moderate, high, as well as low risks, and the actions can be taken
accordingly to reduce the risks.
8. After assessing the risks, mitigating of the risk can also be done and for that, the risk
management plan would be prepared as well as contingency plan can be used when there is
an emergency occur in the plan which can help minimize as well as eliminate the risks
(Wressell, et al., 2018).
9. After preparing the plans, they will be communicated to all the team members and workers
by conducting a meeting with them and telling them how this plan would be communicated
and ensure that there is no underutilization of resources, and also ensuring that all the
resources are used wisely, or simply means there is no wastage of resources.
10. After communicating the plans, they will be implemented in the organization, and after
implementing them, monitoring will be done so that deviations are found. Monitoring of
plans is important because it is necessary to find out whether they are successfully
implemented or not(Wressell, et al., 2018).
11. Also, after that monitoring of the site will be done and the next possible risk will be
identified that can be incurred at the workplace, and those risks will be communicated so that
awareness will be done.

12. Risk management strategy will be implemented at the workplace because construction
projects will be avoided at the risk-prone areas because it can harm the lives of workers as it
will directly affect their lives and the people who are living at the place will also be affected.

 

References

Abdel-Basset, M., Gunasekaran, M., Mohamed, M., &Chilamkurti, N. (2019). A framework
for risk assessment, management and evaluation: Economic tool for quantifying risks in
supply chain. Future Generation Computer Systems, 90(1), 489-502.
Birkel, H. S., Veile, J. W., Müller, J. M., Hartmann, E., & Voigt, K. I. (2019). Development
of a risk framework for Industry 4.0 in the context of sustainability for established
manufacturers. Sustainability, 11(2), 384.
Ćulibrk, J., Delić, M., Mitrović, S., &Ćulibrk, D. (2018). Job satisfaction, organizational
commitment and job involvement: The mediating role of job involvement. Frontiers in
psychology, 9, 132.
Golding, G. (2021). Unfair dismissal and the Coronavirus pandemic: Creative responses from
Australia’s Fair Work Commission. Revue de droit comparé du travail et de la
sécuritésociale, (4), 100-115.
Guliyeva, S. (2020). Enterprise risk management strategy. Economic and Social
Development: Book of Proceedings, 3, 704-710.
Jacobson, R. K., & Eaton, A. A. (2018). How organizational policies influence bystander
likelihood of reporting moderate and severe sexual harassment at work. Employee
Responsibilities and Rights Journal, 30(1), 37-62.
Keers, B. B., & van Fenema, P. C. (2018). Managing risks in public-private partnership
formation projects. International Journal of Project Management, 36(6), 861-875.
Pavlov, A., Ivanov, D., Pavlov, D., &Slinko, A. (2019). Optimization of network redundancy
and contingency planning in sustainable and resilient supply chain resource management
under conditions of structural dynamics. Annals of Operations Research, 1-30.
Rane, S. B., Potdar, P. R., & Rane, S. (2019). Development of Project Risk Management
framework based on Industry 4.0 technologies. Benchmarking: An International Journal.

20
Wijethilake, C., & Lama, T. (2019). Sustainability core values and sustainability risk
management: Moderating effects of top management commitment and stakeholder
pressure. Business Strategy and the Environment, 28(1), 143-154.
Willumsen, P., Oehmen, J., Stingl, V., & Geraldi, J. (2019). Value creation through project
risk management. International Journal of Project Management, 37(5), 731-749.
Wressell, J. A., Rasmussen, B., & Driscoll, A. (2018). Exploring the workplace violence risk
profile for remote area nurses and the impact of organisational culture and risk management
strategy. Collegian, 25(6), 601-606.

Active model exercise
Question 1
According to the material requirement plan of the organization describe the production of
item B will be changed from week 3 to week 2 then there is no change in the order releases
for items B, C, and, D (Marchet, et al., 2018). there is no change between these items because
there are no planned order releases from weeks 2 and 3 because there are 0 productions in
both the week in item B and because of this there is no change in items B, C, and D as they
have no relation with each other but they can change the production of item C in the week 2
because they manufacture 400 quantity of this product in the second week but there is 0 level
of the production in the market and the organization has to increase their production in the
company to increase the company sales in the market for the benefits and gaining the profit of
the organization in the market (Marchet, et al., 2018).

Question 2
As based on the on-hand inventory for item C and it is directly increased from the level of 0
to 200 directly this describes the difference in both the production and the manufacturing
level of the goods and the products in the organization. as you can see both of the production
levels of items B and D this is the important thing for the organization (Meunier, et al., 2016).
based on the plan order realizes of the production level of item C is staying on the 0 levels in
the first and this is the lack point in the organization as the first week of the production
company does not focus on the goods of item C. this is will affect the production and the
manufacturing level of item B in the market as on the second week. This is the way the other
item such as B and D production and the manufacturing level in the organization will
decrease automatically.

Question 3
Based on the fixed order quality FOQ of item D increased from 500 to 750 then this will help
the company to increase the production level of the B and C and because they are reducing
the production level of the D this is the reason company will focus on the manufacture of the
goods and the service of the other items in the organization as the item D production reduce
and the company will be focussing on the other item of the organization (Meunier, et al.,
2016). there is a change in the production level of the company of item D at the reducing
level in the manufacture of the 150 items. This is the affection of the other items of the
organization as they are manufacturing them of the flashy flashers organization.

 

Question 4
Based on the table and the records of the company also, the plan order realizes describe there
is the slow manufacture start for the item C in the organization but as they have started late
production of the organization in the item of the company but the item C production will
remain to stay long and till week 6 compares to the manufacturing level of both the products
from the first 1 of the organization (Ogura, et al., 2015). according to the planned order report
and the table if there are changes in the production of item C then there are the chances that
the production level of the other two items B and D will be increased automatically as the
company focus on the manufacture products of the items products. This is the amount of the
level and the changes that happen in the organization as they will reduce the focus on the
manufacture of the product item C and they do produce the item of the B and D these are the
changes that happen in the organization (Ogura, et al., 2015).

 

Assignment 2
Report

Introduction
Flashy flashers are the organization that produces the side lamp lights and the headlights that
are used in the vehicle and this firm produces the automotive electrical components. As this
organization supplies the parts and the types of equipment that will be used in the vehicle and
they are doing their best in the company as they are working in the garage to provide the best
and excellent level of customer service for better and positive feedback from the customer of
the organization. as the organization sales report, this has been very clear and it is mentioned
in the company case study is that there are the two types of products that are known as the
best selling products of the company are known as side lamp and the headlamp.

 

According to the manual of the MRP explosion for the side lamps and the headlamps of the
organization, this has been very clear that the headlamps of the company are the high level of
selling in the market compared to side lamps this table describes the difference between both
the commodities selling in the market and there is the competition between both the products
in the organization (Song, et al., 2015). based on the production level of the company and the
selling price also, the MPS explosion cost of the unit and the unit available in the hand of the
organization describe the difference between both the product demand in the market and the
level of the manufacture is not similar with each other (Song, et al., 2015).

Increase manufacture
Compare to the details of the company manufacture of the goods and the products this has
been very clear that the company has to increase the manufacture of the side lens (SL111P)
more in the organization for the better and increase the sales rate of the organization
(Cornish, et al., 2016). according to the master production schedule and the company has to
start their production from the 1week based on the details and the manufacturing of the goods
and the MPS start date the company is lacking in the manufacturing of the goods in the first
week and the second week of the company. this describes the company lacking point in goods
manufacturing (Cornish, et al., 2016).

Production
The most important thing in the organization as the company has a medium level of
production. The company has to increase their production level in the organization for the
better and the good result in the organization. they have to increase the production level of
the company as they also, develop the new teammates and the worker for the production of
the goods in the organization (Klumpp, 2018). they have to get more materials and raw
materials for the production of the goods and the products of the organization (Klumpp,
2018).

Focus
They have to focus on both the products of the organization which has a high level of demand
in the organization and it is very important for the organization. as the side lamps and the
headlamp has the high level of the demand in the organization as the most of the sales which
have an increase in the week 3 and week 5 also, in week 6 the SL100E has the highest level
of the production and this product has the highest level of the production in the organization.

Recruitment
A flashy flasher has a medium-sized firm that has a total of 900 employees and 125
managerial and administrative personnel. Based on these data and the details the organization
has to increase the recruitment because according to manufacturing goods of the organization
they have to hire more employees and co-workers for the company to get better and the good result with the help of this they will be able to get a better positive result. As the vice
president of the operations and the supply chain of the organization, I have to manage the
supply of the organization as they have to get better and the positive result of the organization
(Bayarçelik, et al., 2020).

Inventory control manager
Inventory control of the organization describes the well maintained and this will explain the
investment records of the organization and the transaction describe the company has what
kind of amount in their on hand at the current period and the balances are credible (Surajit,
2018). The MRP production or the explosion of the organization each week describes and
handles the production and the manufacturing level of the organization of each level. As the
organization receives the investment in the company based on the investor and the investor
control manager of the company that handles and maintains the balance of the production of
the organization. the MRP outputs of the organization are providing the priority and the
capacity reports of the company. they also, handle the order launching capability of the
company (Bayarçelik, et al., 2020).

Conclusion
Based on the report and the details that are mentioned above in the organization describe the
company has to focus on the manufacture and the production of the organization and they
also, have to hire more workers and employees in the organization to increase the production
level of the company and with the help of this company will be able to increase the
production level of the two main products of the organization in week 1 and 2 which is the
most important week for the organization to do production in the market.

 

References
Bayarçelik, E. B., & Bumin Doyduk, H. B. (2020). Digitalization of business logistics
activities and future directions. In Digital Business Strategies in Blockchain Ecosystems (pp.
201-238). Springer, Cham.
Cornish, A., Raubenheimer, D., & McGreevy, P. (2016). What we know about the public’s
level of concern for farm animal welfare in food production in developed
countries. Animals, 6(11), 74.
Klumpp, M. (2018). Automation and artificial intelligence in business logistics systems:
human reactions and collaboration requirements. International Journal of Logistics Research
and Applications, 21(3), 224-242.
Marchet, G., Melacini, M., Perotti, S., Rasini, M., & Tappia, E. (2018). Business logistics
models in omni-channel: a classification framework and empirical analysis. International
Journal of Physical Distribution & Logistics Management.
Meunier, M., Guyard‐Nicodème, M., Dory, D., & Chemaly, M. (2016). Control strategies
against C ampylobacter at the poultry production level: biosecurity measures, feed additives
and vaccination. Journal of applied microbiology, 120(5), 1139-1173.
Ogura, Y., Mondal, S. I., Islam, M. R., Mako, T., Arisawa, K., Katsura, K., … & Hayashi, T.
(2015). The Shiga toxin 2 production level in enterohemorrhagic Escherichia coli O157: H7
is correlated with the subtypes of toxin-encoding phage. Scientific reports, 5(1), 1-11.
Song, Y., Nikoloff, J. M., & Zhan, D. (2015). Improving protein production on the level of
regulation of both expression and secretion pathways in Bacillus subtilis. Journal of
microbiology and biotechnology, 25(7), 963-977.
Surajit, B., & Telukdarie, A. (2018, December). Business logistics optimization using
industry 4.0: current status and opportunities. In 2018 IEEE International Conference on
Industrial Engineering and Engineering Management (IEEM) (pp. 1558-1562). IEEE.

Question 1
A According to the previous report of Fred and based on his medical history as he has
hypertension, hypercholesterolemia, diabetes mellitus, GORD, atrial fibrillation, and a
cholecystectomy. These all are the disease that he had five years ago ("Ponatinib", 2019).
Based on the current situation of Fred and his medical condition as he has weakness in his
left hand and the left side of the body and he was unable to speak properly from that side.
After the discharge from the rehabilitation environment and during the discharge he is still
facing the problem in the left section. Also, he has weakness in his left arm and the vision of
his eyes are blurred is resolved but some type of residual dysphasia is still there in his body.
Based on his medicine as he is taking the highest level of dose of simvastatin 40 mg PO daily
("Iobenguane", 2017).
B According to his medical reports and the medical condition, this has been very clear that he
has issues of the CVA and this is known as the cerebrovascular accident which is known as
the stroke in medical terms. Also, it stops the blood flow from the blood vessels and the
blockage the rupture of a blood vessel. This is also, an important sign to watch out before the
medical condition of the person is went out of the hands of the person ("Iobenguane", 2017).

C According to the pathophysiological perspective, this has been very clear that he is leading to
the stage of the CVA because he has symptoms related to this disease and his medical
condition right now as he discharges from the hospital he still has weakness in the left side of
the arm and this will leads to a high level of the CVA stage in which he has the blockage in
his blood vessel and the blood flow will stop in the one side of the body and because of this,
there might be chances his brain stops working too (Gareeva et al., 2017). Two types of
CVA happen in the human body according to medical science and based on the medical
condition of Fred this has been very clear that he has the symptoms of having ischemic
strokes this stroke cause the blood clot in the blood vessels of the human body and block the
blood flows from the blood vessels to the brain.
Fred has weakness in his left side of the body arm after discharge from the rehabilitation this
means clear that the blood clot in his blood vessels is high and there might be chances that he
has an ischemic stroke in his body (Gareeva et al., 2017).

D According to Fred's condition and his past disease that he had five years ago which include
diabetes and hyperlipidemia, hypertension, and atrial fibrillation. These all are the diseases
that lead towards the CVA ischemic stage that causes the blood clot in the human body and
stops the blood flow in the left side of the body (Indriastuti & Harun, 2020).

Pathogenesis has explained the reason behind the CVA and the causes of CVA in the human
body according to the research this has been very clear that CVA leads to heart failure and
heart attack in the human body this means most of the cases in the CVA is include the person
medical condition or they has asthma because asthma is the disease in which human faces
issues while breathing and they feel pressure on their heart. Also, another reason for having
or leading towards the CVA ischemic stage is because of the microvascular damage in the
diabetic heart that may lead to myocardial injury and damage the blood vessels of the human
body.

Question 2
According to the condition and the health report of Fred explain there are two risk factors
available in Fred's health condition and this explains there are the chances of the risk
appearance from modifiable and non – modifiable. This has been very clear that there is a
risk factor on the second most level in the human body and that is a heart attack or this is the
risk factor of the heart stroke.
Non-modifiable – this risk factor is the cardiovascular disease of risk factors that can not be
changed and this risk factor include the person's past life, family background, and family
history of the disease. In this, the diseases can not be resolved in the human body and heart
stroke increases the amount or the percentage of having a heart attack in the human body
(Indriastuti & Harun, 2020).
Modifiable – the modifiable risk is the risk that happens or occurs and this shows that
hypertension is the commonest modifiable risk factor and this disease will be lead to the
CVA by diabetes mellitus, smoking, and obesity is the disease that leads to this level of the
risk factor (Hontsariuk et al., 2019).

Question 3

The sign and symptoms of the CVA include the changes in the human body and there are the
signs and the symptoms in the human body of having the CVA and the disease that cause the
CVA is the pain in the one portion of the human body and the body parts. The stroke
happened to develop the colt in the blood vessel and these blockages lead to damaging the
brain function of the human body.

A The first symptom of having the CVA is weakness in the human body also, the person feels
numbness and fleeing of their body parts stop working time to time. The person is unable to
move their body parts and they do not feel senses in their body. This is the first sign of having
the CVA in the human body and this will lead to heatstroke in the human. The person having
issues in the moment of the human body and their parts is having an issue at the moment and
while working these are the important things for a person if they having issue in developing
their work process.

B Another sign of having the CVA and implementing the cerebrovascular accident in the
human body is the procedures because the signs describe the person having the symptoms of
CVA and they have started their medical procedures and the medical process to improve the
medical condition and resolve the issue of the medical health (Hontsariuk et al., 2019).
Another symptom of having the medical condition in bad stage or they have facing issues in
walking and talking also, as they see the blur vision in their eyes from the left side and this
will affect on their working and their body stops responding. These are the diseases that can
make a person as a statute and he needs the support to do moment in their body. This will
block the movement in the human and stop the procedures of the blood circulation between
the body and throughout the body from brains to tiptoe. These are the issues that are faced by
humans and the person like Fred having issues in walking and doing other household things
and the work procedures.

C These all are the symptoms and the signs that describe the person having the medical issue
related to CVA or their body having the blood clot and their blood vessel will stop the
processing of the blood in the human body from brain to all parts of the body. CVA is a
disease that leads to the stoppage of brain function and the human body would not be able to get an indication and respond from the brain this will lead to a high level of the disease and the person can get a paralysis attack.

Question 4
A According to the medical prescription, Fred is having the six types of medicines that are
prescribed to him by the doctors because of his health and based on his health condition. As
he has digoxin at the range of the 125 mcg PO daily the reason behind this medicine and
usage of this medicine is to reduce the chance of heart failure and this will help Fred to
improve the blood function into his heart and his heart pumps blood more effectively like
before when he was at his younger age in 20s. this is the importance of this medicine that is
given to him for the better and the healthy development in Fred's health. Also, improve the
health condition of the person this is the reason they prescribe the medicine at the level of
125 mcg at the PO daily (Hontsariuk et al., 2019).

B Another medicine that prescribes him is the simvastatin that belongs and use this medicine to
reduce the cholesterol level in the human body and maintain the cholesterol level in the
human and the reason prescribing the medicine is because more cholesterol in the human
body leads to blockage in the blood vessel of the Fred. The level of this medicine that is
given to Fred is 40 mg and this will maintain the heart and the blood balance in the body and
reduce the risk of heart disease. The cholesterol in the human body builds the fatty substance
that builds in the human body and the blood vessel and this block the way of the blood into
the blood vessels. This is the reason they prescribe this medicine to Fred to reduce the
cholesterol level in his body (Renzitti, 2018).

C Amlodipine medicine is used to treat high blood pressure and hypertension and this prevents
reducing angina this is known as the appear chest pain and heart-burning. The heart pain and
the chest burn leads to high blood pressure and because of this calcium channel will be
broken and which helps to this reduce the pressure of the blood in the human and maintain
the blood pressure level in the human body (Renzitti, 2018).

Question 5

All the medication and the medical history of Fred and his past medical illness are described
clearly that he been having the CVA issue for a very long time because he has such kind of
the disease that indicates to the CVA. this has been very clear as the CVA is such a high issue
and it is important to take care of the person more during this time and have to make things
possible (Madan & Schoutens, 2016). The medical things and the CVA is the disease that
makes the person handicapped and paralyzed if they do not take the person at the right time
and also, they have to change their diet and the supplements to maintain their diabetes,
cholesterol, and blood pressure level in their body. Fred has the issue and the symptoms of
having the CVA of the non-modifiy level because after a week of therapy he is still having
the issue in moving his hand off the left side and he is unable to walk properly (Madan &
Schoutens, 2016).
These are the sign and the indications that define that Fred is going to face a serious issue in
the future and before the situation gets out of control he has to make sure to do the proper
amount of check-ups and start taking precautions on that amount of level to avoid such kind
of unscary things and the unwanted things (Renzitti, 2018). This has been very clear that if
Fred would not take this health issue seriously and if he would not go to the doctor regularly
or take the medicine from time to time then there might be a chance that he may have the
paralysis attack or blockage in the brain and due to this he might get die and get Ill so hard
that he is unable to walk again properly. This is the reason he has to make sure to take the
medicine and he needs to do a proper level of body check to check if there is another way to
reduce the level of their CVA in the body and with the help of surgery or operation the
blockage in his vessels will be open and the blood flows continue in his body (Renzitti, 2018).

 

Refernces
Gareeva, D., Dunaeva, A., Zagidullin, N., Haphyzov, T., & Zagidullin, S. (2017).
P6489Nephroprotective effect of ishemic preconditioning in contrast-induced nephropathy in
patinets with mild chronic kidney failure. European Heart Journal, 38(suppl_1).
https://doi.org/10.1093/eurheartj/ehx493.p6489
Hontsariuk, D., Hristich, T., Teleki, Y., & Olynik, O. (2019). Chronic pancreatitis in
combination with ishemic heart disease: changes in cytokine immune
response. Pancreatology, 19, S136. https://doi.org/10.1016/j.pan.2019.05.370
Indriastuti, M., & Harun, N. (2020). Comparative Pharmacoeconomy and Effectiveness of
Combination Antiplatelet Cost in Patient Ishemic Stroke. Journal Of Physics: Conference
Series, 1477(6), 062004. https://doi.org/10.1088/1742-6596/1477/6/062004
Iobenguane. (2017), 1682(1), 171-171. https://doi.org/10.1007/s40278-017-39802-8
Madan, D., & Schoutens, W. (2016). Conic CVA and DVA. Wilmott, 2016(82), 45-50.
https://doi.org/10.1002/wilm.10490
Ponatinib. (2019), 1758(1), 285-285. https://doi.org/10.1007/s40278-019-63831-1
Renzitti, S. (2018). Accelerating CVA and CVA Sensitivities Using Quasi Monte Carlo
Methods. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3193219
Renzitti, S. (2018). Accelerating CVA and CVA Sensitivities Using Quasi Monte Carlo
Methods. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3193219

Task 1
Email to Trainer

From – Receptionmanagerofthebilliresort@au.in

To – Trainer

Subject – Invitation for meeting to get the feedback on the business letter

Respected sir,
I am writing this mail to inform you that I develop the business letter to provide
information to Mr. Ronald Hayes to provide information related to the price or fare of the
services that Billi resort provide to their customer. I have attached a soft copy of the
business letter with this mail. To get your feedback on the business letter, I want to conduct
a meeting with you. Kindly please permit the meeting.
Kind regards
Reception manager
The Billi resort

Conduct meeting

Date – 15/03/2022
Time – 09:00 am
Duration – 15 min
Agenda – Discussion on the business letter
Attendees – Trainer and reception manager

 

Reception manager – good morning, sir
Trainer – good morning
Reception manager – Sir, I want to take your feedback on the business letter that I created
to provide the price detail to the customer related to services of the Billi resort.
Trainer – You have done a good job. There is no need to make any adjustments to the
business letter. You will provide all the details with the discounted prices and also provide
the images of the services that you provide to the customers If they book the room for 10
or more than 10 days.
Reception manager – ok, sir.
Thank you
Have a nice day

 

Task 2
Email to Trainer

From – Supervisor@au.in

To – Trainer

Subject – Invitation for meeting to get the feedback on the report

Respected sir,
I am writing this mail to inform you that I write the report to provide information related to
the price of the dining table and 10 chairs that given by the supplier in the form of
quotation. I also share my recommendation in the report related to selecting the best
supplier. I have attached a soft copy of the report in the mail. Kindly please review it and
give feedback in the meeting.
Kind regards
Supervisor

Conduct meeting

Date – 18/03/2022
Time – 09:00 am
Duration – 15 min
Agenda – Discussion on the report
Attendees – Trainer and Supervisor
Supervisor – good morning, sir

 

Trainer – good morning
Supervisor – Sir, I want to take your feedback on the report that I created to provide
information related to the price of the required furniture goods that are given by the
different suppliers of Australia.
Trainer – You have done a good job. There is no need to make any adjustments to the
report. You will provide all the details with the discounted prices and also provide the
images of the dining table and quotation of the suppliers.
Supervisor – ok, sir.
Thank you
Have a nice day