Skip to content

best assignment help services in UK

Assessment Task 1 – Questioning

Question 1
To improve the communication channels and improve the relationship between parties, it is
very important that stakeholders are engaged effectively. Also helps in the creation and
maintain the project and it helps to gather information and reduce the chance of conflict and
or issues related to the project. And also support the existing conflict and solve any problem
in the organization. Overall it enhances the organization’s reputation (O’Riordan & Fairbrass,
2014).

Question 2
Three methods commonly used in engagement models
Fixed price engagement model:
It’s also called a fixed bid or lump sum contract, it is most obvious. As we can see from the
name this model is all about fixing or freezing the project costs
It also helps in documenting all requirements in a careful way. Also, detail the project scope
and in setting up a timetable strictly. It’s all about predictability.
Our project scope and requirement and the end goal are must for the fixed priced models
(Day, et al., 2018).

Benefits:
Transparency: we can predict the budget transparency before the development of stars.
Time-saving: This method required less management and supervision as compared to other
methods.
Establishment of trust: It helps in establishing the trust between the partner.
Non-fixed price model: time and material
In a fixed price model time and material, it allows greater flexibility than a fixed price model.
When the market changes regularly and dynamically and the vision of the product is not clear and when the interference of tech. evolves rapidly. In that case, we can predict the final
project scope in an effective way.

Benefits Flexible: when it is about the budget of the project and scopes. In getting case it is extremely
flexible and effective for handling the request for changes and alterations.
Cheaper
These methods are cheaper for the client. The developer does not have to charge the risk to
the customer.
Risks are lower
Start quicker
Cost-plus method
It is mostly used for staffing or personal leasing, it is a process when one company lends its
specialists to another company for a specific period of time.
This means clients can borrow developers or quality engineers, etc. they can work there until
the competence of the project. they can hire them for their services.
Benefits
The cost-plus method helps to work cheaper, faster, and less risky. Also, it is less time-
consuming or wants less oversight. Also helps to maintain transparency.

Question 3
Fixed-price engagement model
Positive: Transparency: we can predict the budget transparency before the development of
stars.
Time-saving: This method required less management and supervision as compared to other
methods.
Establishment of trust: It helps in establishing the trust between the partner.

Negative:
High cost: All the risks are predicted and calculated in advance and check all things 2-3 times
including high cost.
No flexibility: there are little and less flexibility.
Non-fixed price model: time and material
Positive: Flexible: when it is about the budget of the project and scopes. In getting case it is
extremely flexible and effective for handling the request for changes and alterations.
Cheaper:
These methods are cheaper for the client. The developer does not have to charge the risk to
the customer.
Negative:
Time-consuming: It is the most time-consuming process. And it needs more oversight.
No guarantees: There are no rock-solid guarantees that projects are completed on time or not.
Discrepancy: it creates the discrepancy between project estimation and the real costs.
Cost-plus method
Positive: The cost-plus method helps to work cheaper, faster, and less risky. Also, it is less
time-consuming or wants less oversight. Also helps to maintain transparency.
Negative: it has a unique disadvantage; the client must warn 2-3 months in advance for
cancellation of service.

Question 4
Cohen-Bradford is a method of people influencing at that time when there is no authority
between two relationships. It is based on a concept of reciprocity, it is an approach that can
be effective it is an approach to getting what we want. It influences the reciprocity or a
common-law sense. It helps to influence those around them when there is an absence of
authority (Nguyen & Mohamed, 2018).

 

Question 5
It analyze the power and support of stakeholders. It helps and maps the stakeholder by their
power and support.
It is a grid of interest and power.
A matrix that supports and importance of stakeholders
The matrix influence and interest of stakeholders
Map the stakeholders by attitude and knowledge.
It is a tool from project management used by stakeholders to determine the necessary actions.
Align with their goals and project.

Question 6
By mapping, stakeholders serve and help to maintain the relationship between stakeholders
and the project of the company. It also helps in identifying the key stakeholders. It helps to
understand the relevance of stakeholders.

Question 7
Important for managers to assess the commitment and effectiveness of their stakeholders
To make commitments solid that is achievable.
Communication updates all groups.
Promises made with stakeholders (Bouma, 2015).

Question 8
It helps to improve the communications between stakeholders.
Identification of effective and powerful stakeholders helps to give shape to our project in its
early stages. It increases accountability, transparency, more ideas, and issue solving.

Question 9

We have to identify the stakeholders. It’s an early step for stakeholder management to
establish a stakeholder list.
We have to place the stakeholders on the interesting grid.
It motivates our stakeholders.
Also, build our strategy.

Question 10
Two ways of assessing stakeholders’ engagement
By questionnaires
We can engage our stakeholders with surveys or feedback. By survey, we can get a chance to
meet a large no. of people and also get different feedback from many people. This can be
done by email, via the web, face to face, or via phone.
By interviewing stakeholders
It is a very good way or opportunity to gather intelligence and information. Also, it is very
time-consuming. Through interviews, we can gather a lot of information which helps to
connect with stakeholders.

Question 11
We have to identify the stakeholders.
We have to get them involved. Align with them.
Known their needs
Get stakeholders taking
Try to understand.
Work with the team.

 

Question 12
For that, we have to reduce or lessen the risk of the project.
Manage and maintain the resources in a more effective way.
Make team collaboration.
Meet timelines.
Maintain trust and build it.
Make better relationships with stakeholders.
Make a map for stakeholders.

Question 13
Stakeholders are a very important part of the business. With them, no business can survive
long or not earn a profit. There must be effective policies and effective procedures in regard
to stakeholders. It helps an organization meet its desired objectives. And also, they help them
to contribute to the project. Stakeholders’ inputs are also an important factor in increasing the
quality.

Question 14
Stakeholders are a very important part of the business. With them, no business can survive
long or not earn a profit. They really support the business practices and also, they do financial
support. Stakeholders are people who are interested in our company. They are loyal to
customers and investors too. They are people who help where to invest the money. It
improved communication and also better management.

Question 15
Skills that need to demonstrate when interacting with stakeholders are
Communication: Effective and excellent communication help to build the relationship with
stakeholders. Leadership is also a good skill to demonstrate when interacting with stakeholders.

Question 16
Understand, compromise.

Question 17
It is very important for businesses to listen to and understand the feedback from stakeholders
also helps to give shape and improve the overall business operations. Their consultation is
used for the development of services and products generally (Dawkins, 2014).

Question 18
It is a quantitative investigation of it is a variance that comes with the difference between the
actual behavior and planned behavior. This technique is used to determine the cause. Also
give measures to maintain and control it.

Question 19
We can identify the variance by finding the mean, and to find or identify the mean, we have
to add all sources and then divide them by the. of scores.

I have to identify what stakeholders need and what they actually want we have to take care of
them because they are important to us I have to ask them what their needs are and ask them
for their feedback so we can take ideas from them. We have to identify them and noticed
them closely. Also, we can motivate them. Listen and understand what they saying, and also
we have to determine their motivation.

Part B: Facilitate Stakeholder Commitment
Stakeholder Engagement Assessment Matrix:

Stakeholder  Unaware  Resistant  Neutral  Supportive  Leading

Finance manager YES YES NO NO YES

Production team leader. YES YES YES YES NO

suppliers NO YES YES NO NO

HR manager YES NO YES YES YES

Sale manager YES YES NO YES YES

1. The methods for communication with stakeholders are:
Their engagement is really necessary for the company to achieve its goal.
We should identify the key stakeholder plan and communication.
Via email or newsletter
Or with communication automation
Via presentation also we can also give them a summary of project reports. Or via video call
or normal call.

2. The variance between the planned or actual engagement the reason maybe the maybe there
is a lack of communication between organizations and stakeholders or maybe we are not able
to provide information to them or not ask them for their feedback, Or maybe they also not
taking an interest this could be the reason for these variances ( Leonido, et al., 2020).

3. My expectation of every stakeholder is clear and I manage the stakeholders differently.
And keep stakeholders in a loop, share evidence and all research with them, and track their
sentiment.

4. We can identify their needs by talking with their communication or effective
communication is the best process to know what others thinking we can communicate to
them face to face, via video call, events, meetings, etc. we have to identify their interest and
actions. We have to maintain regular contact with them.

5. We have to identify the team’s capacity and workload.
We have to distribute the resources in the breakdown structure.
We have to check teamwork and adjust workloads according to need.
We have to improve the efficiency of the team.
We have to review our business goals with priorities.

6. I can take different communication methods to facilitate and achieve the organization’s
goal we can communicate with our stakeholders through video calls, phone calls, face to
meet. Communication helps to achieve our desired goal and also maintain our relationship
with our stakeholders.

7. At that time team need communications, leadership, adaptability, diligence, and
negotiation. We can be trained the employees to share our plan with them and take or give
feedback to give them value.

8. Finance manager is careless we have to give them training he is careless and not come in
meeting or share the idea we can talk with him, also the supplier has late delivery of raw
material we have to ask him for fast delivery. We can do communication in the breakdown
process, or we can create a communication plan, constraints resource.

 

References
Bouma, J. (2015, April). Timely injection of knowledge when interacting with stakeholders
and policy makers. In EGU General Assembly Conference Abstracts (p. 2620).
Dawkins, C. E. (2014). The principle of good faith: Toward substantive stakeholder
engagement. Journal of Business Ethics, 121(2), 283-295.
Day, S., Blumberg, M., Vu, T., Zhao, Y., Rennie, S., & Tucker, J. D. (2018). Stakeholder
engagement to inform HIV clinical trials: a systematic review of the evidence. Journal of the
International AIDS Society, 21, e25174.
Leonidou, E., Christofi, M., Vrontis, D., & Thrassou, A. (2020). An integrative framework of
stakeholder engagement for innovation management and entrepreneurship
development. Journal of Business Research, 119, 245-258.
Nguyen, T. S., & Mohamed, S. (2018). Stakeholder management in complex projects. In The
7th World Construction Symposium (pp. 497-506).
O’Riordan, L., & Fairbrass, J. (2014). Managing CSR stakeholder engagement: A new
conceptual framework. Journal of business ethics, 125(1), 121-145.

Question 1
Budget–It is the estimation of the specific amount of money or the plan required for a specific charge of survival or to be utilized for a particular objective (Carliner, 2015).
Business Plan – It is an important written text that gives an overview and description of the future of the organization.
Coaching – It is the progressive method of interacting and working with other individuals.
Colleagues–These are coworkers or associates usually in the civil or professional office and frequently of the same status.
Consultation–It includes assisting to overcome, address and identify obstacles to attaining the objectives of the organization.
Contingencies – It is the possible negative occasion that might happen in the upcoming period like natural calamity, recession in the economy etc.
Contingency Plans – It is the strategy or plan for how the enterprise will respond to crucial business or essential incidents that hit the novel plans or strategies off way.
Employee Induction/On boarding–It is the process that must occur when an individual first begins the new employment.
External Stakeholders – It includes customers or clients, shareholders and investors, agencies of government and suppliers.
Financial Information–It is the data related to transactions of money of the business or individual.
Human Resources–It is the business department in the organization that is accountable for everything related to work.
Intellectual Property–It means the mind’s creations like inventions; artistic and literary symbols, designs and works, images and names utilized in trade and commerce.
Internal Stakeholders–These are the individuals whose main interest in the organization arrives through a straight relationship like investment, ownership or employment.
Mentoring–It is the relationship or association between the experienced person of business i.e. mentor and the employee or owner of business i.e. mentee.
Operational Performance – It is the interaction between many units of the organization and the capability to generate large output jointly (Carliner, 2015).
Organizational Policies and Procedures–It is the set of interior guidelines that develop the expectations and rules of the organization.
Performance Management System–It is the management tool of a business that aids managers evaluate and monitoring the work of employees.
Performance Monitoring Systems & Processes – These are the processes and systems for setting up the objectives of the organization, monitoring processes and actions utilized to attain these objectives and making ways for all managers for attaining those objectives efficiently.
Personnel – These are the employees or staff members who follow the instructions of the manager usually at the organization.
Policies and Procedures–These are set of guidelines or rules for the employee and organization to specifically follow or to attain compliance.
Problem Solving–It means to form processes that remove or mitigate obstacles that prevent individuals from attaining strategic objectives.
Productivity Plans–These are the innovative plans that individuals develop for boosting their efficiency.
Profit–It is the amount of money the business appeals to after doing activities of accounting for every expense.
Records–These are the documents that accurately record the event, condition or act linked to the business.
Recruitment – It is the process of identifying, screening, on boarding and hiring qualified candidates for the job.
Resource Acquisition (or Talent Acquisition)–This is the process used by employers for interviewing, tracking and recruiting job candidates and then training and on boarding them.
Resources–These are the type of supply that could be strained by the organization or individual for executing and functioning all projects and plans.
SMART Goals–It stands for Specific, Measurable, Achievable, Relevant and Time-Bound.
Strategy–It is the accurate set of objectives, actions and plans that reflects how the organization will specifically compete in the specific market with the service or product.
Strategic Plan – It defines the individual according to their business and then mentions all concrete and relevant actions to obtain the objectives.
Supervision–It is the procedure that includes the manager interacting daily with the employees for reviewing the performance of work.
Suppliers–It is the entity of a business or individual that sells products.
Systems–It is the group of inter-reliant tasks or components that meet the objectives of the business.
Targets–It is defined as to purpose at someone or something specific.
Work Teams–It is the group of workers that effectively work jointly on the task (Reason & Hobbs, 2017).

Question 2
Five elements that must be included in the operational plan are given below:
1. Budget
2. Milestones and timelines
3. Evidence of research
4. Objectives and goals
5. Chain of value

Question 3
Four benefits of workplace consultation are given below:
1. Greater commitment to work
2. Openness and respect among employers and employees
3. It gets a healthier environment for working
4. It gives opportunities to learn(Reason & Hobbs, 2017).

Question 4
These are the computable measure of work performance over a period for a particular goal. These are important in the process of operational planning as they give objective and measurable standards through which leaders of business could track development and execute change.

Question 5
The purpose of the contingency plan of business is to accurately maintain continuity of business after and during the troublemaking incident.

Question 6
Four possible options of risk treatment in the contingency plan are given below:
1. Avoidance
2. Reduction
3. Transfer
4. Acceptance

Question 7
Two alternative approaches are given below:
1. Define strategic goals
2. Define effectiveness (Wong & Hernandez, 2012).

Question 8
SMART goals are:
1. Specific
2. Measurable
3. Attainable
4. Relevant
5. Time-bound

Question 9
Five types of internal channels of communication are given below:
1. Intranet
2. Emails
3. Internal podcasts
4. Software for video conferencing
5. Software of private messaging(Wong & Hernandez, 2012).

Question 10
Advantages of Internal Recruitment:
1. Decrease time for hiring
2. Shorten times of on boarding
Disadvantages of Internal Recruitment:
1. Create anger among managers and employees
2. Restrict the pool of candidates
Advantages of External Recruitment:
1. Enhance diversity
2. Reduce tension among employees
Disadvantages of External Recruitment:
1. Extra training
2. Increment in costs

Question 11
These are the rights provided to individuals over the specific creations of their particular minds.

Question 12
Three methods that can be utilized are given below:
1. Self-assessment
2. 360-degree feedback
3. Management by goals

Question 13
Three external factors are given below:
1. Technological and scientific progress
2. Micro and macroeconomics
3. Competition

Question 14
The types of legislation are given below:
1. The fair labor standards act
2. The occupational health and safety act
3. The consumer product safety act
4. Laws of tax (Martens, 2012).

Question 15
The policies and procedures are given below:
1. Accurately define the ultimate objective or vision for the plan
2. Review the smaller objectives for resources, team and budget needed for implementing the plan
3. Assign resources, members of the team and budgets
4. Monitor the growth of the plan’

Question 16
Two types of financial reports are given below:
1. Profit and loss statement
2. Balance sheet (Martens, 2012).

Question 17
Five situations are given below:
1. While making changes in business
2. When an organization suffer losses
3. Renovation, relocation or modification of facilities
4. Changes in systems, procedures and policies
5. Reorganization of the business department

Question 18
Four stakeholders are given below:
1. Internal clients
2. Managers
3. Team members of the project
4. Manager of resources

Question 19
Two ways are given below:
1. Consultation on particular venues, projects or developments
2. Enduring consultation for monitoring and tracking perceptions of stakeholders

Question 20
The operational plan should be accepted before being executed as presenting the offer accurately is important to achieve acceptance for the specific plan from the accurate party.

Question 21
Training, coaching and mentoring the new employees should be considered while employing or inducting staff into innovative roles (Kerry & Mayes, 2014).

Question 22
Five-element items are given below:
1. Information about employee
2. Contract of employment
3. Description of position
4. Choice form of superannuation standard
5. Declaration form of Australian tax file number

Question 23
The benefits of coaching and mentoring are given below:
1. Better skills in management
2. Enhanced productivity
3. Maximized confidence

Question 24
An operational plan concerning organizational objectives and goals covers one year and these objectives and goals arrive by analyzing the operations of the business.

Question 25
Four examples are given below:
1. Repair
2. Maintenance
3. Recycling
4. Manufacturing (Kerry & Mayes, 2014).

Establish Operational plan
For the successful operation of any business, it is important to develop plans which will drive direction and support the business in achieving its goal and objectives.
Outline the purpose of the operational plan about “OZeeFOODS”
Purpose is to adopt a policy in which they purchase fruit and vegetables only from Australian farmers.
The next purpose is to market all products under only their brand name “OZeeFOODS”

Resources for this operational plan are given below:
a) Individuals for the business
b) Currency
c) Physical resources
1) Machinery for goods
2) Vehicles for loading the goods
3) Storage rooms for storing foods and vegetables
Financial resources are:
Current financial support is from three investors who invest $2,000,000 in the company.
Capital
Current and past year expenses
Funds
These all resources are important for implementing operational plans.
As an operation manager of the company, I would like to discuss the developing plan with team members and company stakeholders so we take effective decisions on the development of an operational plan.
This consultation will be conducted on 2-6-2022 in the conference room by discussing this plan.
This plan will be approved by “The management committee”. They approve by response mail or by conducting meetings with us for giving their thoughts and approved the plan.
Once the company got approval from the management committee the company transferred mail to team members and inform them about the approval of the plan and now, they can implement the plan in the organization.
The key performance indicator which is needed for the operational plan are given below:
Returns per client
Client’s and retailers’ satisfaction
Revenue growth
Client retention rate
The revenue margins

For measuring progress towards the goal then firstly record and plan what task will be done at what time and with what resources. The company used planner advice as he monitor the progress of every task.
There is a process that identified the progress of goals:
1) first measure the goal
2) How far you have come
3) Identify the distance to achieve the goal
2. Appendix1: Contingency plan template

Contingency Plan
Company name: – “OZeeFOODS”
Name of a person developing the plan: operational manager
Who was consulted as part of this plan?Name/s- Oliver
Position- stakeholder
Riskidentified: It is that process from which a company determines the risk that potentially stops the program. So, the identification of risk is a must In the organization.
Strategies/activitiestominimizetherisk Bywhen Bywhom
The first activity is to find the Risks Risk management team
Then analyses the risk Risk management team
Managing risk Risk management team
Develop and follow a Risk management plan in the workplace Risk management team

Assessment task 2.2- IMPLEMENTATION STRATEGY AND ACTION PLAN
Company needs to recruit 50 staff for a variety of roles. For recruiting them there is the step which is followed by the company are:

Recruiting;
1) Find needs for hiring
2) Proper job description
3) Interviewing
4) Proposal of employment (Harish, & Kumar 2014)

Now for the new staff company develop a training program for them which are given below:
1) Establish each employee’s procedures
2) All managers should use the new signing training agenda
3) On boarding them
4) Trained them on culture not only topic
The communication process develops for employees:(Harish, & Kumar 2014)
Open communication for them
Teamwork
Shared their ideas

Induction t raining is the process in which the company welcomes the employee and shows policies of the company and their role. This process helps the employee to know everything about the organization. The induction process followed by the company is:(Blencowe, et al., 2015)
1) Companies general training program
2) Follow-up induction program
3) Specific Orientation program (Blencowe, et al., 2015)

Physical resources are a touchable item which is used in the operational plan of the business. Physical resources are a must for every organization the physical resources are:
Equipment’s
Building and land
Assets
Facilities in the organization
Materials
Companies’ infrastructure

Now the plan strategies for using physical resources are:
a) Always be sure that your physical resources are efficient
b) Screen the quality of the resources
c) Identify which physical resources are used for what plan
d) now deal with potential momentous

It is very necessary for the implementation of the plan because without resources no one can do work, without resources it is not possible to achieve the organization’s goal. Without resources how could they produce goods and where they store them.

3) Protecting your brand name (“OZeeFOODS”) is also critical therefore we develop some processes to maintain your brand name is (Choong, et al., 2017)
a) Confirm that every person in the company understands the significance of brand identity.
b) Save the messaging reliable
c) Placed the logo of your brand everywhere
d) Always stay active
f) Brands have to familiarize overtime
g) Have target spectators in mind
h) Repurpose your content (Choong, et al., 2017)

4) Policies and procedures followed by fruit and vegetable company are given below:
a) Bring all fruits and vegetables from Australian farmers.
b) Sale all fruits and vegetables in canned
c) Set quality standard
d) Maintain a risk management plan
e) Always clear objective
f) Monitor progress regularly
g) follow rules and regulations by everyone

These policies and procedures are directly related to the operational plan, it is very helpful for an organization to achieve goals.
Appendix2: Action Plan Template

Milestone: Action and/or objective(to achieve operational aims of physical& human resourcing)
Date
Person responsible
Budget & resources
Correct distribution of workforce
(Peykari, et al., 2017)
1-06-2022 Manager of company $5000
Manpower is Resource
Monitoring process 2-06-2022 Senior manager $4000
Monitor employees by monitoring the system
Provide training sessions 4-06-2022 Trainer $5000
By online and face to face training
Maintain teamwork 7-06-2022 Team leader $4000
Develop Trust
Control overhead cost 9-06-2022 Financial officer $5000
By Implementing a control cost system

Maintain a Risk management plan
(Peykari, et al., 2017)
11-06-2022 Risk management Team $6000
By Risk System
Increasing sale 13-06-2022 Sales executive of firms $4000
By online sale

Budgetary and financial performance:
Past budgetary and financial performance Current Budgetary and financial performance
Focused on profits and expenses Focused on financial and earning area
Not flexible Current budget flexible
More waste financially Control waste financially

Companies’ key performance indicators are: (Rakhshani, et al., 2019)
a) Monitor revenue growth
b) Profit margins
c) Client holding
d) Satisfaction of customer
e) Revenue per client (Rakhshani, et al., 2019)

For monitoring profit and target, the company develops Profit and loss statements and then compares them with the past year’s profit and loss statements, do changes in the finance of the business.
When staff is underperformance then we saw some problems such as:
a) Complaints are increasing from clients and co-workers
b) Deadlines are missing
c) Work completed with poor quality
d) Targets are not achieved

As an operational manager I manage staff underperformance by following some steps:
a) Identify the problem
b) Assess them
c) Conduct meeting
d) Develop an action plan
e) Meeting for studying performance

4) For staff performance as an operational manager I develop a performance management plan from that we know the regular performance of each employee. By monitoring their activity, their interest, and the progress of the project and maintaining reports with the human resource manager by giving them staff, and performance data.

5) Milestone achievements against the target (Yasuhara, et al., 2020)
a) Profitable business
b) Ahead authority
c) Train hard teams (Yasuhara, et al., 2020)

Performance against targets:
a) Improve skill
b) Developed teamwork environment
c) Value of time

6)Monitoring activities Dates Resources
Skill development Within 5 days Log collection
Communication Within 4 days Kernel monitoring
Team-building Within 5 days File capturing
Training Within 7 days Video session

Changes required in the plan are:
a) Change marketing strategy
b) Buy Fruits and vegetables from an Australian farmer
c) Changes in leadership
d) Maintain or change the culture
8) Implementation of documents: By receiving approval from stakeholders implement the plan according to the organizational requirements which are:
1) Clear objectives of the organization
2) Workforce team
3) Maintain quality standards
4) Complete declines
9) Recommendations for operational improvement for “OZeeFOODS” are:
1) Train all employees
2) Order employee
Assessment 2.4
Meeting
Meeting objective: discuss and Identify underperformance or issues they are facing
Meeting Place:
Meeting Date:2-06-2022
Meeting Attendees: Colleagues

Operational manager- Hello everyone, good morning all of you I hope you all are good.
Colleagues- good morning, sir
Operational manager- This meeting is conducted for informing you that the operational plan was first implemented one month ago and the problems are arising.
Colleagues- ok sir
Operational manager- we survey and find a problem that affects our project are:
1) Waste
2) Performance is not monitored regularly
3) Overhead cost is an increase
4) Cash flow is not stable
Colleagues- ok sir, what do we do now.
Operational manager- This meeting is conducted for informing you that this problem is affecting our company’s growth. Now you are getting my point, identify a solution and implement them.
Colleagues- ok sir
The company develops a Support plan for individuals and the team: (Kitchener, et al., 2018)
All team leader leads their team effectively
Solving their problems fast
Monitor their performance and tell them their mistakes
Maintain overhead costs and reduce them
Maintain stable cash flow(Kitchener, et al., 2018)

Continuous improvement policy that is implemented by the fruit and vegetable company:
1) Firstly, identify problems
2) Develop improvement policies for that
3) Improve time management
4) Relational communication
5) Battles resolution
The monitoring process which is used by the company is the Report management mechanism
4) Email
To – stakeholder
Subject – A policy document
Date- 2-06-2022
Respected sir
This email is written to inform you about the continuous policies document which is developed by me for improving the performance so that we increase our sales this year and improve the employee performance. In these policies, we improve time management, communication, conflict resolutions,and all.
The operational plan involved:
Purpose
Financial and physical resources
Communication policies
Growing strategy
I hope I explain my point in Infront of you, if there is a mistake let us know. Give us the approval to implement them.
Thank you
Regards
Operational manager

 

 

References
Blencowe, N. S., Van Hamel, C., Bethune, R., & Aspinall, R. (2015). ‘From scared to prepared’: targeted structured induction training during the transition from medical school to foundation doctor. Perspectives on medical education, 4(2), 90-92.
Carliner, S. (2015). Training design basics. Association for Talent Development.
Choong, P., Hutton, E., Richardson, P. S., & Rinaldo, V. (2017). Protecting the brand: Evaluating the cost of a security breach from a marketer’s perspective. Journal of Marketing Development and Competitiveness, 11(1), 59.
Harish, V. S. K. V., & Kumar, A. (2014, February). Planning and implementation strategy of Demand Side Management in India. In 2014 First International Conference on Automation, Control, Energy and Systems (ACES) (pp. 1-6). IEEE
Kerry, T., & Mayes, A. S. (2014). Issues in mentoring. Routledge.
Kitchener, F., Young, R., Ahmed, M., Yang, G., Gaweesh, S., Gopalakrishna, D., … & Hsu, E. (2018). Connected Vehicle Pilot Deployment Program Phase 2, Performance Measurement and Evaluation Support Plan-ICF/Wyoming (No. FHWA-JPO-16-290). United States. Department of Transportation. Intelligent Transportation Systems Joint Program Office.
Martens, R. (2012). Successful coaching. Human Kinetics.
Peykari, N., Hashemi, H., Dinarvand, R., Haji-Aghajani, M., Malekzadeh, R., Sadrolsadat, A., … & Larijani, B. (2017). National action plan for non-communicable diseases prevention and control in Iran; a response to the emerging epidemic. Journal of Diabetes & Metabolic Disorders, 16(1), 1-7..
Rakhshani, E., Gusain, D., Sewdien, V., Torres, J. L. R., & Van Der Meijden, M. A. (2019). A key performance indicator to assess the frequency stability of wind generation dominated power system. IEEE Access, 7, 130957-130969.
Reason, J., & Hobbs, A. (2017). Managing maintenance error: a practical guide. CRC Press.
Wong, K. V., & Hernandez, A. (2012). A review of additive manufacturing. International scholarly research notices, 2012.
Yasuhara, T., Kawauchi, S., Kin, K., Morimoto, J., Kameda, M., Sasaki, T., … & Date, I. (2020). Cell therapy for central nervous system disorders: current obstacles to progress. CNS Neuroscience & Therapeutics, 26(6), 595-602.

 

 

Question 1
A rite of the passage can be considered as the ceremony which does mark the individual
transition from being one part of life to another. This is the ceremonial event which does exist
to the societies which are historical known and which can mark the passage from being on
social status to another religious status all over the world it gives great attention to the general
types of rites that do explain the purpose from people’s perspectives which do observe the
rites and do discuss the cultural, social and psychological significance gets seen by the
scholars for having the human behavior understanding (Haimon, 2018).
According to the saying of Dan Milliman, Positive change can jump to the energy of high
level and awareness and it can involve the rite of passage.
We should go through a time of hardship, or introduction, every time we rise to a greater rung
on the ladder of self-development. Quota; Birth for a child, becoming a wife for a woman,
graduation parties, and retirement plans are all instances of initiation rites. As a result, we
might argue that passing throughout every phase of life is a rite of passage. The majority of
rites of passage are religious or cultural. They serve to promote the prevalent cultural and
religious norms.

Question 2
There can be a good example for the rite of passage is about turning to the adulthood
According to me, a school graduation ceremony is considered as the rite of passage that I
have experienced first-hand. This was the formal ceremony according to me.
I have received the formal invitation card which has been received by the school one week
before the event. The invitation card has been accompanied by the letter which contained the
rules of the conduct and chart of the event happening. We have been permitted for arriving at
the venue at least 1 hour before the event starts. We were informed to wear formal attire. This
event has been started at 10 am having silent prayer. The director, vice-principal, principal,
and the class teachers were present there at the event. They have been given formal speeches
which outline the growth academically and the expectations of all of us. Representatives of
our class have shared their experience in school on behalf of students. Parent teachers’
association members have delivered the speech on parents’ behalf. Then formal felicitation ceremony has been conducted in which all students’ names have been called out and we have
been lined there for receiving. Then after that entire batch photograph with the teachers has
been taken. After completion of the ceremony, the teacher has given the vote of thanks and
then ends the ceremony (Forth, 2018).

Question 3
This individual does go by the transition from the teenager to the adult. It is considered that
going to adulthood having means going to the other part of life. In this reflection to the
definition 1 is considered as Rite if the passage can be the ceremony which can mark the
individual transition from one step of the life to the other step of the life and being turned to
the adult can be the example of the rites of the passage. Being an adult can make the person
mature emotionally and physically as gets done by puberty. Challenges that get met by adults
besides the things people have been expecting from the adult can help in growing as a person.
This has been said by Dan Millman in the ascending for the higher rung on the personal
evolution ladder. As a person goes by so many different steps of life and by this there is more
experience and knowledge get experienced which can help in better physical, emotional and
mental person (Glozah & Lawani, 2014).

Question 4
As there are some generally recognized rites of the passage can be cultural and religious. It is
really important as it can reinforce cultural values and religious views. Rites of passage can
give can mark the individual transition from one step of life to the other step of life. This does
describe the expectations of society for the individual on a particular step of life. Rite of
passage can give someone a sense of belonging and identity. This can be seen in the societies
as different children can socialize and group with children and new roles approval. As an
example, a person can take participate in the election when the person gets reached the legal
age. Giving birth can indicate that wife and husband can become the father and mother. As
the native American societies can celebrate the first menses of the girl. For example, girls’
parents among Luiseno and southern California Indians can announce to the community that
their daughters of them have started menstruating and becoming women. Girls have been
buried partly in the heated sand. They have not been permitted for scratching and eating the
slat and they have been provided instruction by the older women about changes related to the
psychology which has been occurred and how wives and women can behave. For the North American girls, announcements of the public which has begun menstruating can be
considered as humiliating. This is the matter of the family and personal pride in the Native
American cultures. As boys do not experience clear markers of the psychology of the
transition to adulthood menstruation and the rites of the passage to the culture’s new status
can be more severe than the girls. Rite of the passage is really important in societies as before
history has been recorded. The Rite of the passage can indicate womanhood and manhood. In
so many religions all over the world could be determined by the rite of the passage that how
close we are to god and what is the social status in the religious community (Van Gennep,
2013).

References
Forth, G. (2018). Rites of Passage. The International Encyclopedia of Anthropology, 1-7.
Glozah, F. N., & Lawani, S. (2014). Social change and adolescent rites of passage: A cross
cultural perspective. Journal of Human Sciences, 11(1), 1188-1197.
Haimson, O. (2018). Social media as social transition machinery. Proceedings of the ACM on
Human-Computer Interaction, 2(CSCW), 1-21.
Van Gennep, A. (2013). The rites of passage. Routledge.

Abstract— Due to the constant worldwide technical progress and the various opportunities for computer usage, data encryption has now become a serious concern in recent years. Cyber dangers are increasing at a rapid pace, coinciding with the increased usage of cell phones and laptops worldwide. This paper examines the condition of the cyber security new threats ecosystem by reviewing related works available in the literature during 2011 and 2013 by customers and professionals in the information technology (IT) sector. Diverse types of cyber developing dangers have been discovered, including harmful occurrences, system occurrences, and networked abuse, with the focus on the virus, Spyware, Spam, and internal abuse, to name a few. It has already been determined that while these Cybercriminals’ instruments exhibit a similar degree of complexity and development as phone and computer software solutions advance. Although the currently offered mitigation strategies have been found to be satisfactory, cybercriminals are emerging new means to evade security mechanisms. It is also probable that as knowledge progresses, a development of cyber dangers must emerge as a result. As a result, a few managements and IT governments’ strategic strategies for fighting cyber risks were proposed.

⦁ Introduction (Heading 1)
The amid growing concerns about cybercrime nowadays has had a significant impact on the perceived benefit of information technology.
This is a significant threat to the online world’s security. Cyber security is described as “a set of technologies, practiced via a synchronized set of movements, meant to protect networking, computer, software application software, and information from just an attack, destruction, or unauthorized access”.
Cyber Emergent Threats include malicious attacks, sophisticated persistent vulnerabilities, and network abuse, according to researchers. Any effort to utilize another person’s computer to infect the version of windows via viruses, Trojan horses, malware, or other malicious programs is considered malevolent conduct. Network attacks are acts that aim to impair or interrupt a system database structure information flow on a Managed Security service account, with effects such as Denial of Service (Dos), Session Hijacking, Identity Fraud, and many others. Spam, scamming, computer viruses, and others known as network abuse may all be used to take advantage of the point of interaction on a net. Computer security is typically thought of as being illicit online activities. Because of the rapid advancement of these forms of cyber-attacks, a report from the International Telecommunications Union (ITU) found that around $1 trillion was lost to Computer crimes frauds internationally in 2012, with $390 billion being unaccounted for internationally. The first part of this study will include a thorough evaluation of the science on the increasing development and disingenuousness of computer security possible attacks, which pose specific challenges to both information assets and congress cyber security operations. The evaluation will critically examine the existing condition and future prediction of information technology, as well as the existence of an online danger panorama in public administration.

Classification of Techniques

Professionals within cyber security are continuously shielding processor systems contrary to numerous procedures of cyberattacks. Each day, cyber assaults board companies and private networks, and various kinds of assaults are quickly expanding. “There are many 2 kinds of internet organizations,” told the paper Cisco CEO John Chambers, “those who’ve gotten attacked covers the entire that haven’t yet realized they were attacked.”
Cyber assaults take a change of inspiration. Cash is one of them. Cybercriminals’ whitethorn knocks a show is as well as entitlement money to reenergize it. Ransomware, a sort of cyberattack which strains currency to reinstate amenities, is much additional classy always than before [12].
Consumers, including companies, were susceptible to cyber assaults, frequently as they except confidential info on private cellular telephones besides utilizing unsecure data services.
There are 7 types of cyber security threats which are as follows:
1) Malware
2) Emoted
3) Denial of Service
4) Man in the Middle
5) Phishing
6) SQL Injection
7) Password Attacks

1. Malware
This is a malicious software which is known as Ransomware, worms, viruses and also extra like Spyware and it is activated himself whenever someone tries to clicking on the link as well as trying to clicking on any attachment that helping in installing of various software which is not good for the system. Reports of Cisco provide malware whenever it activated could:
This will install the harmful software
The components network is blocked permanently [12].
The system will become inoperable due to the disruption of individual parts.

2. Emoted
This is an Emoted which is basically designed for the malware of the banking as well trying to attempt of the sneaking of computers as well as the sensitivity of the information which is private and also its late versions is basically including of software in the appropriate manner of spamming and also delivery of malware services and as well as banking towards the Trojans.

3. Denial of service
A denial-of-service (Do’s) reaction is a form of cyber-attack that prevents people from accessing computers equipment, organizations, businesses, or any other information technology (IT) infrastructure. Within those kinds of cyber assaults, their attackers generally flood application servers, platforms, or networking using information, overloading the victim’s capabilities thus finding it tough or dangerous for others to utilize these [11].

4. Man in the Middle
Whenever cybercriminals inject themselves together into the two-party exchange, also called as man-in-the-middle (MITM) assault. As per Cisco, once blocking transmission, attackers could analyze but also take data. Whenever someone guest utilizes any unencrypted Wi-Fi network, MITM attacks are common. Assailants create a barrier between clients as well as the internet, then just use ransomware to download apps and steal data. This type of attack was mainly done by the person who has knowledge of both the parties and with the help of various communication method he tries to communicate between them and create a problem for both of them. This type of attack mainly with the help of conversation and communication methods [10]

5. Phishing
Phishing attacks were using intentionally forged transmission, along with emails, to attempt to persuade the recipient to accept this and follow the procedure therein, like submitting a credit card number. “This same purpose is to acquire user’s credit card and logins and to infect the perpetrator’s laptop with software,” according to Cisco. This attack helps the attacker to earn money or stealing of money from the respective owner of that bank and in this with the help of proper personal information like knowledge of several credit cards, information of the bank as well as knowledge of password help the attacker to easily hack the bank and stealing money from the appropriate bank [11].

6. SQL Injection
This injection is a type of cyber-attack and also results in the proper manner of inserting code that is malicious and the server is using that kind of SQL in it. Whenever it is infected properly, the information is released by the server. The submission of the malicious code could be simple as well as easy it will be entered inside the search box of the website. This is also known as an attack that is common and vendor and also which is used for malicious code for SQL and also for the database information of backend and manipulation for accessing of knowledge and information which is not intentionally is displaying properly [10].

7. Password Attacks
A cyber attacker can gain access to various material only with an appropriate password. Information Insight describes social programming as a ” tactic cyberattacks utilize that depends primarily on human interactions and frequently entails luring people into breaching basic security practices.” Obtaining a credential repository or remembering a passcode are two further sorts of phishing scams .
Some application which is included is as follows:
Brute Force attackers
Injection Attackers
Malware and other attacks
This type of attack using by the hackers for thinking of appropriate password use for application which is important .

 

Challenges of cyber security

1. Ransomware attacks- Ransomware attacks entail trying to gain access to a public cloud and elimination him from using it till a threat has been paid. Attacks of Ransomware are unsafe for exact users, but they’re much more unsafe for organizations that can’t entree the info they need to conduct their everyday activities. In most extortion assaults, though, the hackers refuse to publish the data after a payment has been made, rather than attempting to extract additional money.

 2. IoT attacks- IoT devices can be digital, computing, and motorized devices which can transmit the data to the network [2].

3. Cloud Attacks– In the cloud attacks, it exposes the celebrity’s private photos if this attack has been carried out the enterprise data, then it can pose the threat for the organization and can lead to the collapse

 4. Phishing attacks- These are the social engineering attack types that get used for stealing the user data do include the credit card number, login credentials.

 5. Cryptocurrency and blockchain attacks
Cryptocurrency and blockchain attacks cannot have meant so much for the internet user and technologies do have a huge deal for such business. These attacks on the frameworks can pose challenges in the business’s cyber security
6. Software vulnerabilities- Software are having so many vulnerabilities and some challenges in cyber security and which is the adoption of the digital device can be more than the before [2]

 7. AI and machine learning attacks- AI and machine learning is been proven as beneficial for the development in different sectors. This also has vulnerabilities. This technology could be exploited by the individuals for carrying the cyber threats and can pose threats in the business [1]

 8. BYOD policies- Having has your own devices can pose various challenges in the field of cyber security. If the device has been running the pirated and outdated version of software then this is a good medium for accessing the hackers

9. Insider attacks– So many challenges of cyber security can be external for the business and there are some instances of the inside job. Employees having malicious intent could leak and export the confidential data of individuals and competitors.

10. Outdated hardware– With the software developers do realize the software vulnerabilities risk, this does offer the periodic update.
⦁ Cyber Défense
⦁ Despite their widespread use in the mass press and also in domestic and international organization declarations there have been no uniform meanings for Cyber phrases. They are perceived to signify numerous things by various countries and peoples.
⦁ However, provides the definition and full explanation of the word cyber defense: For corporations, federal agencies, as well as other conceivable systems, cyber defense is indeed a government computer defense system that involves reaction to activities, key infrastructure security, and information security [4]
⦁ Since no hardware or information is affected, cyber defense works to avoid, recognize, and respond to threats or risks in a timely basis. Cyber defense has become more crucial for most firms in securing vital services and data as the number and sophistication of attacks increases.
⦁ People-Centric Security
⦁ People-centric security varies from standard data security because it focuses on humans. PCS aims for a balance of risk reduction with employee adaptation. In this proactive method for data security, individual liberty and confidence take precedence over rigid, preventative security measures. The traditional control structure for data security has become progressively unsustainable in quick intricate scientific, financial, or risk environments. [1]
⦁ PCS is founded on the set of core values as well as personal rights and duties. Workers have special rights, according to PCS’s principle. Others, on the other hand, are tied to particular obligations. Such rights and obligations are predicated on the concept that when a person fails to fulfil their responsibilities or fails to act in a way that sets out the rights from his or her co-workers as well as the company’s current shareholders, that person would face consequences.
⦁ (1) This agreement of rights and duties fosters a sense of collaborative co-dependency amongst workers, leveraging the company’s social value.
⦁ (2) PCS concepts assume that investigative and proactive measures, as well as open preventive controls, will take precedence over the deployment of invasive prophylactic control systems [3]
⦁ (3) PCS advocates for the creation of a trust zone that promotes individual liberty and innovation.
⦁ (4) PCS assumes a transparent, confident business culture, as well as executive resources and expertise.
⦁ (5) The PCS concepts assume that people have the necessary information to comprehend entitlements, obligations, and choices.

Acknowledgment
The causes for the prevalence of various forms of threats have been explained in this article, which has impacted the condition of Cyber security.
The purpose of this study is to examine and assess the current status of cyber security new threats, as well as the best way to prevent cyber system vulnerabilities. The following conclusions may be derived from the current study: governments and major organizations across the globe should really be mindful of the rising threat of cybercrime there in near future. A huge increase in the number of surgical strikes on organizations and big government collaboration has been recorded and predicted in this investigation. This is predicated on the projection that cybercriminals’ strategies will become more intricate and harder to avoid, identify, and handle in the coming years than they are currently.
Companies and government organizations, on the other hand, are now impacted by the main assaults, but the more security is responsive today, the more Cybercriminals are interested in enhancing that vulnerability. From the pertinent research, it was deduced that whatever was in store in 2012 was a quick summary of the risks. Apps and the landscape are shifting to our portable apps. As the use of handheld phones grows, as the number of assaults targeting these devices rises, so will the number of attacks directed at them proportionally. According to the study, the year 2013 was a watershed moment in the cyber threat landscape, with statistically significant developments, but the dynamic race among both center backs and attackers has chosen to continue, and the estimation is that it will help to propagate beyond Southwest England and the United States, starting to affect Eastern Europe, the Arabian Peninsula, and Latin America and the Caribbean.

References

1) [1]V. Rizov, “Information Sharing for Cyber Threats”, Information & Security: An International Journal, vol. 39, no. 1, pp. 43-50, 2018. Available: 10.11610/isij.3904.
2) [2]M. Lehto, “The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies”, International Journal of Cyber Warfare and Terrorism, vol. 3, no. 3, pp. 1-18, 2013. Available: 10.4018/ijcwt.2013070101.
3) [3]H. Hettema, “Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence”, Computers & Security, vol. 109, p. 102396, 2021. Available: 10.1016/j.cose.2021.102396.
4) [4]D. Broeders, “Private active cyber defense and (international) cyber security—pushing the line?”, Journal of Cybersecurity, vol. 7, no. 1, 2021. Available: 10.1093/cybsec/tyab010.
5) [5]P. Håkon Meland and F. Seehusen, “When to Treat Security Risks with Cyber Insurance”, International Journal on Cyber Situational Awareness, vol. 4, no. 1, pp. 39-60, 2018. Available: 10.22619/ijcsa.2018.100119.
6) [7]L. Fichtner, “What kind of cyber security? Theorising cyber security and mapping approaches”, Internet Policy Review, vol. 7, no. 2, 2018. Available: 10.14763/2018.2.788.
7) [8]S. Hopkins and E. Kalaimannan, “Towards establishing a security engineered SCADA framework”, Journal of Cyber Security Technology, vol. 3, no. 1, pp. 47-59, 2019. Available: 10.1080/23742917.2019.1590920.
8) [9]E. Buenrostro, D. Cyrus, T. Le and V. Emamian, “Security of IoT Devices”, Journal of Cyber Security Technology, vol. 2, no. 1, pp. 1-13, 2018. Available: 10.1080/23742917.2018.1474592.
9) [9]”Online Password Guessing Attacks by Using Persuasive Cued Click Points”, International Journal of Science and Research (IJSR), vol. 4, no. 12, pp. 1186-1188, 2015. Available: 10.21275/v4i12.nov152165.
10) [10]A. S.S., “SQL Injection Detection Using Machine Learning”, Revista Gestão Inovação e Tecnologias, vol. 11, no. 3, pp. 300-310, 2021. Available: 10.47059/revistageintec.v11i3.1939.
11) [11]A. Bonguet and M. Bellaiche, “A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing”, Future Internet, vol. 9, no. 3, p. 43, 2017. Available: 10.3390/fi9030043.
12) [12]J. Jang, H. Kang, J. Woo, A. Mohaisen and H. Kim, “Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information”, Digital Investigation, vol. 14, pp. 17-35, 2015. Available: 10.1016/j.diin.2015.06.002.
13)

1)
2)

Section A – Skills Activity
1. The piece of legislation that is selected here is the Fair Work Act 2009. This legislation is
maintained at our workplace and it is one of the most important legislation of Australia which
emphasizes protecting rights including workplace rights, as well as engaging in industrial
activities and being free from unlawful discrimination. The Fair Work Act 2009 also provides
the legal framework for the employer as well as employee relations at the workplace
(Golding, 2021).

2. The next step is to consult with stakeholders – Meeting with stakeholders
The meeting will be conducted on 30-03-2022 and the time of the meeting will be 10:30 AM.
The location decide for the meeting is Conference Hall, and attendees of the meeting will be
HR Manager, Project Manager, Risk Manager, Marketing Manager and all the employees of
the organization, CEO.
Risk Manager – Good Morning Sir and all the staff members of our organization!
CEO – Good Morning, so what we are going to discuss today?
Risk Manager – Today we are going to discuss the most important legislation of our
organization and what are the possible risks that are incurred, how these risks can be
eliminated as well as what are the risk priorities, and risk management strategies.
Marketing Manager – Okay great, so we can start now and discuss in brief.
Risk Manager – yes, so we know that a lot of workplace hazards are incurring at our
workplace so we need to prepare for them and identify the risk management strategies as well
as risk priorities. Also, we need to ensure that all the risk management strategies will be
implemented and communicated all the strategies. Also, I have prepared the work breakdown
structure which will directly show the duration in what time what activities will be conducted
and implemented in the organization.

CEO – Okay great, so you can show what activities are added in the Work Breakdown
Structure?
Risk Manager – The activities include identifying risks, assessing risks, analyzing the risks,
evaluating them, and determining different ways to eliminate the risks.
CEO – Okay and what is the time duration you gave to all these activities?
Risk Manager – For Identifying risks – 2 weeks are required because in that we analyze and
identify what are the risks coming in the organization, 1 week for assessing the risks, 2 weeks
for analyzing the risks, 1 week for evaluating the risks, and 2 weeks to eliminate the risks.
Also, the most important legislation is the Fair Work Act 2009 and which focuses on
implementing fair work strategies at our workplace and ensuring that all the objectives are
achieved fairly. Also, I want to ask whether any legislation you want to add or any of the
suggestions you want to give for the risks that can be beneficial in the organization, and how
can we eliminate those risks.

3. Adhere to organizational policies and procedures
It is essential to identify all the risks that are occurring in the organization for adhering to
organizational policies and procedures as well as making sure that all employees are safe at
the workplace and they are not facing any kind of risks, also if any risks are incurred at the
workplace, then determine that what actions to be taken to reduce the risks and their impact
on the working of operations of the organization(Golding, 2021).
I was a risk manager ensuring that all the risks are identified and taking every possible action
to reduce or eliminate the risks and ensuring that risk management strategies that are
implemented must be properly communicated to all the staff members in the organization.
Also, my responsibilities include inspecting the machinery and all the equipment that is used
at the workplace that whether all the machinery is working properly or not, and providing full
information to all the employees that how their safety will be maintained.
Different Communication methods are used to communicate with all the team members
including meetings will be conducted with all the team members, and training sessions will
be conducted for all the employees where they will be getting training of eliminating the
risks. Also, if any new machinery or technology is introduced at the workplace then they
must get the proper training that how to install and use the technology or machinery without
any risks.
For implementing the method of communication, workers and employees in the organization
are getting aware of all the information, and the method that is very suitable for assessing the risks, risk assessment, and risk management plan will be prepared for ensuring that workers
are safe in the organization, and provide them a safe working environment, and the risks
should not be of any type including financial risks, market risks or no any hazards must be
incurred at the workplace.
For implementing this method, proper information must be communicated and hazards must
be monitored and the risks must be mitigated as well as transferred so that its impact will be
reduced(Rane, et al., 2019).

 

Section B – Knowledge Activity
Question 1
1. Health and Safety:
It Refers to the industrial safety and health hazard is that an individual might be injured and
hurts opposing healthiness disturbs if unprotected to a hazard. Reductions, Mistakes, and
outings are mutual risks at all workplaces.
Dangerous constituents, Asbestos, Physical management, and spiritual health are properties
of health and safety. Occupied from height is one of the main damages including falls from
rooftops and ladders.
2. Human Resources:
It identifies probable operative connected risks to your corporate so you can diminish any
difficulties previously they rise. The several hazards related to human resources as Staff are
not getting spaces arranged by the regulation, some personnel occupied additional than their
decided-upon times, and they are being waged less than their colleagues.
3. Project assumptions:
A project assumption is an effect that we can trust to be accurate for the project at a
workplace. The various types of risks that can assumable as main project staff obtainability,
employee's presentation for the project, exactness of the development agenda times,
salespersons distribution time, and also comprised operate associates' action or knowledge
services (Rane, et al., 2019).
Question 2
The key components of a Risk management plan are:
1. Monitoring the risk – It refers to the frequent assessment of the hazards recognized in the
organization's risk record. It is the procedure of which paths and estimates the stages of
hazard in an association(Jacobson, et al., 2020).

2. Identify the risk – It is the method of influencing the hazard that might evade the database,
creativity, or outlay from accomplishing its purposes.
3. Evaluation of risk – It is the progression that is used to compare the valued hazard against
the specified hazard conditions, therefore, to regulate the implication of the danger.
4. Treatment of risk – The procedure of risk treatment is to execute and choosing of events to
adjust the hazards. Its actions comprise improving and recollecting the hazard.

Question 3
Industry-standard risk framework includes that risk assessment model will apply to the
organization where all the employees will be interacting together so that returns can be
maximized, also the risk management is focusing on institutions' growth and minimize the
incidents, as well as risks, can be reduced(Abdel-Basset, et al., 2019).
The Risk Management framework for the construction industry includes preparing the risk
management process for the construction industry where all the workers and employees are
involved in constructing a building, as well as the building of projects (Abdel-Basset, et al.,
2019).
Conditions that are affecting the construction project are such as –
1. Human resources and depending on their skills and availability,
2. Quality of the supply system
3. Quality and availability of the equipment will also be affecting the construction project
risks.

4. Site layout and the site location are the conditions that must be considered for the project
of construction of the building.
5. Another one is the financial resources of the project including the financial plan, and the
risk assessment model(Keers, et al., 2018).
The Risk Management process includes –
1. Evaluation of risks, and analyzing the probability as well as its implications.
2. Identification of risks that are preventing the organization and staff members from
preventing our objectives.
3. Another one is risk treatment, and determining the positive and negative effects of the
risks.

Question 4
Quantitative and Qualitative risk management techniques and approaches include-
1. Quantitative risk management is focusing on measuring the performance and data by using
quantitative techniques and the data that can be measured must be quantitative data.
2. Qualitative data must be based on subjectivity.
3. Examples of the quantitative risk management analysis technique are interviewing as well
as cost and time estimates, as well as Delphi technique, expert judgment the examples of the
qualitative risk management analysis, includes historical data, risk rating scales, as well as to
conduct the SWOT Analysis and brainstorming session. The qualitative risk analysis
technique can be SWIFT Analysis, Bow-Tie Analysis, Consequence matrix, Probability
matrix (Willumsen, et al., 2019).
4. Sensitivity Analysis, as well as expected monetary value, modeling, and simulation are the
quantitative risk analysis techniques.
Strategies to assess the risks include risk probability as well as determining the possibility of
risks, as well as how it is impacting the project, and what are the project goals, budget
productivity, budget schedule(Willumsen, et al., 2019).

Risk categorization includes risks that will be divided into categories as well as to reduce the
risks, and find all the solutions to the risks and problems that are incurring in the
organization.

 

Section C – Performance Activity
The project that is chosen here is the construction of the building and I am playing a major
role in the organization is Risk Manager Role, and carry the risk analysis for it.
Risk Analysis will be done and they can also be ranked as the high risks, moderate risks as
well as low risks.

Strategies that are taken to minimize the risks for all the workers who are working on the
construction of the project include –
1. Firstly take the consultation from all the employees, and workers for working on the
project and ensure that the schedule of the project must be proper which include all the dates
and deadlines that on which date the project will be completed as well as who has the roles
and responsibilities for completing the project and leads to proper communication between all
the workers and all the managers, contractors, builders, as well as investors who are investing
in the project.
2. The design of the building must be communicated properly so that no errors in the design
of the building occur as well as no omission made in the design of the building (Keers, et al.,
2018).
3. If employees are consulted along with the workers that whether they are willing to work on
the project then they must be using their ideas as well as there will be optimum utilization of
resources, and generating all the ideas as well as maintaining the costs of the organization.
4. Performance of workers will be regulated and monitored daily so that if any changes are
required then workers can make it immediately so that feedback can be communicated to
them, and it leads to organizational growth, and the design of building in which all the
employees and workers are working must be monitored regularly because once the design of
the building is done, major changes cannot be made in it, only a few changes can be made.
Also, monitoring of work and workers can reduce the delay in the project because when
monitoring is made, areas of improvement can be made, and the cost can also be monitored
while monitoring the project and resources(Birkel, et al., 2019).
5. It is very essential to provide training to employees so that their performance can be
improved and they get the information when any new technology is introduced at the
workplace as it will directly inform employees and workers that how this technology will be
implemented and how it will be beneficial to all the employees and workers (Birkel, et al.,
2019).

6. For managing the risks, the risk management plan, and risk assessment model can be
prepared as well as analysis of the environment can be done properly, and it includes the
internal as well as external environment analysis of the project on which all the workers are
working so that if there any issues are coming then they must be realized.
7. Contingency plan must be prepared for every project because it includes all the possible
risks as well as actions that can be taken to reduce those risks and provide training to all the
workers before working on the project so that they can work collaboratively and they can also
identify what are the possible risks that are coming in the project while they are working in
the organization and then they can directly report to their seniors as well as supervisors, and
possible actions can be taken immediately to reduce those risks.
7. Once the risks are identified, their assessment would be done properly, also the ratings and
consequences of the risks will be identified after the type of risk can be determined. Ratings
of the risks can be moderate, high, as well as low risks, and the actions can be taken
accordingly to reduce the risks.
8. After assessing the risks, mitigating of the risk can also be done and for that, the risk
management plan would be prepared as well as contingency plan can be used when there is
an emergency occur in the plan which can help minimize as well as eliminate the risks
(Wressell, et al., 2018).
9. After preparing the plans, they will be communicated to all the team members and workers
by conducting a meeting with them and telling them how this plan would be communicated
and ensure that there is no underutilization of resources, and also ensuring that all the
resources are used wisely, or simply means there is no wastage of resources.
10. After communicating the plans, they will be implemented in the organization, and after
implementing them, monitoring will be done so that deviations are found. Monitoring of
plans is important because it is necessary to find out whether they are successfully
implemented or not(Wressell, et al., 2018).
11. Also, after that monitoring of the site will be done and the next possible risk will be
identified that can be incurred at the workplace, and those risks will be communicated so that
awareness will be done.

12. Risk management strategy will be implemented at the workplace because construction
projects will be avoided at the risk-prone areas because it can harm the lives of workers as it
will directly affect their lives and the people who are living at the place will also be affected.

 

References

Abdel-Basset, M., Gunasekaran, M., Mohamed, M., &Chilamkurti, N. (2019). A framework
for risk assessment, management and evaluation: Economic tool for quantifying risks in
supply chain. Future Generation Computer Systems, 90(1), 489-502.
Birkel, H. S., Veile, J. W., Müller, J. M., Hartmann, E., & Voigt, K. I. (2019). Development
of a risk framework for Industry 4.0 in the context of sustainability for established
manufacturers. Sustainability, 11(2), 384.
Ćulibrk, J., Delić, M., Mitrović, S., &Ćulibrk, D. (2018). Job satisfaction, organizational
commitment and job involvement: The mediating role of job involvement. Frontiers in
psychology, 9, 132.
Golding, G. (2021). Unfair dismissal and the Coronavirus pandemic: Creative responses from
Australia’s Fair Work Commission. Revue de droit comparé du travail et de la
sécuritésociale, (4), 100-115.
Guliyeva, S. (2020). Enterprise risk management strategy. Economic and Social
Development: Book of Proceedings, 3, 704-710.
Jacobson, R. K., & Eaton, A. A. (2018). How organizational policies influence bystander
likelihood of reporting moderate and severe sexual harassment at work. Employee
Responsibilities and Rights Journal, 30(1), 37-62.
Keers, B. B., & van Fenema, P. C. (2018). Managing risks in public-private partnership
formation projects. International Journal of Project Management, 36(6), 861-875.
Pavlov, A., Ivanov, D., Pavlov, D., &Slinko, A. (2019). Optimization of network redundancy
and contingency planning in sustainable and resilient supply chain resource management
under conditions of structural dynamics. Annals of Operations Research, 1-30.
Rane, S. B., Potdar, P. R., & Rane, S. (2019). Development of Project Risk Management
framework based on Industry 4.0 technologies. Benchmarking: An International Journal.

20
Wijethilake, C., & Lama, T. (2019). Sustainability core values and sustainability risk
management: Moderating effects of top management commitment and stakeholder
pressure. Business Strategy and the Environment, 28(1), 143-154.
Willumsen, P., Oehmen, J., Stingl, V., & Geraldi, J. (2019). Value creation through project
risk management. International Journal of Project Management, 37(5), 731-749.
Wressell, J. A., Rasmussen, B., & Driscoll, A. (2018). Exploring the workplace violence risk
profile for remote area nurses and the impact of organisational culture and risk management
strategy. Collegian, 25(6), 601-606.

Active model exercise
Question 1
According to the material requirement plan of the organization describe the production of
item B will be changed from week 3 to week 2 then there is no change in the order releases
for items B, C, and, D (Marchet, et al., 2018). there is no change between these items because
there are no planned order releases from weeks 2 and 3 because there are 0 productions in
both the week in item B and because of this there is no change in items B, C, and D as they
have no relation with each other but they can change the production of item C in the week 2
because they manufacture 400 quantity of this product in the second week but there is 0 level
of the production in the market and the organization has to increase their production in the
company to increase the company sales in the market for the benefits and gaining the profit of
the organization in the market (Marchet, et al., 2018).

Question 2
As based on the on-hand inventory for item C and it is directly increased from the level of 0
to 200 directly this describes the difference in both the production and the manufacturing
level of the goods and the products in the organization. as you can see both of the production
levels of items B and D this is the important thing for the organization (Meunier, et al., 2016).
based on the plan order realizes of the production level of item C is staying on the 0 levels in
the first and this is the lack point in the organization as the first week of the production
company does not focus on the goods of item C. this is will affect the production and the
manufacturing level of item B in the market as on the second week. This is the way the other
item such as B and D production and the manufacturing level in the organization will
decrease automatically.

Question 3
Based on the fixed order quality FOQ of item D increased from 500 to 750 then this will help
the company to increase the production level of the B and C and because they are reducing
the production level of the D this is the reason company will focus on the manufacture of the
goods and the service of the other items in the organization as the item D production reduce
and the company will be focussing on the other item of the organization (Meunier, et al.,
2016). there is a change in the production level of the company of item D at the reducing
level in the manufacture of the 150 items. This is the affection of the other items of the
organization as they are manufacturing them of the flashy flashers organization.

 

Question 4
Based on the table and the records of the company also, the plan order realizes describe there
is the slow manufacture start for the item C in the organization but as they have started late
production of the organization in the item of the company but the item C production will
remain to stay long and till week 6 compares to the manufacturing level of both the products
from the first 1 of the organization (Ogura, et al., 2015). according to the planned order report
and the table if there are changes in the production of item C then there are the chances that
the production level of the other two items B and D will be increased automatically as the
company focus on the manufacture products of the items products. This is the amount of the
level and the changes that happen in the organization as they will reduce the focus on the
manufacture of the product item C and they do produce the item of the B and D these are the
changes that happen in the organization (Ogura, et al., 2015).

 

Assignment 2
Report

Introduction
Flashy flashers are the organization that produces the side lamp lights and the headlights that
are used in the vehicle and this firm produces the automotive electrical components. As this
organization supplies the parts and the types of equipment that will be used in the vehicle and
they are doing their best in the company as they are working in the garage to provide the best
and excellent level of customer service for better and positive feedback from the customer of
the organization. as the organization sales report, this has been very clear and it is mentioned
in the company case study is that there are the two types of products that are known as the
best selling products of the company are known as side lamp and the headlamp.

 

According to the manual of the MRP explosion for the side lamps and the headlamps of the
organization, this has been very clear that the headlamps of the company are the high level of
selling in the market compared to side lamps this table describes the difference between both
the commodities selling in the market and there is the competition between both the products
in the organization (Song, et al., 2015). based on the production level of the company and the
selling price also, the MPS explosion cost of the unit and the unit available in the hand of the
organization describe the difference between both the product demand in the market and the
level of the manufacture is not similar with each other (Song, et al., 2015).

Increase manufacture
Compare to the details of the company manufacture of the goods and the products this has
been very clear that the company has to increase the manufacture of the side lens (SL111P)
more in the organization for the better and increase the sales rate of the organization
(Cornish, et al., 2016). according to the master production schedule and the company has to
start their production from the 1week based on the details and the manufacturing of the goods
and the MPS start date the company is lacking in the manufacturing of the goods in the first
week and the second week of the company. this describes the company lacking point in goods
manufacturing (Cornish, et al., 2016).

Production
The most important thing in the organization as the company has a medium level of
production. The company has to increase their production level in the organization for the
better and the good result in the organization. they have to increase the production level of
the company as they also, develop the new teammates and the worker for the production of
the goods in the organization (Klumpp, 2018). they have to get more materials and raw
materials for the production of the goods and the products of the organization (Klumpp,
2018).

Focus
They have to focus on both the products of the organization which has a high level of demand
in the organization and it is very important for the organization. as the side lamps and the
headlamp has the high level of the demand in the organization as the most of the sales which
have an increase in the week 3 and week 5 also, in week 6 the SL100E has the highest level
of the production and this product has the highest level of the production in the organization.

Recruitment
A flashy flasher has a medium-sized firm that has a total of 900 employees and 125
managerial and administrative personnel. Based on these data and the details the organization
has to increase the recruitment because according to manufacturing goods of the organization
they have to hire more employees and co-workers for the company to get better and the good result with the help of this they will be able to get a better positive result. As the vice
president of the operations and the supply chain of the organization, I have to manage the
supply of the organization as they have to get better and the positive result of the organization
(Bayarçelik, et al., 2020).

Inventory control manager
Inventory control of the organization describes the well maintained and this will explain the
investment records of the organization and the transaction describe the company has what
kind of amount in their on hand at the current period and the balances are credible (Surajit,
2018). The MRP production or the explosion of the organization each week describes and
handles the production and the manufacturing level of the organization of each level. As the
organization receives the investment in the company based on the investor and the investor
control manager of the company that handles and maintains the balance of the production of
the organization. the MRP outputs of the organization are providing the priority and the
capacity reports of the company. they also, handle the order launching capability of the
company (Bayarçelik, et al., 2020).

Conclusion
Based on the report and the details that are mentioned above in the organization describe the
company has to focus on the manufacture and the production of the organization and they
also, have to hire more workers and employees in the organization to increase the production
level of the company and with the help of this company will be able to increase the
production level of the two main products of the organization in week 1 and 2 which is the
most important week for the organization to do production in the market.

 

References
Bayarçelik, E. B., & Bumin Doyduk, H. B. (2020). Digitalization of business logistics
activities and future directions. In Digital Business Strategies in Blockchain Ecosystems (pp.
201-238). Springer, Cham.
Cornish, A., Raubenheimer, D., & McGreevy, P. (2016). What we know about the public’s
level of concern for farm animal welfare in food production in developed
countries. Animals, 6(11), 74.
Klumpp, M. (2018). Automation and artificial intelligence in business logistics systems:
human reactions and collaboration requirements. International Journal of Logistics Research
and Applications, 21(3), 224-242.
Marchet, G., Melacini, M., Perotti, S., Rasini, M., & Tappia, E. (2018). Business logistics
models in omni-channel: a classification framework and empirical analysis. International
Journal of Physical Distribution & Logistics Management.
Meunier, M., Guyard‐Nicodème, M., Dory, D., & Chemaly, M. (2016). Control strategies
against C ampylobacter at the poultry production level: biosecurity measures, feed additives
and vaccination. Journal of applied microbiology, 120(5), 1139-1173.
Ogura, Y., Mondal, S. I., Islam, M. R., Mako, T., Arisawa, K., Katsura, K., … & Hayashi, T.
(2015). The Shiga toxin 2 production level in enterohemorrhagic Escherichia coli O157: H7
is correlated with the subtypes of toxin-encoding phage. Scientific reports, 5(1), 1-11.
Song, Y., Nikoloff, J. M., & Zhan, D. (2015). Improving protein production on the level of
regulation of both expression and secretion pathways in Bacillus subtilis. Journal of
microbiology and biotechnology, 25(7), 963-977.
Surajit, B., & Telukdarie, A. (2018, December). Business logistics optimization using
industry 4.0: current status and opportunities. In 2018 IEEE International Conference on
Industrial Engineering and Engineering Management (IEEM) (pp. 1558-1562). IEEE.

Question 1
A According to the previous report of Fred and based on his medical history as he has
hypertension, hypercholesterolemia, diabetes mellitus, GORD, atrial fibrillation, and a
cholecystectomy. These all are the disease that he had five years ago ("Ponatinib", 2019).
Based on the current situation of Fred and his medical condition as he has weakness in his
left hand and the left side of the body and he was unable to speak properly from that side.
After the discharge from the rehabilitation environment and during the discharge he is still
facing the problem in the left section. Also, he has weakness in his left arm and the vision of
his eyes are blurred is resolved but some type of residual dysphasia is still there in his body.
Based on his medicine as he is taking the highest level of dose of simvastatin 40 mg PO daily
("Iobenguane", 2017).
B According to his medical reports and the medical condition, this has been very clear that he
has issues of the CVA and this is known as the cerebrovascular accident which is known as
the stroke in medical terms. Also, it stops the blood flow from the blood vessels and the
blockage the rupture of a blood vessel. This is also, an important sign to watch out before the
medical condition of the person is went out of the hands of the person ("Iobenguane", 2017).

C According to the pathophysiological perspective, this has been very clear that he is leading to
the stage of the CVA because he has symptoms related to this disease and his medical
condition right now as he discharges from the hospital he still has weakness in the left side of
the arm and this will leads to a high level of the CVA stage in which he has the blockage in
his blood vessel and the blood flow will stop in the one side of the body and because of this,
there might be chances his brain stops working too (Gareeva et al., 2017). Two types of
CVA happen in the human body according to medical science and based on the medical
condition of Fred this has been very clear that he has the symptoms of having ischemic
strokes this stroke cause the blood clot in the blood vessels of the human body and block the
blood flows from the blood vessels to the brain.
Fred has weakness in his left side of the body arm after discharge from the rehabilitation this
means clear that the blood clot in his blood vessels is high and there might be chances that he
has an ischemic stroke in his body (Gareeva et al., 2017).

D According to Fred's condition and his past disease that he had five years ago which include
diabetes and hyperlipidemia, hypertension, and atrial fibrillation. These all are the diseases
that lead towards the CVA ischemic stage that causes the blood clot in the human body and
stops the blood flow in the left side of the body (Indriastuti & Harun, 2020).

Pathogenesis has explained the reason behind the CVA and the causes of CVA in the human
body according to the research this has been very clear that CVA leads to heart failure and
heart attack in the human body this means most of the cases in the CVA is include the person
medical condition or they has asthma because asthma is the disease in which human faces
issues while breathing and they feel pressure on their heart. Also, another reason for having
or leading towards the CVA ischemic stage is because of the microvascular damage in the
diabetic heart that may lead to myocardial injury and damage the blood vessels of the human
body.

Question 2
According to the condition and the health report of Fred explain there are two risk factors
available in Fred's health condition and this explains there are the chances of the risk
appearance from modifiable and non – modifiable. This has been very clear that there is a
risk factor on the second most level in the human body and that is a heart attack or this is the
risk factor of the heart stroke.
Non-modifiable – this risk factor is the cardiovascular disease of risk factors that can not be
changed and this risk factor include the person's past life, family background, and family
history of the disease. In this, the diseases can not be resolved in the human body and heart
stroke increases the amount or the percentage of having a heart attack in the human body
(Indriastuti & Harun, 2020).
Modifiable – the modifiable risk is the risk that happens or occurs and this shows that
hypertension is the commonest modifiable risk factor and this disease will be lead to the
CVA by diabetes mellitus, smoking, and obesity is the disease that leads to this level of the
risk factor (Hontsariuk et al., 2019).

Question 3

The sign and symptoms of the CVA include the changes in the human body and there are the
signs and the symptoms in the human body of having the CVA and the disease that cause the
CVA is the pain in the one portion of the human body and the body parts. The stroke
happened to develop the colt in the blood vessel and these blockages lead to damaging the
brain function of the human body.

A The first symptom of having the CVA is weakness in the human body also, the person feels
numbness and fleeing of their body parts stop working time to time. The person is unable to
move their body parts and they do not feel senses in their body. This is the first sign of having
the CVA in the human body and this will lead to heatstroke in the human. The person having
issues in the moment of the human body and their parts is having an issue at the moment and
while working these are the important things for a person if they having issue in developing
their work process.

B Another sign of having the CVA and implementing the cerebrovascular accident in the
human body is the procedures because the signs describe the person having the symptoms of
CVA and they have started their medical procedures and the medical process to improve the
medical condition and resolve the issue of the medical health (Hontsariuk et al., 2019).
Another symptom of having the medical condition in bad stage or they have facing issues in
walking and talking also, as they see the blur vision in their eyes from the left side and this
will affect on their working and their body stops responding. These are the diseases that can
make a person as a statute and he needs the support to do moment in their body. This will
block the movement in the human and stop the procedures of the blood circulation between
the body and throughout the body from brains to tiptoe. These are the issues that are faced by
humans and the person like Fred having issues in walking and doing other household things
and the work procedures.

C These all are the symptoms and the signs that describe the person having the medical issue
related to CVA or their body having the blood clot and their blood vessel will stop the
processing of the blood in the human body from brain to all parts of the body. CVA is a
disease that leads to the stoppage of brain function and the human body would not be able to get an indication and respond from the brain this will lead to a high level of the disease and the person can get a paralysis attack.

Question 4
A According to the medical prescription, Fred is having the six types of medicines that are
prescribed to him by the doctors because of his health and based on his health condition. As
he has digoxin at the range of the 125 mcg PO daily the reason behind this medicine and
usage of this medicine is to reduce the chance of heart failure and this will help Fred to
improve the blood function into his heart and his heart pumps blood more effectively like
before when he was at his younger age in 20s. this is the importance of this medicine that is
given to him for the better and the healthy development in Fred's health. Also, improve the
health condition of the person this is the reason they prescribe the medicine at the level of
125 mcg at the PO daily (Hontsariuk et al., 2019).

B Another medicine that prescribes him is the simvastatin that belongs and use this medicine to
reduce the cholesterol level in the human body and maintain the cholesterol level in the
human and the reason prescribing the medicine is because more cholesterol in the human
body leads to blockage in the blood vessel of the Fred. The level of this medicine that is
given to Fred is 40 mg and this will maintain the heart and the blood balance in the body and
reduce the risk of heart disease. The cholesterol in the human body builds the fatty substance
that builds in the human body and the blood vessel and this block the way of the blood into
the blood vessels. This is the reason they prescribe this medicine to Fred to reduce the
cholesterol level in his body (Renzitti, 2018).

C Amlodipine medicine is used to treat high blood pressure and hypertension and this prevents
reducing angina this is known as the appear chest pain and heart-burning. The heart pain and
the chest burn leads to high blood pressure and because of this calcium channel will be
broken and which helps to this reduce the pressure of the blood in the human and maintain
the blood pressure level in the human body (Renzitti, 2018).

Question 5

All the medication and the medical history of Fred and his past medical illness are described
clearly that he been having the CVA issue for a very long time because he has such kind of
the disease that indicates to the CVA. this has been very clear as the CVA is such a high issue
and it is important to take care of the person more during this time and have to make things
possible (Madan & Schoutens, 2016). The medical things and the CVA is the disease that
makes the person handicapped and paralyzed if they do not take the person at the right time
and also, they have to change their diet and the supplements to maintain their diabetes,
cholesterol, and blood pressure level in their body. Fred has the issue and the symptoms of
having the CVA of the non-modifiy level because after a week of therapy he is still having
the issue in moving his hand off the left side and he is unable to walk properly (Madan &
Schoutens, 2016).
These are the sign and the indications that define that Fred is going to face a serious issue in
the future and before the situation gets out of control he has to make sure to do the proper
amount of check-ups and start taking precautions on that amount of level to avoid such kind
of unscary things and the unwanted things (Renzitti, 2018). This has been very clear that if
Fred would not take this health issue seriously and if he would not go to the doctor regularly
or take the medicine from time to time then there might be a chance that he may have the
paralysis attack or blockage in the brain and due to this he might get die and get Ill so hard
that he is unable to walk again properly. This is the reason he has to make sure to take the
medicine and he needs to do a proper level of body check to check if there is another way to
reduce the level of their CVA in the body and with the help of surgery or operation the
blockage in his vessels will be open and the blood flows continue in his body (Renzitti, 2018).

 

Refernces
Gareeva, D., Dunaeva, A., Zagidullin, N., Haphyzov, T., & Zagidullin, S. (2017).
P6489Nephroprotective effect of ishemic preconditioning in contrast-induced nephropathy in
patinets with mild chronic kidney failure. European Heart Journal, 38(suppl_1).
https://doi.org/10.1093/eurheartj/ehx493.p6489
Hontsariuk, D., Hristich, T., Teleki, Y., & Olynik, O. (2019). Chronic pancreatitis in
combination with ishemic heart disease: changes in cytokine immune
response. Pancreatology, 19, S136. https://doi.org/10.1016/j.pan.2019.05.370
Indriastuti, M., & Harun, N. (2020). Comparative Pharmacoeconomy and Effectiveness of
Combination Antiplatelet Cost in Patient Ishemic Stroke. Journal Of Physics: Conference
Series, 1477(6), 062004. https://doi.org/10.1088/1742-6596/1477/6/062004
Iobenguane. (2017), 1682(1), 171-171. https://doi.org/10.1007/s40278-017-39802-8
Madan, D., & Schoutens, W. (2016). Conic CVA and DVA. Wilmott, 2016(82), 45-50.
https://doi.org/10.1002/wilm.10490
Ponatinib. (2019), 1758(1), 285-285. https://doi.org/10.1007/s40278-019-63831-1
Renzitti, S. (2018). Accelerating CVA and CVA Sensitivities Using Quasi Monte Carlo
Methods. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3193219
Renzitti, S. (2018). Accelerating CVA and CVA Sensitivities Using Quasi Monte Carlo
Methods. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3193219

Task 1
Email to Trainer

From – Receptionmanagerofthebilliresort@au.in

To – Trainer

Subject – Invitation for meeting to get the feedback on the business letter

Respected sir,
I am writing this mail to inform you that I develop the business letter to provide
information to Mr. Ronald Hayes to provide information related to the price or fare of the
services that Billi resort provide to their customer. I have attached a soft copy of the
business letter with this mail. To get your feedback on the business letter, I want to conduct
a meeting with you. Kindly please permit the meeting.
Kind regards
Reception manager
The Billi resort

Conduct meeting

Date – 15/03/2022
Time – 09:00 am
Duration – 15 min
Agenda – Discussion on the business letter
Attendees – Trainer and reception manager

 

Reception manager – good morning, sir
Trainer – good morning
Reception manager – Sir, I want to take your feedback on the business letter that I created
to provide the price detail to the customer related to services of the Billi resort.
Trainer – You have done a good job. There is no need to make any adjustments to the
business letter. You will provide all the details with the discounted prices and also provide
the images of the services that you provide to the customers If they book the room for 10
or more than 10 days.
Reception manager – ok, sir.
Thank you
Have a nice day

 

Task 2
Email to Trainer

From – Supervisor@au.in

To – Trainer

Subject – Invitation for meeting to get the feedback on the report

Respected sir,
I am writing this mail to inform you that I write the report to provide information related to
the price of the dining table and 10 chairs that given by the supplier in the form of
quotation. I also share my recommendation in the report related to selecting the best
supplier. I have attached a soft copy of the report in the mail. Kindly please review it and
give feedback in the meeting.
Kind regards
Supervisor

Conduct meeting

Date – 18/03/2022
Time – 09:00 am
Duration – 15 min
Agenda – Discussion on the report
Attendees – Trainer and Supervisor
Supervisor – good morning, sir

 

Trainer – good morning
Supervisor – Sir, I want to take your feedback on the report that I created to provide
information related to the price of the required furniture goods that are given by the
different suppliers of Australia.
Trainer – You have done a good job. There is no need to make any adjustments to the
report. You will provide all the details with the discounted prices and also provide the
images of the dining table and quotation of the suppliers.
Supervisor – ok, sir.
Thank you
Have a nice day