Premium Essay

Unit 36 Assignment 3

In: Business and Management

Submitted By LordYapz
Words 2475
Pages 10
Laws and legislations

There are many laws out there that cover near enough everything, so therefore with my business I will need to make sure I abide the laws which cover; health and safety, fire precautions, the environment, employee rights, the building, intellectual property (for example business names, inventions and copyrights), fair trading (consumer credit, consumer protection and competition law), keeping information about people, licences and insurance.
Health and safety is the most important thing within any business, I must make sure everyone within Alcarwash is safe first before we do anything. I am responsible for the effect that Alcarwash may have on the health and safety of your employees and the consumers. I will have to make sure I register with the Health & Safety Executive (HSE) or with my Local Authority, so that they can come to check all aspects of the business and building to make sure that everything is in place and safe to operate around without it causing any damage to anyone around it. With healthy and safety comes thigs such as fire precautions; this is because I will need to make sure all my employees know what they are doing during a fire- so therefore I’ll need to practice drills, for when there is a fire my employees are aware what to do to keep themselves and others out of danger.

Some laws set by HM Revenue & Customs, which I must abide by, are;
Sex Discrimination
The Sex Discrimination Act is a British Act of Parliament which became a law in 1975. Under the Act, people of both sexes have the right to equal opportunities in education and employment, and to be paid the same amount for doing the same work. In direct and direct discrimination are both unlawful in the Sex Discrimination Act. Direct discrimination is when someone is treated differently and not as well as other people because of their sex. Indirection…...

Similar Documents

Premium Essay

Unit 3 Assignment 1

...Short Answer: 1. What two things must you normally specify in a variable declaration? a. variable type b. identifier i. int n; // type - int, identifier - n 2. What value is stored in uninitialized variables? c. is a variable that is declared but is not set to a definite known value before it is used. Algorithm Workbench Review: 3. Write assignment statements that perform the following operations with the variables a, b, and c. d. Adds 2 to a and stores the result in b e. Multiplies b times 4 and stores the result in a f. Divides a by 3.14 and stores the result in b g. Subtracts 8 from b and stores the result in a ii. b = a + 2 iii. a = b * 4 iv. b = a / 3.14 v. a = b - 8 4. Assume the variables result, w, x, y, and z are all Integers, and that w=5, x=4, y=8, and z=2. What value will be stored in result in each of the following statements? h. Set result= x+y i. Set result= z*2 j. Set result=y/x k. Set result=y-z vi. result = x++ - y; vii. Answer -4 viii. result = 4 – 8 = -4 ix. result = ++w + y; x. Answer xi. w = w + 1 = 5 + 1 = 6 xii. result = 6 + 8 = 14 5. Write a pseudo code statement that declares the variable cost so it can hold real numbers. * Declare Real price= 0.00 * Display "the original price." * Input item......

Words: 731 - Pages: 3

Premium Essay

Unit 3 Assignment 1

...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really......

Words: 411 - Pages: 2

Free Essay

Unit 3 Assignment 1

...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not......

Words: 294 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this......

Words: 283 - Pages: 2

Premium Essay

Unit 3: Marketing Assignment

...Unit 3: Marketing Assignment Task 1 "Marketing is the management process responsible for identifying, anticipating and sufficient customer requirements beneficially." http://www.getin2marketing.com/discover/what-is-marketing This means the ideas, the brand, how you communicate, the design, print process, measuring effectiveness, market research and the psychology of consumer behaviour all count as part of the bigger picture of ‘marketing’. It is a process and not just the production of a single piece of promotional material. Secondly, it is all about satisfying customer needs and those companies that anticipate the needs and respond to them first and/or best will win. Thirdly, the marketing department does not have exclusive rights over this process. A good marketer will ensure all departments within a company have input into this process. Lastly this process has to be profitable for the company. The following describes the four P's of marketing: Products are the goods and services that the business provides for sale to your target market. When developing a product they should consider quality, design, features, packaging, customer service and any subsequent after-sales service. It also refers to the variation in a product range e.g. Cadburys has dairy milk Oreo, dairy milk whole nut etc. Place is in regards to distribution, location and methods of getting the product to the customer. This includes the location of your business, shop front, distributors,......

Words: 1136 - Pages: 5

Free Essay

Unit 3 Assignment 1

...Assignment Requirements 1. Look up other database-naming conventions. Is there one that makes the most sense to you? Explain why. 2. Look for Entity Relation Diagrams. What other ways of diagramming entities and relations did you find? Describe any similarities and differences between them. Solutions 1. A naming convention is important when working with databases in order to provide a clear structure and format; especially in team environments. By using these conventions the database can be understood by anyone applying these conventions; thus increasing maintainability. These are not rules but guidelines that can be adapted to any working environment. All names should be in camelcase with the first letter in lower case. Separate name parts by using camel case and NOT underscores or spaces. This provides better readability and you will not have to use quotes when doing SQL statements. Prefixes or namespaces are the ONLY parts of names that should be separated by underscores. This defines a clear separation between names and areas. Do not use numbers in names. This is poor design, indicating divided table structures. Do not use dot (.) separator between names, remember use camel casing. This way you will avoid problems when doing SQL statements as fields are accessed using dot notation. It goes without saying, do not use reserved database words in any name. Always try to use names that make sense and are descriptive of their purpose. Avoid abbreviations whenever......

Words: 625 - Pages: 3

Premium Essay

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Premium Essay

Unit 3 Assignment

...Algorithm Work Bench * Write assignment statements that perform the following operations with the variables a, b, and c. a. Adds 2 to a and stores the result in b b. Multiplies b times 4 and stores the result in a c. Divides a by 3.14 and stores the result in b d. Subtracts 8 from b and stores the result in a Set b = 2 + a Set a = b * 4 Set b = a / 3.14 Set a = b – 8 * Assume the variables result, w, x, y, and z are all integers, and that w = 5, x = 4, y = 8, and z = 2. What value will be stored in result in each of the following statements? a. Set result = x + y b. Set result = z * 2 c. Set result = y / x d. Set result = y – z a. 12 b. 10 c. 2 d. 6 * Write a pseudocode statement that declares the variable cost so it can hold real numbers. Floating-point variable cost. * Write a pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0. Declare total as integer = 0 * Write a pseudocode statement that assigns the value 27 to the variable count. count = 27 * Write a pseudocode statement that assigns the sum of 10 and 14 to the variable total. Declare total as integer = 0 set total = 10 + 14 * Write a pseudocode statement that subtracts the variable downPayment from the variable total and assigns the result to the variable due. Declare downPayment as integer Declare Total as integer Declare due as integer set due = total – downPayment * Write a......

Words: 578 - Pages: 3

Free Essay

Unit 3 Assignment 1

...Craig Roxbury Unit 3 Assignment 1 Erica Lanier Video Summary 1 In video 1.07 the lesson is on ports and connectors. There are three different types of ports, those are serial port, parallel port and game port. The serial port is usually male and have 9 or 25 pins. The parallel port is usually female and has 25 pins. The game ports are female and have 15 pins. All of those ports have been replaced by USB ports. The video also discusses how the modem connects to a phone line and converts digital to analog. It explains there are two types of SCSI narrow and wide SCSI, the narrow SCSI has 50 pins and the wide has 68 pins. Video 1.09 teaches that there are two types of monitors, you have CRT and LCD. CRT stands for cathode ray tube and LCD stands for liquid crystal display. The CRT is similar to an old television and the LCD uses thin film transistors and the back lighting is through polarized panels. Your specifications of a monitor include screen size, contrast ratio, refresh rate, response time, interfacing, dot pitchand pixel pitch. Video 1.11 focuses on types of printers and the types of problems that come with each. There is the Dot Matrix, Ink Jet and the laser printers. Overall the videos covered your computer basics and the parts that make it productive. I could comprehend the objective of the videos but they all covered a plethora of information in a matter of minutes, so I feel there was a lot that I missed. Fortunately what I did not catch in the video......

Words: 322 - Pages: 2

Free Essay

Unit 3 Assignment 6

... the micro cycles change up the weight and rep ranges every week. In week one your rep range will be 12-15 reps. In week two you bump up all the weights and drop reps down to 9-11. Week three adds weight again to each exercise to drop the rep range down to 6-8. And in week four you bump the weight up again to drop reps down to 3-5 per set. Those are the four microcycles that you will repeat. On the fourth week you have completed the first 4-week phase. On the fifth week you drop the weight back down and start all over at 12-15 reps per set. This is the start of Phase 2. But now you will be able to do each rep range with at least 5 and up to 20 pounds more than you could in Phase 1. In the sixth week, or week 2 of Phase 2, you will be back at 9-11 reps per set. In week 7, or week 3 of phase 2, weight will go up again to drop your repa down to 6-8 per set. And in week 8, or week 4 of phase 2, weight will go up to limit reps to 3-5 per set. That completes Phase 2. And in week 9 you start The final phase, phase 3 by dropping back down to 12-15 reps per set and run through the four microcycles again until you are back down at 3-5 reps per set. Of course, in each phase you will be using 5-20 pounds more than you did in phase 2 and 10-40 pounds more than you used in Phase 1. This is how you get stronger... Much stronger, over this 12-week program. The constant increase in weight each week and the recycling of these four phases leads to......

Words: 7070 - Pages: 29

Premium Essay

Unit 3 Assignment

...EC142 Unit 3 Assignment Chapter 4: # 4, 7, 9, 10 4. What effect would a rule stating that university students must lie in university dormitories have on the price elasticity of demand for dormitory space? What impact might this in turn have on room rates? Answer: The effect of the price elasticity of demand would be more inelastic for adding the rule in the university. The room rates impact would increase as students oppose to follow the rules while they are in that University. 7. You are chairperson of a state tax commission responsible for establishing a program to raise new revenue through exercise taxes. Why would elasticity of demand be important to you in determining the products on which the taxes should be levied? Answer: If I were the chairperson of a state tax commission responsible, I would select the products that were price inelastic, because the tax increase will increase the tax revenue. Elasticity of demand would be very important to me considering that “the higher tax on a product that has an elastic demand will bring in less tax revenue.” (Econ pg. 86) In this case, goods and services such as cigarette, liquor and phone service are the helpful to excise taxes because these are the products that have not decrease in demand when an excise tax is levied. 9. Because of a legal settlement over state health care claims, in 1999 the U.S tobacco companies had to raise the average price of a pack of cigarettes from $1.95 to $2.45. The decline price of...

Words: 452 - Pages: 2

Premium Essay

Unit 3 Assignment

...Unit 3 Assignment Greg Phoenix Cleveland State Dr. King August 13, 2000 Unit 3 Assignment The slides I will be discussing are Psychology/Human services. Part 1: Were the individuals professional? Slide one: This slide is a picture of two people who appear to be talking. The one individual is leaning in touching her co-worker on the shoulder. Although her coworker seems distressed, I do not feel it is proper for her to have physical contact. Not everyone will feel that her act of kindness as welcoming. Workers have very different levels of acceptance for physical contact of any kind (Zupek, 2010). Something that seems very innocent to you and I could be offensive to another. Slide two: Shows a client laying on the couch with a tissue in her hand and the counselor is writing something down on paper. This picture is a classic for what people consider to be a normal therapy session. The counselor appears to be professional, but also seems distant. There is no eye contact with the patient, which may come across to the patient as “not listening”. Slide three: Is of a therapist standing in a room writing on something despite the fact they are in a group session. Is this individual professional? It appears she is, although she is distancing herself from the group. I guess it could be decided if we knew the exact situation instead of only seeing a picture of it. She appears to be working where she feels less distracted. I think she would be more professional if she......

Words: 1010 - Pages: 5

Premium Essay

Unit 3. Assignment 1

...Unit 3. Assignment 1. IPv6 Addressing 1. Research the following organizations and explain their involvement with the Internet public IP addresses a. American Registry for Internet Numbers (ARIN) ARIN, a nonprofit member-based organization, supports the operation of the Internet through the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. IP address space allocation, transfer, and record maintenance http://www.arin.net/about_us/overview.html b. Internet Assigned Numbers Authority (IANA) IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. http://www.iana.org/numbers c. Asia-Pacific Network Information Center (APNIC) The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. The Internet number resources include antonymous system numbers as well as IP addresses that assist in clearly......

Words: 577 - Pages: 3

Free Essay

Unit 3 Assignment

...suicide they sent him to the psych ward at the Kansas City hospital. The plaintiff remained at the hospital under their care for over a year; he is now on anti-depressants to maintain a level head. He has outstanding medical bills in the amount of $145,000.00 and will have more to come for the plastic surgery to fix his face. The plastic surgery will cost upwards of $100,000.00. Client wants to sue the doctors and person(s) liable for his injuries for $100 million dollars. DEMAND FOR JURY TRIAL Plaintiff demands a trial by jury. PRAYER FOR RELIEF WHEREFORE, plaintiff requests judgment against defendant as follows: 1. General damages in the sum of $1,000,000.00. 2. Interest on such damages awarded as allowed by law; 3. Costs of suit; and 4. Such other and further relief as the Court may deem just and proper. Dated: June 5, 2012 Jane Doe IL Attorney License # 12345 Law Office of Jane Doe 123 Main Street Chicago, IL 60601 Attorney for Plaintiff...

Words: 692 - Pages: 3