MODULE 1: ACCESS AND USE OF COMMON BUSINESS TOOLS

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:19 PM on 3/16/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

65 Terms

1
New cards

It can be considered as any asset that helps or assists the organization to achieve its stated aims or objectives

Business Tools

2
New cards

Examples of Common Business Tools

  1. Digital Cameras

  2. Mobile Telephones

  3. Pagers

  4. Scanners

  5. Photocopiers

  6. Notebooks

  7. Batteries

  8. Keyboard

  9. Brochures

  10. Information

  11. Knowledge

  12. Manuals

  13. Software

  14. Wiki

  15. Email

3
New cards

Possible Names in Defining a Business Tool

  1. Portable and Attractive Tool

  2. Significant Small Items

  3. Significant Small Tools

4
New cards

This states that the item is portable and probably does not have a fixed location.

Portable and Attractive Tool

5
New cards

It states that they are attractive, meaning they could be a target for theft or excessive use

Portable and Attractive Tool

6
New cards

This is very similar as the items are small so they can be easily lost and they are significant to the business

Significant Small Items

7
New cards

Is a list of all tools that are to be controlled

The Register/Tool Register

8
New cards

Storing the Details

  1. Spreadsheets

  2. Asset Register

  3. Database Software

9
New cards

Electronic format of storing details

Spreadsheets

10
New cards

Paper approach where all the details are recorded in a book

Asset Register

11
New cards

Can be configured to suit the needs of the business

Database Software

12
New cards

Tool Description

  1. Brand

  2. Model

  3. Purchase Date

  4. Supplier

  5. Warranty Expiry Date

  6. Depreciation

  7. Storage Location

  8. Physical Location

  9. Serial Number

  10. Asset Number

  11. Barcodes

  12. Department Associated Equipment

13
New cards

Generally globally unique so that no two serial numbers should be the same and they will identify each item

Serial Number

14
New cards

A number given by the manufacturer

Serial Number

15
New cards
term image

Serial Number

16
New cards

Uniquely identifies the product you or your organization purchased

Asset Number

17
New cards

A number given by the company

Asset Number

18
New cards
term image

Asset Number

19
New cards

An asset number can be represented by a _____ for software

License Number

20
New cards

An asset number can be represented by a _____ for hardware appliance

Service Tag

21
New cards

A method of representing data in a visual, machine-readable form

Barcodes

22
New cards

Represented data by varying the widths and spacings of parallel lines

Barcodes

23
New cards
term image

Barcodes

24
New cards

Basic RFID System

  1. RFID Tag

  2. Antenna

  3. RFID Reader

  4. Computer Database

25
New cards

Uses electromagnetic fields to automatically identify and track tags attached to objects

Radio Frequency Identification Tags

26
New cards

It consists of a tiny radio transponder; a radio receiver and transmitter

Radio Frequency Identification Tags

27
New cards

A radio receiver and transmitter

Radio Transponder

28
New cards
term image

Radio Frequency Identification Tags

29
New cards

Attached to assets to transmits stored data to the antenna

Radio Frequency Identification Tags

30
New cards

Receives the stored data from the tag and transmits that data to an RFID reader

Antenna

31
New cards

Connected to the antenna wirelessly and receives data from the RFID tag

RFID Reader

32
New cards

Data is transmitted into the RFID database where it can be stored and evaluated

Computer Database

33
New cards

Acceptable Usage of Business Tools

  1. Establish rules or policies on tool use

  2. Have controls that restrict use to business purposes

  3. Inform staff of usage rules

  4. Consider out of hours use of the tool

34
New cards

It is often required in an emergency

Software

35
New cards

Serial numbers may also be required and stored separately

Software

36
New cards

Storage material may not suit a new computer

Software

37
New cards

It is very attractive for theft

Software

38
New cards

It means fast - easily updateable

Wiki

39
New cards

Great for internal information

Wiki

40
New cards

It must have access rules

Wiki

41
New cards

It must have content rules

Wiki

42
New cards

It need to set access rules where calls can be made to

Landline

43
New cards

It also set rules on how long for personal access

Landline

44
New cards

Some systems may require training

Landline

45
New cards

Answering the telephone to external people will impact on the business

Landline

46
New cards

It has very similar rules to telephone

E-mail

47
New cards

It may have rules on private use

E-mail

48
New cards

It may have rules on content

E-mail

49
New cards

It may have rules about the presentation of emails

E-mail

50
New cards

Who has the tool?

Tools can be given to STAFF for business use

51
New cards

This determines who can have the tool

Rosters

52
New cards

This ensures the tool is available

Rosters

53
New cards

This resolves conflict should this arise due to more than one person requiring the tool on the same day

Rosters

54
New cards

Must be some level of security in the storage location

Storage

55
New cards

Conflict between easy access and flexibility compared with control and security

Storage

56
New cards

Cost of security and the cost of the tools

Storage

57
New cards

It should consider if the tool has special storage requirements

Storage

58
New cards

Security Tools

  1. Locks

  2. Swipe Card Access

  3. Security Cameras

  4. Passwords

  5. Police Checks

59
New cards

It can specify consideration regarding employment before they commence work

Employment Contracts

60
New cards

It ensures that staff understand importance of issues

Employment Contracts

61
New cards

It identify and advise staff of consequences of breaking the rules

Employment Contracts

62
New cards

Lockable Storage

  1. Standard Keys

  2. Cables with Locks for Laptops

  3. Retina Scans

  4. Voice Prints

  5. Facial Recognition

63
New cards

Lockable Storage for High Security Control

  1. Retina Scans

  2. Voice Prints

  3. Facial Recognition

64
New cards

This is a check on the control procedures

Audit

65
New cards

This is a procedure to check that the tool is there

Stocktakes