The ability to communicate effectively verbally and in writing with internal and external people is vital to the success of any business.
To help you complete this assignment you may wish to usewww. businessball. com
Use the amplification tool also to help.
- Explain the importance of negotiation in a business environment. Think about the reasons for negotiation and how can it benefit your situation within business? What consequences could there be without negotiation? Give me 2 examples where negotiation or lack of negotiation has had an impact on a situation at work
- Sometimes we need to negotiate. Explain the features of different ways to negotiate.
- What are the ‘ components’ of negotiation tactics? Think of how each of these ways to negotiate may have their advantages or uses in negotiating?
2. 1Explain the different types of presentation and their requirements. Think about the different ways you could present information and what reason the information is being communicated.
2. 2Explain how different resources can be used to develop a presentation.
2. 3Explain the different methods of giving a presentation or conveying information. Include what you may use for each of the following.
2. 4Explain the best practice in delivering presentations.(Some of this section you may have answered in unit 9, revisit your work for unit 9 and check. If you feel you have answered this already state this next to the specific criteria).
2. 5Explain how to collect and use feedback on a presentation. Think about this simplistically. What can you do at the end of a presentation to get feedback on whether the information has been effectively delivered?
3. 1Explain the characteristics of bespoke documents. Bespoke documents are documents or materials made specifically for that use, company, or subject / information. Characteristics are things such as; corporate/professional image.
3. 2 Explain the factors to be taken into account in creating and presenting bespoke documents, consider aspects such as image, legislation, Available resources, Ease of use (e. g. is it realistic to get a choir in to demonstrate the meaning of a crescendo)? Quality of resource.
3. 3 / 3. 5 – Explain the legal requirements and procedures for gathering information for bespoke documents. Think here about information you may wish to create, if it contains data and statements then what should you ensue prior to using such information? Do you need to gain approval; explain how you do this?
3. 4 Explain techniques to create bespoke business documents. Explain how you have created some of your documents, show screen shots if you wish to help you describe how you created these.
4. 1 Explain the typical stages of information system development. Think here about any information system you could store information. Think about what you would need to consider if creating or developing an information system. Aspects you need to think about are: Systems may be manual or electronic, access, security, features of the system eg: How is information going to be analysed / retrieved, It’s strengths / weaknesses, how can you check its reliability? Once the system has been developed how will it be handed over to be operational? How will problem solving be executed?
(We suggest you look carefully at the amplification for this section).
4. 2 Analyse the benefits and limitations of different information systems. Here you’re looking to compare and consider differences between a manual and electronic system in terms of Reliability of data, security or loss of data, efficiency / speed, integration of information systems (systems corresponding and feeding information between each other). Reporting of information from the system, ease of amendments, space of information retention and access.
4. 3 Explain legal, security and confidentiality requirements for information systems I a business environment.
What do the following mean Data Protection Act 1998, Freedom of information Act 2000, Copy design and patents Act 1988.
Explain also about security requirements of information systems. This will also include manual use and transportation of information, how could security be breached here and what can be done to reduce or eliminate the risk?
4. 4 Explain how to monitor the use and effectiveness of an information system.
Think logically here. Imagine you created an information system and you want to check it is working as you had intended it to work. How can you collect data on an information system in use? What information would you need to find out so you are able to monitor and evaluate the effectiveness of the system?