unit 5 key words

?
internal business communication
methods used within a business to communicate with other members of staff. methods such as memos
1 of 30
external business communication
methods of communication used to communicate with customers. methods such as a phone or email
2 of 30
informal communication
takes place outside the recognised communication channels. e.g between a friend
3 of 30
formal communication
take place using the approved channels of communication. beween a manager
4 of 30
confidetniality
mataining personal information private from unauthorised personell
5 of 30
verbal communication
the exchange of information between participants using languange skills
6 of 30
non-verbal communication
is data on individuals opinions tastes and preferences
7 of 30
written communication
methods of communications that use written words such as letter to convey a message
8 of 30
graphic communication
use of picture, charts an graps to convey a message.
9 of 30
spreasheets
used to interpret qualititive information into qualititive information
10 of 30
word processors
used to convey qualititive information in various methods.
11 of 30
database
used to save neccesary information and alllow it to remain private
12 of 30
body language
is a paerson's gestures, pose, movements, and expressions. these help a person to communicate.
13 of 30
communication medium
is the platform used to deliver a communication to its intended reciever
14 of 30
intranets
are internal electronic communication systems linking computers within a single business.
15 of 30
downward communicaton
flows from higher to lower hierarchial levels. they are communications from superiors to subordinates
16 of 30
upwards communication
flow from lower to higher organisatinal levels. they are communications from subordinates to superiors
17 of 30
horizontal communications
flow between employees on the same hierachical level.
18 of 30
Qulitative information
data on individual opinions, tastes and preference
19 of 30
quantitative information
is measurable. it produces data that can be analysed in numerical form.
20 of 30
Data protection act 1998
limit the use of an individuals personal data by businesses and sets out principles for storing the information
21 of 30
data controller
is a person or organisation that stores personal data
22 of 30
data subject
is a person whose data has been collected and stored
23 of 30
information commisioner
is appointed offcial who supervises the enforcement of the data protection act.
24 of 30
copyright, design and parents act 1988
includeds on the ownership and legality of copying and distributing software and manuals
25 of 30
Gantt charts
are a diagrammatic method of scheualing task to complete an activity
26 of 30
work plans
ra elists of tasks that are neccessary in oreder to complete a project
27 of 30
critical path analysis
is a method of schedualing tasks so a project can be completed in the minimum amount of time
28 of 30
computer misuse act 1990
defines crimes arising from inappropriate usage of computers such as hacking, fraud, data misuse and distributition of viruses
29 of 30
health and safety (display screen equipment regulations 1992
was introduced to rpotect employees using computers in their work
30 of 30

Other cards in this set

Card 2

Front

external business communication

Back

methods of communication used to communicate with customers. methods such as a phone or email

Card 3

Front

informal communication

Back

Preview of the front of card 3

Card 4

Front

formal communication

Back

Preview of the front of card 4

Card 5

Front

confidetniality

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Applied Business resources:

See all Applied Business resources »See all unit 5 resources »