Documente Academic
Documente Profesional
Documente Cultură
1
Addis Walcott
Title Page
Year: 2018
Subject: Electronic Document Preparation and Management
Candidate numbers:-
0900860057
0900860073
0900860081
0900860103
0900860154
0900860170
0900860197
0900860219
0900860243
0900860278
0900860308
0900860316
0900860383
Candidate Name:-
BOWEN, KEVIN CASCIUS
CLARKE, OSEI KWADO
CLARKE, SAMUEL
DOWDING, JOSHUA
GIBSON, TARIQUE
HARRY, JOEL ELIJAH
HAYLIGER, RAPHAEL GAVIN
HERMAN, CAREEM NICKOESI
JERVIS, JAMAL
MOORE, SHEMAR LAWRENCE
PRINCE, NAYSHUN
RIDLEY, ROYON ODEL
WALCOTT, ADDIS
Mark Allocation
For
Portfolio
Allotted Marks Marks Gained
Accuracy And Speed
One mark for each of the ten documents typed accurately 10 10
Knowledge and Comprehension
Description of all the components 2 2
Description of at least 50% of the components 1
Title page 1 1
Table of Contents 1 1
Bibliography 1 1
Total 5
Presentation and Use of
Technology
Two-page indented OR blocked style letter 1 1
A circular letter OR form with a tear-off 1 1
Manuscript 1 1
Tabulation 1 1
A notice with an agenda 1 1
Chairman’s agenda or minutes of a meeting 1 1
Invitation with a menu OR Programme 1 1
Flow chart or Organisation Chart 1 1
A lease or Hire Purchases or WILL with endorsement 1 1
A Contract Of employment 1 1
Total 10
TOTAL MARKS 25 25
Addis Walcott
Addis Walcott
Addis Walcott
Table of Contents
Title…………………………………………………………………………………………………………………..……I
Introduction………………………………………………………………………………………………………....II
Acknowledgement……………………………………………………………………………………………..…III
Description of component………………………………………………………………………………..…..IV
Letter……………………………………………………………………………………………………………………1
Task Page………………………………………………………………………………………………………………7
Report…………………………………………………………………………………………………………………..8
Example of report…………………………………………………………………………………………………..9
Task Page……………………………………………………………………………………………………………..26
Committee Documents………………………………………………………………………………………….29
Task Page……………………………………………………………………………………………………………….30
Notice…………………………………………………………………………………………………………………….31
Task page………………………………………………………………………………………………………………32
Minutes………………………………………………………………………………………………………………….33
Display Work…………………………………………………………………………………………………………..34
Task Page………………………………………………………………………………………………………………..35
Organizational Chart………………………………………………………………………………………………..36
Task Page………………………………………………………………………………………………………………..37
Graduation Programme…………………………………………………………………………………………….38
Legal Work……………………………………………………………………………………………………………...39
Task page………………………………………………………………………………………………………………..41
Employment Contract……………………………………………………………………………………………...42
Bibliography……………………………………………………………………………………………………………..53
Addis Walcott
0900860057, 0900860073, 0900860081, 0900860103, 0900860154, 0900860170, 0900860197
0900860219, 0900860243, 0900860278, 0900860308, 0900860316, 0900860383
Title page:
Basic Obligations
i
0900860057, 0900860073, 0900860081, 0900860103, 0900860154, 0900860170, 0900860197
0900860219, 0900860243, 0900860278, 0900860308, 0900860316, 0900860383
Introduction
In this book called Basic Obligations there is a guide on the basic obligations of
this business and a report which is Cyber Crimes there is also an Oraganizational
Chart of a business which show how an organization is structured. While reading
this book you will learn about different obligations in a business
The obligations in this business are basically clear of understanding, in this book
there is a committee document with a notice with agenda and then minutes of a
meeting. Next there is a graduation programme and in the graduation programme
there are different items done by persons . Then there is a Legal document with
an employment contract and then a Will and Testament in the will and testament
it show different decisions made by persons in a business before they die and to
show that agree with these decisions they sign different documents.
In reading this book you will soon be knowledgeable of some basic obligations of
this business and other businesses. This book is very good for persons who are
interested in learning about a business or an organization .
Or email: walcottaddis@yahoo.com
ii
0900860057, 0900860073, 0900860081, 0900860103, 0900860154, 0900860170, 0900860197
0900860219, 0900860243, 0900860278, 0900860308, 0900860316, 0900860383
Acknowledgement
We would like to specially thank those person who would have helped in doing this School Based
Assignment. If it was not for those persons we would not have been guided in the right in doing this
School Based Assignment.
Firsty God who gave us the courage and understanding in doing this School Based Assignment and also
giving us knowledge on how to go about doing this School Based Assignment.
Secondly our parent who provided resources for doing this School Based Assignment.They also guided
us in doing this School Based Assignment during the weekend.
Lastly our teacher who guided us in every step of completing this School Based Assignment.She gave us
the instructions on how to go about doing this School Based Assignment and we did what we was told.
iii
iii
Addis Walcott
Description Of Content
Sba #1:This task was given to us on the 4th March, 2017 and the researcher was able to type a
letter on this day and hwe was given an assignment to research a news paper
editor,publication and address. After we did this we returned to our class room where we
retrieved our letter and we inserted these things to our compiled document . After which we
inserted a task page and a cover page and we closed off our letter and we inserted the
bibliorgraphy. We saved , print and email our letter to the teacher.
Sba#2:On the 24th April, 2017 the researchers retrieved the letter and we continued our sba
where we extracted a report on Cyber Crimes from a website and we placed it into our sba and
we placed the other bibliography into place and we completed the introduction,
acknowledgement and then we restructured the content page. After which we saved print and
emailed to the teacher.
Sba #3:On the 6th May, 2017 the researchers was given the tabular work to do ,where we
opened publisher and typed out information on table and we sreen shotted it and pasted it into
Microsoft Word and cropped it and on the 13th May,2017 we was able to complete our tabular
work in the compiled folder. we saved the sba and we printed and send it to the teacher.
Sba #4&5:On the 15th May,2017 the researchers was given a part of a notice to type and we
edited it the information and typed it in the compiled document and saved ,print and send to
the teacher.On the 20th May,2017 he was given the other parts of the report and we typed the
information given in compiled document and we saved, print and emailed it the teacher.
Sba#6:On the 22nd May,2017 the researchers was given a organization flow chart to create and
we drew shapes and extracted pictures from the internet and drew up the flow chart ,placed in
the bibliorgrphy and we saved ,print and sent to the teacher.
Sba#7:On the 29th May 2017, the researchers was given a graduation program to create on
publisher and we placed in necessary information and we saved, print and send to my teacher.
Sba#8:On the 10th June,2017 the researchers was given a employment contract to type and
have made changes to the contract by placing necessary information into it after which he
saved,emailed and send to the teacher.
Sba#9On the 17th June,2017 the researcher typed our Last Will and Testament . We received
instructions on how to go about doing it and we made edits to it , completed the task and save
and send to the teacher. After which the researcher created a book name and reorganized his
sba and completed , saved and emailed to teacher.
iv
Addis Walcott
Sba#10: On the 29th July, 2017 the researchers typed a letter with a tear off. We was given the
task and we made some changes to it . After which the researchers was given other instructions
and we carried out these tasks, saved, and send to the teacher via email.
Addis Walcott
Addis Walcott
Task Page
A letter on continuation sheet in block style
Addis Walcott
Walcott’s Restaurant
4 Benn Profit Drive, Plaisance Village, East Coast Demerara, Guyana.
Contact: (592) 222-2364/2353
Email:walcottaddis@yahoo.com,www.walcottsrestaurant.com
“Pleasing our customers is what we Do”
Adam Harris
Kaieteur News
24 Saffon Street,
Charlestown,
Georgetown,
Guyana.
Have you ever noticed the amount of tobacco advertising and paraphernalia at
your local convenience store? From posters plastered across the windows, to
clocks on the wall, to sidewalk displays that create a pedestrian obstacle course—
tobacco is everywhere. Not only is the advertising a mind-numbing eyesore, it is
also dangerous and distracting.
While many products are advertised in this manner, it is the cigarette makers who
most often choose this in-your-face method to sell their tobacco products. The
Master Settlement Agreement, reached in1998 with the tobacco giants, does not
go far enough in addressing this problem. [City/Country} should adopt local
zoning ordinances limiting the size and location of advertising for all products.
Suggested guidelines include prohibiting more than 10 percent of storefront
windows to covered by advertising of any kind and prohiting sandwich board
signs.
Addis Walcott
Page#2
Adam Harris
Friday, May 29, 2020
We must address the very problem of Big Tobacco trying to buy our communities
and hook another generation of smokers in the progress. We should contact the
elected officials of [City/Country] and encourage them to tackle this issue—to
limit the advertising that threatens the beauty and safety of our community.
Sincerely,
WALCOTT’S RESTAURANT
____________________
ADDIS WALCOTT
Chef
Addis Walcott
Task Page
Letter with a tear off.
Addis Walcott
Walcott’s Restaurant
4 Benn Profit Drive, Plaisance Village, East Coast Demerara, Guyana.
Contact: (592) 222-2364/2353
Email:walcottaddis@yahoo.com,www.walcottsrestaurant.com
“Pleasing our customers is what we Do”
We are honoured to be chosen to introduce our restaurant’s latest line of services to your
home and community. Best Catering service you can find around town, Well tasted cuisines out
of many restaurants, Best structured recipes and also good customer service.
The latest comments on our cuisines shows that the food made at this restaurant is nothing
compared to other restaurants. Our aim at Walcott’s Restaurant is to provide good customer
service and to provide well tasted food to customers in oreder to get better feedback.As such,
we are inviting you to detach the self-addressed,Post –Paid Reply, tear off portion of this letter
and submit your comments about our different foods within 10 days. Please state the different
ways in which your family feel or think about our cuisines made at this restaurant.Responces
may be in form of an essay or recipe.
Our culinary committee is made up of a group of professionals from the Caribbean’s well
trained chefs, Chef Walcott, Chef James , Chef King, Chef Isaacs and Chef Frank. They will select
the six “best responses” for an award of a week free lunch at our restaurant. The customer who
gives the best response will win the super prize of $2000.
Yours truly
_______________
Addis Walcott
Manager
___________________________________________________________________________
Walcott’s Restaurant
5-6 Benn Profit Drive, Plaisance E.C.D
Mailing station
SOUTH OROPOUCHE
NAME: --------------------------------------------------------------------------- TELEPHONE: ------------------------
ADDRESS:
-------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------
How I feel or think about Walcott’s Restaurant Cuisines and Services.
Addis Walcott
Addis Walcott
Task Page
An example of a report.
Addis Walcott
Addis Walcott
Cyber Crimes
Chunlian Qu
November 17, 2004
Contents
5 References …………………………………………………………………………. 22
Addis Walcott
Cyber Crimes
Cyber crime, also called computer crime, is any illegal behavior directed by means of electronic
operations that targets the security of computer systems and the data processed. It involves a number
of issues ranging from the theft of information from a computer system or network, to the use of a
computer as a tool during committing a crime. As more companies connect their networks to the
Internet, awareness of computer crimes becomes very important.
1 Types of Attacks
In this age of automation and connectivity, almost all organizations are vulnerable to cyber crimes. Here
are the most common targets for cyber crimes:
Business Attacks
Businesses may be the target of their competitors. The worldwide economic competition is becoming
more and more fierce. Industrial espionages have become a growing threat because of the competition
among national economies. Even “friendly” nations in the past have become our economic enemies.
Financial Attacks
Professional criminals may target Banks and other financial organizations for financial gain. These days,
our money may seem to be nothing but bits in a computer, numbers on a screen, and ink on an
occasional bank statement. We tend to depend on more on computer to pay our bills and deposit our
checks electronically. Theft and fraud cases are also increasingly done electronically as well.
Terrorist Attacks
Terrorists may target any organization but especially government and utility company computers. Their
purposes could be to paralyze the government or cause disastrous accidents.
Addis Walcott
Grudge Attacks
Any company can be the target of its own employees or ex-employees. Similarly, universities may be the
target of their students and former students. Their goals are for revenge.
“Fun” Attacks
Any organization can be the target of crackers, sometimes they’re seeking for the intellectual challenge,
and sometimes they are professionals who may do it to ber hired.
2 Types of Offenders
Crackers
Cracker is a person who engages in computer and telecommunications intrusion. Crackers operate in
groups or in individuals. The motivation of a cracker is to access a system or data.
Criminals
There are three major types of criminal behavior: espionage, fraud and abuse. The common motivation
of a criminal is financial gain.
Vandals
Vandals can be roughly divided into two groups: users and strangers. Users are those who are
authorized to use the system they abuse, but they have extended their privileges. Strangers are those
who are not authorized to use the system in any way. A main motivation of vandal is to damage the
system or data files.
Addis Walcott
Cyber crimes can be classified in many ways. You might divide them by who commits them and what
their motivation might be. Or, you might divide these crimes by how they are committed. Here, I have
chosen to divide computer attacks by the types of computer security that ought to prevent them.
1. Physical security is protection of the physical building, computer, related equipment, and media
(e.g., disks and tapes).
2. Personnel security includes preventing computer crimes. That is to protect computer equipment
and data from a variety of different types of people, including employees, vendors, contractors,
professional criminals and others.
3. Communications security is to protect software and data, especially when it passes from one
computer to another computer across a network connection.
4. Operations security is protection of the procedures used to prevent and detect security
breaches, and the development of methods of prevention and detection.
Wiretapping
Wiretapping is Interception of communications signals with the intent to gain access to information
transmitted over communications circuits.
Telephone and network wiring is often not secured as it should be. Intruders can physically damage it
and can pick up the data flowing across the wires. Criminals sometimes use wiretapping methods to
eavesdrop on communications, especially in telephone fraud.
Addis Walcott
Eavesdropping on Emanations
Computer equipment emits electromagnetic impulses. Whenever you strike a computer key, an
electronic impulse is sent into the immediate area. Potential offenders may take advantage of these
electronic emanations by monitoring, intercepting, and decoding them.
Because of the emanation threat, government computers used to store and process classified
information require special physical shielding. It’s a major concern for military and intelligence data.
One example may involve flooding a computer resource with more requests than it can handle. The
attack is initiated by sending excessive demands to the victim’s computers, exceeding the limit that the
victim’s servers can support and making the servers crash. This causes the resource (e.g. a web server)
to crash and cannot provide normal services for authorized users. Another example can be electronic
sabotage involving the actual destruction or disabling of equipment or data.
Physical security can prevent disaster, or at least to minimize the effects of them. Major concerns of
basic physical security:
1. Locks and keys. The first line of defense against intruders is to keep them out of your building or
computer room.
2. Natural disasters, such as fire, flood, lightning, and earthquakes.
3. Environmental threats, such as electricity and heating and air conditioning systems.
If you want examine and validate a physical security program, you can use some types of tests, such as
regular physical security inspections, random checks and penetration tests.
There are two forms of masquerading: physical and electronic. In person, a criminal may use an
authorized user’s identity or access card to get into restricted areas where he can access to computers
and data. Electronically, an unauthorized person will use an authorized user’s logon ID, password
personal identification number, or telephone access code to gain access to a computer or to a particular
set of sensitive data files.
Social Engineering
Social engineering is to gain privileged information about a computer system by skillful lying, usually
over a telephone line.
Some crackers are very good at social engineering, and use it to discover telephone number, account
names, passwords, and other access information of the legitimate users. This is usually done by acting as
an authorized user or administrator, and asking for assistance.
Harassment
Harassment is using computer methods (e.g., email) to slander or bother someone. Sending threatening
email message and slandering people on bulletin board systems and newsgroups are common types.
Addis Walcott
Software Piracy
Software piracy is copying of software without authorization.
People are the biggest threat to computer. There are many types of people who imperil computers and
information, ex. employees, vendors, contractors, professional criminals. It is necessary to develop a
personnel security program according to different people/different threats. Important components of
personnel security are background checks and careful monitoring on the job.
Traffic Analysis
Traffic analysis means collection and analysis of information. An eavesdropper can get desired
information by analysis of message characteristics (e.g., length, frequency, destination).
Sometimes, the attacks on data might not be so obvious. Even data that appears quite ordinary may be
valuable to a foreign or industrial spy. For example, travel itineraries for generals and other dignitaries
help terrorists plan attacks against their victims.
Addis Walcott
Covert Channels
Covert channels mean a communications channel that allows two cooperating processes to transfer
information in a manner that violates the system’s security policy.
A smart insider can hide stolen data in other innocent output. For example, a filename or contents of a
report could be changed slightly to include secret information that is obvious only to someone who is
looking for it.
Trap door is activated in some innocent-appearing manner (e.g., a special “random” key sequence or
transaction in an application at a terminal). Software developers often include trap doors in their code
to enable them to reenter the system and perform certain functions.
Session hijacking
Session hijacking is taking over an authorized user’s terminal session, either physically when the user
leaves his terminal unattended or electronically when the intruder carefully connects to a just-
disconnected communications line.
Tunneling
Tunneling uses one data transfer method to carry data for another method. Tunneling is an often-
legitimate way to transfer data over incompatible networks, but it is illegitimate when it is used to carry
unauthorized data in legitimate data packets.
Addis Walcott
Timing Attacks
Timing attacks mean attacks that take advantage of the timing of computer processes and operations to
get access.
These include the abuse of race conditions and asynchronous attacks. In race conditions, there is a race
between two processes operating on a system; the outcome depends on who wins the race.
Asynchronous attacks are another way of taking advantage of dynamic system activity to get access.
Trojan Horses
Trojan horses are a computer program with an apparently or actually useful function that contains
additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking
process to the detriment of security or integrity.
Trojan horses are a common technique for planting other problems in computers, including viruses,
worms, logic bombs and salami attacks.
A worm is a standalone program that can propagate to other computers via networks. It exists
independently of any other programs. A worm simply replicates itself on one computer and tries to
infect other computers that may be attached to the same network.
There is an important distinction between worms and viruses: a worm operates over a network, but in
order to infect a machine, a virus must be physically copied. They have many similarities, and both can
be introduced into systems via Trojan horses.
The best way to prevent viruses and worms from invading a system are:
Salamis
Salami technique is the process of secretly and repetitively slicing away tiny amounts of money (like the
slices of a salami) in a way that is unlikely to be noticed.
It works on financial data, e.g., taking advantage of the rounding of decimals in bank interest
calculations.
Logic Bombs
Logic bombs are a resident computer program that triggers an unauthorized act when a certain event
(e.g., a date) occurs.
A typical logic bomb tells the computer to execute a set of instructions at a certain date and time or
under certain specified conditions.
As more companies connect their networks to the Internet, communications security is particularly
important. There are many different ways to protect communications:
1. Access control, e.g., the use of good password. It is crucial to enforcing computer security in
networked environments.
2. Cryptographic methods, e.g., encryption of transmitted data.
3. Physical protection and shielding of network cabling.
4. Firewall technology. It can protect internal systems and networks from other networks.
IP Spoofing
IP spoofing is a method of masquerading in which an attacker forges the addresses on data packets sent
over the Internet so they appear to be coming from insider a network in which systems trust each.
How can an operations security program prevent IP spoofing attacks? Two good ways are to require
passwords in all cases and to prevent trust relationships.
Password Sniffing
Password sniffers mean sniffers are programs that monitor all traffic on a network, collecting a certain
number of bytes from the beginning of each session, usually the part where the password is typed
unencrypted on certain common Internet service such as FTP and Telnet.
One-time passwords and encrypted passwords are good ways to keep password sniffing attacks from
compromising systems.
Scanning
Scanning is running a program, often called a war dialer or a demon dialer, that ties a set of sequentially
changing numbers (e.g., telephone numbers or passwords) to determine which ones respond positively;
for example, with telephone number, the program would report those that successfully connect to
modems.
1. Malicious intruders.
2. Spies attempting to access systems for targeted data.
3. Criminals intent on committing fraud.
Addis Walcott
Excess Privileges
Users in a system have excess privileges—more privileges than they ought to have.
In UNIX environments, intruders who manage to get “root” or “superuser” privileges can play havoc
with the system. In mainframe systems, abuse of privileges is sometimes called superzapping.
1. Ways you can increase awareness among potential victims of possible computer crimes.
2. Ways you can keep computer criminals from actually committing a computer crime.
Operations security cannot exist in a vacuum. The only way it can be effective is if it is integrated into an
organization’s physical, personnel, and communications security programs. In fact, operations security is
used to help make those programs more productive.
Addis Walcott
The second step is to repair damage and prevent recurrence. The organization may have to seek help
from outside expertise. In the past, following a serious breach, the government is one choice for an
organization when investigating computer crime. With the number of computer crimes growing each
year, the resources of most governmental agencies have been overburdened. They have insufficient
personnel resources to handle the load and inadequate technical expertise to thoroughly research the
cases. Private companies specializing in the field of network security now offer computer crime and
forensic evidence services. Such specialists must have the specific knowledge base to efficiently and
quickly complete investigations, with a background in recovery and analysis of computer forensics,
formal investigations, and the relevant laws.
Cyber crimes may be subject to the investigation of the NCCS (The FBI’s National Computer Crimes
Squad):
As a general rule, an investigator should not let the attacker know that they are being disconnected or
tracked due to unauthorized access.
At present, the state of global legal protection against cyber crime is weak. There are following
suggestions:
1. Firms should secure their networked information. Laws to enforce property rights work only
when property owners take reasonable steps to protect their property in the first place.
2. Government should assure that their laws apply to cyber crimes. National governments remain
the dominant authority for regulating criminal behavior in most places in the world.
3. Firms, governments, and civil society should work cooperatively to strengthen legal frameworks
for cyber security. To be prosecuted across a border, an act must be a crime in each jurisdiction.
Addis Walcott
5 References
David Icove, Karl Seger, & William Vonstorch. “Computer Crime: A Crimefighter’s Handbook”. O’Reilly &
Associates. 1995.
Computer Crime and Intellectual Property Section (CCIPS) of the Criminal Division of the U.S.
Department of Justice Web Page,
http://www.cybercrime.gov/
http://www.fbi.gov
http://www.asianlaws.org/cyberlaw/library/cc/what_cc.htm
Addis Walcott
Addis Walcott
Task Page
An example of ruled tabulation with main headings and multiple
columnar headings.
Addis Walcott
Addis Walcott
Addis Walcott
Task page
Notice with agenda
Addis Walcott
Walcott’s Restaurant
4 Benn Profit Drive, Plaisance Village, East Coast Demerara, Guyana.
Contact: (592) 222-2364/2353
Email:walcottaddis@yahoo.com,www.walcottsrestaurant.com
“Pleasing our customers is what we Do”
Notice
Notice is hearby given that the second meeting of the Board of Directors will be held at the registered
meeting office of the restaurant at 2:30 pm on Tuesday May30, 2017.
Simon Bolivar
Secretary
Agenda
1. Confirmation of the minutes of the last meeting.
2. Matters arising from the minutes.
3. Financial irregularities of company accountants.
4. Confirmation of the appointment of Auditor.
5. Date of next meeting.
Addis Walcott
Task Page
Minutes of meeting
Addis Walcott
Walcott’s Restaurant
4 Benn Profit Drive, Plaisance Village, East Coast Demerara, Guyana.
Contact: (592) 222-2364/2353
Email:walcottaddis@yahoo.com,www.walcottsrestaurant.com
“Pleasing our customers is what we Do”
Minutes
Of the first meeting of the Board of Director held on Tuesday May 30 th,2017 at
2:30 pm at the Registered office of the restaurant, Meeting Room at the
Restaurant-Top floor of the restaurant.
Present:
Task Page
Organization Flow Chart
Addis Walcott
Walcott Restaurant
Organizational Chart
Addis Walcott
Executive President
Perry Walcott
Rickey Gouviea George Wood Nicholas Roberts
Planning and
Technological Research Mobile services Multimedia Control
and Data Services
Francis Monize Frank Wilson
Becillo Center Sasha Bacchus Mabel Simmons Infastucture
Management
Walqa Center Landline Telephony
Joy Williams
Shawn Walcott
Ganada Center
Operations and
Business Support
Katelyn Bacchus
Audrey Becon
Services and Systems
Engineering 44
Innovation
Strategy
Addis Walcott
Task page
Program for Graduation
45
Addis Walcott
Back
46
Addis Walcott
Front
47
Addis Walcott
48
Addis Walcott
Task Page
Employment contract
49
Addis Walcott
Employment Contract
29th May,2017
Between
Walcott’s Restaurant
And
___________________________________________
50
Addis Walcott
(1) Walcott’s Restaurant whose Registered Office is at 4 Benn Profit Drive, Plaisance, East
Coast Demerara, Guayana (‘’the employer’’) and
(2) Audrey Becon of 12 Church Street, Georgetown, Guyana (‘’the employee’’)
IT IS AGREED that the Employer will employ the Employee and the Employee will work
for the Employer on the following terms and conditions:
1. Receptionist
The Employee may forom time to time be required to carry out such other reasonable duties as
the Employer may decide, without additional remuneration, should this be necessary to meet
the needs of the business.______________________________________________________
51
Addis Walcott
The Employee’s continuos employment, taking into account any service with Employer and with
any previous employer which counts, began on 19thJune,2017.______________________
3. Probationary period
The first Probationery period of employment will be a probationery, during which the
Employee’s performance will be monitored. The probationery period may be extended by the
Employer. During the probationery period this employment may be terminated by either party
giving one week’s notice to the other in writing.______________________________________
4. Payment
Payment is at the rate of £12 per week and is payable weekly in arrears by cheque on
Friday.________________________________________________________________
Hours in excess of 92 per week are classed as overtime. Over time must be authorized in
advance by Time Manager.____________________________________________________
5. Deductions from wages
The Employer shall be entitled to suspend the Employee’s employment without paqy in the
event of the Employment refusing to obey a lawful order including(but not restricted to) those
given to comply with the Employer’s statutory obligations.______________________________
6. Benefits
After the completion of 6 months continous employment, the Employee will be entitled to
Health Insurance, Relocation, Job Resources,Flex time and Vacation Time.__________________
7. Expenses
The Employer will reimburse all reasonable out-of-pocket exspenses incurred by the
Employee during the operation of his/her day to day, subjects to production, within one month
of written evidence of expenditure, where procurable._________________________________
8. Holidays
*If bank and public holidays are given in addition to annual holiday entitlement, include
following.
In addition to bank and public holidays, the Employee’s annual holiday entitlement is 2
days.
9. Absences due to sickness or injury
In the event of incapacity due to sickness of injury the Employee must advise Walq Center
Manager not later than 12:00 pm on the first day of absence. Full reasons must be given at
this time.___________________________________________________________________
If the Employee is absent for seven days or less, he/she shall immediately on returning to
work complete a self-certification form in respect of each day of absence._______________
52
Addis Walcott
If the Employee is dissatisfied with a disciplinary or dismissal decision, he/she should apply to
Ganda Center Manger in writing. For further details of the discipline and dismissal procedure
applicable to this employment, the Employee should refer to Reference Document. This
procedure is not contractual.___________________________________________
12. General
The Employer reserves the right to vary the terms of employment contained in this Agreement.
The Employer will notify the Employee in writing within one month of such variation. This
statement replaces all of the Employee’s previous terms and conditions of employment with
the Employer.__________________________________________________________________
Audrey Becon
Designation
Walcott’s restaurant
Date …………………………………
53
Addis Walcott
Audrey Becon
I.D # 6754389123
DATE …………………………………
Task Page
A will
54
Addis Walcott
OF
Addis Walcott
Article I.
For information purposes, at the time of this will, I am married to Audrey Becon ,
born 17th May 1993. ______________________________________________
Article II.
55
Addis Walcott
I appoint my wife, as Personal Representative of this Will, with full power and
authority to sell transfer and convey any and all property, real or personal, which I
may own at the time of my death, at such time and place and upon such terms and
conditions as my Personal Representative may determine, without necessity of
obtaining a court order. __________________________________________
56
Addis Walcott
Article III.
I direct that all my legally enforceable debts, funeral expences, expences of my last
illness and administrative expences, be paid by my Personal Representative from
the assets of my estate as soon as practicable after my death._________________
I direct that all inheritance, transfer, succession and other death taxes which may
be payable with respect to any property includible as part of my gross estate, shall
be paid from my residuary estate, without any appointment thereof.
_________________________________________________________________
Article IV.
Offering form funeral service, Car (PKK 2567), Insurance(Hand in Hand Trust) ,
Pension, Clothing, Footwear, Eye wear, Other property(Lot 16 Church
Street,Georgetown, Guyana.).
____________________________________________
Article V.
57
Addis Walcott
All reside and reminder of my estate, of every nature and kind, which I may own at
the time of my death, real, person and mixed, tangible, of whatsoever nature and
wheresoever situated, I give, desire and bequeath in equal portions to my children,
proving they survive me.______________________________________________
1. Alex Walcott
All
2. Aliyah Walcott
Children
3. Viera Walcott
4. Audrey Walcott Must
5. Alexis Walcott Receive
6. Shaun Walcott
Property Of Me
7. Christopher Walcott
Article VI.
I wish to have funeral services in Assembly of God Church 14 Middle Walk
Buxton, East Coast Demerara, Guyana. I wish to have Reverend Winston
Beckles to hold my funeral. If he is not available, I wish to have Reverend
Debra Stewart to hold my funeral. The music to be played at the funeral will
be the following: When the roll of call is yonder, Fill me up& over flow, I
give my self away, It’s a beautiful day, You are my all in all, Nobody
Greater, You are God alone, Jesus at the Center of it all,Give me you, I need
you and What a mighty God we Serve.______________________________
Article VII.
58
Addis Walcott
This is the place in my house where Social Security Card Driver’s License,
Bank Statements Credit Card bills, Credit Card, Discount Card
Passport, Visa and Bank Card can be found:
1. In my bedroom at the bottom of my big suit case.
1. Republic Bank
2. Scotia Bank
3. John Fenandes Limited
4. Bounty Supermarket
5. Giftland Mall
________________________
Addis Walcott
Testarix
This instrument was, on the date hereof, signed, published and declared by
Addis Walcott, to be his Last Will and Testament, our presence and in the
presence of each of us and we, at the same time, at his request, in his
presence of each other, have hereunto signed our names and addresses as
attesting witnesses.
59
Addis Walcott
We Kevin Mc Callister, John Gee and Addis Walcott, the Testarix, and the
witnesses, respectively, whose names are signed to the attached and
foregoing instrument, being first duly sworn, do hereby declare to the
indesigned officer that the Testarix signed the instrument as his Last Will
and Testament and that he signed voluntarily and that each of the witnesses,
in the presence of Testarix , at her request, and in the presence of each
other, signed the Will as a witness and that to the best of knowledge of each
witness the Testarix was at that time eighteen or more years of age, of sound
mind and under no constraint or undue influence.
_____________________________
Addis Walcott
Testarix
______________________________
Shaun Walcott
Witness
_______________________________
Peggy Walcott
Witness
Notary to public
State of Guyana
Bibliography
www.tcsstore.org/stages/3_develop/t_letters_advertising.doc
60
Addis Walcott
http://www.cs.umsl.adu/~sanjiv/classes/cs5780/projects/cybercrimes.doc
http://classtalkers.com/sba-tips/edpm-sba-tips-sba-tips/tabulation-with-main-headings/
https://www.slideshare.net/syyam2/noticeagendaminut
http:/www.orgcharting.com/tag/organization-chart/
www.kansaslegalsservices.org/files/Simple%20Will.doc
61
Mark Allocation
By
PROFILE MARKS
ASSIGNMENT ACCURACY KNOWLEDGE PRESENTATION
TOTAL
#1 & & &
10
10 5 25
10 5 10 25
MARKS
GAINED
ACCURACY and SPEED
Allocation Marks
of Marks Gained
Appropriate Margins 1 1
Appropriate Layout 1 1
Alignment 1 1
Line Spacing 1 1
Capitalisation 1 1
Appropriate Font, Size, Style and Colour 1 1
Transposition 1 1
Correct Interpretation of Printer Correction Signs 1 1
Communication of Information in a Logical Manner 1 1
Using Appropriate Grammar
Omitted or Added Words 1 1
10
Total 10
1Page
Assignment #1
Assignment #1
2
Page
PRESENTATION
2
and
USE OF TECHNOLOGY
Allocation Marks
of Marks Gained
Eyes on the copy 2 2
Eyes on copy but with some inconsistencies 1
Eyes consistently off copy 0
Total 10 10
3
Addis Walcott
Introduction……………………………………………………………………………………………………… i
Acknowledgement……………………………………………………………………………………………..ii
Title Page…………………………………………………………………………………………………………….iii
Description Of Component………………………………………………………………………………….iv
Correcting a Manuscript………………………………………………………………………………………1
Specimen page……………………………………………………………………………………………………..2
Corrected Manuscript…………………………………………………………………………………………..3
Conclusion……………………………………………………………………………………………………………v
Bibliography…………………………………………………………………………………………………………vi
Addis Walcott
iv
Addis Walcott
We would like to specially thank those person who would have helped in doing
this School Based Assignment. If it was not for those persons we would not have
been guided in the right in doing this School Based Assignment.
Firsty God who gave us the courage and understanding in doing this School Based
Assignment and also giving us knowledge on how to go about doing this School
Based Assignment.
Lastly my teacher who guided us in every step of completing this School Based
Assignment.She gave us instructions on how to go about doing this School Based
Assignment and we did what we was told.
ii
v
Addis Walcott
iii
6
Addis Walcott
After which the researcher saved the document. Then we opened a new
document and started to type our table of content, the introduction, the
acknowledgement, the corrected manuscript, we placed the specimen page into
the document and did our bibliography our title page and our conclusion.
The reason for doing the task is to obtain 25 marks for our EDPM CSEC
examination in May-June 2018.
2. The researcher then placed the corrected manuscript into the document at
2:38 pm on the 16th September,2017.
iv
7
Addis Walcott
8
Addis Walcott
9
Addis Walcott
10
Addis Walcott
TELEPHONE LINES
Advantages of Digital phone lines
Telephone lines were designed to communicate the human voice. They transmit
data using sound waves or an analog data form. Before computer signals can be
transmitted via the telephone lines must be converted from the digital to an
analog format. This process is called modulation. When the signal reaches the
receiving computer it is converted back from the analog to the digital form. This is
called demodulation.
Two others are: a large volume of data is transmitted more quickly, and the
same line is used for voice, videos and data transmission.
This means an ISDN user can receive telephone calls, transmit faces and surf the
internet at the same TIME , USING THE SAME LINE.
11
Addis Walcott
The researcher is saying in our opinion a manuscript is the easiest way to write
notes in a meeting. The manuscript is used by many person in different meetings.
In doing this assignment the researcher think that doing the manuscript is easier
for many persons when writing notes in seminars and others.
12
Addis Walcott
vi
13
Addis Walcott
Mark Allocation
By
PROFILE MARKS
ACCURACY KNOWLEDGE PRESENTATION
TOTAL
ASSIGNMENT & & &
10
10 5 25
10 5 10 25
MARKS
GAINED
14
Addis Walcott
15
Addis Walcott
Allocation Marks
of Marks Gained
2
Description of all the components 2
PRESENTATION
16
Addis Walcott
and
USE OF TECHNOLOGY
Allocation Marks
of Marks Gained
Open Web Browser 1 1
Open Page of a Known Address 1 1
Use Search Engine 1 1
Compose E-mail 1 1
Edit and Spell Check 1 1
Use Copy Features 1 1
Add Attachment to E-mail 1 1
Use Address Book 1 1
Send and Save Email 1 1
Print Email 1 1
10
17
Addis Walcott
Table Of Content
Introduction…………………………………………………………………………………….i
Acknowledgement……………………………………………………………………………..ii
Description Of Content………………………………………………………………………..iv
Task Page……………………………………………………………………………………………1
Search Engine……………………………………………………………………………………2
Compose Email…………………………………………………………………………………….4
Attach File…………………………………………………………………………………………..5
Sent Email……………………………………………………………………………………………6
Conclusion……………………………………………………………………………………………7
Bibliography……………………………………………………………………………………….8
18
Addis Walcott
Introduction
This assignment is based on the internet and email and the different
procedures that can be used with the internet and email such as:
Opening a search engine, attaching a file, sending emails, and signing
into email. When using the internet many things can be done.
The Internet is the global system of interconnected computer
networks that use the Internet protocol suite to link devices
worldwide. It is a network of networks that consists of private, public,
academic, business, and government networks of local to global scope,
linked by a broad array of electronic, wireless, and optical networking
technologies. The Internet carries a vast range of information resources
and services, such as the inter-linked hypertext documents
and applications of the World Wide Web(WWW), electronic
mail, telephony, and file sharing while Email is a method of exchanging
messages between people using electronics.
19
Addis Walcott
Acknowledgement
We would like to specially thank those person who would have helped in doing
this School Based Assignment. If it was not for those persons we would not have
been guided in the right in doing this School Based Assignment.
Firsty God who gave us the courage and understanding in doing this School Based
Assignment and also giving us knowledge on how to go about doing this School
Based Assignment.
Lastly my teacher who guided me in every step of completing this School Based
Assignment.She gave we instructions on how to go about doing this School Based
Assignment and we did what we was told.
ii
20
Addis Walcott
Title
iii
21
Addis Walcott
Description Of Content
22
Addis Walcott
iv
Task Page
23
Addis Walcott
Search Engine
2
24
Addis Walcott
25
Addis Walcott
Compose Email
26
Addis Walcott
Attach File
27
Addis Walcott
Sent Email
Conclusion
28
Addis Walcott
All in all using the internet is a fast way to get in contact with persons.
Bibliography
29
Addis Walcott
Retrieved from The World Wide Web (www) on the 7 th October, 2017 1:21 pm form the following:
https://www.orlandovacation.com/packages/seaworld-vacation-packages/
30
Addis Walcott
Mark Allocation
By
PROFILE MARKS
ACCURACY KNOWLEDGE PRESENTATION
TOTAL
ASSIGNMENT & & &
10
10 5 25
10 5 10 25
MARKS
GAINED
31
Addis Walcott
Allocation Marks
of Marks Gained
Name of Event 1 1
Theme for Event 1 1
Aim of Event 1 1
Correct Headings for Pictures at Event 1 1
Facts and Details of Pictures 1 1
Correct Spelling Throughout 1 1
Correct Grammar Throughout 1 1
Correct Usage of Words 1 1
Communication of Event in a Logical Manner 1 1
References 1 1
10
Total 10
32
Addis Walcott
Allocation Marks
of Marks Gained
2
Description of all the components 2
PRESENTATION
33
Addis Walcott
and
USE OF TECHNOLOGY
Allocation Marks
of Marks Gained
Create and Open Presentation 1 1
Use Template or Wizard to Create Presentation. 1 1
Adding of Slides 1 1
Inserting of Text and Text-boxes 1 1
Use of toolbar or Menu to Apply Formatting 1 1
Applying Backgrounds 1 1
Navigate Slides using Scrollbar ,Slide Sort , Menu and Key Command 1 1
Rearrange Order of Slides 1 1
Saving Presentation 1 1
Printing slides 1 1
10
Total
34
Addis Walcott
Introduction……………………………………….……….………………………………………………….i
Acknowledgement……………………………………………..………………………………………………ii
Description Of Content…………………………………….………………………………………………..iii
Title……………………………………………………………………………………………………………………1
Aim………………………………………………………..……………………………………………………………2
Theme…………………………………………………………………………………………………………………3
List Of Events/Activities………………………………………………………………………………………..4
Announcement……………………………………………………………………………………………………5
March Pass…………………………………………………………………………………………………………..6
Reference…………………………………………………………………………………………………………13
Conclusion…………………………………………………………………………………………………………iv
Bibliography……………………………………………………………………………………………………..v
35
Addis Walcott
i
36
Addis Walcott
We would like to specially thank those person who would have helped in doing
this School Based Assignment. If it was not for those persons we would not have
been guided in the right in doing this School Based Assignment.
Firsty God who gave us the courage and understanding in doing this School Based
Assignment and also giving me knowledge on how to go about doing this School
Based Assignment.
Lastly my teacher who guided me in every step of completing this School Based
Assignment. She gave us instructions on how to go about doing this School Based
Assignment and we did what we was told.
ii
37
Addis Walcott
1. On the 22nd September, 2017 at 10:00 am the researcher was given the task
to take out pictures of the activities that occurred at The Guyana Education
Trust College Annual Inter House Sport Event and the researcher went
about doing his task and completed it at 4:00pm.
2. On the 25th September, 2017 the researcher then returned to the
classroom setting and he was given the task to create a power point
presentation with the pictures he took and he also was given the task to
create a word document with the Introduction, Acknowledgement,
Description Of Content, Conclusion and a Bibliography and then he saved
the documents.
iii
38
Addis Walcott
39
Addis Walcott
40
Addis Walcott
Slide 1
Inter-House Sports
2017
09:00 am
22 nd September,2017
Guyana National Service
(ground)
Slide 2
Theme
It s N o t H o w Bi g Yo u Ar e Bu t It s H o w
Bi g Yo u Pl a y It . St r i v e Fo r g r e a t n e ss.
Slide 3
A House
41
Addis Walcott
Slide 4
Aim
T h e r e se a r c h e r a i m i s t o f o c u s o n
t h e a t h l e t e s i n A H o u se a b i l i t y t o
c o m pet e w it h t h e o t h er a t h l et es.
Slide 5
Events
M a r c h Pa ss
Sp e e c h Ab o u t M a r c h Pa st
Ph y si c a l D isp l a y
10 0 m M a l e s/ Fe m a l e s (r a c e )
20 0 m M a l e s/Fe m a l e s (r a c e )
40 0 m M a l e s/Fe m a l e s (r a c e )
8 0 0 m M a l e s/ Fe m a l e s (r a c e )
150 0 m M a l e s/ Fe m a l e s (r a c e )
4x 10 0 m M a l e s/ Fe m a l e s (r a c e )
4x 40 0 M a l e s/Fe m a l e s (r a c e )
T u g o F W a r
Slide 6
Events
March Pass
Speech
Physical Display
Races
42
Addis Walcott
Slide 7
Athletes Ability
Bo t h m a l e a n d f e m a l e a t h l e t e s h a d m o r e t h a n
o n e se ssio n s t o p r a c t ic e
T h e a t h l e t e s h a d c o m p e t e d a g a i n st e a c h o t h e r
Al l a t h l e t e s w e r e p l a c e d in su it a b l e r a c e
c a t e g o r i e s t o su i t t h e ir a b il it y
T h e m a r c h pa ss se g m e n t t h e y w e r e t h r e e “3”
p r a c t ic e se ssio n s.
T h e l a st m a r c h pa st p r a c t ic e se ssio n s, su it a b l e
m a r c h e r s w e r e c h o o se t o pa r t ic ipa t e
T h e p h y sic a l d isp l a y a l so h a d t h r e e “3” p r a c t ic e
se ssio n s
T h e l a st se ssio n se v e n “7” su i t a b l e d a n c e r s w e r e
c h o o se t o pa r t ic ipa t e
Slide 8
March Pass
A H o u se m a r c h pa st w a s g r a d e d f o r “99” W h ic h
t h e t e a m b r o u g h t se c o n d 2 n d p l a c e .
A h o u se m a r c h pa ss w a s c o n sist o f 21 m a r c h e r s
T h e y w e r e d r e sse d n r e d a n d w h i t e .
Slide 9
Opening Speech
T h e sp e e c h w a s g iv e n b y a g u e st
H e st a t e d a v a r ie t y o f im p o r t a n t p o i n t s a b o u t
t h e m a r c h pa ss, p h y sic a l d isp l a y a n d t h e r a c e s.
H e is a l so a m e m b e r o f Th e Gu y a n a Ed u c a t i o n
T r u st Co l l e g e Sc h o o l .
43
Addis Walcott
Slide 10
Physical Display
T h e p h y sic a l d isp l a y se g m e n t w a s t h e se c o n d
a c t i v it y d u r i n g t h e sp o r t s
It w a s m a d e u p o f b o t h m a l e a n f e m a l e
pa r t ic i pa n t s
A m ix t u r e o f m u si c w a s p l a y e d t o d e m o n st r a t e
e x e r c ise a n p h y sic a l d isp l a y
10
Slide 11
Races
T h e y w e r e b o t h m a l e a n f e m a l e r a c e s se pa r a t e
T h e y w e r e a l so d if f e r e n t c a t e g o r i e s in r a c e a n
a g es
Bo t h m a l e a n d f e m a l e s pa r t i c i pa t e d a c c o r d in g
t o t h e ir g r o u p i n g s
A pa p e r f o r m a t w a s f o l l o w e d f o r e a c h r a c e
Males Females
11
Slide 12
The Guyana Education Trust
College 2017 Sports (Images)
12
44
Addis Walcott
Slide 13
Reference
T h e Gu y a n a Ed u c a t i o n T r u st Co l l e g e
10 8 Ca r m i c h a e l St r e e t
Cu m m i n g s Bu r g
22n d Se p t e m b e r , 20 17
Gu y a n a N a t io n a l se r v ic e (g r o u n d )
13
45
Addis Walcott
iv
46
Addis Walcott
47