Free Essay

Example of Secretary File

In: Other Topics

Submitted By GhiaMortel
Words 314
Pages 2
Trece Martires City College Trece- Indang Road. Brgy. Luciano,
Trece Martires City, Cavite

Attendees:
1. Ms. Eunice Nicole Oli
2. Mr. Aljon Tandog
3. Ms. Venise Palomera
4. Ms. Cielo Mae Ligsa
5. Ms. Virgie Islao
6. Ms. Carla Jane Calimbas
7. Ms. Louisse Lyra Mae Austria
8. Mr. Philip Marco Cabuhat
9. Ms. Princess Jane Espiritu
Of the 18 Officers, nine is absent. They did not make it because to some unavoidable circumstances. II.Time Started:
2:00 p.m.
June 03,2016
III.Agenda:
Projects for upcoming classes.
IV.Call to Order:
Mr. Jameson Pagud preside the meeting at exactly 2:38 p.m.
V.Discussion Proper:
Sir Jameson opened the meeting by intriducing himself. And then he starts to ask what project we plan for upcoming classes. Every one shared their idea. Some suggest that we have to buy electricfan to be able to feel comfortable everytime we use the HRM rooms. Mr. Philip suggest that we have to have our own cleaning materials so that we don’t have to barrow to the utility. Ms. Eunice our President suggest that we have to buy trash bins so that the students will be obliged to put the trash to the trash bins and not to the hall way. Me, as the secretary suggest that we have to have more chairs because some students sit to the high chair, to the floor and some shared to one chair that cause the chair to broke. And then Our Vice President, Kuya Aljon suggest that we have to do first the Brigade for the HRM rooms because the classes would be at June 13,2016 already.
VI.Adjournment:
The meeting ends at 3:24 p.m

Prepared by: Noted by: VENISE M. PALOMERA Mr. JAMESON PAGUD (AHRMS Secretary) (AHRMS Adviser) CIELO MAE LIGSA Ms. RIA ALICE FLORES (AHRMS Asst. Secretary) (Dean of HRM Department)…...

Similar Documents

Free Essay

File

...|system of defenses against | | |system, changing permissions,|that secure? |viruses and other malicious | | |setting up authentication | |applications, or malware. For | | |methods, and configuring the | |example, it prevents hackers | | |Common Criteria Security | |from harming your programs | | |Evaluation features | |through a technique called | | | | |“sandboxing” — restricting what| | | | |actions programs can perform on| | | | |your Mac, what files they can | | | | |access, and what other programs| | | | |they can launch. | |Comments on administration |This operating system |User administration seems easy for a |Administration......

Words: 626 - Pages: 3

Free Essay

File

...institution, organization firm. Ex-Employees. 3. Malware is a evil dangerous software.It is a program that is inserted into a system with the intent of compromising confidentiality, integrity and availability of victims data, application or operating systems. Virus is a program that attach themselves to legitimate programs on victim’s computer, where as a worm is a program that don’t attach themselves to victim’s programs. Virus is spread by email, instant messaging and file transfer etc. Direct propagating worms can jump from one computer to another with out human intervertion on the receiving computers. Because direct propagating is a weakness which allows an attacker to reduce a system's information assurance to his/her work easily. Trogan horse. 4.A program that hides itself by deleting a sys files and tacking on the sys files name by hackers or by virus or worms as a part of its payload. Trogan Horse is a program that which hides system files and shows itself a sys fileby renaming and such files are difficult to find. RAT remote access trogan,gains control on the victim’s computer remotely,like opening closing typing on victims computer. Downloader are small trojan horses that allow large trogan horses after the downloader is installed . Spyware are the Trojan horses that gather information about victim and make it available to the attackers. Cookies can be dangerous at times because they can contain too personal data/ information when exposed......

Words: 1819 - Pages: 8

Premium Essay

The Secretary Chant

...reader to form a solid picture of a woman sitting at her desk performing the daily drudgery of a secretary. She does not see herself as a real woman but a woman whose hair is rubber bands (3), whose breasts are wells of mimeograph ink , (5) and whose feet bear casters (6). The secretary is so entrenched in her job that she describes her head as a badly organized file (8). To furthur describe how badly organized the file of her head is (or her mind) Ms. Piercy reiterates that fact in line 9 and 10 by saying My head is a switchboard / where crossed lines crackle . With the use of two lines both describing the mind and thoughts of the secretary it is successfully conveyed that the secretary really is confused and overburdened by the demands of the job. Further examination of the personification of the secretary as a piece of office equipment is seen in the use of onomatopoeia as a metaphor. Buzz. Click (7) and Zing. Tinkle (14). With the use of these descriptive sounds the machines would traditionally make, the symbolism is more aptly expressed to the reader. Often times the secretary or office assistant are seen as nothing more than robotic extensions completely devoid of human qualities. Press my fingers (11) is an instruction to her boss explaining exactly how she is to provide a function as if she was explaining how to operate any other piece of office equipment. Like any secretary she would have to organize an office and explain to her boss where things were to be......

Words: 742 - Pages: 3

Free Essay

File

...The first thing that most new users shifting from Windows find confusing is navigating the Linux file system. The Linux file system functions differently than the Windows file system. I will compare and contrast the differences of both and takes you through the layout input/output systems of both. In Linux, there is only a single hierarchal directory structure. Everything begins from the root directory which is represented by the symbol /, which then expands into sub-directories. Windows includes various partitions and then directories under those partitions; Linux places all the partitions underneath the root directory by mounting them in specific directories. In contrast, Windows uses the letter C as its root directory. In Windows, various partitions are detected during the boot process and are assigned a drive letter. Under Linux, the system must mount partitions and devices during the boot process; otherwise it will be unaware of its existence. This might not seem very convenient to provide access to your partitions or devices, but it offers greater flexibility. This is known as the unified file system in Linux which offers several advantages over the Windows file system. For example, let's examine the /usr directory. This directory resides off the root directory and contains most of the system executables. With the Linux file system, you can choose to mount it off another partition or even off another machine over a network connection. The underlying system......

Words: 309 - Pages: 2

Free Essay

File

...invading so many aspects of what has traditionally been considered the individual's inviolate personal domain, this book is a God- send in helping us understand what it is we have with the right to privacy, and also in helping us to focus on what is so much at risk. While the word "privacy" appears nowhere in our Constitution, a majority of Americans fervently believe that their right to privacy is a key element which is central to the way they live their public and personal lives, and that it is also key to the viability of the democratic system. Given the fact that it is a somewhat abstract, ambiguous, and difficult idea to define, privacy is indeed seen as being a critical and irreplaceable basic right of individuals. For example, the freedoms of expression and religion in the First Amendment protect the right to have private thoughts and ideas. The Fourth Amendment says the government may not arrest a person or search his house without good reasons. The Fifth Amendment says a criminal defendant does not have to testify against himself at trial. That means he can keep private any information about the crime he is charged with committing. These Amendments, however, do not say Americans have a general right to privacy. Where, then, does the right of privacy come from? The Supreme Court developed it through decades of interpreting the U.S. Constitution. In this wonderful, eminently accessible, and very readable book, Ellen Alderman and Caroline......

Words: 2131 - Pages: 9

Free Essay

Types of Secretary

...TYPES OF SECRETARY Secretary is an administrative assistant who perform several office tasks within one job in Business Office Administration. 1. Administrative Secretary /Executive Secretary 2. Legal Secretary 3. Office Secretary 4. School Secretary 5. Litigation Secretary 6. Medical Secretary 7. Real Estate Secretary 1. Administrative Secretary/ Executive Secretary A variety of clerical and administrative duties are performed by administrative secretaries to run an organization proficiently. The tasks of administrative secretaries include planning and scheduling appointments and meetings, managing projects, organizing and maintaining paper and electronics files, conducting research and distribute information by using mail services, telephone, e-mail, web sites. They serve as a communication and information managers for an office and may handle travel and guests arrangements also. Generally administrative secretaries work in hospitals, schools, government agencies, corporate settings or medical and legal offices. Their job generally involves sitting for long periods. 2. Legal Secretary A legal secretary is an individual who works in the legal profession specially for helping lawyers. They are also called as executive assistants or administrative assistants. Their tasks are to perform daily clerical functions necessary for the efficient operation of a legal office. Apart from the typical filing, dictation, typing and phone answering......

Words: 778 - Pages: 4

Premium Essay

File

...emergence of Gourmet bakers, it has shown explosive annual growth of more than 25% in its business. It has 1700 employees working in its all departments. It has around 95 branches and will enhance its coverage to One hundred branches making it The Largest Bakers and Confectionaries of the city as well as the country Vision The vision of GOURMET, throughout these years was to provide a quality food in affordable prices. That’s why where ever the market inflation went GOURMET never broke its rules. The Vision of Mr. Ch. Muhammad Nawaz was higher than any crisis. Since he belongs to religious family, sincerity and integrity has been his code of conduct. He has strong believe in Allah that HE is providing whatever he has. His entire Life is an example of it. Although now the care takers of the GOURMET industries are his sons. But his vision remains unchanged over the time. Mission In this age of rapidly changing life styles consumers are driven to change their eating habits constantly. GOURMET responds to their desires and extended its existing product line. GOURMET has built a huge network of retail shops all over Lahore and now stepped towards Faisalabad. We established International level technology based factories and laboratories for quality maintenance. Executive Summary: Gourmet a name that needs no introduction at least for the people living in Lahore with over 95 outlets throughout the city and still growing in numbers. Gourmet is referred to as......

Words: 1219 - Pages: 5

Premium Essay

Company Secretary

...industrial and economic development of a country. Various development banks like ICICI, IFCI, IDBI; SFCs, SIDCs take initiative in promoting entrepreneurship through assistance to various agencies involved in EDP and by providing financial assistance to new entrepreneurs. 3. Balanced Regional Development: Small scale units can be set up in industrially backward and remote areas with limited financial resources. Successful EDP's assist in accelerating the pace of industrialization in the backward areas and reduce the concentration of economic power in the hands of a few, Entrepreneurs feel like taking advantage of the various concessions and subsidies offered by the state and central government. Success story of entrepreneurs set right example for others to follow and this accelerates the pace of industrialization in the backward areas. Setting up of more units leads to more development of backward areas and balanced regional development. 4. Use of Local Resources: In the absence of any initiative local resources are likely to remain unutilized. Proper use of these resources can result in the progress or development of the area and that too at lower cost. Alert entrepreneurs seize the opportunity and exploit it in the best interests of the area and industry. Effective EDPs can help in the proper use of local resources by providing guidance, assistance, education and training to the prospective entrepreneurs. 5. Improvement in per Capital Income: Entrepreneurs are always...

Words: 3123 - Pages: 13

Premium Essay

File

...internationally. It also offers a range of additional services, such as banking, because of its extensive reach across the country. In big cities, each postal district will have its own post office. Opening hours can vary from one office to another, but post offices are generally open from 9:00 or 10:00 until 18:00 or 19:00. Postal Codes A postal index number, commonly referred to as a PIN code, comprises six digits. There are eight PIN regions in the country, which are divided into geographical areas (a ninth PIN relates to the Army Postal Service). The PIN region is indicated by the first digit, while the next two refer to the sub-region/sorting district. The final three digits represent the post office responsible for delivery. For example, the pin code of Ashok Nagar in Delhi is 110018. Registered Mail India Post makes it possible to register a letter or parcel in order to keep track of it. To send a registered letter or parcel, the relevant form must be filled out at a post office. There is a special counter at post offices for registered mail. The customer receives a receipt, which allows them to track the item online. Speed Post This service provides quicker delivery of a parcel or letter. Tariffs vary according to the weight of the parcel or letter and whether the destination is domestic or international. Business Mail Customers can choose from a range of cost-effective mailing services, including printing, collating, inserting and sealing. India......

Words: 718 - Pages: 3

Free Essay

Files

...Addition of Matrices Denote the sum of two matrices A and B (of the same dimensions) by C = A + B.. The sum is defined by adding entries with the same indices [pic] over all i and j. Example: [pic] Subtraction of Matrices Subtraction is performed in analogous way. Example: [pic] Scalar multiplication To multiply a matrix with a real number, we multiply each element with this number. Example: [pic] Multiplication of a row vector by a column vector This multiplication is only possible if the row vector and the column vector have the same number of elements. To multiply the row by the column, one multiplies corresponding elements, then adds the results. Example: [pic] If the row vector and the column vector are not of the same length, their product is not defined. Example: [pic] The Product of a Row Vector and Matrix When the number of elements in row vector is the same as the number of rows in the second matrix then this matrix multiplication can be performed. Example: [pic] If the number of elements in row vector is NOT the same as the number of rows in the second matrix then their product is not defined. Example: [pic] Linear programming (LP; also called linear optimization) is a method to achieve the best outcome (such as maximum profit or lowest cost) in a mathematical model whose requirements are represented by linear relationships. Linear programming is a special case of mathematical programming (mathematical optimization). More......

Words: 1244 - Pages: 5

Premium Essay

File

...at it is very cheaper rates than traditional proposal and can also significantly so lower than all over IT expenses, at the same time that will for us very convenient and scalable charging models have to appears and that making that cloud even look more attractive. Convenience and continuous availability: The cloud service offers to public cloud service that are available whenever the end-user may be locate that he can access. This representation enables easily can access to information and helps the needs of users in different time zone or different place and geographic locations also that we can access, if we see side benefit, explain booms since it is very easier than ever to access we also view and modification shared documents and files. Increased storage capacity: The cloud computing can supports or accommodates and store huge more data if we compare to a personal computer this offers almost to store unlimited for storage capacity, it supports us don’t worries about running out of storages space & at the same time that we can store huge data. Backup and recovery: In this backup and recovering data is stored into cloud and not on physical device. And sometimes the clouds itself backup the data from the local computers. And it is flexible and easy in providing the backup and recovery services. Disadvantages of cloud computing: Slow speed: It takes longer duration while uploading and downloading of large data from the cloud. Security and privacy: If we talk......

Words: 762 - Pages: 4

Free Essay

File

...CMMS programs offer a wide range of features. A manager will have to decide which features are compatible with a particular facility and generate the information that is most helpful. One manager may be more interested in an equipment inventory and maintenance history. A manager who supervises a number of employees may want to prepare a work order for every job and schedule each worker’s time. Another manager may only be interested in budgetary information. For additional Information contact: Wes Throop, Project Leader; Missoula Technology & Development Center; 5785 Hwy. 10 West; Missoula, MT 59808-9361. Phone: 406–329–3957; Fax: 406–329–3719; Internet: wthroop@fs.fed.us; Lotus Notes: Wesley Throop/WO/ USDAFS 1 Program Comparisons For example, maintenance at the North Central Research Station is handled by one person who uses Maintenance Manager by Symbiotic Systems to track equipment part numbers and repair dates. The manager of the Mount St. Helens Visitors Centers uses Datastream MP2 Professional to track work history and equipment, and to generate work orders. The work orders include specific safety instructions and special tools required for each job. The Missoula Technology and Development Center considered over 300 CMMS programs during a year-long review. These programs were evaluated using demonstration software supplied by the manufacturers. Table 1 compares features of seven programs determined to be most suitable for Forest Service......

Words: 1965 - Pages: 8

Premium Essay

Example

...Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. An Example Paper My Name 1,2 My Department My University My City, My Country My Co-author 3 My Co-author’s Department My Co-author’s University My Co-author’s City, My Co-author’s Country Abstract This is a short example to show the basics of using the ENTCS style macro files. Ample examples of how files should look may be found among the published volumes of the series at the ENTCS Home Page http://www.elsevier.nl/locate/entcs. Key words: Please list keywords from your paper here, separated by commas. 1 Introduction This short note provides a guide to using the ENTCS macro package for preparing papers for publication in your conference Proceedings. The Proceedings may be printed and hard copies distributed to participants at the meeting; this is an option to Conference Organizers may choose to exercise. The Proceedings also will be par of a volume in the series Electronic Notes in Theoretical Computer Science (ENTCS), which is published under the auspices of Elsevier Science B. V., the publishers of Theoretical Computer Science. It’s home page is http://www.elsevier.nl/locate/entcs The ENTCS macro package consists of two files: entcs.cls, the basic style file, and 1 2 3 Thanks to everyone who should be thanked Email: myuserid@mydept.myinst.myedu Email: couserid@codept.coinst.coedu c......

Words: 3426 - Pages: 14

Premium Essay

Example

...Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. An Example Paper My Name 1,2 My Department My University My City, My Country My Co-author 3 My Co-author’s Department My Co-author’s University My Co-author’s City, My Co-author’s Country Abstract This is a short example to show the basics of using the ENTCS style macro files. Ample examples of how files should look may be found among the published volumes of the series at the ENTCS Home Page http://www.elsevier.nl/locate/entcs. Key words: Please list keywords from your paper here, separated by commas. 1 Introduction This short note provides a guide to using the ENTCS macro package for preparing papers for publication in your conference Proceedings. The Proceedings may be printed and hard copies distributed to participants at the meeting; this is an option to Conference Organizers may choose to exercise. The Proceedings also will be par of a volume in the series Electronic Notes in Theoretical Computer Science (ENTCS), which is published under the auspices of Elsevier Science B. V., the publishers of Theoretical Computer Science. It’s home page is http://www.elsevier.nl/locate/entcs The ENTCS macro package consists of two files: entcs.cls, the basic style file, and 1 2 3 Thanks to everyone who should be thanked Email: myuserid@mydept.myinst.myedu Email: couserid@codept.coinst.coedu c......

Words: 3426 - Pages: 14

Premium Essay

File

...manufacturer's cost and the consumer acceptance price level to provide for markups at the wholesale, distributor and retail level? • Does the price allow for freight, projected profit, price fluctuations in the market place and consumer interpretation of value? • Are coupons or discounts being considered to promote consumers to try other flavors, etc.? Product introduction. • What is the product cost breakdown? • Costs of goods sold • direct labor • direct materials • Operating expenses • selling expenses • communications expense • general and administration expenses (including freight) • What markups are allowed at each level of distribution (markup chain and channel pricing)? For example: |Manufacturer | |Wholesaler | |Retailer | | |Cost |90% |Cost | 80% |Cost         |60% | |+ | |+ | |+ | | |Markup |10% |Markup |  20% |Markup |40% | |= | |= | |= | | |Selling Price |100% |Selling Price |100% ......

Words: 972 - Pages: 4