Free Essay

Kaan

In:

Submitted By electioneering
Words 1089
Pages 5
POLICY Acceptable Use for ICT Facilities (for Students)
Purpose Student users of Özyeğin University computing and network systems, facilities and services are bound by the rules and definitions outlined in this policy. All the facilities provided to students by the University are designed and implemented for the ease of use, ease of access, faster communication and higher productivity. Compliance with this policy and proper use of system resources are vital for success. Therefore, the University has the full authority and right to audit, while providing wide and secure IT facilities. Scope All applications and usage relating to IT facilities provided for students. Validity This document is effective as of the date it is uploaded to the system. It is revised and updated in the first two months of every year and when necessary. Only the latest version on the system is valid. This is why printing the document is not recommended. In the case that a printed copy is used, it is the user’s responsibility to check the document’s validity through the system. Definitions Computing and Network Systems: Includes LANs, wireless and modem connections, on-campus telephone system, faxes, printers, plotters, scanners on the network as well as all types of communication, printing and publishing devices that work off-line. Facilities All IT facilities and services either provided on-campus in laboratories, libraries and/or any other on-campus locations or provided off-campus through remote access Spoofing The act of constructing electronic communications to appear as though they came from another party. Snooping The attempt or act of unauthorized monitoring, recording, or disclosing another user’s communications, personal files or usage traffic. Spam Unauthorized and unsolicited electronic communications including unauthorized bulk email messages of a commercial, political, lobbying, fundraising nature; chain letters or electronic “petitions” asking recipients to forward messages by promising either good/bad luck, unauthorized virus alerts, unverified public service announcements, and any other unverified or unauthorized electronic communications that are not listed here. Hacking The act of gaining unauthorized access to university computers, networks,

information systems and / or other user accounts, via a local or remote communication network. The Policy Any variation to this policy must be approved by Information Services. 1. Agreement to this policy All students are required to adhere to the terms and conditions of this policy from the moment they logged on to the university system or started to use the IT facilities of the University. 2. Use of Facilities 2.1 Students gain access to the IT facilities of the university upon enrollment after they are issued with laptops, usernames and passwords by signing the relevant forms. 2.2 The university offers all its IT facilities for academic purposes. It is strictly forbidden to use the IT facilities of the university for any other non-academic purposes, personal gain or consultancy. Limited non-commercial personal use is permitted. 2.3 Students should not abuse, through excessive use, any facilities made available to them. The University reserves the right to impose limitations on the use of information resources, such as Internet downloads. 2.4 Students are required to manage their allocated network disk quota including email accounts, keeping within the quota limits allocated. 2.5 Students cannot use the facilities for any purpose that is unlawful, unethical or immoral. 2.6 Students cannot reserve or stop others from using common IT facilities including computer workstations, printers, plotters etc. 2.7 Students are required to abide by all applicable rules of access for laboratories, classrooms, libraries, meeting rooms, and group study rooms etc that require special access rights. Otherwise, students are personally held liable for any loss or damage to the equipments in such premises. 3. Electronic Communication 3.1 Official correspondence from the University will be forwarded to students’ e-mail accounts. Students are personally liable with regularly checking their e-mail accounts. Email accounts must be managed to remain within the quota storage requirements. 3.2 Electronic communications must not be constructed to appear as though they came from another party, or from an anonymous source. 3.3 University email services must be primarily used for academic purposes. Limited non-commercial personal use is permitted. 3.4 University email services must not be used to send spam. 3.5 Email 3.5.1 Email is not private. Students acknowledge that it: • Belongs to Özyeğin University • May in certain circumstances be accessed and reviewed by the University; and • May in certain circumstances be inspected by parties outside of Özyeğin University, for example, in the event of litigation. 3.5.2 Students agree to use the University email system with due diligence as per the guidelines set out in this policy. 3.6 Copyright, Illegal and Unacceptable Materials 3.6.1. Students must not copy or participate in any activity which involves copying the University software onto removable/portable media without authorization from the copyright owner. Any such action is in breach of the law and against the policy of the

University, and such actions can expose the student/s to appropriate disciplinary measures. 4. Security 4.1 Students will not attempt to access any areas for which they are not authorized. Even unsuccessful attempts will be considered breaches. 4.2 Students must not permit or aid unauthorized third persons to use the IT facilities of the university. For this purpose students will not disclose or let other use their passwords and will take reasonable precautions to protect their passwords. 4.3 Özyeğin University systems administrators may access students’ accounts, email and storage areas when necessary for maintenance, to ensure the security of data and integrity of the system or for backup purposes. Such information is the property of the University. 4.4 Students are not allowed to connect, disconnect and/or modify any hardware or software on Özyeğin University IT facilities without the authorization of Information Services. 4.5 In case of any breach of the aforesaid rules, Özyeğin University Information Services has the right to terminate user accounts and start an investigation. 5.Breach of the rules and penalties 5.1 Breaches of the policy and rules may be treated as misconduct under the Özyeğin University Disciplinary Regulations as well as the relevant provisions of the Intellectual Property Law. 5.2. Academic staff, security officers, Information Services staff and other administration staff are authorized to execute, reinforce and police the student acceptable use policy.

I accept to abide by the rules of the Acceptable Use of IT Facilities Policy (PROS.BT.02).
Student’s Name and Surname: ………………………………………… Student Number: …………………………………………………………………….. Signature: ………………………………………………………………………………… Date: ………………………………………………………………………………………….

Similar Documents

Premium Essay

Leaders of Today

...political ideologist? Is it better to be a smart leader or a good person? The main focus of Polo was Kaan, but his discussions of other leaders, such as the Old Man of the mountain and Lord Prester, gives insight to other leaders of the past. The Old Man of the mountain was a deceptive leader who tricked people into being his followers because they claimed he controlled a place of paradise. He trained a group called Ashishin or assassins. The Old Man would take a man from the paradise and ask him from where he came; the man would reply, “that he came from Paradise!” (Polo book 1 Chapter 24) The Old Man used this illusion to motivate men to do his bidding. The selected men were driven to do his work based solely on the desire to return to paradise. The Old Man of the mountain was a commander of deception. Even though he used an illusion he was able to secure his kingdom, making him an effective leader. He did not seem interested in invading other areas, but to maintain the system he had created. The Old Man’s demise came at the hand of the Lord of Tartars. The Lord felt that he needed to stop the Old Man because of his evil crimes. He sent one of his generals to destroy the Old Man and his “paradise”. Lord of Tartars did not want to conquer the Old Man because of his riches or vast amounts of land. He wanted to eliminate the Old Man because he was evil and deceitful. In comparison, Kaan conquered...

Words: 1286 - Pages: 6

Free Essay

Genel

...Untitled | Ceren Soytürk | Taner Ceylan | Yeni Dünya | Dilara Deniz Sevinç | Danielle Kwaaital | Diane | Ece Metin | Barbara Kruger | Fate | Ecem Uslu | Azade Köker | Asmalımescit Houses | Egemen Çelen | Taner Ceylan | New World | Fahri Emir Çak | Markus Oehlen | - | Ferhat S. Kurtoğlu | Ali Taptık | Trans-Kript | Furkan Tekin | Ahmet Oran | Soyut Kompozisyon | Gamze Canbaz | Robert Montogomery | İstanbul için Şiirin Maketi | Gökçe Ece | Haluk Akakçe | Garden | Görkem Kesimahano. | Mat Collishaw | Venal Muses | Hayri Korkut Yıldız | Taner Ceylan | Yeni Dünya | Hümeyra Yücel Özvar | Erinç Seymen | Untitled | Hussam Rifai | Garth Weiser | - | İzel Bostancı | Ramazan Bayrakoğlu | İsimsiz | Kaan Alıncak | Elke Krystufek | Moai | Kaan Öztoptak | Taner Ceylan | Yeni Dünya | Muammer Nuray | Erinç Seymen | Untitled | Muazzez Dolmacı | Cindy Sherman | Untitled no. 184 | Mustafa Gündoğdu | Ardan Özmenoğlu | Cuma’ya gittim Gelicem | Naz Kayaş | Sophie Calle | La Vue de ma Vie | Ömer Öztosun | Emin Ansen Atilla | Stone | Onur Can Rodop | Julian Schnabel | The Yellow Baron | Orhan Özalp | Susan Hefuna | Attention | Oytun Demircan | Emin Ansen Atilla | Stone | Ozan Parlar | Necla Rüzgar | Cennet Provası | Pelin Kılıç | Elke Krystufek | - | Pelin Soyer | Azade Köker |...

Words: 316 - Pages: 2

Free Essay

Productt

...Mehmet Emin Pamuk Sivanthy Selvanathan Jonathan Yalcin Kaan Yigitsoy Enes Kivrak MAN 333-1 PRODUCT DESCRIPTION In the recent years we have witnessed an emerging shift of trend from the generic products to healthier products such as organic apples or ergonomic shoes. Healthy products have become more competitive everyday and there is a growing demand in certain categories that still needs to be met. This is the kind of market need that we have targeted with our innovative product; “FootC”. “FootC” is a shoe sole designed to massage the pressure points on the bottom of your feet, which are scientifically proven reflexology points. Massaging these improves the health of the internal and the external organs. There are approximately 30 reflexology points that can be targeted on the sole of our feet. The “FootC” has enough electrical pulse pads to target all of these points. The material used to develop the product is a silicone compound that can withstand up to 400Kg of pressure and is antibacterial. We offer the product in 8 different colors and each color comes with its individual scent, which also provides odor protection. Other than being a portable foot massager “FootC” also provides 5 key features; pedometer, GPS, bacteria level measurement, a position (stance) tracker and an exercise level tracker. These features and the electrical pulses, needed for the massage, are all powered by a 3400 mAh lithium battery, which can be charged through a small plug...

Words: 366 - Pages: 2

Free Essay

Enen

...------------------------------------------------- Crazy Donuts Marketing Professionals ------------------------------------------------- Research Project Proposal, October 22, 2014 Azmina Rahemanji, Jianlan Chen, Kaan Zaim, & Ramy El-Refai The Johns Hopkins Carey Business School Marketing Strategy BU.450.710.82.FA14 Dr. Haiyang Yang Abstract Our research group, company profile, and team charter plans are written in the following proposal. Dunkin Donuts Considering the amount of competition in the coffee industry, it’s fascinating that Dunkin Donuts has served not only the United States but internationally for over 50 years and has continued to expand. Our team is interested in learning and researching their marketing strategies, expansion strategies, and vision to maintain their leading position in the coffee business. The team will look back to the historic rollouts of campaigns, the known ‘America runs on Dunkin’ advertising campaign, the recent use of innovative marketing practices like the inclusion of Vine videos in TV advertising, and current headlines that read plans by DD to market to Californians after an initial failure in the Starbucks dominated state. As told by the company: “Dunkin' Donuts is the world's leading baked goods and coffee chain, serving more than 3 million customers per day. Dunkin' Donuts sells 52 varieties of donuts and more than a dozen coffee beverages as well as an array of bagels, breakfast sandwiches and other baked goods”...

Words: 626 - Pages: 3

Premium Essay

Floris

...LYCAR – Research project Hotel Van der Valk | Den Haag – Nootdorp Plan of Approach Prepared by: Floris-Jan König 682028 Prepared for: B. van der Valk H. Kaan T. Tijdeman Version: 1.0 Date: 8 November 2012 Place: The Hague Table of Contents Introduction 3 Purpose of project 3 Research question 4 Sub questions 4 Purpose of plan of approach 4 The plan of approach defines the following: 4  Project purpose 4  Business and project goals and objectives 4  Scope and expectations Fout! Bladwijzer niet gedefinieerd.  Roles and responsibilities 4  Assumptions 4  Ground rules for the project 4  Project timeline 4 Background information 4 Currently the 4 Project approach 4 Goals and Objectives 5 Business Goals and Objectives 5 Project Goals and Objectives 5 Scope 5 Scope definition Fout! Bladwijzer niet gedefinieerd. Assumptions 5 Project Assumptions 5 Deliverables 6 Project Management Approach 6 Project Timeline 6 Project Roles and Responsibilities 6 Communication Plan 6 Attachments/Appendices 8 Appendix 1 – The LYCAR Criteria for research 10 1. Introduction As part my final phase at Hotelschool The Hague I have to fulfil the requirements of the Lycar course. The whole Lycare course consists of 3 final products which will, in the end, lead to graduation at Hotelschool to Hague for a bachelor degree in Business administration in Hotel Management. As described in figure 1 I have to conduct...

Words: 2055 - Pages: 9

Premium Essay

Carl Rogers

...mga kahidlaw Aruy, aruy, aruy, aruy, aruy, aruy, Aruy, aruy, aruy, aruy, aruy, aruy Di ka ba mahalooy ning pobreng alindahaw. DIGDI SA SAMUYA Pobreng kamugtakan Pero mga tawo garu magturugang Kada may okasyon Gabus nagtiripon Ang lambang pamilya Igwang namundugan Gabos nag-oogma Gabos nagtatabang-tabangan DAI NANGGAD AKO Dai nanggad ako maghigot nin manok kun ako malakaw Iba an nahimas, kun ako naabot An balukag gumos, ‘yan ang pinagpunan Maraot na boot Dai nanggad ako maghigot nin manok kun ako malakaw Iba an nahimas, kun ako naabot An balukag gumos, ‘yan ang pinagpunan Maraot na boot Proverbs 1. Ang mag-agom na daing baging Kahoy na ing sanga. 2. Ang ga-ulu-alistuhan na daing aram Ang nakukuha kaan kasusupgan. 3. Ang babaying salawahan Di dapat pag-ngaloan 4. Ang aking barumbado Mag-gurang man an tarantado. 5. Tunay na tentasyon ang babaying magayon alagad tentasyon na dai nakauyam kundi nakaumok 6. Ang tawong grabe ang gulang Minsan iyo pa ang nawal-an 7. Sabihun mo ang permi mong kaiba Ta taramun ko kung sisay ka 8. Inano man katibay ang abaka Dai man syempreng kusog Pag solo sana 9. Ang nanghahagad, dai dapat namili. 10. Ang puwedeng gibuhon ngunyan Dai na pagpaagahan Riddles 1. Arin man na sira ang duwa ang payo? (badi) 2. Nagtukaw si itom, sinurat ni pula, nagluwas si puting gabuga. (sinapna) 3. Kung aga gatindog, kung banggi gahigda. (banig) ...

Words: 772 - Pages: 4

Free Essay

Lq 45

...Teori kebijakan deviden Brigham (1989), menyatakan bahwa dalam kebijakan deviden terdapat 3 teori : a) Deviden irrelevance theory, Teori ini menyatakan bahwa kebijakan dividen perusahaan tidak merupakan pengaruh terhadap nilai perusahaan maupun biaya modalnya. Pendukung utama teori ketidakrelevanan dividen (dividends irrelevance theory) ini adalah Merton Miller dan Franco Modigliani (2001). Mereka berpendapat bahwa nilai suatu perusahaan hanya ditentukan oleh kemampuan dasarnya untuk menghasilkan laba dan risiko bisnisnya. Dengan kata lain, nilai perusahaan tergantung hanya pada pendapatan yang dihasilkan oleh aktivanya, bukan pada bagaimana pendapatan tersebut dibagi antara dividen dan laba yang ditahan. Keon et. al (2000) menyatakan bahwa pada teori ketidakrelevanan dividen, tak ada hubungan antara kebijakan dividen dan nilai saham. Satu kebijakan dividen sama bagusnya dengan lainnya. Secara agregat investor hanya mementingkan pengembalian total keputusan investasi, tak peduli apakah pengembalian berasal dari perolehan modal atau pendapatan dividen. b) Teori Bird in The Hand Kebanyakan pemilik saham lebih menyukai pembayaran dividen saat ini daripada menundanya untuk direalisir dalam bentuk “capital gain” nanti. Tarif pajak untuk “capital gain” memang sering lebih rendah daripada untuk dividen, namun para pemilik saham banyak yang lebih menyukai dividen saat ini, karena dengan pembayaran dividen sekarang maka penerimaan uang tersebut sudah pasti, sedangkan apabila...

Words: 741 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment 1

...of the application's use are properly maintained. For this we suggest adding the whitelisting and blacklisting capabilities so as to ensure only user approved programs should be granted permission to run in private mode. Traditionally whitelisting and blacklisting were majorly used in security so as to protect the user from malicious software entirely. While this may still be used by the user's system it does not restrict secure applications that have already been installed on the user's system from executing privately. Blacklisting is used so as to allow the user to deny permissions to a list of applications that he chooses to mention while whitelist grants permissions only to those applications mentioned by the user[5]. 2 Previous Work Kaan Onarlioglu[3] discussed how PrivExec ensured that all the data stored during the execution of an application was encrypted and then stored privately in a container separate from the public filesystem and also this data was securely discarded on the completion of the execution of the process. This ensured that the user's privacy was maintained during the execution of any process in private mode. Himanshu Pareek[4] discussed application whitelisting technique using application verification before it's execution. In this paper we combine these techniques to give the user better security while still making use of PrivExec to maintain their privacy. 3 System Design Since the application must be allowed or disallowed to execute based on the whitelist...

Words: 1116 - Pages: 5

Free Essay

Copycat

...Facebook DarrylHome20+ Requests Messages Notifications Privacy Shortcuts Account Settings Search for people, places and things Recent 2015 2014 2013 2012 2011 2010 2009 1996 Born Cover Photo Update Cover Photo Darryl Lovendino (DarryltheGreat)Add or change other names Update InfoView Activity Log10+ TimelineAboutFriends936Photos More Darryl Lovendino Update Profile Picture Status Photo/Video Life Event News Feed Darryl Lovendino 20 April at 07:53 · Maligayang ika-dalawampung araw ng abril! Like · Comment · Share · 133 Darryl Lovendino 7 April at 10:01 · Wahahahahah Darryl Lovendino's photo. Like · Comment · Share Karl Chrolo Lovendino, JuJo BaJojo, BO OO and 9 others like this. Darryl Lovendino Write a comment... News Feed Darryl Lovendino shared Waka Flocka Flame's video. 9 March · 7,919,334 Views Waka Flocka Flame uploaded a new video. Like · Comment · Share Solo Kun Hahahaha naimaine ko po kayooo XD 9 March at 10:31 · Like Darryl Lovendino Write a comment... Darryl Lovendino shared Trust Me, I'm a "Psychologist"'s photo. 7 March · Trust Me, I'm a "Psychologist"'s photo. Trust Me, I'm a "Psychologist" tweet it @trustpsychology See translation Like · Comment · Share · 1 Darryl Lovendino shared a link. 2 March · iOS · Drugs As Tools For Spirituality "The program is a voyage chart, a series of signals, which, like the pilot’s radio provides the basic orienting information required for...

Words: 901 - Pages: 4

Premium Essay

A Comparative Analysis of Two Private Fm Stations in India.

...succession it launched Bangalore, Hyderabad and Jaipur in early 2006 and completed the final rollout of the remaining 22 stations recently. Programming Style: The programming content of radio mirchi principally revolves around contemporary film music. It’s a fun-filled package of pure energy hosted by turbo charged radio jockeys, who also host interviews with celebrities and engage listeners in lively conversation. Reasons of being No.1 Its development has been the result of intensive research, top quality programming and aggressive marketing. It keeps the brand relevant to customers and remains high on the recall quotient. Various promotional activities have infused and injected it with panache. Annual events like the Mirchi Kaan Awards for radio advertising industry, over competition. Mirchi Achievers...

Words: 1697 - Pages: 7

Premium Essay

Aarongs Possibilities

...BRAC University School of Business Summer2015 COURSE OUTLINE MKT 201: Principles of Marketing Section – 2, 5 [“Marketing is not the art of finding clever ways to dispose of what you make. It is the art of creating genuine customer value.” ― Philip Kotler]. |Section |DAYS |TIME |Room No | |2 |Mon & Wed |09:30 - 10:50 |UB20203 | |5 |Mon & Wed | 03.30 - 04.50 |UB20203 | Instructor: Rahma Akhter Office : UB20605 E-mail : rahma.akhter@bracu.ac.bd Phone : 01817530917 Consultation Hours |DAY |TIME |ROOM |HOURS | |Sun & Tues |12:30-01:50 |UB 20605 |3 | |Sun & Tues |02:00-03:20 |UB 20605 |3 | |Mon & Wed |11:00-12:20 |UB 20605 |3 | |Mon &Wed |12:30-01:50 |UB 20503 |3 | I. RATIONAL: This course introduces the students to the world of marketing. Starting off with the key concepts of marketing, the course is also a survey of the marketing function of the organization, including the marketing environment and target markets, marketing strategy with emphasis on the marketing...

Words: 1707 - Pages: 7

Premium Essay

Kuda Menggonggong

...Exchange Students’ Guide Incoming Students: Bachelor & Master Dear students, Welcome to the exchange students’ community of WU (Vienna University of Economics and Business)! You are one of around 450 exchange students from around 230 partner institutions in 50 countries who study at WU each semester. This guide is designed to provide you with the information you need before your arrival. Please read it carefully as it covers all the important steps you need to consider. We wish you an exciting and successful exchange experience on campus! Your International Office Team Contents 1. 2. Academic Calendar and Application Deadlines ........................... 4 General Information .................................................................. 5 3. Studying at WU ........................................................................ 13 Courses .................................................................................................... 13 ECTS and transcripts ................................................................................ 14 4. Entry Regulations .................................................................... 15 How do I become a WU exchange student ................................................ 5 WU will contact you ................................................................................... 5 Information sessions .................................................................................. 5 Confirmation of stay .................

Words: 5479 - Pages: 22

Premium Essay

Voluntary Principles on Security and Human Rights

...From Compliance to Practice Mining Companies and the Voluntary Principles on Security and Human Rights in the Democratic Republic of Congo Tanja A. Börzel/Jana Hönke SFB-Governance Working Paper Series 25 • October 2011 DFG Sonderforschungsbereich 700 Governance in Räumen begrenzter Staatlichkeit - Neue Formen des Regierens? DFG Research Center (SFB) 700 Governance in Areas of Limited Statehood - New Modes of Governance? SFB-Governance Working Paper Series Edited by the Research Center (SFB) 700 „Governance In Areas of Limited Statehood - New Modes of Governance?“ The SFB-Governance Working Paper Series serves to disseminate the research results of work in progress prior to publication to encourage the exchange of ideas and academic debate. Inclusion of a paper in the Working Paper Series should not limit publication in any other venue. Copyright remains with the authors. Copyright for this issue: Tanja A. Börzel/Jana Hönke Editorial assistance and production: Tanja Kilper/Sara Gebh/Anna Jüschke All SFB-Governance Working Papers can be downloaded free of charge from our website www.sfb-governance.de/en/ publikationen or ordered in print via e-mail to sfb700@zedat.fu-berlin.de. Börzel, Tanja A./ Hönke, Jana 2011: From Compliance to Practice. Mining Companies and the Voluntary Principles on Security and Human Rights in the Democratic Republic of Congo, SFB-Governance Working Paper Series, No. 25, Research Center (SFB) 700, Berlin, October 2011. ISSN 1864-1024 (Internet)...

Words: 16584 - Pages: 67

Free Essay

Poshmaal

...Life is a blog ------------------------------------------------- Poshmaal ghazal : poetic expression of both the pain of loss or separation and the beauty of love in spite of that pain Aah Ko Chaahiye - Mirza Ghalib Aaina mujse meri pehli si surat mange Aaj jaane ki zid na karo - Faiyaz Hashmi Aap ki yaad aatee rahee Aap ko dekh kar, dekhta reh gaya - Aziz Qaizi Aawargi - Mohsin Naqavi Ab ke ham bichhde - Ahmed Faraz Apni dhun mein rehataa huu.N - Nasir Kazmi Aye husn-e-beparwah Aye Mohabbat Tere Anjaam Pe Rona Aaya Baabul Moraa - Baat niklegi - Kafeel Aazer Bhooli bisri chand umeedein - Razi Tirmizi Chamakte chaand ko - Anand Bakshi Chhaa rahii kaalii ghataa - Qalander Baksh Jurrat Chupke chupke raat din - Hasrat Mohani Denevaale mujhe maujo.n kii ravaanii de de - Shadab Lahori Dil dhoondhta hai, phir wahee - Gulzar Dil mein ik lahar sii uThii hai abhii - Nasir Kazmi Duniyaa jise kahate hain - Nida Fazli Duniya kisi ke pyaar mein - Dukhi Prem Nagri Ek purana mausam lauta - Gulzar Faasle aise bhii honge - Adeem Hashmi Gulon mein rang bhare - Faiz Ahmed Faiz Har ek baat pe kahte ho - Mirza Ghalib Hazaaron Khvaahishen - Mirza Ghalib Honton se chhoo lo tum - Indeevar Hoshwaalo.n ko khabar kya - Nida Fazli Humko kiskay gham nay maara - Masroor Anwar Hungama hai kyon barpa - Akbar Allahabadi Itni muddat baad mile ho - Mohsin Naqvi Jab bhii aatii hai terii yaad - Krishan Adeeb Jhoom kay jab rindo nay pila di - Kaif Bhupali Jhukii jhukii si nazar...

Words: 9323 - Pages: 38

Premium Essay

Business Plan

...(The Marketing Mix) Pages 23-26 ❖ Product ❖ Price ❖ Promotion ❖ Place 6. Legal Status Pages 27-29 ❖ Laws and Regulations ❖ Food and Safety Health Regulations 7. Financial Plan Pages 30-34 ❖ Operating and Start-up costs ❖ Cash Flow Projection ❖ Profit and Loss Account ❖ Financial Analysis 8. Growth and Expansion Plan (5 Year Future Plan) Pages 35-37 Executive Summary Business Name: Fresh Creams Owner/Sole Trader: Mr Kaan Polat Fresh creams are an ice cream parlour that sells freshly made premium ice cream and sells this in many different flavours. Fresh creams will also include hot/cold fresh sandwiches, hot beverages and smoothes. The hot beverage products will include a range of espressos, coffees, lattés and teas. This wide variety of product range aims to attract many customers in Borehamwood as it brings a...

Words: 14805 - Pages: 60