Premium Essay

Pdtf File

In:

Submitted By kenzie
Words 1908
Pages 8
ASSIGNMENT 2
December 11
2012

The essay is based on a critical analysis on the interaction of HR and line managers, including the concept of HR business partnering, the integration of businesses and HR strategies, and integration of theories with practice using examples from organisations.
Name:Ikenze tony Kalu

STUDENT NO: 12234835
Word count:
HR AND LINE MANAGERS
HR managers are managers responsible for delivery of basic HRM services such as recruiting, hiring, training, organizational development, coaching, employee relation, communication, leadership, advice, salary and benefits, team building of staffs within an organization and also the well-being of people and relationship between management and employees (Susan, H, 2012). while the line manager are managers crucially responsible for administrative management of individuals, direct management of staffs within an organization and the supervision and discipline of their employees and performance appraisal (John ,F ,2012) in addition the line managers have the power to influence the employees behaviour (cascio,2008;cited in faisal et al ,2011).

Interaction between the HR mangers and line managers
However the interaction between the HR manager and the line manager is very essential within an organization, a previous research carried out by Stockton Borough Council (2011) showed that there is an existing culture of both managers working together to address people management responsibilities, this research also showed that line managers were ready to take up more responsibities to deal with poor staff performance without direct access to HR support and going through the required training on the task like conflict management, for an organization to be fit for current and future challenges Line managers have to be involved in the development and review of HR policies(Liz,F. 2012).
Furthermore,

Similar Documents

Free Essay

Hurray

...PROCEDURES FOR CONDUCTING PRACTICAL ICT TESTS The Supervisor A suitably competent supervisor, who may be the candidates’ tutor, is responsible for the administration of the practical tests according to these instructions. The supervisor is responsible for the preparation of the hardware and software for the test. Timetabling of the Practical Tests CIE does not timetable the practical tests in the same way as most IGCSE and AS & A Level written papers. The IGCSE and AS & A Level timetable will specify a period within which candidates must take the two practical tests for each syllabus. Within this period, Centres may conduct the practical tests at any convenient time or times. Candidates must complete each practical test in a single session. Wherever possible, candidates from the same Centre should sit their assessment at the same time. If more than one session is necessary to accommodate all candidates, these sessions should follow on from each other. However, Centres do not need to sequester candidates until other candidates have taken the test. When arranging examination dates, Centres should take into account the time needed to set up the system and should allow contingency planning (e.g. to reschedule examination times due to possible hardware failure) wherever possible. Preparation for the Practical Tests Before the candidates take a practical test, the supervisor must work through a past/specimen paper, using the hardware and software that the candidates will be using...

Words: 2393 - Pages: 10

Premium Essay

An Analysis of Ecb

...This customer data file is for 60,000 customer records in the restaurant category. Clean up the data: As with most customer data files, there is incomplete information. Address how you handle incomplete data. (I suggest completely eliminating records in Acquisition Channel with “NULL” or “Uncategorized”.) Also eliminate any records with blank in Ethnicity. Note in Ethnicity African-Americans is also coded as Afr. Am. so these two should be combined. In Age of Kids there are cells coded as Pre-teen &? I suggest combining with “Age Mix” or “Preteen & Teenagers”. After cleaning up the file, we are left with 26,352 records which should still be an adequate sample size.) Questions for analysis: 1. Calculate the profitability of each customer. Assume the average Cost of Goods Sold (COGS) for all vouchers (with promotional discounts factored in) is 20% of the total revenue. Assume the average one-time Cost per Acquisition (CPA) for each channel is: $12 for Advertising, $10 for Affiliate, $5 for Email, $8 for ILS, $7 for Paid Search and $5 for Social Media. Assume there are no additional costs. You may find the Excel VLOOKUP function helpful for this (https://support.office.com/en-sg/article/VLOOKUP-function-0bbc8083-26fe-4963-8ab8-93a18ad188a1). 2. What does the “average” ECB.com customer look like? Is the “average” customer desirable or undesirable? Why? 3. Describe each segment (new, engaged, lapsed, inactive). How much revenue does each segment...

Words: 517 - Pages: 3

Free Essay

Introducing Transaction Log Files

...Introducing Transaction Log Files Each SQL Server 2000 database has at least one transaction log file and can have multiple transaction log files spread across a number of disks. Each transaction log file is a separate operating system file and is used by only one database. Each transaction log file generally has the .ldf filename extension (this extension is not required). Each transaction log has a logical filename that is used in Transact-SQL statements and a physical filename that is used by the Windows operating system. Additional file properties include the file ID number, initial file size, file growth increment (if any), and maximum file size. Unlike data files that contain pages, transaction log files contain a series of transaction log records. A sequential log sequence number (LSN) identifies each transaction log record. Regardless of the number of physical log files, SQL Server 2000 treats the transaction log as one continuous log. SQL Server 2000 logically divides each physical transaction log file into a number of virtual log files (VLFs). The number and size of virtual log files are determined dynamically based on the size of each transaction log file. Each transaction log file has at least two VLFs. Each growth increment (if any) is treated as a separate physical file with its own VLFs. The number or size of VLFs cannot be configured or set directly by the database administrator. SQL Server 2000 tries to maintain a small number of virtual file logs because it operates...

Words: 2158 - Pages: 9

Premium Essay

Nt1330 Unit 3 Quiz Essay

... When to use standard I/O (A) When working with disk or terminal files (B) When you need to fetch file metadata [a] (C) None (D) All the above 2. Difference between getc and fgetc (a) fgetc can be implemented as macro, where as getc cannot be implemented as macro (b) getc can be implemented as macro, where as fgetc cannot be implemented as a macro [b] (c) getc is used to write a character and fgetc to read a character (d) fgetc to write a character and getc to read a character 3. rewinddir returns (a) 0 (b) -1 [c] (c) no value (d) error (4) The functions which change the execution mode of the program from user mode to kernel mode are known as (a)...

Words: 1393 - Pages: 6

Free Essay

Ewrwqer

...- Authors: Banshee 2. Product History Version 0.5 Interface improved again, program may now open and extract files through drag and drop. TGA files will be previewed in the program. OS BIG Editor is now able to associate .big files with it and several options were added to make the program more confortable for the user. These options are also saved everytime the program is closed and loaded in the next time. Version 0.4 Interface improved, program may now open files by parameters, file size and compression size showed when user selects it and extract will now extract all selected files. Version 0.3 First public version of the program, basic extracting tools. 3. To do, Future features - .manifest/.imp/.relo/.bin support - create and edit BIG files - compress files inside the .BIG package with RefPack compression. - preview DDS and few other binaries. - tree view - additional parameter support 4. Version History 0.5 - revisions by Banshee: - Added: Associate .big files with OS BIG Editor at Options -> Preferences (Note: the second and third icons were made by Danny van Loon). - Added: Preview your TGA files in the program (done by Zlatko Minev and, its interface.was improved by Banshee) - Added: Extract your files by dragging and dropping them to windows explorer. - Added: Drag your .BIG files by from windows explorer and open them by dropping them into the program (coded by Danny van Loon). - Added: New...

Words: 574 - Pages: 3

Premium Essay

Health Care Financing

...Provena Health – Ghost Image Log This Image was checked for viruses on: 8/25/09 |PC Make / Mod |HP dc7900 sff |Memory Size |2Gb | |PC serial no. | |Hard Drive Size |250Gb | |Image Name |dc7900v4 |System ROM Date |V1.16 | |Date Imaged |8/26/09 |System ROM SoftPaq | | |Operating Sys |XP |Video Card |Intel Q45/Q43 | |Your Name |Reese |NIC Card |Intel 82567LM-3 | |Version of Ghost used |11.5 |Wireless Card if installed | | | | |Local Admin Password |roo$t3r | |Note: Latest ROMPaq must be installed (dock must be updated |Note: After ghosting and before putting on the network, PC or laptop must have McAfee| |also for laptops). ...

Words: 271 - Pages: 2

Free Essay

Organization, Time Management, Effective Communication

...learning. While some people believe if they have intelligence and talent, they will get success in their study, but others claim that a important factor to contribute to the achievements of their performance is hard-working. For me, in my self-study experience, intelligence, talent or hard-working are not enough, the improvement of some modern-technology skills in looking for informaton leads student to be successful. The truth is that because of taking advantage of using organization, some abilities in time management and effective communication on online learning is the way to approach me to knowledge and get good achievements in my MBA online course. The role of organization Regarding organization, well organized materials, documents or files is one of the ways a person use to save his time and manage his work. Many people could not remember where they are put a hard copy document in, hence, they waste a lot of time to locate it with an exhausted and confused feeling. It also...

Words: 1642 - Pages: 7

Free Essay

Case Project

...Running head: Case Project Case Project Student College Case Project Linux as an operating system is a powerful tool used in businesses for its secure kernel and command line interface. From a small business to a large enterprise, Linux is used to run servers, store vital information and documents. In Outdoor Adventures, this store needs a more efficient computing system. The system will need to keep information available and secure enough to ensure that the information can only be seen by the right people. To help keep things organized, a file structure will also be required to keep all the files with special permissions together for easy access. To better illustrate the security capabilities of Linux Ed Sawicki of Biznix.org said, “The Linux firewall has functionality that rivals expensive commercial firewalls. Its rules allow fine grained control over stateless and stateful packet filtering. The Linux firewall is extensible, allowing new filtering capabilities as the need arises.” This comparison is powerful when considering what would be the most cost effective direction for a business, but also the safest. Another advantage of linux is that it is generally free to try before applying it to a commercial setting. The product can in effect speak for its self by allowing itself to be made publicly available so there is no need to consider it a “business risk” when a technician can experiment with it first before applying it on a much grander scale. “Linux…is...

Words: 1333 - Pages: 6

Premium Essay

File Access

...File Access Computers have become an important tool for the companies. They are used as time clocks, keep track of inventory, to communicate with customers and to do research. In some cases, the computer is used to assign tasks and inform employees of upcoming events. Though computers are good tool and resource, there is the potential an employee may misuse or access files they have no clearance to access. For this reason there is a need to restrict access. If a company has 5000 employees who have access to the computer system and there is a need to restrict 10 users from accessing a specific file, there is a need to establish protocols to prevent access. How this is done differs in each operating system. In Unix there are ways to set parameters for the 4990 users to access a single file. These are set within the types of files. They are called regular, directory, special, named pipes, links and symbolic links. Unix operating systems operate these files and routes them into a uniformed system that operates in the background supporting files and giving disk space as needed for files. This is done by using inode (Index node) which controls information the system needed for a specific file. Multiple files can be connected to one inode, but if active the inode will only be associated with one file and a file will be controlled by one inode. A file’s attributes, permissions, and control information are stored within the inode. In the FreeBSD inode for example has...

Words: 654 - Pages: 3

Premium Essay

Pos 355 File Management

...File Management Comparison for Operating Systems All computers and their subsequent operating systems use a means of digitally storing data within a file onto an allotted section of some type of storage media. The allotted section of storage can theoretically be read from, and written to as required. The data in the file is stored as bytes of binary code, and can be identified as belonging to a particular file by the file’s start or “address”. Though the storage section is linear in nature, it can be visualized as a cross grid of cells, with each cell containing one byte of data. The combined cells of data populate the allotted section of storage within a file. At this point, operating systems diverge from this commonality, particularly in the way the operating systems manage files through their respective “file management” programs. The following is a cursory look at three such operating system’s file management schemes. Mac OS file system Mac OS uses what is called the Hierarchical File System (plus). It comes from the original version of the Hierarchical File System (HFS), which comes from the Macintosh File System (MFS), used with older Mac systems. The HFS concept begins with a sole directory on a storage media (in this case a hard drive or hard disk). From this directory, sub-directories are created, and so on, down to the user and user access files. This is the most simplistic of file management system concepts, in theory. Mac OS is also proprietary. Linux...

Words: 829 - Pages: 4

Free Essay

Photoshop

...Adobe CS6 Master Collection Mac Cracks. Instructions : 1.Disconnect internet connection 2.Patch Hosts file Double click to launch "AdobeCS6PatchHostsFile" to patch hosts file to block outgoing connections, this will patch then open the hosts file to show you. You will need to enter you admin password. 3.Install Adobe CS6 Master Collection as a trial 4.IMPORTANT After install, launch each application then close it before you apply the specific application patch. This will ensure Photoshop is the Extended version 5.Apply application specific patch Double click the application specific patches to apply the "amtlib.framework patch", this also archives the original amtlib.framework folder in the application specific Frameworks. 6.Run "IllustratorTryoutSplashFix" This rewrites the files so the correct splash screen shows Also makes archives of originals You must only use this on a fresh copy of Illustrator Otherwise use the files in the folder • Disconnect from the Internet (or block outgoing connections) and install the trial version. • When installing, select "Trial"! • After installation, launch and complete the application once, blocking any outgoing connections. • Replace (keep a copy of the original just in case) amtlib.framework located in Application_Name.app / Contents / Frameworks / with [k'ed] one. • Block outgoing connections:   Open the hosts file and add the following lines: 127.0.0.1 192.150.14.69 127.0.0.1 192.150.18.101 127.0.0.1 192.150...

Words: 713 - Pages: 3

Premium Essay

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Free Essay

Usb Usb Driver

...relatively easy to develop applications in C that access such peripherals. Linux operating system do not provide remote access through USB between different machines .Here we utilize its high bandwidth to transfer files between machines using USB without using any network cables. 1.2 Objectives The USB remote file access allows high speed transferring of files between two machines. 1.3 USB Cable Fig 1.1 A USB Cable 1.4 Advantages Of Using USB Cable for Remote Access • Transfer files between two PCs (or three PCs using two cables) • Fully compliant with USB 1.1 and USB 2.0 • USB 2.0 High-speed performance with data transfer rate of over 15 Mbps • No external power needed (Bus powered from either USB port) • Low power consumption • Supports suspend and resume for power management • Supports remote wake-up • Terrific for laptop/notebook to desktop file transfers. 1.5 Module Overview This project mainly contain two parts 1.Kernel Module (USB driver) 2.User Interface 1. Kernel Module In this module we create a device driver for USB direct link cable which is used to connect between two systems. The driver is designed in such a way that it should be efficient and simple to the Linux operating system. The files are transmitted using file transmission protocol. The low level system call...

Words: 557 - Pages: 3

Premium Essay

Textiles Company Network Disaster Plan

...123 Textiles Company Network Disaster Plan Keith A Manley IT240/ Sorrells 11/30/2012 The 123 Textile Corporation has several solvable issues that we will address in this network updating proposal. They have been exposed to inclement weather and as of late a break in resulting in the companies sever and all pertinent data for sales, production, human resources. This proposal will lay out all necessary hardware upgrades as well as the software upgrades needed to maintain the new hardware. It will also look at off-site back up as a potential resolution to being in an area that may be more susceptible to break-ins resulting in equipment loss and or damage. The proposal will also address the issues of inclement weather and possible protection from natural disasters. Hardware and equipment proposal; A required designated space for the new computer equipment should be around 50 square feet with through wall ventilation but no window or exterior access points. In addition a cable line for modem connection and power source will be required. Power source should be of 20 amp circuit and non GFI, number of circuits at primary location in room to be four. In consideration of power outages that could result in loss of data a recommended solution will be the installation of an online UPS battery backup unit which provides continuous power while plugged in through the unit’s battery allowing for smoother and quicker power transition. This unit provides...

Words: 1340 - Pages: 6

Free Essay

Wordpress

...width, and other features. WordPress.org allows you to preview it to. Whenever you want to make your own or make changes to existing themes you will need some extra files. You can also go to the edit themes in the admin or use notepad ++. A theme consists of a number of template files, all stored in the theme folder which we find in wp-content/themes. Every WordPress Theme has to include at least two files: index.php and style.css. The index file defines what content is displayed by the theme, and the style sheet contains information about the theme that WordPress uses to make the theme work correctly. Most themes have a few additional files: header.php (contains the <head> sections of each page plus the header of the website’s design), sidebar.php (contains the sidebar, including any widget areas), footer.php (contains any functions that are specific to your theme. You can develop your own WordPress Theme by first creating a Child Theme. This is your style.css file. Create the following using comments: Theme name, Theme URI, Author, Author URI, description, Version, Tags and other comments. After the stylesheet is complete, your theme should show up blank in the admin panel under themes now you can activate it. Now it’s time to fill in the template files. The main file you will need to use is the index.php file. It can be used to include all references to the header, footer, sidebar, content,...

Words: 773 - Pages: 4