|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording in the performance criteria is detailed below. |
|
Computerised technology may include: | personal computers or terminals (stand-alone or networked) scanning equipment bar coding equipment point-of-sale terminals hand-held equipment software, including: word processing databases spreadsheets financial inventory electronic data interchange (EDI). |
| |
Systems may include: | electronic manual. |
| |
e-commerce may include: | business to business business to end-consumer (direct) consumer to consumer. |
| |
Maintenance requirements may include: | cleaning hardware or software upgrades preventative maintenance OHS requirements. |
| |
Reporting may be: | formal and informal to individuals or groups written, faxed, emailed or spoken. |
| |
Sources of information may include: | legislation and regulations work procedures and internal manuals company operating procedures and instructions manufacturer specifications supplier and customer instructions manifests codes of practice quality assurance systems, procedures and policies awards, workplace agreements, and other industrial arrangements verbal communication, including face-to-face, telephone, internet and radio written instructions and communication such as data exchange, letters and emails safety instructions and workplace signage electronic or hard copy policy and protocols. |
| |
Basic transactions may include: | sales quotations returns administration of accounts electronic transactions, including: electronic data interchange (EDI) MIME value added networks payments received by: cash cheque credit card EFTPOS cash on delivery (COD) direct credit. |
| |
Transaction security may include: | principles of digital cryptography, steganography and public-key cryptosystems cryptographic standards (e.g. government security policy, international standards) digital signatures, digital escrow, certification virus protection secure communications intrusion detection and countermeasures copy and counterfeit detection privacy and anonymity protocols. |
| |
Credit checks may be: | automated or manual completed internally or by external agent. |
| |
Business policy and procedures in regard to: | acquisition and sale of products and services reporting mechanisms interaction with customers information technology systems processing e-commerce transactions. |
| |
Customer requests for further information may include: | quotations price notification product and service availability logistics (e.g. time of delivery) warranties payment options. |
| |
Customer account file may include: | account holder details mode of payment (preferences) customer number credit limits contact details supply details product or service category transaction history. |
| |
Electronic payments may include: | payment gateways electronic presentment clearance systems dishonour systems credit card transactions electronic bill payment. |
| |
Payment for products and services may include: | electronic bills letters of credit point-of-sale transactions mail order and telephone orders. |
| |