|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording in the performance criteria is detailed below. |
|
Computerised technology may include: | personal computers or terminals (stand-alone or networked)scanning equipmentbar coding equipmentpoint-of-sale terminalshand-held equipmentsoftware, including:word processingdatabasesspreadsheetsfinancialinventoryelectronic data interchange (EDI). |
| |
Systems may include: | electronicmanual. |
| |
e-commerce may include: | business to businessbusiness to end-consumer (direct)consumer to consumer. |
| |
Maintenance requirements may include: | cleaninghardware or software upgradespreventative maintenanceOHS requirements. |
| |
Reporting may be: | formal and informalto individuals or groupswritten, faxed, emailed or spoken. |
| |
Sources of information may include: | legislation and regulationswork procedures and internal manualscompany operating procedures and instructionsmanufacturer specificationssupplier and customer instructionsmanifestscodes of practicequality assurance systems, procedures and policiesawards, workplace agreements, and other industrial arrangements verbal communication, including face-to-face, telephone, internet and radiowritten instructions and communication such as data exchange, letters and emailssafety instructions and workplace signageelectronic or hard copypolicy and protocols. |
| |
Basic transactions may include: | salesquotationsreturnsadministration of accountselectronic transactions, including:electronic data interchange (EDI)MIMEvalue added networkspayments received by:cashchequecredit cardEFTPOScash on delivery (COD)direct credit. |
| |
Transaction security may include: | principles of digital cryptography, steganography and public-key cryptosystemscryptographic standards (e.g. government security policy, international standards)digital signatures, digital escrow, certificationvirus protectionsecure communicationsintrusion detection and countermeasurescopy and counterfeit detectionprivacy and anonymity protocols. |
| |
Credit checks may be: | automated or manualcompleted internally or by external agent. |
| |
Business policy and procedures in regard to: | acquisition and sale of products and servicesreporting mechanismsinteraction with customersinformation technology systemsprocessing e-commerce transactions. |
| |
Customer requests for further information may include: | quotationsprice notificationproduct and service availabilitylogistics (e.g. time of delivery)warrantiespayment options. |
| |
Customer account file may include: | account holder details mode of payment (preferences)customer numbercredit limitscontact detailssupply detailsproduct or service categorytransaction history. |
| |
Electronic payments may include: | payment gatewayselectronic presentmentclearance systemsdishonour systemscredit card transactionselectronic bill payment. |
| |
Payment for products and services may include: | electronic bills letters of creditpoint-of-sale transactionsmail order and telephone orders. |
| |