Friday, September 6, 2019
Computer Information Systems Brief Essay Example for Free
Computer Information Systems Brief Essay In order for the company to continue to thrive, consideration of growth opportunities will also be analyzed. In addition, the threats that Kudler may encounter if changes are not implemented will also be discussed throughout this evaluation. The owner of Kudler Fine Food stores offer gourmet foods and fine wines all within one location. All store locations offer baked goods, meat, seafood, produce, cheese, dairy products, and wine with little or no preservatives added. The success of Kudler Fine Foods is in part from the systems that the stores have in place. For example, the current computer system is available 24 hours a day, seven days a week, the owner provides training to all employees and is, therefore, understood by all employees. This understanding of the computer system enables the daily operations of the business to thrive as sales increase. As the company moves forward and introduces changes with technological advances, continued employee training is a must with the installation of new hardware and software programs. The number of products that must be accounted for, on a daily basis, at the Kudler locations is extensive. Presently, Kudlerââ¬â¢s accounting data is collected by point-of-sale (POS) terminals in each store. The terminals are used as cash registers when customers check-out. The POS system records all sales, items, quantities, prices, taxes and totals for all transactions. ââ¬Å"These intelligent terminals use keypads, touch screens, bar code scanners, and other input methods to capture data and interact with end users during a transaction, while relying on servers or other computers in the network for further transaction processingâ⬠(Oââ¬â¢Brien Marakas, 2008, p. 81). Furthermore, functions are available for various types of sales reports to be created with the current system. However, the current system does not meet the needs of the business as the computer system is outdated. Furthermore, the founder of the company, Kathy Kudler, is having great difficulty with monitoring the needs of the three stores and the situation will soon become overwhelming with further expansion. Ms. Kudler needs a computer system that will accommodate her current and future needs for her growing gourmet food business. Currently, each of locations operates with a stand-alone POS system. Ms. Kudler must travel between stores to ensure the managers are meeting her high standards and creates a substantial loss in productivity. The lack of remote access also presents an issue for the future expansion plans for the business. With no way to access accounting, inventory, and sales information, successful expansion will not be possible. Ms. Kudlerââ¬â¢s presence is a daily requirement at each location to manage the operations, inventory, sales, etc. and without updated computer technology the company cannot see any further growth. Not only is the company facing limited expansion possibilities, but current security measures are not sufficient. Although Kudlerââ¬â¢s present system is password protected and has backup capability, financial information may be in jeopardy. With the implementation of a new system can easily remedy this situation giving added security to the company. In addition to the companyââ¬â¢s financial information, protection to the companyââ¬â¢s customer base should also be of great concern. In particular, the customerââ¬â¢s credit card information is at high risk. Additional security measures addressing such concerns as passwords, employee identification numbers, and restricting employee personal use must be applied. For example, a proxy server can limit the employeeââ¬â¢s internet access to approved websites (Bargranoff, Simkin, Strand, 2008). Not only will a proxy server prevent counterproductive activity from employees, but it will also limit the exposure to threats from viruses, theft, and internet hackers. There are both strengths and weaknesses with Kudlerââ¬â¢s Fine Foods current computer technology practices. Kudler Fine Foods uses the POS system to record sales, items, quantities, prices, taxes and totals for all transactions. However a continuous challenge Ms. Kudler faces is the purchasing of additional inventory. The company uses forecasting, which allows the company to replenish its inventory based upon historical sales information. For the company to monitor its supply, a system must be implemented that will track individual items and allow managers to re-order necessary inventory from this information. The issue with a forecasting inventory system is that the decisions are based upon past performance, 2 to 3 years old. Unfortunately, sales do not follow the same pattern from year to year. In addition, sales from holidays, birthdays, weddings, and the like are not accounted for under the forecasting system. Every year orders will continue to change depending on the economic stability of the state. Furthermore, holidays will not always be on the same day and will subsequently affect the forecasting information. In the event that too much inventory is order, the excess is donated to charity if in good condition, if not the excess is thrown away. Inventory management is crucial due to the perishing potential of the inventory items. It is a delicate balance because to satisfy customers, there must be enough on hand merchandise to avoid sales losses. It is imperative that Kudler Fine Foods increase the use of technology, if the company is to continue to grow and thrive. Most importantly that is a definite need for a network to assist Ms. Kudler with her communication needs between her stores and add updated software to handle the companyââ¬â¢s inventory needs. To implement the new technology, funding and training will be required. The procurement of new software will be required for Ms. Kudler and her employees to run effectively and efficiently.
Thursday, September 5, 2019
Improving WPA and WPA2
Improving WPA and WPA2 Introduction: WPA is an acronym for ââ¬Å"Wi-Fi Protected Accessâ⬠. It was designed and developed by Wi-Fi alliance as a reponse to the weaknesses and vulnerabilities in the previous wireless security protocol i.e. WEP (Wired Equivalent Privacy). It is a certification program developed by WiFi alliance to indicate compliance with the previous security protocol and secure wireless networks. WPA2: WPA2 is vulnerable to insider attack(If attacker is in the network or somehow gets into the network) under certain conditions. Following are the attacks on WPA/WPA2: PSK (Pre-Shared Key) vulnerability. PSK cracking tool, Eavesdropping. (Attack on PSK Authentication) PEAP mis-configuring Vulnerability. (Attack on Authetication Server) TKIP Vulnerability. (Attack on Encryption) Encyption in WPA2: There are two types of keys used in WPA2 for encryption: Pairwise key(PTK): It is used to protect unicast data frames. Group key (GTK): It is used to protect group addressed data frames like Broadcast APR data request frames. It is used as an encryption key in Access Point(AP) while as a decryption key in Client. Analysis and Improvement of 802.11i (WPA2): The security requirement for WLAN(Wireless Local Area network) industry are data confidentiality. Intergrit, mutual authentication and availability. Primary recommendations: CCMP should be used for data confidentiality. Mutual Authentication must be implemented for security concerns. Addresses DoS(Denial of Service ) in MAC (Medium Access Control)layer. Wireless Threats: Passive Eavesdropping/ Traffic Analysis: An attacker can easilty sniff and store all the traffic in the WLAN. Message Injection / Active Eavesdropping: An attacker is capable of inserting a message into the wireless network with the help of NIC cards(Network Interface cards). Attacker can generate any choosen packet, modify contents of the packet and completely control the transmission of the packet. Message Deletion and Interception: It is done by interfering with the packet reception processon the receivers antenna. eg. Causing CRC errors so that the receiver drops the packet. Message interception means that an adversary is able to control a connection completely i.e an attacker can capture a packet before the receiver actually receives it and decide whether to delete the packet or forward it to the receiver. Masquerading and Malicious AP (Access Point): An attacker can learn MAC addresses by eavesdropping and it can also spoof MAC address. Session hijacking: An adversary may be able to hijack alegitimate session after the wireless devics have finished authenticatin themselves successfully. It can be overcome using data confidentiality and strong integrity meachanism Man in the Middle Attack (MitM): ARP cache posioning is a type of Man in the Middle Attack in case of wired connection. Denial of Service(DoS): An adversary is capable of making the whole Basic Service Set (BSS) unavailable, or disrupting the connection between legitimate peers . Ex. forging the unprotected management frames, protocol weaknesses or jamming of frequency bands with denial of service to the legitimate users. Data Confidentiality and integrity: It defines threee confidentiality security protocols: WEP (Wired Equivalent Privacy). TKIP (Temporal Key Integrity Protocol) CCMP (Counter Mode Cipher Blocking chaining MAC (Message Authetication Code) Protocol). A temporal key (TK) is assumed tobe shared between peers before executing any data confidentiality protocols. Authentication and Key Management: There are two types of Authetication systems: Open System Authetication. Shared Key Authentication. These are not secured so IEEE802.11i definesa new standard viz. RSNA (Robust Security Network Association) RSNA establishment procedure: Network and Security Caability Discovery. 802.11 Authentication and Association. EAP / 802.1X / RADIUS Authentication. 4-way handshake Group key handshake. Secure data communication. Availability: Main cause is due to DoS attack: First, an adversary can launch an 802.11i attack much more easily than a physical layer attack, with only moderate equipment. Second, it is much more difficult for a network administrator to detect and locate these attacks. Layer abstraction is a very important concept in networks, requiring each layer to provide independent functionality separately. Michael Algorithm is used to solve above problems. It woks as follows: When a incorrect packet is detected by Access point, it waits for 60 secs,within this time span of 60 secsif another incorrect packet is received by access point from the same source then it shut down that link. Application: 1. Security for Mobile ATE: The data collected from hardware systems using mobile phones, PDAs application needs to be protected as currently many internet like things are done on mobiles only. We are also aware that the security in mobile phones while accessing internet is not secured.To overcome this, many ATE (Automatic test Equipment) are isolated from networks and run in stand-alone environments. An ATE system describes a single hardware device performing test measurements or a group of devices testing another hardware system. Mobile app developers need to focus on securing data using apps: Configuration of the mobile device. Apps running on the device. Equipment communicating with the device. Wireless connection between the device and ATE. When ATE is sending data out from the device, it can use an https connection, data encryption and user authenticationto ensure that the non-trusted sources will not have access to the data.The wireless connection between the device and the server should be secured using wireless security protocols like WPA,WPA2, HTTPS and AES encryption. Below fig. shows the security concerns for the mobile devices. Fig. Major Mobile Application Server Areas Securing the Wireless Connection: The mobile device should never connect to the ATE system through an unsecure WiFi network. Users must connect to the networks that implements strongest security protocol with encryption included. In strict scenarios, the application must use a secure VPN(Virtual Private Network) to connect to the server. Securing the mobile Device: No amount of coding, server configuration or wireless setup will be useful if the hardware containing the mobile application has already been compromised. Before installing any application on the mobile device, user must check that they have ot already compromised their systems security features by jailbreaking or rooting the device. A jailbroken device is that device where user removes ââ¬Å"Operating system limitations imposed by the manufacturerâ⬠. By both of the process i.e. jailbreaking or rooting, all of the security features that the system designers built-in to protect users are put into jeopardy. Securing the Application: Application must not gain too much controlof the mobile device. Each application must be independent of each other i.e one application must not call other application or use resources of the other. Securing the ATE system: The administrator and the developer on the ATE server need to work together to assure that the server providing the mobile apllication data is secure. Most of the data processing must be done on the ATE server side as it is difficult for the attacker to access data and also computing power is ore on server side. (A)Data Acquisition Methodology: Obtaining black -listed IP addresses: It was obtained from a german website, which was not up-to-date. This blacklisted IP addresses were the primary source for quantifying illegal activities. Associating blacklisted IP addresses with geographic locations: IP addresses were never assigned to a specific geographical area or region. IP addresses were assigned to organisations in blocks or assigned to residences through fixed commercials ISPs. Maxmind provided one such tool named GeoIP. The GeoIP tool contains a database of IP addresses and their corresponding global location information viz. City, State, Country, longitude and latitude. Obtaining security statistics of WiFi deployments: The statistics of WiFi deployments such as percentage of secure access points and the number of blacklisted IP address occuring within the specific deployments for cities. (B) Data Manipulation Methodology: It involves processing the data. Depending on the number of IP addresses balcklisted, city were choosen i.e the city having highest number of blacklisted IP addresses were considered. Data Analysis Methodology: We generated derived statistics of fileds such as IP address availability, WiFi network security and the number of blacklisted IP addresses. Results of Data realated Methodology: Suggestion: After 2006, every wireless enabled device is WPA/WPA2 certified and Trademarked by WiFi alliance. The biggest hurdle is that users are unaware of the wireless security protocols and in the security dialogue box also first one is ââ¬Å"Noneâ⬠and after that there is a list from WEP to WPA2. It has been seen that the user choose ââ¬Å"Noneâ⬠or WEP as a security protocol without knowing exactly what that security protocol does as it comes earlier in the list. So, the first and the foremost thing is do make user aware of the protocols and advice them to use better protocol as per the requirements. For Ex.,Corporate world must use the toughest to decipher protocol whereas normal user can use somewhat lighter version of the protocol with good password, but it must never have the Wireless access without any security protocol i.e. none. References: Security for Mobile ATE Applications by Susan Moran. Malicious WiFI Network: A First Look by Andrew Zafft and Emmaneal Agu. Security Analysis and Improvements for IEEE 802.11i by Changhua He and John C Mitchell .
Wednesday, September 4, 2019
Elements of Fiction in Danielle Steelââ¬â¢s Mixed Blessings :: Danielle Steel Mixed Blessings Essays
Elements of Fiction in Danielle Steelââ¬â¢s Mixed Blessings Danielle Steel, in her work of fiction, Mixed Blessings, has effectively used plot, setting, and theme as she weaves a powerful tale of three couples who face decisions about having children that will test, in unexpected ways, the ties that bind them as lovers, partners, and friends. Steel has used these elements to emphasize that there are people who have such a great need and love for children. In Mixed Blessings, she represents women radically and optimistically as shown by Diana Goode, Barbie Mason, and Pilar Graham, unlike the negative representation of womanhood in the movie version of her other novel, The Ring, where Kassandra feels that taking her own life would save her children and her husband from the shame of her unfaithfulness. First, there is a major plot structure in Mixed Blessings, the plot of complications. Right from the beginning, Steel portrays the female characters in terms of their dreams, careers, and their curiosity about having a family. For instance, Diana is the middle child amongst three sisters; her goal is to classically strive to be better, smarter, and more successful. She feels that she has to achieve something more than her sisters have done. Gayle, Dianaââ¬â¢s older sister has a dream of attending medical school, but she happily succumbs to marriage temptation. In fact, in Steelââ¬â¢s own words Gayleââ¬â¢s situation is described as: Her oldest sister, Gayle, had been set on going to medical school until she met her husband in her first year of premed, married him that June, and instantly got pregnant. . . . Gayle never looked back at a career in medicine once. She was happily married, and satisfied to stay home with her girls and keep busy with them and her husband. She was the perfect doctorââ¬â¢s wife, intelligent, informed, and completely understanding about his hours as an obstetrician. (6) As the plot progresses, Diana has her own complications from the Intrauterine Device (IUD) she has been using for the past eighteen years. The IUD delayed her from having a child immediately after her marriage. Another aspect of plot that Steel has used in this novel is the reversal of fortune, where Diana, the young elegant looking woman, who knows where she is going and what she wants out of life, ends up being frustrated about inability to have a child.
Tuesday, September 3, 2019
Justice After War :: essays research papers fc
Justice after War History ââ¬â Wars ââ¬â Writing Task Wartime is definitely a time of much violence and many things happen during this time, but what about after warâ⬠¦ ââ¬Å"The just war tradition is typically evoked when discussing the decision to launch a war (justice of war) and when evaluating the conduct of forces during war (justice in war). But the tradition does not explicitly specify principles for assessing justice after war, nor does it discuss state obligations upon achieving military victory.â⬠This excerpt was taken from an article by Tony Lang and Mary-Lea Cox. Once victory is earned by one side it must take responsibility to pave the road to peace in that country by building a new political system. This is summarized in Thomas L. Freidmanââ¬â¢s view when he says ââ¬Å"you break it, you own itâ⬠. But maintaining peace in war-trodden country is not easy. There is jealousy from that country, the urge to take revenge; while this is happening the victors have to discuss how to maintain justice. Maintaining the balance between these two is a tedious task. In many conflicts through history the aftermath has been more of a problem to the defeated than the war itself, becoming financially crippled, becoming underdogs of the world, being restricted. These are all problems faced by the dark horse of the battle, after a battle keeping a stability of even-handedness and retribution is a daunting task. Many trials through time have been subject to comments by critics that have made points that justice had no role in the final judgement. In the Nuremberg Trials, of the 21 defendants that were held in custody 11 were sentenced to death (over 50%), three were acquitted and the rest were subject to heavy jail terms. The Nazi atrocities that they were put on trial for were for good reason, though they had been wishing to give them all a fair trial it is obvious that excessive urges to take revenge caused an imbalance in the balance between revenge and justice. Those to be prosecuted were done so because of the brutal ââ¬Å"war crimesâ⬠, ââ¬Å"crimes against peaceâ⬠and ââ¬Å"crimes against humanityâ⬠they had committed. The prosecutors were dominated by a large percentage of Jews, who at this time, excusably, had a fervent hatred for the Nazis, since the Nazis had also had a fervent hatred for them. But this just shows how hard it would have been for these prosecutors to not have had revenge govern their thoughts throughout the trial.
Monday, September 2, 2019
All About Video Recording :: Video Camera Recorder
All About Video Recording Over the past 30 years the advancements in technology have been tremendous, everything from the 80ââ¬â¢s camcorder, which was approximately the size of a cat, to the ones presently, which are approximately the size of your hand. To the creation of digital cameras ,DVDââ¬â¢s and CD-Rââ¬â¢s, as well as so much more. When Purchasing a Video Recorder, there are many aspects of the piece that should be examined, in order to pick out the best quality product for the amount of money you are prepared to spend. Picking between the different types of products is the first step. In the world of digital recording , there are three basic types. The first being Hard Disc Recorders which are also known as Personal Television Recorders, these record all the action without the need for video tapes. With on screen program guides, recording in digital is a simple one-button operation. The next is DVD RAMwhich is the official DVD Recordable format backed by the DVD Forum, DVDRAM records onto a DVD recordable disc that can then be played on most modern DVD players. Lastly, there is DVD+RW which was developed by Philips and Sony, DVD+RW discs can be edited to cut out commercial breaks. They can also be played on most modern DVD players. The quality of the recording is always an important statistic tobe aware of, in video recording, there are four basic levels of quality. The first level is referred to as 2 Heads and is usually used for standard quality mono recording and playback, next there is 4 Heads , which has an improved picture and sound quality and freeze frames. Next, there is 6 Heads which has all the benefits of a 4 head video recorder plus 2 extra heads for greater sound quality. Lastly, there is Super-VHS which provides up to 400 lines of resolution, instead of the usual 240 lines, S-VHS delivers superior picture quality. The next aspect to focus on when purchasing a Video recorder would be the sound quality. In this department there are two basic options Depending on the kind of TV you have and the type of programs you record, you need to consider the type of sound playback you want. The first option would be Mono which is usually for standard recording and playback. Mono video recorders represent great value and are suitable for connection to portable TVââ¬â¢s. The second option would be Nicamstereowhich is a high quality stereo for improved sound reproduction.
Sunday, September 1, 2019
Overall Banking of Bank Asia Limited
[pic] PART A INTRODUCTION OF THE REPORT [pic] [pic]1: Introduction [pic] 1. BACK GROUND OF THE STUDY [pic] Bank is a financial institution whose main aim is to earn profit through exchange of money and credit instruments. A banking company must perform both of the essential function accepting of deposits and lending or investing the same. If the purpose of acceptance of deposits is not to lend or invest, the business will not be called banking business. It may be said that banking in its most simple form, is as old as authentic history. As early as 2000 B. C. Bany Lonians has developed a system of banks.In ancient Greece and Rome the practice of granting credit was widely prevalent. According to some authorities the word ââ¬Å"Bankâ⬠is derived from the words banco, bancus, banque or bance. All of these words mean a bench upon which the mediaeval European bankers used to sit with their coins to transact banking business. When a banker failed to meet his obligations, the angry p eople used to break up his ââ¬Å"bancoâ⬠. The account for origin of the word ââ¬Å"Bankruptâ⬠which means bank failure but whatever be the origin of the bank, the word came to be used in Europe from the middle age in connection with the business of bank.Money also links the history of banking. It created a logical necessity of banks. However, the birth of present day banking is not sudden. It has come to its present stage through a process of development. During the last decade, banking became the most competitive industries of Bangladesh with a huge amount of growth. A large number of new banks have made their way in the industry and yet there are more to come. In such a highly competitive service industry, ââ¬Ëcustomer satisfactionââ¬â¢ is a very important factor to consider. High customer atisfaction and loyalty give an organization a better base than its competitors and allows it to flourish in the industry. 2. OBJECTIVE OF THE STUDY [pic] General Objective The general objective of preparing this report is to fulfill the requirement of project work as well as completion the BBA Program through gaining the experience and view the application of theoretical knowledge in the real life. Also find out the Operational Process of the Bank and itââ¬â¢s overall Performance. Project Objective The objectives of this report are the followings: Get introduced with the idea of ââ¬Å"Customer Service Qualityâ⬠in Bank Asia Ltd. ? Introduce with the Bank service quality assessment tools ? Techniques to win a strong customer base ? To know the expectations of customers of Bank Asia Ltd. ? To analyze different activities of different desk. ? To analyze different rules and regulations of the Banking System. ? To analyze the procedures of making loan. ? To analyze how to provide better customer service. ? To analyze how bankers introduce their product to the clients and customers. To know how people communicate with clients, customers and head offic e about different purposes and how they use information system. ? To Know the position of Bank Asia Ltd in the Market ? To know the studyââ¬â¢s and conditions of overall performance ? To make some recommendations and conclusion to further the development of Retail products of Bank Asia Ltd. 1. 3 Methodology of the study [pic] To make the report more meaningful and presentable, two sources of data and information were used widely. Both primary and secondary data sources were used to prepare this report.The nature of this report is descriptive with some survey or using sampling method. Most of the necessary information has been collected by a questionnaire, officers working in Retail Banking. 1. 4 DATA COLLECTION [pic] Both the primary and secondary forms of data are used to make the report more rich and informative. The details of these sources are gives below: Primary Sources Most of the information was acquired by discussing with the officers working in the Patherhat Branch of Bank Asia Ltd. Observation and work experience with different divisional in-charges and suggestions of many executives of the bank.Secondary Sources Annual Report of the Bank Asia Limited. Various books, articles, compilations etc. Websites of the Bank. Instruction circular of Head Office, brochures of different banks, newspapers and magazines regarding banking issues, seminar papers and so on. 1. 5 LIMITATIONS [pic] The report was not free from limitations. The study has been conducted on the subject of ââ¬Å"Activities in Bank Asia Limitedâ⬠. The Officers of Bank Asia have provided all the necessary information with his best abilities. Key limitations of the study are as follows: The internship is a very short period of time. During this short period it is very difficult to study about Bank Asia properly. ? The data and information collected from Bank Asia was not clearly related with the topic. ? The study was not successfully completed due lack of knowledge of banking profession. ? Some data and information was not provided by Bank Asia due to maintain secrecy. ? The data that are collected contained lots of information so it is very difficult to represent all information concisely. ? Bank is a very busy organization with comparison to others.There are rushes of people for about whole the day and the officers have to transact with them. So it is very much tough for Credit Officers to allocate time for me. [pic] PART B COMPANY PROFILE [pic] [pic]2: COMPANY PROFILE [pic] 2. 1 ABOUT BANK ASIA [pic] Bank Asia is one of the renowned and successful banks in Bangladesh established in 1999. The paid up capital of the Bank is 1116 million. With in very short time Bank Asia has established itself as one of the fast growing local private Bank. Now it has 66 branches in its network. It has own ATM service.It provides ATM service through other banks too. Mr. A. Rouf Chowdhury is the Chairman of Bank Asia. Bank Asia is operated by the experienced, qualified, professional management teams whom have exposure in the international market. In the year 2003 the Bank again came to the limelight with over subscription of the Initial Public Offering of the shares of the Bank, which was a record (55 times) in our capital marketââ¬â¢s history and its shares commands respectable premium. Bank Asia is maintaining itââ¬â¢s competitiveness by leveraging on its Online Banking Software and modern IT infrastructure.It the pioneer amongst the local Banks in introducing innovative products like SMS Banking and under the ATM Network the Stelar Online Banking Software enables directs linking of a clientââ¬â¢s account, without the requirements for a separate account. Bank Asia has long experience in the financial sector of our country. By their programmatic decision and management directives in the operational activities, the Bank has earned a secured and distinctive position in the banking industry in term of performance, growth and excellent manage ment. 2. 2 CORPORATE INFORMATION[pic] ? Letter of intent received : 24/02/1999 First meeting of the Promoters held: 15/04/1999 ? Certificate of incorporation received: 28/09/1999 ? Certificate of commencement of Business : 28/09/1999 ? First meeting of the board of Directors held: 01/10/1999 ? Banking license received : 06/10/1999 ? First branch license received: 31/10/1999 ? Inauguration of Bank : 27/11/1999 ? Date of publication of Prospectus : 29/06/2003 ? Date of IPO Subscription : 23/09/2003, 24/09/2003 ? Date of first share trading in Bourse : 08/01/2004 ? Date of agreement with CDBL : 20/12/2005 ? Date of first scrip less trading : 30/01/2006 Numbers of Promoters: 22 ? Numbers of Directors: 11 ? Numbers of Branches : 66 ? Auditors : S. F. Ahmed &CO. Chartered Accountants House #25, Road # 13A, Block- D, Banani, Dhaka- 1213. ? Registered Office: Tea Board Building (1st floor) 111-113, Motijheel C/A, Dhaka ââ¬â 1000, Bangladesh. 2. 3 MANAGEMENT HIERARCHY OF BANK ASIA LIMIT ED [pic] 2. 4 MISSION STATEMENT OF BANK ASIA [pic] To assist in bringing high quality service to our customers and to participate in the growth and expansion of our national economy.To set high standards of integrity and bring total satisfaction to our clients, shareholders and employees. To become the most sought after bank in the country, rendering technology driven innovative services by our dedicated team of professionals. 2. 5 VISION OF BANK ASIA [pic] Bank Asiaââ¬â¢s vision is to have a poverty free Bangladesh in course of a generation in the new millennium, reflecting the national dream. Our vision is to build a society where human dignity and human rights receive the highest consideration along with reduction of poverty. 2. 6 COMMITMENT & CULTURE OF BANK ASIA LTD. pic] 2. 6. 1 Social Commitment: Though the purpose of Bank Asia is obviously earning profit, but the promoters and equity holders are aware of their commitment to the society to which they belong. 2. 6. 2 Corpor ate Mission: â⬠¢ To provide high quality financial services in export and import trade. â⬠¢ To provide excellent quality customer service. â⬠¢ To maintain corporate and business ethics. â⬠¢ To become a trusted responsibility of customerââ¬â¢s money and their financial advisor. â⬠¢ To make their stock superior and rewarding to the customers/ share holders. â⬠¢ To display team sprit and professionalism. To have a sound capital base. 2. 6. 3 Corporate Culture: Bank Asia is one of the most disciplined banks with a distinctive corporate culture. Here we believe in shared meaning, shared understanding and shared sense making. Our people can see and understand events, activities, objectives, objects and situation in a distinctive way. They mould their manners and etiquette, character individually to suite the purpose of the bank and the needs of the customers who are of paramount to us. The people in the bank see themselves as a tight knit team/ family that belie ve in working together for growth.The corporate culture we belong has not been imposed; it has rather been achieved through our corporate culture conduct. [pic]3: TECHNOLOGY AND INNOVATION [pic] 3. 1 DELIVERY CHANNEL [pic] Focusing of the need for increasing customerââ¬â¢s service delivery point Bank Asia has been continuously adding new items. Their delivery channels now include 32 branches one booth, ATMs, internet banking, POS machine of Dutch Bangla Bank Ltd. and mobile banking. 3. 2 BRANCH NETWORK [pic] Bank Asia intends to achieve to attain balanced growth and expansion of its branch network.Aiming to extend their service and to increase their reach rapidly to their growing and valuable clients. Bank Asia always looking for opportunities for adding more branches to their growing network. 3. 3 ATM [pic] Bank Asiaââ¬â¢s ATM Service has been well embraced by the clients since it provides them most flexibility in handling cash money and ensures uninterrupted banking faciliti es round the clock. In the face of growing demand they arranged for addition of new ATMs and set up 10 additional machines during the year 2007.Now they have ATMs of their own also they have under share arrangements 93 ATM E-cash booths and 226 ATMs of Dutch Bangla Bank Ltd. 3. 4 INTERNET BANKING [pic] Internet banking facilities change their business process, since many customers fell comfortable to execute transaction through internet. The transaction through internet has grown very fast in the recent year. Their internet banking further improved in 2007 and their customer can change their profile, stop payment of issued cheques, see the status of cheques, request a cheque book etc. n addition to existing facilities like fund transfer, balance and transaction enquiry etc. 3. 5 CREDIT CARD FACILITIES [pic] Bank Asia now provides credit card to its customers and clients. Through this card a client can draw money from any bank. [pic] PART C GENERAL BANKING(AN OVERVIEW) [pic]4: GENERA L BANKING (AN OVERVIEW) [pic] 4. 1 Banking Service of Bank Asia Ltd. [pic] Banking Services General Banking Credit/Advance Foreign Exchange CashCash Credit (HYPO)Import AccountsCash Credit (PLEDGE)Export RemittanceCash Credit SchemeRemittance Clearing House Lease FinancingCustomer Service Saving Overdraft 4. 2 CUSTOMER SERVICE[pic] Accepting Deposit: There are three kinds of deposits in Bank Asia those are as follows: a) Demand Deposit. b) Time Deposit. c) Scheme Deposit. a) Demand Deposit: The deposit from which depositors can withdraw money without any notice is demand deposit. These demand deposit also three categories those are as follows: 1) Current deposit (CD Account). 2) Saving Deposit (Saving Account). 3) Short Term Deposit (STD Account). b) Time Deposit: This deposit is called FDR (Fixed Deposit Regular).The amount in this account is payable only after time stipulated. There are three types of time deposits those are as follows: FDR # One Month 10% # Three Month 12. 5% # S ix Month 12. 5% # One Year 12. 5% # BASP 14% C) Scheme Deposits: With the growth of the middle classes and classes of people having a monthly and regular source of income, from which people deposit a specific amount in the Bank at a regular interval of time, is called Scheme Deposit. The following accounts are under Scheme Deposit A/C: 1. Deposit pension Scheme (DPS),2. Monthly Saving Scheme (MSS), 3.Monthly Income Scheme (MIS), 4. Super Saving Scheme (SSS),5. Multi plus Saving Scheme (MPSS). 4. 2. 1 ACCOUNTS OPENING PROCEDURE [pic] To open a new account an applicant has to maintain number of formalities. Bankââ¬â¢s officer also is careful whether necessary documents are provided by the new account opener. To open a new account following formalities have to be maintained: ? An introducer who introduces new account holder to the bank. ? Two copies of passport size recent photograph attested by the introducer. ? Account opening form duly filled. ? Signature card duly signed. One co py of photograph of nominee. ? After fulfilling the above formalities, Bank provides to the customer a deposit slip book and a cheque book which is marked by his new account number. ? If it is joint account each and every person has to provide their details and signed into the account opening form. ? Letter of thanks to the account holder and introducer For Partnership firm: If it is a Partnership firm there is some additional formalities have to be maintained, those are as follows: ? Partnerââ¬â¢s signature ? Partnerââ¬â¢s name and address. ? The nature of the firmââ¬â¢s business Two copies of photograph for each and every partner, duly attest by the introducer. ? Account must be introduced properly. ? Introducerââ¬â¢s signature on account opening form has to verify by an officer under full signature. ? Certified true copy of the memorandum of the firm. ? Registered partner ship deed. ? In case of joint account, operational instructions are to be signed by the joint acc ount holders. For proprietorship business: ? Declaration of proprietorship ? Photocopy of Business trade license. ? Account agreement form. ? Photocopy of TIN certificate. For Limited Company: Certified true copy of Memorandum & Articles of Association of the company. ? Latest audited balance sheet of the company. ? Latest copy of companyââ¬â¢s income statement. ? Certificate copy of incorporation of the company for inspection and returned with a duly certified photocopy for bankââ¬â¢s record. ? Certificate from the registered of the joint stock companies that the company is entitled to commence business (in case of public limited co. for inspection and return) along with a duly certified photocopy for bankââ¬â¢s record. ? Name and address of the board of directors. ? Authorized signature. Extra resolution of the board, general meeting of the company for opening the account and authorization for its operation duly certified by the Chairman/ Managing Directors of the company . ? Full name of the company and full address of head office. General condition for opening current and saving account: ? At least Tk. 2,000/- for current account and Tk. 1,000/- for saving account has to deposit while account is going to open. 4. 2. 2 ISSUE OF DUPLICATE CHEQUE BOOK [pic] When an account holder loss his cheque book he has to inform it to the bank. Then bank stop any amount from that account.Account holder has to apply to the bank through application to new cheque book. Then fresh cheque book is issued instead of lost one after verification of the signature of the account holder from the specimen signature card and on realization of required exercise duly only with prior approval of manager of the branch. Cheque of the new cheque book is recorded in the ledger card and signature card ass usual. Series number of lost book is recorded in the stop payment register and caution should be exercised to guard against fraudulent payment. 4. 2. 3 CLOSING OF AN ACCOUNT [pic]The re are some reasons for which account may be closed those are as follows: ? If the customer is desirous to close the account. ? If the bank finds that the account is inoperative for a long duration. ? If garnishee order is issued by the court of Bank Asia. ? To prevent money laundering some times Bangladesh Bank order to the bank to close the account of the black money holder. To close the account, the cheque has to be returned to the bank. Bank Asia takes all the charges by debiting the account and remaining balance is then paid to the customer. Necessary entries are given to the account closing register and computer. . 2. 4 ISSUING OF PAY ORDER [pic] A pay order is an instrument from one branch to another branch of the same bank to pay a certain sum of money to the person there on or to his order. Unlike the cheque, there is no possibility of dishonoring pay order because before issuing PO, bank takes the money of the pay order in advance. The pay order purchaser has to apply in a prescribed form with a credit voucher for the amount of pay order and other credit vouchers for commission and VAT. 4. 2. 5 TELEGRAPHIC TRANSFERS (TT) [pic] TT is the quickest method of transferring funds from one place to another.The remitting branch sends a telegraphic/ telephone message to the other end, to pay a certain sum of money to a named payee. Such a message is usually sent in code language. Prefixing or suffixing a check cipher authenticates the message. A check cipher for a remittance is worked out on a test key table, access to which is allowed only by authorized officers. The codebook is always kept in the custody of authorized officers. All T. T. are following by written confirmations under the signature of authorized officer of the remitting branch. The receiving branch, after thoroughly checking the telegraphic message, acts on it. . 2. 6 ISSUING CERTIFICATE [pic] Bank Asia provides different certificates to its clients and customers. It provides Bank Certificate to its clients for opening BO account and deduct Tk. 200/- as service charge. Bank Asia provides solvency certificate too to prove that their client is financially solvent. This solvency certificate is needed if client is willing to go to abroad or opening new business. 4. 3 ACCOUNTS DEPERTMENT [pic] Following things are done by the Accounts Department: ? Pass outward instrument to the clearing house. ? Pass inward instrument to respective department. Return instrument in case of dishonor. ? Prepare OBC and IBC for the respective branch and head office. ? Verify dailyââ¬â¢s cash expenses and issuing cash voucher sleep for different necessary daily expenses. ? Issuing credit voucher for remittance coming from abroad. ? Receiving clearing cheque from teller department and bank wise separate the cheques and send those to the clearing house. ? Recording of return cheque from different banks and back to return it to the clients. ? Prepare OBC request letter to head office for collecti ng fund out side of the city. The following entries are given if the cheque is honored.Customer A/C Debit Bank Asia general A/CCredit Bank Asia Principle Branch clears its cheque through the head office as well as the cheque of other branches, because it is only permitted. The other branches send the instrument through IBCA. Bank Asia principle branch act as an agent in this case. For this the concern branch gives the following entries: Bank general A/C Debit Customerââ¬â¢s A/C Credit If the instrument is dishonored, the instrument is returned to the concerned branch through IBCA along with the following entries: Incase of return for inward instrument. Bank general A/CDebit Customerââ¬â¢s A/CCreditIncase of return for outward instrument: Customer A/C Debit Bank general A/CCredit Incase of returning an instrument the respective officer usually looks for following reasons: ? Insufficient fund ? Drawerââ¬â¢s signature differs. ? Amount in word and figure differ ? Refer to draw er ? Stop payment ? Not arrange for ? Effect not cleared may be presented again. Receiving cheque for collection: In Bank Asia, cheques of its customers are received for collection from other banks. In case of receiving cheque, following points should be checked. ? The cheque should not carry a date older than the receiving date for more than 6 months.In that case it will be a ââ¬Ëstale chequeââ¬â¢ and it will nit be allowed for collection. Again the date of the cheque should not be more than one day forward than the receiving date. ? The amount in figures and words in both sides of the pay-in-slip should be same with the amount mentioned in the figure and word in the cheque. ? The name mentioned in the cheque should be same in both side in pay-in-slip and it should be the same with the name mentioned in the cheque. ? The cheque must be crossed. 4. 4 CREDIT DEPERTMENT [pic] Consumer Credit is a part of Credit Department which involves in generating loan to the client.Bank Asia Station Road Branch provides four categories of loans those are as follows: 1. Consumer Durable Loan. 2. Auto Loan. 3. House Finance. 4. Unsecured Personal Loans. 4. 4. 1 HOUSE FINANCE [pic] Regulations for House Finance Loan: ? House Finance Loan is provided for the long period of time (Maximum 15 years including 1 year grace period). ? Loan to price ratio: The loan to price ratio is 80%. It means bank finance 80% amount of required amount. Bank provide loan for the construction which is already completed up to ground floor. ? Rate of interest of house finance loan of Bank Asia is 16%. ? Loan size: Loan Size is Tk. 3, 00,000. 0 to Tk. 50, 00,000. 00. ? Maximum Exposure (Bank Equity) 20%. ? Age of the applicant must be between 25-65 Years. ? DBR: DBR (Debt Ratio) have to 40%. ? Processing Fee: 0. 5% or 5000/- whichever is higher. 4. 4. 2 CLOSING OF AN ACCOUNT [pic] Regulation for Auto Loan: ? Auto Loan is provided for purchasing new vehicle. ? Loan to price ratio: If it is recondit ion car bank will finance 80% of the total price and if it is new vehicle bank will finance 90% of the total price. ? Rate of interest of Auto Loan is 16%. ? Loan size: Loan Size is maximum Tk. 20, 00, 000. 00. ? Maximum Exposure (Bank Equity) 20%. ? DBR: DBR (Debt Ratio) have to 40%. Tenor: Auto Loan provided for 60 months (for recondition vehicle), and for 72 months (new vehicle). ? Processing Fee: 1% or 5000/- whichever is higher. ? Age of the applicant must be between 25-65 Years. An application is provided to BRTA as if the vehicle is registered at the name of Bank Asia & the applicant. 4. 4. 3 CONSUME DUALE LONE [pic] Consumer Durable Loan provided to business man as financial assistant. There are some rules and regulations for consumer durable loan those are as follows: ? Loan size: Loan Size is Tk. 50, 000. 00 to Tk. 5, 00,000. 00. ? Rate of interest of Consumer Durable Loan is 17%. Maximum Exposure (Bank Equity) 40%. ? DBR: DBR (Debt Ratio) have to 33%. ? Tenor: Auto Loan p rovided for minimum 6 months or maximum 48 months. ? Processing Fee: 1% or 1000/- whichever is higher. ? Age of the applicant must be between 25-57 Years. ? Loan to price ratio 70%. 4. 4. 4 UNSECURED PERSONAL LONE [pic] Unsecured Personal Loans for service holders, business man will not apply for this type of loan. There are some rules and regulations for Unsecured Personal Loans those are as follows: ? Loan size: Loan Size is Tk. 25, 000. 00 to Tk. 5, 00,000. 00. ? Rate of interest of Consumer Durable Loan is 17%. Maximum Exposure (Bank Equity) 20%. ? DBR: DBR (Debt Ratio) have to 33%. ? Tenor: Auto Loan provided for minimum 12 months or maximum 48 months. ? Processing Fee: 1% or 1000/- whichever is higher. ? Age of the applicant must be between 25-57 Years. ? Loan to price ratio: Not applicable. 4. 4. 5 NECESSARY DOCUMENTS FOR A LOAN PROSESSING [pic] ? Latest license copy provided by the city corporation (Trade License). ? TIN Certificate. ? Nationality certificate/ Passport. ? In come statement (Last 6 months). ? Statement of purpose of loan. ? Reference. ? Guarantorââ¬â¢s information and his/her photograph. Utility bill (telephone bill, electric bill etc). ? Necessary information of existing assets and liability. ? Bank transaction last six months. ? Sources of funds from which borrower can repay the loan. ? Received security advance cheque against loan amount which is properly signed by the borrower. ? Joint necessary stump with the loan application book. Stamp charge may receive on cash or adjust from the account of the applicant. 4. 4. 6 GENERAL POLICY GUIDELINE [pic] ? Bank Asia make loan to the reputed clients. ? Encourage lending to socially desirable, nationally important and financially variable sector. Satisfactory security and collateral is required including source of repayment both primary and secondary source. ? Bank Asia may consider terms loan with maturity up to five years. ? Bank Asia extent credit facilities to the area, which the branc h located and size and ability of its stuff to supervise and monitor the same also considered. ? Maximum size of the loan port folio. ? The banking corporation act 1991 restricts lending to any single obligor or a group of companies up to 15% of the capital funds of bank without having approval of Bangladesh Bank.With the Bangladesh Bank the maximum limit can go up to 100% of the capital of the bank. 4. 4. 6 CIB REPORT [pic] Bangladesh Bank established Credit Information Bureau (CIB) with a view to provide information of the borrower to the schedule banks as per requirement. It is one of our credit policies that the bank wilts not sanction/ disburses any loan facility to a defaulter. Therefore to process a loan CIB report is mandatory one. So by CIB inquiry we can get the report on our clients from Bangladesh Bank. As per credit policy a Loan outstanding of Tk 50,000. 0 and above must be reported to Bangladesh bank Inputs the information of all the borrower status in CIB report whet her he is defaulter or not. So the purpose of CIB is to get the borrower(s) credit information with a view to sanction a loan. This is very important because without having CIB a loan cannot be sanctioned. It is also a tool for discourage loan defaulter in our country. CIB functions can be divided into two classes: CIB Inquiry. CIB Reporting. CIB INQUIRY: The following forms are required for CIB Inquiry: 01. Letter of Undertaking (Annexure ââ¬â Ka) to be obtained from the individual client. 02. Inquiry Form: CIB ââ¬â 1AIt covers the information of the debtors / individual borrower or company. Name ET address is mentioned here. It is to be filled up by the bank in Capital letter/ type. 03. Inquiry Form: CIB ââ¬â 2A For institutional client this is necessary. It covers the information of the owners of the concerned borrowing company/firm. In case of individual client this form is not necessary. 04. Inquiry Form: CIB ââ¬â 3A This form covers the information of group rel ated business concern of the borrower and any of its owners. Special Note: The name of the borrower / owners should be mentioned in full and must not be abbreviated.CIB REPORTING: The followings forms are required to report to Bangladesh Bank at monthly or quarterly basis. In case of loan limit one crore ET above it is need to be reported monthly and the entire loan amounting Tk. 50,000/- above are required to report quarterly. Form: CIB-1This from is related to borrower information only. Proper sector code and other information should be incorporated properly. Form: CIB ââ¬â 2 This form is related to the owner(s) information of the borrowing company. Ownerââ¬â¢s code and other information should be incorporate properly. Form: CIB ââ¬â 3This form is related to group / affiliated concern(s) information of the borrower and or any of its owners. Form: CIB ââ¬â 4 This form represents the credit exposure of the borrower with the reporting bank. Dotted boxes are need not re quired to be reported. Economic purpose code, security code, Classification status and other information should be incorporated property. Form: CIB ââ¬â 5 This form is related to the guarantor(s) information of the borrower. All the form should be filled in full name with proper address, Abbreviated name are not acceptable. The impact of CIB in our country is very positive. CIB discourage loan defaulters.A loan defaulter cannot participate in any election as a candidate. It is also a way to harass the defaulter socially. At the initial stage of CIB [about 1990] total classified Loan was detected 41 %. By introducing CIB the percentage of classified loan could be minimized. So indirectly it helps our economy. It also helps the schedule bank by way of providing information as per requirement. [pic] PART D PERFORMANCE EVALUTION BANK ASIA (PATHERHAT BR. ) [pic]5: PERFORMANCE EVALUTION BANK ASIA (PATHERHAT BR. ) [pic] 5. 1 DEPOSIT [pic] Bank Asia, Patherhat Branch launched it operati on on 13th April,2012.AD The deposit volume of Bank Asia Ltd, Patherhat Branch, Chittagong is continuously increasing. The deposit amount is 19 crore at |April,2012. Through the following table the deposit position of Bank Asia Ltd Branch is shown. Showing monthly Deposit of Bank Asia Ltd. Patherhat Branch from the month of December,2011 to April,2012. Deposit (Amount in Crore) |Month |December |January |February |March |April | |Deposit |167446961 |174431349 |178152397 |173798455 |190064299 | 5. 2 ADVANCE [pic]The credit volume of Bank Asia Ltd, Patherhat Branch is increasing day by day. Showing monthly Deposit of Bank Asia Ltd. Patherhat Branch from the month of December,2011 to April,2012. Loans and Advance |Month |December |January |February |March |April | |Loans and Advance |12442268 |9877521 |10921573 |15813095 |19803015 | 5. 3 TOTAL INCOME [pic] The total income of Bank Asia is increasing day by day. Net loss of the branch is decreasing day by day by its acclerated efforts t o go the horizon of Profit. Month |December |January |February |March |April | |Total Inocme |1585091 |1760171 |1595499 |1777016 |1957001 | 5. 4 TOTAL EXPANSE [pic] With expansion of opeation of the branch, the total expense of the branch is incrasing day by day. |Month |December |January |February |March |April | |Total expense |3236019 |2337849 |9169238 |2372934 |2407706 |Position for the month of March, 2012:- |Particulars |Monthly Position of February 2012 |Monthly Position of March 2012 |Cumulative up to March, | | | | |2012 | |Total Deposit |178,152,397. 55 |173,798,455. 59 |173,798,455. 59 | |Total Advances |10,921,573. 95 |15,813,095. 60 |15,813,095. 60 | |Interest Income |1,571,766. 70 |1,745,422. 9 |5,052,804. 32 | |Other Income |23,732. 57 |31,593. 58 |79,882. 32 | |Total Income |1,595,499. 27 |1,777,016. 70 |5,132,686. 35 | |Interest Expenses |1,393,856. 72 |1,488,478. 72 |4,387,861. 15 | |Other Expenses |775,381. 63 |884,456. 00 |2,492,141. 53 | |Total Expenses |2,169,2 38. 35 |2,372,934. 4 |6,880,002. 68 | |Net Provisional Profit/Loss |(573,739. 080 |(595,918. 77) |(1,747,316. 33) | |Foreign Inward Remittance |2,415,193. 08 |1,984,934. 01 |6,289,562. 22 | of Bank Asia, Patherhat Branch is given belowââ¬â [pic] PART E JOB PART [pic]6: JOB PART [pic] 6. 1 JOB DESCRIPTION [pic] In order to achieve best service quality Bank Asia has separate department called ââ¬Å"CUSTOMEN SERVICE DEPARTMENTâ⬠, which is responsible of maintaining over all services of the bank to satisfy customers.To establish world class guest experience in all its operations it mainly focusing on people, infrastructure, technology, products and process. In order to ensure such experience Bank Asia always looks for enthusiastic people as employee and interns as well. I was doing the Internship under customer service depertment from January 25March, 2010 to May 25, 2012 in Patherhat branch. 6. 2 KEY RESPONSIBILITIES [pic] ? Ensuring first hand services to the client. ? Keep observing the service activities during the service hour. ? Guiding lost clients to have proper services. ? Having clients suggestion and complains and reporting to BM. Ensuring clients solutions and quality services. ENSURING FIRST HAND SERVICES TO THE GUEST: [pic] Bank is a financial institution so it is very tuff for a guest to know each service point. They sometimes come up with such problems for which they need not to talk to customer service manager or Branch manager. Like ââ¬â how to write a deposit slip or how to use ATM card in booth etc. in that situation my primary duty was to greet them so that they rely upon me to have on the spot service. On the other hand my primary duties are understanding guestââ¬â¢s problem and guide him or her to talk with the right person on the right desk.KEEP OBSERVING THE SERVICE ACTIVITIES DURING THE SERVICE HOURS: [pic] During the service hour, many unusual situations may arise. So my another duty was to keep looking into those situat ions and make instant solutions like keep looking whether staff behaving the way they should behave or not. To look after whether any staff is ignoring any customers or not, was my another job duty. GUIDING LOST GUESTS TO HAVE PROPER SERVICES: [pic] It is usual situation that different professions people come to bank every day. Some profession people come to bank for the first time and doesnââ¬â¢t know verall service arrangement of the bank. They enter into the branch and starts wondering around within the bank. They get completely lost. So, my responsibility was to listen and guide them in a proper way. HAVING CUSTOMER SUGGESTION AND COMPLAINTS [pic] Since each branch is a touch point for the bank so itââ¬â¢s the better option for SQ department to have better guest experience. Another duty is to collect such suggestions and complain from guests and reporting to the Branch Manager. ENSURING CUSTOMER SOLUTION AND QUALITY SERVICES [pic] A guest should have a complete solution of a problem from branch.If it is not possible for customer service officer then take him/her to customer service manager even if it is not possible for the CSM then take him/her to BM. In the meanwhile I have to ensure the quality service to the guest. 6. 3 DIFFERENT ASPECTS OF JOB [pic] There are five essential areas to excellence in guest experience. Bank Asia Client experience standard will apply it the five aspects for excellence in guest experience listed belowââ¬â 1) People 2) Premises 3) Papers 4) Processes and 5) Practices People: The team who serves the clients. Premises: The location or place where we serve the clients. Papers: The documents we use to provide and receive information and to communicate with our clients and colleagues. Process: the process that enable us to delight our clients. Practices: the way we interact and talk with our clients. For keep concentrating on service issues, Bank Asia has prepared client experience fundamentals for its entire team me mber. Bank Asiaââ¬â¢s client standards areââ¬â o BOLD: All team members are will be bold and on behalf of their clients and colleagues. They will be first to greet, first to listen and first to make any suggestions.They are the persons who satisfy the demands of the clients even if they are unexpressed o RELIABLE: The team member will take full ownership in serving their clients to their complete satisfaction o APPEALING: The team members have to ensure that all clients touch points are appealing and inviting o CONSISTENT: The team members will ensure that their clients experience quality is consistent in all aspects across all clients service point all the time. Apart from the above mentioned jobs, I was appointed for following works as well. Software called Stelar where I have to do: CIF (Customer Information Form). A/C verify & close FDR, DPS opening Cheque book, ATM card issue, Active. My major job purpose & principle accountabilities in the banks are as follows: Ensu re account opening, modification, closing, and ATM card & Cheque book requisition and remittance activities. Implement client service strategies to achieve Bank Asia objective and plans Ensure quick resoling of client quires and issues Efficiently handle customer complains Properly maintain FDR, ATM, Account and other registers Receiving checks, issue cheque book, Fund transfer Verifying check book register, Customer Signature verification Writing pay order, Statement inquire Checking balance as per individual customer request Providing all kinds of general banking information to the customers Issuing check books and posting them into the system. 7: RECOMMENDATION [pic] ? Since the branch is situated in a suitable place, so it should introduce ATM Booth of its own very soon. ? Clearing Department should be under online. ? Locker should be introduced. ? To reduce the working presure of the existing employees new capable employees should be employed. Since there are huge numb er of coverage loan, a recovery team should be introduced. ? Banks marketing policy should be more stronger to influence big corporate clients joint with them. ? Bank Asia can introduce about their product and service through different TV channels. So that every initiative of the bank can go at the door the customers. ? More training facilities should be introduced for the junior officers. 8: CONCLUSION [pic] Bank Asia Limited is one of the most renowed growing bank in the country. It is true that Bank Asia increase its growth and popularity with in very short period of time.It has ensured because they have efficient, capable, professional, talent work force. All the officers are very much comitted, helpful and cooperative so that necessary information accumulate through this report. I wish total success of Bank Asia Limited, Pather Hat Branch, and special thanks to Mr. Niaz Ahammed Rashed (FAVP & Manager), SantoshKumar Bhowmik (EO & Sub Manager), and all officers &employees of Path erhat Brahnch, Chittagong. 9: GLOSSARY [pic] IBC:- Inward bills for collection. OBC:- Out ward bills for collection. CIB:- Credit Information.IRC:- Import Registration Certificate. ERC:- Export Registration Certificate. TIN:- Tax Identification Number. BIN:- Business Identification Number. L/C:- Letter of Credit. FDR:- Fixed Deposit Regular. SME:- Small and Medium Enterprise. CCI&E:- Chief Controller of Import and Export. LCA:- Letter of Credit Authorization. B/L:- Bill of Lading. B/E:- Bill of Exchange. STD:- Short Term Deposit A/C. SOD:- Secured Over Draft. LBC:- Local Bills for Collection. LTR:- Loan Against Trust Receipt. FOB:- Freight On Boat. DBR:- Debt Burdeb Ratio. CPV:- Contract Point Verification.SWIFT:- Society for Worldwide Inter-bank Financial Telecommunication. ICC:- International Chember of Commerce. 10: BIBLIOGRAPHY [pic] â⬠¢ Bank Asia Limited. Management Trainee Report. â⬠¢ Bank Fund Management, Dr. A. R. Khan. â⬠¢ Jeff Madura. International Financial Ma nagement. (West Publishing company, 4th edition, 1995). â⬠¢ Rose, P. S. (1999). Measuring and Evaluating Bank Performance. Commercial Bank Management, Fourth Edition. â⬠¢ Annual Report of Bank Asia Ltd. â⬠¢ www. bankasia. com TITLE OF INTERNSHIP: GENERAL BANKING PRACTICE OF BANK ASIA LIMITED Objective of the Study:The major objective of the study is to evaluate the general banking practice of Bank Asia Ltd. To achieve these major objectives, the specific objectives of the study are mentioned below: 1. To high light the authorities involved in general banking of Bank Asia Ltd. 2. To examine the Account opening system of Bank Asia Ltd. 3. To show the Product or Services of Bank Asia Ltd. 4. To evaluate the General Banking Function of Bank Asia Ltd. 5. To find out problems of general banking practice of Bank Asia Ltd. 6. To give suggestions for improving of general banking practice of Bank Asia Ltd. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â BANK ASIA | | |CHAIRMAN | |PRESIDENT AND MANAGING DIRECTOR | |DEPUTY MANAGING DIRECTOR (DMD) | |SENIOR EXECUTIVE VICE PRESIDENT (SEVP) | |EXECUTIVE VICE PRESIDENT (EVP) | |SENIOR VICE PRESIDENT (SVP) | |VICE PRESIDENT (VP) | |FIRST VISE PRESIDENT (FVP) | |ASSISTANT VICE PRESIDENT (AVP) | |FIRST ASSISTANT VICE PRESIDENT (FAVP) | |SENIOR EXECUTIVE OFFICER (SEO) | |EXECUTIVE OFFICER (EO) | |SENIOR OFFICER (SO) | |MANAGEMENT TRAINEE OFFICER (MTO) | |OFFICER | |JUNIOR OFFICER (JO) | |ASSISTANT OFFICER (AO) | |BANKING OFFICER (BO) | |TRAINEE OFFICER (TO)/TELLER | | [pic] [pic] [pic] [pic] [pic]
Saturday, August 31, 2019
Compare and Contrast the Presentation of Love in the Relationships Between Edgar and Catherine and Catherine and Heathcliff
The two most significant relationships in Catherine's life are with Edgar and Heathcliff; however, they could not be more different. Her relationship with Heathcliff is one of raw, natural passion not social stamina, whereas her marriage to Edgar is one based on convention. Her two lovers come to represent the two conflicting parts of her identity and it is the internal struggle between these conflicting impulses that can be said to lead to her death. As the novel opens, Mr Lockwood says that Heathcliff is a ââ¬Ëdark-skinned gypsy in aspect in dress and manners a gentlemanâ⬠¦ He also observes that Heathcliff will ââ¬Ëlove and hate equally. ââ¬Ë His description of casual violence lack of manners or consideration for other people which characterizes Heathcliff is only a hint of the atmosphere of the whole novel, in which that violence is contrasted with more genteel and civilized ways of living represented by the Lintons. When Nelly Dean begins to narrate the story of Heathcliff's past, she describes him with discrimination. When Heathcliff is first introduced, Mr Earnshaw says ââ¬Ëâ⬠¦ ut you must e'en take it as a gift of God, though it's as dark almost as if it came from the devil. ââ¬Ë Bronti implies early on that Heathcliff has gifts from both God and the Devil (good and bad characteristics). Nelly Dean describes him as a ââ¬Ëdirty, ragged, black-haired child; big enough to walk and talkâ⬠¦ ââ¬Ë she also constantly refers to Heathcliff as ââ¬Ëit'- ââ¬Ëâ⬠¦ Mrs Earnshaw was ready to fling it out of doorsâ⬠¦. [He's a] Gypsy brat', Heathcliff is constantly referred to as if he weren't human. Nelly talks of how he ââ¬Ërepeated over and over again some gibberish that nobody could understandâ⬠¦ ââ¬Ë this portrays him as a wild animal/beast. Catherine and Hindley don't automatically get on with Heathcliff. Catherine ââ¬Ëshowed her humour by grinning and spitting at the stupid little thingâ⬠¦ ââ¬Ë However later on Mrs Dean describes the friends to be ââ¬Ëvery thick. ââ¬Ë Heathcliff's origins are obscure; he was ââ¬Ëfound' and ââ¬ËNot a soul knew to whom [he] belonged. ââ¬Ë Nelly says ââ¬Ëâ⬠¦ they had christened him Heathcliffâ⬠¦.. nd it has served him ever since, both for Christian and surname'; this emphasizes the idea of how low Heathcliff's class is because in the 18th century, the absence of a persons surname exposed a lack of background. Hindley hates Heathcliff from the beginning and the writer comments on how he sees Heathcliff ââ¬Ëas a usurper of his parents' affectionsâ⬠¦ ââ¬Ë This conveys how Heathcliff was favoured above the children. Bronti describes Heathcliff to be ââ¬Ëas uncomplaining as a lambâ⬠¦ ââ¬Ë which persuades the reader to think he is innocent. It is also a biblical phrase as in the bible; lambs were used to portray the innocence and purity of life. Hindley fiercely calls Heathcliff ââ¬Ëan imp of Satan' in contrast to the original idea that he was innocent and corresponds to the idea that Heathcliff has gifts from both God and from the devil. In the next chapter, Catherine and Heathcliff become extremely close. ââ¬ËShe was much too fond of Heathcliff. The greatest punishment we could invent for her was to keep her separate from himâ⬠¦ ââ¬Ë says Nelly showing that the two were inseparable. When Catherine's father dies, Nelly Dean comments on how ââ¬Ëthey both set up a heart breaking cryâ⬠¦ ââ¬Ë this shows that Heathcliff is the only person Catherine can now turn to and that they only have each other to get through the sorrow. In Chapter VI when Heathcliff describes Thrushcross Grange, he says ââ¬Ëit was beautiful, ââ¬â a splendid place carpeted with crimson and crimson-covered chairs and tables and a pure white ceiling bordered by goldâ⬠¦ ââ¬Ë This description creates a heavenly image of splendour especially to Heathcliff who has never seen anything like it before. Bronti uses the drawing room window to symbolize the boundary between the two classes since it divides the two sets of children. The window is the barrier motif shown throughout the novel. When Catherine is accepted into the house and Heathcliff is rejected, this is the end of their childhood innocence and the beginning of their awareness of the difference of class: ââ¬Ëâ⬠¦ and I would have been there too, but they had not the manners to ask me to stayâ⬠¦ ââ¬Ë Earlier on in the novel, Mr Lockwood's describes Wuthering Heights; the house and its furniture are described as plain and ââ¬Ënothing extraordinaryâ⬠¦ he floor was of smooth, white stone; the chairs high-backedâ⬠¦ ââ¬Ë This contrast with the description of the Grange and perhaps Bronti uses this as a metaphor to describe the social context of the inhabitants of both houses. The meeting of the two families begins the ââ¬Ëtug of war' for Catherine between Edgar and Heathcliff. Heathcliff describes Catherine to be attracted to the Lintons and ââ¬Ëfull of stupid admiration' for them suggesting that Catherine's love for Edgar was built on admiration and for what he represents rather than his innate qualities. At the moment when Heathcliff and Catherine's intimacy is on the verge of blossoming into love, social class intrudes into the novel and their affection. As Heathcliff says- ââ¬Ëâ⬠¦ I resumed my station as a spy; because, if Catherine had wished to return, I intended shattering their great glass panes to a million fragments, unless they let her out.. ââ¬Ë This conveys that his love for Catherine is protective and possessive. If the window through which Catherine and Heathcliff first view the Lintons is a metaphor for class division, then Heathcliff vows to smash both the literal and metaphorical boundary between him and Catherine. When Catherine comes back, it is evident that her stay at the Lintons' house was the beginning of the wilting of their relationship because although she is still extremely fond of him, she has realized ââ¬Ëhow very black and cross' and how ââ¬Ëfunny and grimâ⬠¦ ââ¬Ë he appeared, and she has also realized that he is ââ¬Ëâ⬠¦ so dirtyâ⬠¦ ââ¬Ë Heathcliff ââ¬Ëdid not stand to be laughed at' and ran away. Catherine has begun to think like the Lintons, and thus begins a thaw in their love. ââ¬ËHeathcliff was hard to discover at first- if he were careless and uncared for before Catherine's absence, he had been ten times more so, sinceâ⬠¦ says Nelly, emphasizing the fact that Catherine had defended and protected Heathcliff in their home. Heathcliff was only cared for if she was there. When Catherine returns home her behaviour is acquired; her attitude and appearance as a ââ¬Ëvery dignified person' show that she has moved into a different sphere; that of the ââ¬Ëgenteel' Lintons. Heathcliff cannot follow her. He tries to follow her, ââ¬Ëâ⬠¦ Nelly make me decentâ⬠¦ ââ¬Ë and he wants to have the effect Edgar has on Catherine: ââ¬ËI wish I had light hair and fair skin, and was dressed and behaved as well, and had a chance of being as rich as he will beâ⬠¦ Although Cathy still cares for the things she did with him during their childhood, she is still under a lot of pressure to become a lady and she is vain enough to enjoy the admiration and approval she receives from Edgar, Hindley and his wife. Just as the window separated the Wuthering heights children from the Lintons in the last chapter, a material object separates Catherine from Heathcliff. The fine dress she wears is a very real boundary between the old friends: it must be sacrificed (smudged and crumpled) if she is to embrace Heathcliff. The dress is also a metaphor for the fact that id Catherine is to associate with Heathcliff, the wildness of her character will be exposed. As Catherine is wants to enjoy both Edgar's admiration and Heathcliff's love, this leads her to ââ¬Ëadopt a double character without exactly intending to deceive anyoneâ⬠¦ ââ¬Ë Edgar represents the side of Catherine that satisfies her vanity and her yearning for social consequence; Heathcliff represents her natural and real emotions. Catherine has to change in order to be loved by Edgar. During one of his visits, she shows her impulsive and impetuous side when she ââ¬Ësnatche[s] the cloth from [Nelly's] hand, and pinche[s] [her]' to the great shock of Edgar who only knows her as ââ¬Ëa very dignified personâ⬠¦ ââ¬Ë It seems as though Catherine's love for Edgar is based on external considerations ââ¬Ëâ⬠¦ you love Mr Edgar because he is handsome and young and loves youâ⬠¦ ââ¬Ë says Nelly. Her love is based on his appearance, his wealth and how he feels towards her. Her love for Heathcliff however is internal; in her heart: she loves him ââ¬Ënot because he's handsome, but because he is more myself than I am. This suggests that Heathcliff represents the person who Catherine actually is whereas Edgar is who Catherine wants to be in terms of social aspirations and consequence. When Catherine tries to explain why she feels she is wrong to marry Edgar, she says she feels it ââ¬ËHere! and Here! ââ¬Ë striking ââ¬Ëone hand on her forehead and the other on her breast' as she does so. This creates another metaphorical boundary, between the external and internal: Catherine's love for Edgar is based on internal qualities but her love for Heathcliff is felt within her body. Cathy's description of her love for Heathcliff shows the contrast between Linton's softness and Heathcliff's wildness: ââ¬ËWhatever our souls are made of, his and mine are the same and Linton's is as different as a moon beam from lightning or frost from fire. ââ¬Ë This is an interesting contrast as ââ¬Ëmoon beam' and ââ¬Ëfrost' are calm and beautiful images, however, they are completely opposite to ââ¬Ëlightning' and ââ¬Ëfire' which are both dangerous and wild things. gall, I never would have raised a hand against himâ⬠¦ I never would have banished him from her society, as long as she desired his. ââ¬Ë Correspondingly, he imagines Catherine's affection for Edgar in terms of property: ââ¬ËHe is scarcely a degree dearer to her than her dog, or her horse. It is not in him to be loved like me. ââ¬Ë Material wealth has always been associated with the Lintons, so Heathcliff extends ideas of property and ownership to their emotions as well. Heathcliff's reunion with Catherine is presented as bittersweet: though passionately glad to be reunited, Catherine accuses Heathcliff of having killed her. Heathcliff warns her not to say such things when they ââ¬Ëwill be branded in [his] memory and eating deeper eternally' after her death. He also says that she had been at fault for abandoning him: ââ¬Ëwhy did you betray you own heart Cathy? You deserve thisâ⬠¦ ââ¬Ë This passionate scene between Catherine and Heathcliff in this chapter is probably the emotional climax of the novel though it only marks the middle of the book. It is as though they were members (who belong together) of a different species from other humans. Ellen says: ââ¬Ëthe two, to a cool spectator, made a strange and fearsome picture. ââ¬Ë Catherine tears Heathcliff's hair, and he leaves bruises on her arm. Later, ââ¬Ëhe foamed like a mad dog, and gathered her to him with greedy jealousy. ââ¬Ë ââ¬Ë[Ellen] did not feel as though [she] were in the company of a member of [her] own species. ââ¬Ë What Ellen considers as bestial, the lovers would probably consider transcendent; their love sets them apart from others but in what way is open to interpretation. When Catherine dies, Bronti creates a contrast between the ways the two men react to her death. Edgar Linton had his head laid on a pillow and his eyes shutâ⬠¦ ââ¬Ë this shows that he is mourning silently and calmly but, Heathcliff ââ¬Ëdashed his head against the knotted trunk, and lifting up his eyes howled not like a man but like a savage beast getting goaded to death with knives and spearsâ⬠¦ ââ¬Ë This harsh diction portrays Heathcliff's pain, torment and anger at Catherine's death. Bronti uses this language to show that Catherine was Heathcliff's other half; without her (his beloved), half of his soul was missing. The comparison between Edgar's peaceful mourning and Heathcliff's declaration of love again refers to the difference of their emotions and their contrasting natures. The question of what happens after death is important in this chapter and throughout the novel; though no firm answer is given. Ellen is convinced that Catherine went to heaven, ââ¬Ëwhere life is boundless in its duration, and love in its sympathy, joy in its fullness. ââ¬Ë Heathcliff however, cannot conceive of Catherine finding peace whilst they are still separated, or of his living without her. In the chapter before, Catherine said ââ¬ËI'm wearying to escape into that glorious world and to be always there; not seeing it dimly through tears and yearning for it through the walls of an aching heart, but really with it and in it. ââ¬Ë It is as though she had in mind a heaven that was like the moors in everyway but with the spirits of natural freedom. Eighteen years after her death, Heathcliff's continued love for Catherine's dead body paradoxically emphasizes the physical, yet non-physical nature of their relationship. This all-consuming love is revealed when he explains how he tried to dig up her body on the day she was buried. Heathcliff is pleased to see that Catherine still looks like herself after eighteen years but claims that if she had been ââ¬Ëdissolved into earth or words,' he would have still been happy. His idea of heaven is to be completely united with Catherine in body, as well as in spirit and this could just as well mean to disintegrate into dust together as to be joined in the act of love. In the final two chapters, we are given an extraordinary window into Heathcliff's mind in the chapter. Whenever he looks at something, he sees Catherine in it; he hears her voice in every sound. This is Bronti's idea of true haunting, which seems to resemble madness rather than scary noises in the dark. If the ghost of Catherine is at work, she has found her home in Heathcliff's mind and her vocation is distorting his perception and his ability to communicate with the outside world. The presentation of love in the relationships between Catherine and Edgar and Catherine and Heathcliff are clearly profoundly contrasting. Heathcliff represents passion and nature, whereas Edgar represents culture. These two characteristics symbolize the duality in Cathy's own personality and it is her struggle between the two conflicting impulses that eventually consumes her. However, when Heathcliff and Edgar die and are both buried alongside Catherine, we can see how Bronti portrays that the two men will always have a place in her heart.
Subscribe to:
Posts (Atom)