Strengths Finder 2.0 identifies my top five strengths are adaptability, restorative, individualization, communication and strategic. I must use these strengths every day in my job and my home life. These strengths are apparent in all areas of my life both at work and home.
In preparation of the approval of Mr. K. Grooms’ request, the Web Developer sent a reminder what his login ID is and reset his password. The new password was securely sent to him.
Sarah begins by asking the client if he remembers his password, when he is unsuccessful at signing in, she pivots immediately to doing a hard reset on his password. We want to always at least educate the client about the self service option for when he forgets his password--as this can help to avoid the client having to continue to call in for this.
- Since the client was not receiving the email Krista decided to create the client's username and had the client reset the password through the website.
The accompanying steps depict how a customer and a server confirm each other utilizing Kerberos.
- After verification, Cody asks open ended questions to find out how he can begin guiding the client. ("what screen are you on now?"
Relevant coding- Melissa coded the client's concerns regarding the advertisement received, however, she did not include the code regarding the disbursement information provided. For accurate record keeping, we should include all codes that reflect
Prior to ending the call, she is sure to confirm there are not other questions or
- Control. (2:34 - 2:41) Talisha and the client are speaking at the same time. As a best
- Bria does a good job explaining to the okay to speak with the reason for needed to speak with the client for authorization.
- Laura verifies the email address of the client, as she advises him that she will be following up with him (per his request).
- Verify email address before sending link. (2:18) Kaylonni does not verify that the client would like to use the verified email address before sending out the registration link. After Kaylonni advises that she's already sent it, the client
Verification- (1:48) At this time, Lindsey provided account specific information prior to verifying. We should make sure we verify at least 3 pieces
After verifying the email address, she digs deep to verify the preferred email and digs deeper to gain info on a pre-established account setup.
According to What is SWOT Anlysis (2011), SWOT analysis is an analysis used to identify the internal factors (strengths and weaknesses) of the company as well as external factors (opportunities and threats) of the company.