mystery shopper, Other Subject

Assignment Help:
Visit any restaurant, possibly your school cafeteria. The workers and fellow customers will assume that you are an ordinary customer, but you are really a secret shopper (spy) for the owner. YOUR TASK After your visit, write a short letter to the owner explaining (a) what you did and what you observed, (b) any possible violations of policy that you observed, and (c) your recommendations for improvement. The first part of your report (what you did and what you observed) will be the longest. Include a description of the premises, inside and out. Tell how long it took for each step of ordering and receiving your meal. Describe the service and food thoroughly. You are interested in both the good and bad aspects of the establishments decor, service, and food. For the second section (violations of policy), use some common sense: if all the servers but one have their hair covered, you may assume that policy requires hair to be covered; a dirty window or restroom obviously violates policy. The last section (recommendations for improvement) involves professional judgment. What management actions will improve the restaurant?

Related Discussions:- mystery shopper

Visit report, can i get an example of visit to the interesting place report...

can i get an example of visit to the interesting place report?

Land survey, What is the correction for bad ranging?

What is the correction for bad ranging?

Cryptography, Cryptography Information protection uses cryptography to ...

Cryptography Information protection uses cryptography to change usable information into a form that renders it ineffectual by anyone other than an official user; this procedure

Chemistry, applications o chemistry in information technology

applications o chemistry in information technology

Security model, SECURIT Y MODEL A computer security model is a system ...

SECURIT Y MODEL A computer security model is a system for identifying and enforcing security policies. A security model may be established upon a formal model of access rights

Punch-out from wcbe and wcs mpe to external suppliers, Punch-out from WCBE ...

Punch-out from WCBE and WCS MPE to External Suppliers A conventional electronic marketplace (EMP) or a private trading exchange (PTX), such as IBM WCS MPE, provides a variety o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd