Prepare a list of specific steps that customers can take

Assignment Help Management Information Sys
Reference no: EM132190612

Questions:

1) You're working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons that warns them of the potential dangers of surfing the Internet in public places. Conduct research on the Internet about using public hotspots to access the Internet. Prepare a list of specific steps that customers can take to protect their data when surfing on publicly accessible networks.

2) With the arrival of reliable, fast, networked digital information, businesses can track the location and status of all kinds of objects, such as cars and bicycles. This is introducing a new business model different from individual ownership-now, using a car can become a "subscription" service.

What options are there for "subscribing" to a car instead of owning one? How about for a bicycle? Are there other businesses you can identify that would be able to take advantage of digital information and become subscription services instead of vendors of a physical product? What are the advantages to the consumer of subscription over ownership? What are the drawbacks?

3) Computer security professionals are among the highest-paid employees in information technology organizations. Using employment sites such as Monster.com, computerjobs.com, and dice.com, research computer security jobs available in the state where your school is located (try searching "computer security").

Select three entry-level computer security jobs from different employers and prepare a document comparing the following: What are the educational requirements? What job skills are required? How much prior work experience are firms looking for? Are programming skills required?

4) You work in the information technology group of a chain of sporting goods stores. The company operates 40 locations in seven states. The 40 locations are organized into four regions (north, south, east, and west) with 10 stores each. Regional managers are responsible for inventory management, procurement of inventory, sales, and marketing for their particular region.

The company has been processing all transactions electronically (with customers and suppliers), and it has captured all the data in a large data warehouse. Unfortunately, the regional managers are complaining that there is so much information in the data warehouse that extracting meaningful data has become difficult. You've just been placed on the team that will be designing a new data strategy for the company.

a. Setting up data marts would probably help with the accessibility of information. What type of data marts would you suggest setting up? Make sure you explain who will benefit from the data marts you suggest.

b. For the data marts you identified, list the data that should be stored in each data mart and explain how the regional managers could make use of that information to manage their group of stores.

Note: => 4 references for each question.

Each question should be answered not less than 300 words.

Reference no: EM132190612

Questions Cloud

Critical review involves the coherent analysis of the issue : Critical review involves the coherent analysis of the issues surrounding a topic. In a critical review your aim is to evaluate the scientific merit of research
Develop guidelines for handling unhappy customers : How could you develop guidelines for handling unhappy customers? Draft a “cheat sheet” for employee reference.
Describe marketing tactics to accommodate changes : Describe marketing tactics to accommodate changes to the distribution channel for your organization.
Develop the skills to assess the success of the plan : Develop the skills to assess the success of the plan. Evaluate strategic initiatives to leverage opportunities and mitigate threats to small businesses.
Prepare a list of specific steps that customers can take : Prepare a list of specific steps that customers can take to protect their data when surfing on publicly accessible networks.
What type of device do you use for backing up files : How often do you back up critical data files such as homework files? What type of device do you use for backing up files?
Evaluate the effectiveness of any new behaviors : Evaluate the effectiveness of any new behaviors or approaches you have applied. What new behaviors or approaches you plan to apply
What effect this has on the economic arguments you : Are there any business-related, regulatory or other non-economic factors that could significantly affect the economic arguments you have put forward?
Calculate the relevant anthropometric indices : Calculate the relevant anthropometric indices and undertake analysis of this data against national and international reported values

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the concept of a crawler search engine

How has the utilization of mobile technologies impacted search engine optimization practices?Explain the concept of a crawler search engine.

  How information systems influence businesses to be efficient

B6111.12- Explain how information systems influence businesses to be more competitive, efficient, and profitable. Provide at least one example for each factor.

  Describe the use of windows security groups

Describe the use of Windows security groups and explain how a connection to active directory could be performed using the existing technology.

  How many labour hours should the tenth satellite require

INFT6304 - Project Planning & Management Group Assignment. How many labour hours should the tenth satellite require. How many labour hours for the whole project

  Value of multiple content repositories

Read the Wachovia Case Study, "Wachovia's CAS: Harnessing the Value of Multiple Content Repositories Across a Large Enterprise"

  Describe the purpose of icmp and how it is used

What is VOIP? What are the essential components of the telecommunications systems using VOIP? What are the advantages?

  How a specific administrative task helped in security

Identify the proper phase in the PDCA cycle for each security administration task discussed in the lab.

  Why corporate culture plays a critical role in developing

Speculate on why corporate culture plays a critical role in developing a more agile product development approach.

  What are the advantages of an e-commerce business

MGT 401- If you are unable to secure funding, what are the alternatives to starting your own business? What are the advantages and disadvantages of an e-commerce business? Should traditional businesses also offer online sales?

  How to identify the use of ajax on a web page

As a senior Web developer, you've been asked to explain how to identify the use of Ajax on a Web page to a non-technical person.

  Explain a breach of security of its customers information

Describe the security breach of customer's information at the company you researched. Explain a breach of security of its customers information.

  Compare the iso/iec 27001 outline with the nist

Compare the ISO/IEC 27001 outline with the NIST documents discussed. Which areas, if any, are missing from the NIST documents? Identify the strengths and weaknesses of the NIST programs compared to the ISO standard

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd