SlideShare a Scribd company logo
power point 115
QUESTIONS on Page #54:Respond to questions: PICK ANY 3 of themMAKING BUSINESS
DECISIONS Pg#54Cool College Start-UpsNot long ago, people would call college kids who
started businesses quaint. Now they call them the boss. For almost a decade, Inc. magazine
has been watching college start-ups and posting a list of the nation’s top start-ups taking
campuses by storm. Helped in part by low-cost technologies and an increased prevalence of
entrepreneurship training at the university level, college students—and indeed those even
younger—are making solid strides at founding companies. And they’re not just
launching local pizza shops and fashion boutiques. They are starting up businesses that
could scale into much bigger companies and may already cater to a national
audience.Research Inc. magazine at www.inc.com and find the year’s current Coolest
College Start-up listing. Choose one of the startups and explain how the business can use
BPR, CRM, SCM, and ERP to help it gain traction in the market. Be sure to explain how the
company can gain a competitive advantage by using each enterprise system efficiently and
effectively.Managing Bad Customer RelationshipsThere is a common saying that the
customer is always right. Clearly this can create many issues with customer relationship
management as many times the customer is incorrect, but you can’t tell the customer
they are wrong.Research the Internet and find an example of a customer relationship gone
wrong and determine if the customer was at fault for the problem. What can you do as a
manager when a customer is angry but clearly wrong about a situation? What strategies can
a manager use when dealing with angry customers?Review Questions – pg#69 – PICK
any 3 of them and respond to.MAKING BUSINESS DECISIONS pg#69The Competitive
Landscape for Students According to the Economic Policy Institute, over the past decade the
United States has lost an estimated 2.4 million factory jobs to China. Factories in South
Korea, Taiwan, and China are producing toys, toothpaste, running shoes, computers,
appliances, and cars. For a long time, U.S. firms did not recognize these products as
competition; they regarded Asia’s high-tech products as second-rate knockoffs and
believed Asian countries maintained a factory culture—they could imitate but not
innovate. In hindsight, it is obvious that once these countries did begin designing and
creating high-end products, they would have obvious competitive advantages, with high-
value research and development coupled with low-cost manufacturing of unbeatable goods
and services. Asia is now on the rise in all industries from wind turbines to high-speed
bullet trains. According to Bloomberg Businessweek ’s ranking of the most innovative
companies, 15 of the top 50 are Asian, up from just 5 in the previous year. In fact, for the
first time, the majority of the top 25 are based outside the United States. How do you, as a
business student, view these statistics?What type of global business climate will you be
competing in when you graduate?If you wanted to gather competitive intelligence about the
job market, where would you look and what types of data would you want to analyze?What
can you do to create personal competitive advantages to differentiate yourself when
searching for a job?Review Questions – pg#79 – Pick any 3MAKING BUSINESS
DECISIONS pg#79(Complete ONE of the Options Below)Option #1The Internet of Things Is
Wide Open—for Everyone!IoT is transforming our world into a living information system
as we control our intelligent lighting from our smartphone to a daily health check from our
smart toilet. Of course, with all great technological advances come unexpected risks, and
you must be prepared to encounter various security issues with IoT. Just imagine if your
devices are hacked by someone who now can shut off your water, take control of your car,
or unlock the doors of your home from thousands of miles away. page 80 We are just
beginning to understand the security issues associated with IoT and M2M, and you can be
sure that sensitive data leakage from your IoT device is something you will most likely
encounter in your life.Identify a few IoT devices you are using today. These can include
fitness trackers that report to your iPhone, sports equipment that provides immediate
feedback to an app, or even smart vacuum cleaners. If you are not using any IoT devices
today, brainstorm a few you might purchase in the future. How could a criminal or hacker
use your IoT to steal your sensitive data?What potential problems or issues could you
experience from these types of illegal data thefts?What might be some of the signs that
someone had accessed your IoT data illegally?What could you do to protect the data in your
device?Option #2Information Issues in the Information AgeWe live in the information age,
when the collection, storage, and use of data are hot topics. One example of inappropriate
data handling occurred at a college where the monitoring of restrooms occurred every 15
seconds to observe the use of toilets, mirrors, and sinks. Students, faculty, and staff began
complaining that the data collection was an invasion of their privacy and a violation of their
rights. Another example of inappropriate data handling occurred when a professor of
accounting at a college lost a flash drive containing information for more than 1,800
students, including Social Security numbers, grades, and names. Social Security numbers
were included because the data went back to before 1993, when the college used Social
Security numbers to identify students.What types of student data does your college collect?
What could happen if your professor lost a thumb drive with all your personal information?
What types of issues could you encounter if someone stole your personal data? What can
your college do to ensure this type of data storage violation does not occur?

More Related Content

Similar to power point 115.docx

Atomico Need-To-Know 29 January 2018
Atomico Need-To-Know 29 January 2018 Atomico Need-To-Know 29 January 2018
Atomico Need-To-Know 29 January 2018
Atomico
 
The Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationThe Telephone And Telegraph Corporation
The Telephone And Telegraph Corporation
Lori Gilbert
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
ssuser454af01
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White Paper
Rebecca Ricks
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
IRJET Journal
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 Sd
Rosa Williams
 
Role of Information Technology in Organizations Fighting E.docx
Role of Information Technology in Organizations Fighting E.docxRole of Information Technology in Organizations Fighting E.docx
Role of Information Technology in Organizations Fighting E.docx
SUBHI7
 
The Future of Information Services & Technology
The Future of Information Services & TechnologyThe Future of Information Services & Technology
The Future of Information Services & Technology
Cognizant
 
Fjord Trends 2016
Fjord Trends 2016Fjord Trends 2016
Fjord Trends 2016
Fjord
 
Accenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord TrendsAccenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord Trends
Accenture New Zealand
 
Design & Innovation Trends 2016
Design & Innovation Trends 2016Design & Innovation Trends 2016
Design & Innovation Trends 2016
Allan V. Braverman
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
Altimeter, a Prophet Company
 
Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Rob Pestridge
 
Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Jenna Hughes-Gage
 
Presentation To Seda Technology Programme
Presentation To Seda Technology ProgrammePresentation To Seda Technology Programme
Presentation To Seda Technology Programme
Elton050505
 
Global Business Trends to Follow in 2022 | CIOLOOK
Global Business Trends to Follow in 2022 | CIOLOOKGlobal Business Trends to Follow in 2022 | CIOLOOK
Global Business Trends to Follow in 2022 | CIOLOOK
CIO Look Magazine
 
What Use is the Internet of Things to Marketing?
What Use is the Internet of Things to Marketing?What Use is the Internet of Things to Marketing?
What Use is the Internet of Things to Marketing?
Trinity Consulting Services
 
Mit eship show
Mit eship showMit eship show
Mit eship show
Chuck Eesley
 

Similar to power point 115.docx (20)

Atomico Need-To-Know 29 January 2018
Atomico Need-To-Know 29 January 2018 Atomico Need-To-Know 29 January 2018
Atomico Need-To-Know 29 January 2018
 
The Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationThe Telephone And Telegraph Corporation
The Telephone And Telegraph Corporation
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White Paper
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 Sd
 
Role of Information Technology in Organizations Fighting E.docx
Role of Information Technology in Organizations Fighting E.docxRole of Information Technology in Organizations Fighting E.docx
Role of Information Technology in Organizations Fighting E.docx
 
The Future of Information Services & Technology
The Future of Information Services & TechnologyThe Future of Information Services & Technology
The Future of Information Services & Technology
 
Fjord Trends 2016
Fjord Trends 2016Fjord Trends 2016
Fjord Trends 2016
 
Accenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord TrendsAccenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord Trends
 
Design & Innovation Trends 2016
Design & Innovation Trends 2016Design & Innovation Trends 2016
Design & Innovation Trends 2016
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
 
Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016
 
Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016
 
Presentation To Seda Technology Programme
Presentation To Seda Technology ProgrammePresentation To Seda Technology Programme
Presentation To Seda Technology Programme
 
Global Business Trends to Follow in 2022 | CIOLOOK
Global Business Trends to Follow in 2022 | CIOLOOKGlobal Business Trends to Follow in 2022 | CIOLOOK
Global Business Trends to Follow in 2022 | CIOLOOK
 
What Use is the Internet of Things to Marketing?
What Use is the Internet of Things to Marketing?What Use is the Internet of Things to Marketing?
What Use is the Internet of Things to Marketing?
 
Mit eship show
Mit eship showMit eship show
Mit eship show
 

More from write5

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docx
write5
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docx
write5
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docx
write5
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docx
write5
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docx
write5
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docx
write5
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docx
write5
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docx
write5
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docx
write5
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docx
write5
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docx
write5
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docx
write5
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docx
write5
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docx
write5
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docx
write5
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docx
write5
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docx
write5
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docx
write5
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docx
write5
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docx
write5
 

More from write5 (20)

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docx
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docx
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docx
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docx
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docx
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docx
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docx
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docx
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docx
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docx
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docx
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docx
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docx
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docx
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docx
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docx
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docx
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docx
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docx
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docx
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 

power point 115.docx

  • 1. power point 115 QUESTIONS on Page #54:Respond to questions: PICK ANY 3 of themMAKING BUSINESS DECISIONS Pg#54Cool College Start-UpsNot long ago, people would call college kids who started businesses quaint. Now they call them the boss. For almost a decade, Inc. magazine has been watching college start-ups and posting a list of the nation’s top start-ups taking campuses by storm. Helped in part by low-cost technologies and an increased prevalence of entrepreneurship training at the university level, college students—and indeed those even younger—are making solid strides at founding companies. And they’re not just launching local pizza shops and fashion boutiques. They are starting up businesses that could scale into much bigger companies and may already cater to a national audience.Research Inc. magazine at www.inc.com and find the year’s current Coolest College Start-up listing. Choose one of the startups and explain how the business can use BPR, CRM, SCM, and ERP to help it gain traction in the market. Be sure to explain how the company can gain a competitive advantage by using each enterprise system efficiently and effectively.Managing Bad Customer RelationshipsThere is a common saying that the customer is always right. Clearly this can create many issues with customer relationship management as many times the customer is incorrect, but you can’t tell the customer they are wrong.Research the Internet and find an example of a customer relationship gone wrong and determine if the customer was at fault for the problem. What can you do as a manager when a customer is angry but clearly wrong about a situation? What strategies can a manager use when dealing with angry customers?Review Questions – pg#69 – PICK any 3 of them and respond to.MAKING BUSINESS DECISIONS pg#69The Competitive Landscape for Students According to the Economic Policy Institute, over the past decade the United States has lost an estimated 2.4 million factory jobs to China. Factories in South Korea, Taiwan, and China are producing toys, toothpaste, running shoes, computers, appliances, and cars. For a long time, U.S. firms did not recognize these products as competition; they regarded Asia’s high-tech products as second-rate knockoffs and believed Asian countries maintained a factory culture—they could imitate but not innovate. In hindsight, it is obvious that once these countries did begin designing and creating high-end products, they would have obvious competitive advantages, with high- value research and development coupled with low-cost manufacturing of unbeatable goods and services. Asia is now on the rise in all industries from wind turbines to high-speed bullet trains. According to Bloomberg Businessweek ’s ranking of the most innovative companies, 15 of the top 50 are Asian, up from just 5 in the previous year. In fact, for the
  • 2. first time, the majority of the top 25 are based outside the United States. How do you, as a business student, view these statistics?What type of global business climate will you be competing in when you graduate?If you wanted to gather competitive intelligence about the job market, where would you look and what types of data would you want to analyze?What can you do to create personal competitive advantages to differentiate yourself when searching for a job?Review Questions – pg#79 – Pick any 3MAKING BUSINESS DECISIONS pg#79(Complete ONE of the Options Below)Option #1The Internet of Things Is Wide Open—for Everyone!IoT is transforming our world into a living information system as we control our intelligent lighting from our smartphone to a daily health check from our smart toilet. Of course, with all great technological advances come unexpected risks, and you must be prepared to encounter various security issues with IoT. Just imagine if your devices are hacked by someone who now can shut off your water, take control of your car, or unlock the doors of your home from thousands of miles away. page 80 We are just beginning to understand the security issues associated with IoT and M2M, and you can be sure that sensitive data leakage from your IoT device is something you will most likely encounter in your life.Identify a few IoT devices you are using today. These can include fitness trackers that report to your iPhone, sports equipment that provides immediate feedback to an app, or even smart vacuum cleaners. If you are not using any IoT devices today, brainstorm a few you might purchase in the future. How could a criminal or hacker use your IoT to steal your sensitive data?What potential problems or issues could you experience from these types of illegal data thefts?What might be some of the signs that someone had accessed your IoT data illegally?What could you do to protect the data in your device?Option #2Information Issues in the Information AgeWe live in the information age, when the collection, storage, and use of data are hot topics. One example of inappropriate data handling occurred at a college where the monitoring of restrooms occurred every 15 seconds to observe the use of toilets, mirrors, and sinks. Students, faculty, and staff began complaining that the data collection was an invasion of their privacy and a violation of their rights. Another example of inappropriate data handling occurred when a professor of accounting at a college lost a flash drive containing information for more than 1,800 students, including Social Security numbers, grades, and names. Social Security numbers were included because the data went back to before 1993, when the college used Social Security numbers to identify students.What types of student data does your college collect? What could happen if your professor lost a thumb drive with all your personal information? What types of issues could you encounter if someone stole your personal data? What can your college do to ensure this type of data storage violation does not occur?