SlideShare a Scribd company logo
1 of 2
power point 115
QUESTIONS on Page #54:Respond to questions: PICK ANY 3 of themMAKING BUSINESS
DECISIONS Pg#54Cool College Start-UpsNot long ago, people would call college kids who
started businesses quaint. Now they call them the boss. For almost a decade, Inc. magazine
has been watching college start-ups and posting a list of the nation’s top start-ups taking
campuses by storm. Helped in part by low-cost technologies and an increased prevalence of
entrepreneurship training at the university level, college students—and indeed those even
younger—are making solid strides at founding companies. And they’re not just
launching local pizza shops and fashion boutiques. They are starting up businesses that
could scale into much bigger companies and may already cater to a national
audience.Research Inc. magazine at www.inc.com and find the year’s current Coolest
College Start-up listing. Choose one of the startups and explain how the business can use
BPR, CRM, SCM, and ERP to help it gain traction in the market. Be sure to explain how the
company can gain a competitive advantage by using each enterprise system efficiently and
effectively.Managing Bad Customer RelationshipsThere is a common saying that the
customer is always right. Clearly this can create many issues with customer relationship
management as many times the customer is incorrect, but you can’t tell the customer
they are wrong.Research the Internet and find an example of a customer relationship gone
wrong and determine if the customer was at fault for the problem. What can you do as a
manager when a customer is angry but clearly wrong about a situation? What strategies can
a manager use when dealing with angry customers?Review Questions – pg#69 – PICK
any 3 of them and respond to.MAKING BUSINESS DECISIONS pg#69The Competitive
Landscape for Students According to the Economic Policy Institute, over the past decade the
United States has lost an estimated 2.4 million factory jobs to China. Factories in South
Korea, Taiwan, and China are producing toys, toothpaste, running shoes, computers,
appliances, and cars. For a long time, U.S. firms did not recognize these products as
competition; they regarded Asia’s high-tech products as second-rate knockoffs and
believed Asian countries maintained a factory culture—they could imitate but not
innovate. In hindsight, it is obvious that once these countries did begin designing and
creating high-end products, they would have obvious competitive advantages, with high-
value research and development coupled with low-cost manufacturing of unbeatable goods
and services. Asia is now on the rise in all industries from wind turbines to high-speed
bullet trains. According to Bloomberg Businessweek ’s ranking of the most innovative
companies, 15 of the top 50 are Asian, up from just 5 in the previous year. In fact, for the
first time, the majority of the top 25 are based outside the United States. How do you, as a
business student, view these statistics?What type of global business climate will you be
competing in when you graduate?If you wanted to gather competitive intelligence about the
job market, where would you look and what types of data would you want to analyze?What
can you do to create personal competitive advantages to differentiate yourself when
searching for a job?Review Questions – pg#79 – Pick any 3MAKING BUSINESS
DECISIONS pg#79(Complete ONE of the Options Below)Option #1The Internet of Things Is
Wide Open—for Everyone!IoT is transforming our world into a living information system
as we control our intelligent lighting from our smartphone to a daily health check from our
smart toilet. Of course, with all great technological advances come unexpected risks, and
you must be prepared to encounter various security issues with IoT. Just imagine if your
devices are hacked by someone who now can shut off your water, take control of your car,
or unlock the doors of your home from thousands of miles away. page 80 We are just
beginning to understand the security issues associated with IoT and M2M, and you can be
sure that sensitive data leakage from your IoT device is something you will most likely
encounter in your life.Identify a few IoT devices you are using today. These can include
fitness trackers that report to your iPhone, sports equipment that provides immediate
feedback to an app, or even smart vacuum cleaners. If you are not using any IoT devices
today, brainstorm a few you might purchase in the future. How could a criminal or hacker
use your IoT to steal your sensitive data?What potential problems or issues could you
experience from these types of illegal data thefts?What might be some of the signs that
someone had accessed your IoT data illegally?What could you do to protect the data in your
device?Option #2Information Issues in the Information AgeWe live in the information age,
when the collection, storage, and use of data are hot topics. One example of inappropriate
data handling occurred at a college where the monitoring of restrooms occurred every 15
seconds to observe the use of toilets, mirrors, and sinks. Students, faculty, and staff began
complaining that the data collection was an invasion of their privacy and a violation of their
rights. Another example of inappropriate data handling occurred when a professor of
accounting at a college lost a flash drive containing information for more than 1,800
students, including Social Security numbers, grades, and names. Social Security numbers
were included because the data went back to before 1993, when the college used Social
Security numbers to identify students.What types of student data does your college collect?
What could happen if your professor lost a thumb drive with all your personal information?
What types of issues could you encounter if someone stole your personal data? What can
your college do to ensure this type of data storage violation does not occur?

More Related Content

Similar to power point 115.docx

Atomico Need-To-Know 29 January 2018
Atomico Need-To-Know 29 January 2018 Atomico Need-To-Know 29 January 2018
Atomico Need-To-Know 29 January 2018 Atomico
 
The Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationThe Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationLori Gilbert
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperRebecca Ricks
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdRosa Williams
 
Role of Information Technology in Organizations Fighting E.docx
Role of Information Technology in Organizations Fighting E.docxRole of Information Technology in Organizations Fighting E.docx
Role of Information Technology in Organizations Fighting E.docxSUBHI7
 
The Future of Information Services & Technology
The Future of Information Services & TechnologyThe Future of Information Services & Technology
The Future of Information Services & TechnologyCognizant
 
Fjord Trends 2016
Fjord Trends 2016Fjord Trends 2016
Fjord Trends 2016Fjord
 
Design & Innovation Trends 2016
Design & Innovation Trends 2016Design & Innovation Trends 2016
Design & Innovation Trends 2016Allan V. Braverman
 
Accenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord TrendsAccenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord TrendsAccenture New Zealand
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of ThingsAltimeter, a Prophet Company
 
Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Rob Pestridge
 
Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Jenna Hughes-Gage
 
Presentation To Seda Technology Programme
Presentation To Seda Technology ProgrammePresentation To Seda Technology Programme
Presentation To Seda Technology ProgrammeElton050505
 
Global Business Trends to Follow in 2022 | CIOLOOK
Global Business Trends to Follow in 2022 | CIOLOOKGlobal Business Trends to Follow in 2022 | CIOLOOK
Global Business Trends to Follow in 2022 | CIOLOOKCIO Look Magazine
 
What Use is the Internet of Things to Marketing?
What Use is the Internet of Things to Marketing?What Use is the Internet of Things to Marketing?
What Use is the Internet of Things to Marketing?Trinity Consulting Services
 

Similar to power point 115.docx (20)

Atomico Need-To-Know 29 January 2018
Atomico Need-To-Know 29 January 2018 Atomico Need-To-Know 29 January 2018
Atomico Need-To-Know 29 January 2018
 
The Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationThe Telephone And Telegraph Corporation
The Telephone And Telegraph Corporation
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White Paper
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 Sd
 
Role of Information Technology in Organizations Fighting E.docx
Role of Information Technology in Organizations Fighting E.docxRole of Information Technology in Organizations Fighting E.docx
Role of Information Technology in Organizations Fighting E.docx
 
The Future of Information Services & Technology
The Future of Information Services & TechnologyThe Future of Information Services & Technology
The Future of Information Services & Technology
 
Fjord Trends 2016
Fjord Trends 2016Fjord Trends 2016
Fjord Trends 2016
 
Design & Innovation Trends 2016
Design & Innovation Trends 2016Design & Innovation Trends 2016
Design & Innovation Trends 2016
 
Accenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord TrendsAccenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord Trends
 
[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things[Report] Consumer Perceptions of Privacy in the Internet of Things
[Report] Consumer Perceptions of Privacy in the Internet of Things
 
Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016
 
Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016Mortimer_Spinks_Technology_Survey_2016
Mortimer_Spinks_Technology_Survey_2016
 
Presentation To Seda Technology Programme
Presentation To Seda Technology ProgrammePresentation To Seda Technology Programme
Presentation To Seda Technology Programme
 
Global Business Trends to Follow in 2022 | CIOLOOK
Global Business Trends to Follow in 2022 | CIOLOOKGlobal Business Trends to Follow in 2022 | CIOLOOK
Global Business Trends to Follow in 2022 | CIOLOOK
 
What Use is the Internet of Things to Marketing?
What Use is the Internet of Things to Marketing?What Use is the Internet of Things to Marketing?
What Use is the Internet of Things to Marketing?
 
Mit eship show
Mit eship showMit eship show
Mit eship show
 

More from write5

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docxwrite5
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxwrite5
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxwrite5
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxwrite5
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxwrite5
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxwrite5
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxwrite5
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxwrite5
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxwrite5
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxwrite5
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxwrite5
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxwrite5
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxwrite5
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxwrite5
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxwrite5
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxwrite5
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docxwrite5
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docxwrite5
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxwrite5
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docxwrite5
 

More from write5 (20)

This week we are going to participate in a.docx
This week we are going to participate in a.docxThis week we are going to participate in a.docx
This week we are going to participate in a.docx
 
This week begins an overview of the Research In.docx
This week begins an overview of the Research In.docxThis week begins an overview of the Research In.docx
This week begins an overview of the Research In.docx
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docx
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docx
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docx
 
The Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docxThe Travels of Sir John Mandeville.docx
The Travels of Sir John Mandeville.docx
 
This will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docxThis will enable you to understanding the extent to which.docx
This will enable you to understanding the extent to which.docx
 
The Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docxThe Superfund website will have information about contaminated how.docx
The Superfund website will have information about contaminated how.docx
 
The Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docxThe Strengths and Weaknesses of the North and South in.docx
The Strengths and Weaknesses of the North and South in.docx
 
This assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docxThis assignment will help you to explain the concept of.docx
This assignment will help you to explain the concept of.docx
 
The Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docxThe Institutional Structure of the Communist.docx
The Institutional Structure of the Communist.docx
 
The next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docxThe next couple of weeks begins an overview of the.docx
The next couple of weeks begins an overview of the.docx
 
Two general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docxTwo general technology trends in my workplace are that EHRs.docx
Two general technology trends in my workplace are that EHRs.docx
 
Two of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docxTwo of the religions that we have studied in the.docx
Two of the religions that we have studied in the.docx
 
XYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docxXYZ restaurant owner wishes to extend his current operation by.docx
XYZ restaurant owner wishes to extend his current operation by.docx
 
Write at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docxWrite at least 4 paragraphs in your own words after.docx
Write at least 4 paragraphs in your own words after.docx
 
You mention in your post that you will be.docx
You mention in your post that you will be.docxYou mention in your post that you will be.docx
You mention in your post that you will be.docx
 
to in which you draw from the assigned.docx
to in which you draw from the assigned.docxto in which you draw from the assigned.docx
to in which you draw from the assigned.docx
 
Title Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docxTitle Executive Order on Improving the Cybersecurity.docx
Title Executive Order on Improving the Cybersecurity.docx
 
Write a to paper in APA format that.docx
Write a to paper in APA format that.docxWrite a to paper in APA format that.docx
Write a to paper in APA format that.docx
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

power point 115.docx

  • 1. power point 115 QUESTIONS on Page #54:Respond to questions: PICK ANY 3 of themMAKING BUSINESS DECISIONS Pg#54Cool College Start-UpsNot long ago, people would call college kids who started businesses quaint. Now they call them the boss. For almost a decade, Inc. magazine has been watching college start-ups and posting a list of the nation’s top start-ups taking campuses by storm. Helped in part by low-cost technologies and an increased prevalence of entrepreneurship training at the university level, college students—and indeed those even younger—are making solid strides at founding companies. And they’re not just launching local pizza shops and fashion boutiques. They are starting up businesses that could scale into much bigger companies and may already cater to a national audience.Research Inc. magazine at www.inc.com and find the year’s current Coolest College Start-up listing. Choose one of the startups and explain how the business can use BPR, CRM, SCM, and ERP to help it gain traction in the market. Be sure to explain how the company can gain a competitive advantage by using each enterprise system efficiently and effectively.Managing Bad Customer RelationshipsThere is a common saying that the customer is always right. Clearly this can create many issues with customer relationship management as many times the customer is incorrect, but you can’t tell the customer they are wrong.Research the Internet and find an example of a customer relationship gone wrong and determine if the customer was at fault for the problem. What can you do as a manager when a customer is angry but clearly wrong about a situation? What strategies can a manager use when dealing with angry customers?Review Questions – pg#69 – PICK any 3 of them and respond to.MAKING BUSINESS DECISIONS pg#69The Competitive Landscape for Students According to the Economic Policy Institute, over the past decade the United States has lost an estimated 2.4 million factory jobs to China. Factories in South Korea, Taiwan, and China are producing toys, toothpaste, running shoes, computers, appliances, and cars. For a long time, U.S. firms did not recognize these products as competition; they regarded Asia’s high-tech products as second-rate knockoffs and believed Asian countries maintained a factory culture—they could imitate but not innovate. In hindsight, it is obvious that once these countries did begin designing and creating high-end products, they would have obvious competitive advantages, with high- value research and development coupled with low-cost manufacturing of unbeatable goods and services. Asia is now on the rise in all industries from wind turbines to high-speed bullet trains. According to Bloomberg Businessweek ’s ranking of the most innovative companies, 15 of the top 50 are Asian, up from just 5 in the previous year. In fact, for the
  • 2. first time, the majority of the top 25 are based outside the United States. How do you, as a business student, view these statistics?What type of global business climate will you be competing in when you graduate?If you wanted to gather competitive intelligence about the job market, where would you look and what types of data would you want to analyze?What can you do to create personal competitive advantages to differentiate yourself when searching for a job?Review Questions – pg#79 – Pick any 3MAKING BUSINESS DECISIONS pg#79(Complete ONE of the Options Below)Option #1The Internet of Things Is Wide Open—for Everyone!IoT is transforming our world into a living information system as we control our intelligent lighting from our smartphone to a daily health check from our smart toilet. Of course, with all great technological advances come unexpected risks, and you must be prepared to encounter various security issues with IoT. Just imagine if your devices are hacked by someone who now can shut off your water, take control of your car, or unlock the doors of your home from thousands of miles away. page 80 We are just beginning to understand the security issues associated with IoT and M2M, and you can be sure that sensitive data leakage from your IoT device is something you will most likely encounter in your life.Identify a few IoT devices you are using today. These can include fitness trackers that report to your iPhone, sports equipment that provides immediate feedback to an app, or even smart vacuum cleaners. If you are not using any IoT devices today, brainstorm a few you might purchase in the future. How could a criminal or hacker use your IoT to steal your sensitive data?What potential problems or issues could you experience from these types of illegal data thefts?What might be some of the signs that someone had accessed your IoT data illegally?What could you do to protect the data in your device?Option #2Information Issues in the Information AgeWe live in the information age, when the collection, storage, and use of data are hot topics. One example of inappropriate data handling occurred at a college where the monitoring of restrooms occurred every 15 seconds to observe the use of toilets, mirrors, and sinks. Students, faculty, and staff began complaining that the data collection was an invasion of their privacy and a violation of their rights. Another example of inappropriate data handling occurred when a professor of accounting at a college lost a flash drive containing information for more than 1,800 students, including Social Security numbers, grades, and names. Social Security numbers were included because the data went back to before 1993, when the college used Social Security numbers to identify students.What types of student data does your college collect? What could happen if your professor lost a thumb drive with all your personal information? What types of issues could you encounter if someone stole your personal data? What can your college do to ensure this type of data storage violation does not occur?