Business managers see inefficiencies in everyday processes

Assignment Help Basic Computer Science
Reference no: EM132689175

IT and business managers see inefficiencies in everyday processes, as these inefficiencies are often related to current systems in place. As such, IT and business managers need to identify these issues to senior management and offer solutions.

In this interactive assignment, you will analyze the role of CRM systems in business and assess the issues that make a CRM system necessary for successful customer relationship management. Assume the role of an IT Manager working for an organization where there is no CRM in place. You may use a business scenario of your choice (this may be a real world scenario with which you are familiar or one you create). For your initial post, you will create PowerPoint presentation and screencast video of your PowerPoint. This presentation will be created for your CIO and should provide all pertinent information.

Your PowerPoint presentation must include a minimum of four inefficient processes you have identified related to recent customer interactions. Consider the CRM research you conducted and present to your CIO the CRM that best meets your needs. Include a rationale as to how it will alleviate the identified inefficiencies, providing a minimum of four reasons why the CRM and the vendor chosen would be the solution for your organization. Support your statements with evidence from your required and researched sources.

Reference no: EM132689175

Questions Cloud

Calculate the amount of principal reduction : If you took out $350,000 mortgage loan to be repaid over 40 years at 4.0%, calculate the amount of principal reduction in the first year.
Find the present value of annuity : An investor will receive a 15-year annuity of $5,000 per year. If the annual interest rate is 4.5%, what is the present value of this annuity?
Analyzing And Visualization Data-Annotation and Color : Discuss Typography and the importance of appearance of text. Discuss the following color harmonies: (Usage, Pros, and Cons)
Enterprise Resource Planning systems : Enterprise Resource Planning (ERP) systems are designed to address all of the business needs of an organization
Business managers see inefficiencies in everyday processes : IT and business managers see inefficiencies in everyday processes, as these inefficiencies are often related to current systems in place.
Cryptography and Site and Facility Security : Define steganography and discuss a method of how steganography is accomplished. Describe the four main classes of fire in relation to the type of fire
Cryptographic algorithms-security protocols : Cryptographic algorithms provide the underlying tools to most security protocols used in today's infrastructures.
Conduct your own social engineering experiments : While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk,
Rate of information technology implementations : How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Collection of communications protocols

Although this suite is commonly known as TCP/IP, these are only two of the many protocols necessary for network communications.

  Main memory but rather for cache memory

Which is the fastest form of RAM but also the most expensive. Due to its cost it is not used as main memory but rather for cache memory.

  Which served as a point-of-sale cash register and terminal

ABC was launched as a retail dive shop with 10 employees in Turkey by Mr Beans. As a small business owner, Beans wanted to offer the e-commerce capabilities of a large firm using a small company's budget. Within a year, he had installed an Ethernet L..

  Provide two examples of why your wireless network

Provide two examples of why your wireless network may not be performing well and explain the reason. Please include at least 2 references to support your answer

  Supervised and unsupervised neural network

What is the difference between a supervised and unsupervised neural network? Can you describe how each works?

  Describe the obstacles faced in the investigation

Describe the obstacles faced in the investigation. Outline the specific digital evidence that was used in the case.

  What is the pv present value of this cash flow stream

If the relevant discount rate for the entire period is 10%. What is the PV (present value) of this cash flow stream?

  Determine the maximum period obtainable from lcg

Determine the maximum period obtainable from following LCG? Xn+1 = aXn (mod 24). What must be the value of a?

  What sort of environmental challenges

What sort of ‘environmental' challenges is this organization facing: social, economic, and technological?

  Secure the data of internal and external stakeholders

With the use of technology also comes the responsibility of businesses to secure the data of internal and external stakeholders. Create a plan that identifies 5-7 security or privacy issues that might occur at the business level.

  Discuss and share rich and diverse assortment of reference

Discuss and share the rich and diverse assortment of reference sources for the Bourne Again Shell (BASH).

  Network administrator assign to a network address

What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 126 hosts?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd