How customers learned about pur

Assignment Help Computer Engineering
Reference no: EM133244963

Question: Picnics R Us (PRU) is a small catering firm with five employees. During a typical summer weekend, PRU caters 15 picnics with 20-50 people each. The business has grown rapidly over the past year and the owner wants to install a new computer system for managing the ordering and buying process. PUR has a set of 10 standard picknick packages (e.g., a "Sandwich Platter" or "Burgers in the Park"). When potential customers call, the receptionist describes the packages to them. If the customer decides to book a picnic, the receptionist records the customer information (e.g., name, address, phone number, etc.) and the information about the picnic (e.g., place, date, time, which one of the standard packages, total price) on a contract. The customer is then emailed a copy of the contract and must sign and return it along with the payment (often a credit card or by check) before the picnic is officially booked. Sometimes, the customer wants something special (e.g., birthday cake). In this case, the receptionist takes the information and gives it to the owner who determines the cost; the receptionist then calls the customer back with the price information. Sometimes the customer accepts the price; other times, the customer requests some changes which have to go back to the owner for a new cost estimate. The owner would like to use the system for marketing as well. It should be able to track how customers learned about PUR, and identify repeat customers, so that PUR can mail special offers to them.

Reference no: EM133244963

Questions Cloud

Develop handling standards for each classification : CYB 690 Grand Canyon University decide how you will label your data to communicate the assigned classification. Develop handling standards
Clearly define the life cycle stage you are in : Which family life cycle stage are you in? Clearly define the life cycle stage you are in. What are the joys of that stage and the difficulties
Explain the meaning of information ownership : CYB 690 Grand Canyon University Explain the meaning of information ownership and how to classify, handle, and label. Describe vulnerability mapping, management
Design rough sketch of cognitive psychological investigation : Design a rough sketch of a cognitive psychological investigation involving one of the research methods described in this chapter
How customers learned about pur : MIS 310 Iowa State University track how customers learned about PUR, and identify repeat customers, so that PUR can mail special offers to them
Explain nursing informatics : Define and explain nursing informatics and highlight the role of a nurs leader as a knowledge worker.
What is the difference between using a pin : ITT 116 Grand Canyon University What is the difference between using a PIN and using a password to secure an account? Which one do you think is more secure?
Where can you find scholarly peer-reviewed sources : Where can you find scholarly peer-reviewed sources? What is the difference between a review article, a meta-analysis article, and an original empirical research
What are some hospital database security concepts : CST 620 University of Maryland, University College What are some hospital database security concepts and issues with respect to disasters and disaster recovery

Reviews

Write a Review

Computer Engineering Questions & Answers

  Briefly describe the current uses of bluetooth

Briefly describe the current uses of Bluetooth as well as the benefits it provides for personal uses and for business purposes.

  Discuss the it manager at a fairly large company

your customer walks into your office and asks you to explain to her how Data is transported over

  Compute the intersection of two arrays of integers

Write java program to implement the algorithm that computes the intersection of two arrays of integers using two different data structures.

  Which optional internet protocols might you implement

Which Internet protocols will your network and workstations need to support? Which optional Internet protocols might you implement?

  Create a patron class for the library

The class will have a user's name. library card number, and library fees (if owed). Have functions that access this data, as well as a function to set the fee.

  Is the introduction interesting and effective

Is the "introduction" interesting and effective? Does the paper have enough content to support the main idea? Does the paper have clear summary or conclusion?

  Explain why you chose advantage and challenge that you did

Explain why you chose the advantage and challenge that you did, and provide one real-world example of each environment.

  Explain the ow-level radiological contamination attacks

This chapter's opening scenario illustrates a specific type of incident/disaster. Using a Web browser, search for information related to preparing.

  What role do end users play in incident reporting

What role do end users play in incident reporting? Should end users be encouraged to report suspicious occurrences? Why or why not? The response must be typed.

  Describe the animated sine curve

Write a Python program one.py with PyOpenGL to display an animation of sine function y = Asin(x+B), satifying the following requirements.

  Write a function that returns the depth of the input a

Write a function celldepth(A, unused) that returns the depth of the input A (the second input unused should be part of your function definition.

  The user for a positive number n representing the number

Write a C program called sort.c that first prompts the user for a positive number n representing the number of numbers to be sorted.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd