Reference no: EM13761873
Questions: For the following questions you should use the - Help_Desk_Spreadsheet_December_Only.xls
Excel file that I have placed on Blackboard. You will create pivot tables using this data to answer the following questions:
1. How many separate customer companies did our help center service? How many calls were made by each of these customers?
2. For all of the calls, for each customer, how many calls were made for each application and what was the average service time for each of the customers for each application? Is there anything interesting that you can see in these results? That is, are there any customers or applications that look different from the others?
3. Next you need to look at a combination of the different applications, the complexity of the problem and the different customers as characteristics and the number of calls and the average service time as key figures. Use this pivot table to answer the following questions:
a. Looking at all companies at once (that is, don't separate out each company), analyze the complexity of the calls and the number of calls and the average service time. Are there any conclusions you can come to?
b. Again, looking at all of the companies at once (i.e. don't separate them), analyze the complexity of the calls for each of the applications and analyze the number of calls and average service time. Are there any conclusions you can come to?
c. Now do the analysis in a and b above for each of the companies. That is for each company answer parts a and b above. Are there any conclusions you can come to? How useful is the data shown in part 3c-b?
Attachment:- help_desk_spreadsheet_december_only-1.xlsx
Explain how the internet has aided criminal activity
: Explain how the Internet has aided criminal activity. Provide three (3) specific examples of how the Internet has aided criminal activity
|
Enforce immediate payment for products
: An parts of Eastern Europe, companies maintain special guards to protect payday funds, to help move products to market, and to enforce immediate payment for products sold to retailers. All of these features indicate:
|
Describe the main difference of worm vs. virus
: 1. Describe the main difference of worm vs. virus and what are the best countermeasures for each in detail.2. What is a DNS attack? Are there different types, if so, explain each? Is the DNS attack assumed to compromise IPSec, and/or is it considered..
|
Software application
: Think of a software application (for example, a time tracking application) that you would like to put in for your past or present organization, or an organization that you have read about.
|
How many calls were made by each of these customers
: How many separate customer companies did our help center service? How many calls were made by each of these customers
|
What is intermodulation distortion
: What is intermodulation distortion? What sorts of signals are susceptible to this form of distortion?In addition, identify two situations in which error-free transmission is crucial to business processes. Instructions:•Your research essay should be ..
|
Paper discussing scope involving project management
: Write 3 to 4 page paper discussing scope involving Project management with a few resources
|
What is a generic subprogram in java
: How do you describe as a type in C++ a pointer to a function that takes two ints as arguments and returns a double. What is a generic subprogram in Java. What are its advantages
|
Specific challenges with overlapping of jurisdictions
: Identify the specific challenges with overlapping of jurisdictions and propose solution(s) for overcoming these challenges
|