Prospect and conducted research on the business

Assignment Help Basic Computer Science
Reference no: EM133128852

Your company specializes in pool cleaning and maintenance services, and you have identified a large health club that has several locations as a prospect and conducted research on the business. You think you have identified some opportunities to help the customer save money. One service option provides biweekly maintenance visits, and the customer pays monthly. Another involves monthly service visits and biannual training sessions at your customer's business so that their staff can learn to perform routine maintenance tasks on their own.

You are preparing to approach the health club's manager to set up a sales call. How would you approach the manager? What other type of information would you want to know before you make your approach? What role would each of the six Cs have in your approach?

Reference no: EM133128852

Questions Cloud

Working and annotated bibliography : As you begin researching you will conduct a preliminary source review which should include a variety of articles
What do you think the future of big data : What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?
Generic software product development and custom software dev : What is the most important difference between generic software product development and custom software development?
Generic software product and custom software development : What is the most important difference between generic software product development and custom software development?
Prospect and conducted research on the business : You have identified a large health club that has several locations as a prospect and conducted research on the business.
Higher levels of efficiency and productivity : Achieve operational excellence through higher levels of efficiency and productivity Create new products, services, and business models
Annotation is crucial component of good data visualization : Annotation is a crucial component of good data visualization. It can turn a boring graphic into an interesting and insightful way to convey information.
Explain how digital forensic software autopsy : Explain how the Digital Forensic Software "Autopsy" contributes to System or Network Security.
Business continuity planning and disaster recovery planning : Discuss the relationship with other organization processes and methods, such as business continuity planning and disaster recovery planning

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Routers In Digital Forensics

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime.

  What are two other disadvantages of scheme

Other than slowness or inefficiency, what are two other disadvantages of this scheme?

  What are the units for the slopes of the given lines

Movie Dramas. Here's a scatterplot of the production budgets (in millions of dollars) vs. the running time (in minutes) for major release movies in 2005.

  Characterized as wicked problems because of controversies

Policymakers are tasked with making decisions on issues characterized as wicked problems because of controversies,

  Write function multiple that determines for pair of integers

(Multiples) Write a function multiple that determines for a pair of integers whether the second integer is a multiple of the first.

  Resulting list is still in alphabetical order

Exercise 2, Assuming the contents of the array node pictured in Exercise 1, show the contents of node and the values of First and free after the letter F

  Application of the proposed approach

Describe the application of the proposed approach in different case studies. Depict a cutout of the CoCoME architecture and design models and show a violation of this architectural aspect. Show a fictitious violation of this concept in the CoCoME s..

  Report detailing relevant user access policies

Sean, your manager, asks you to write a report detailing relevant user access policies.

  Program in java that reads integers

Part 1: Write a program in Java that reads integers into an array list until end-of-file, then prints the array. Part 2: Modify the program to insert the value 99 before the index 5 position.

  Discuss the efficiency of the queue''s enqueue

Discuss the efficiency of the queue's enqueue

  Chose one type of cryptography attack and briefly explain

Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext)

  IT infrastructure and associated processes to cloud

The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd