Recommendations for addressing the business problem

Assignment Help Basic Computer Science
Reference no: EM132357832

In 250-500 words, share these recommendations in a Word document that addresses the following.

1. Summary of the business problem including the requestor who initially brought the problem to you.

2. Summary of the data that were requested and how they was obtained.

3. Discussion of the limitations of the available data and ethical concerns related to those limitations.

4. Hypothesis of why sales of the popular model have dropped based upon data analysis. Reference the Excel file that summarizes the data findings that resulted from your queries.

5. Recommendations for addressing the business problem.

6. In addition to the report, the manager has requested that you submit the Excel files summarizing the data findings that resulted from your queries.

7. The manager has also requested that you update the ERD you created in the Topic 5 assignment to include the tables generated as a result of the joins completed in the Topic 6 assignment. The ERD should clearly document the work stream and relationships.

Reference no: EM132357832

Questions Cloud

How data visualization may contribute to support : How Data Visualization May Contribute To Support The Analysis Of Policy Options In An Organization. Reflect on the characteristics of the data?
What you have learned about marketing : Please share what you have learned about marketing in this course and especially through your work on your marketing plan. The response must be typed.
Sensitivity to social and cultural differences : How do you ensure these techniques reflect sensitivity to social and cultural differences?
Process improvement tool : What tool was used, what was the situation that warranted this work and what was the outcome.
Recommendations for addressing the business problem : Discussion of the limitations of the available data and ethical concerns related to those limitations. Recommendations for addressing the business problem.
Create a consumer privacy policy : Create a Consumer Privacy Policy for your New Shoe Company based on the insight you have gained this week regarding privacy policies and their importance
How each component of accounting information system failed : Explain how the firm's accounting information system (i.e., components and functions) contributed to the fraud and / or embezzlement. You will need to focus on.
What is the objective of product decisions : What is the objective of Product Decisions? Can you please give some examples?
Pavement and storm water management facilities : As indicated above, identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How big is block size used by the file system to read data

How big is the block size used by the file system to read data? Hint: use reads of varying sizes and plot the time it takes to do such reads. Also, be wary of prefetching effects that often kick in during sequential reads.

  Identifying and describing how information is used

Write a 700- to 1,050-word paper identifying and describing how information is used and how it flows in an organization.

  Benefits and challenges of cloud computing

What are some of the benefits and challenges of cloud computing based on your research?

  Function can return reliable results

What function must be called prior to utilization of the function from the previous question so that function can return reliable results.

  Changes in the it environment

What is the C.I.A. guideline? How is this guideline used with respect to changes in the IT environment?

  How to strive to nurture place which holds learning

What type of organization permits you to be creative, risk prone, and good conversationalist with peers? How can you strive to nurture place which embraces learning?

  Concept of situational awareness and data fusion

In combat aviation, the concept of situational awareness and data fusion is critical. Attack or defend the notion that healthcare providers

  How many bits are required for the pointer

A process table is maintained that includes a pointer to a partition for each resident process. How many bits are required for the pointer?

  Network security analyst for a small accounting firm

You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guid..

  Securing the cloud for the enterprise

Based on the the article titled "Securing the Cloud for the Enterprise". What do YOU believe to be the two (2) most important security considerations

  Would intelligence develop would we be able to understand it

What would happen if we had dedicated computers with a huge number of neuron circuits

  Assignment on gonna

Who is available right now to do a three page risk management paper? A-plus writer accepted assignment on last Monday and has yet to submit...they are way passed the due date...who can assist me please?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd