What is a source for their customer data

Assignment Help Management Information Sys
Reference no: EM133540778

Questions

1. With the company's goals in mind, identify 3 data variables they might want to have on their BI Dashboard. For example, the BI Dashboard should include a graph indicating the total number of rental customers per week. Can you think of 2 more?

2. Using terms from the "Relevant Terms" list above, indicate possible sources for the data that Dukes Scooter Rentals needs. Specifically,

a. What can be a source for streaming services subscriber data?

b. What is a source for their customer data, scooter data, and product sales data?

3. What BI analysis tools (ones covered in the course) could Dukes Scooter Rentals use to generate the data and information they need to meet Goals 2-5? Refer to the list of Relevant Terms on Page 1 for ideas. Identify one type of tool for each goal. HINT: pay particular attention to the underlined sections of each goal. (Identify the next 4 bullet points)

- Increase the total number of rental minutes for luxury scooters by offering "Luxury Scooter Discounts" to Dukes' most loyal customers. Identify "loyal" customers by analyzing each customer's total number of rentals in the past 6 months, their most recent rental, and the total amount they've spent on rentals in the past 6 months.

- Monitor customer satisfaction by analyzing comments on the company's social media site. - - Identify the best products to cross-sell with the scooter rental by looking at rental and sales data together.

-Determine the number of luxury scooter rentals in Harrisonburg in October 2021.

Reference no: EM133540778

Questions Cloud

Determine the point where they should stop producing product : Determine the point where they should stop producing products that contribute little to society's welfare, even if it means fewer profits.
Issues that may occur that could be avoided and why : While belting in the field of Business Administration what are some issues thst may occur that could be avoided and why?
What benefits can we gain from stakeholder engagement : What are our external drivers for stakeholder engagement? What benefits can we gain from stakeholder engagement? What are the risks of not engaging?
What are the benefits and challenges associated : What are the benefits and challenges associated with Resurce Based Theory in Health Care
What is a source for their customer data : What can be a source for streaming services subscriber data? What is a source for their customer data, scooter data, and product sales data?
What are the difficulties in this topic worth investigating : What questions do you plan to explore and what are the difficulties in this topic worth investigating? What research did you do to validate your claims?
What are the most promising opportunities for action : Would you prioritize improving cost or improving differentiation? What are the most promising opportunities for action in your chosen priority?
Discuss the cloud strategy adopted by amazon : Discuss the rationale for the organization's current choices, advantages and disadvantages, and suggestions for improvement.
Conduct some research on current trends in it : Information technology leaders need to stay abreast of trends and new innovations. Conduct some research on current trends in IT.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Read the article and answer the below question

read the article and answer the below question : Per the Daniel Benjamin article in your readings.

  Explain the immediate steps you would instruct your team

Explain the immediate steps you would instruct your team to use to contain the attack, but also to maintain the service to the e-commerce site.

  Prepare presentation for plan for fulfilling a business need

develop a PowerPoint proposal presentation for your plan for fulfilling a business need that would help the organization achieve its goals.

  How can buffer-overflow attacks be avoided

Research and discuss the principle of exploits based on buffer-overflow attacks. How can buffer-overflow attacks be avoided?

  Identify the elements of an information security plan

Identify, define, and describe the three or four most important elements of an Information Security Plan.

  Prepare a visual representation of the architecture

Identify the key elements of an appropriate e-commerce Web site for the organization.Prepare a visual representation of the architecture.

  How you would increase the probability of success

Include in your critique how you would increase the probability of success with new technology implementations.

  Research one type of information systems

The goal of the assignment is to understand Information systems and Technology. Please research one type of information systems and:1. Describe what the system is and how it works.

  What are the hardships of performing business in markets

What are the chances and risks of doing business in markets that are emerging?What are the hardships of performing business in markets that are emerging?

  What was the primary rationale for selecting cloud services

What was the primary rationale for selecting cloud services?What benefits and what drawbacks are associated with this cloud sourcing event?

  Create a report based on heuristic evaluation

Provide details of the heuristics based on the Eight Golden Rules and give examples of where cognitive load is increased.

  Write a case study report paper describing the company

write a case study report paper describing the company, some of the possible benefits that the company might have gained by operating globally, the technology used to support a global position and the IT strategy used to gain market share and rete..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd