What is CRM? Describe. What are relevant issues related to information accessibility, privacy, and the ethical use? Describe typical security attacks and ways to defend against them. ERP, which stands for Enterprise Resource Planning, is a software that attempts to integrate all departments and functions acro single system that serves the departments needs. When installed, having an ERP available turns into one of the best ROI (retur a company can make. SCM which stands for Supply Chain Management, enables enterprises to source the raw materials components needed to crea deliver that product or service to customers. The components of a SCM system include Planning (strategic planning and manag Sourcing (choosing suppliers to provide the goods and services needed to make the company's products), Making/Manufactur product), Delivery (delivering the product to the end user), and Returning (accepting defective or unwanted products from the CRM, which stands for Customer Relationship Management, is a system that helps a company have a better understanding of t how they can meet/satisfy those needs while improving their bottom line. Having an effective CRM system in a company can su acquire new ones, offer better customer service, cross sell products more effectively, providing products and services that are e want, and help sales staff close deals faster to bring in expedited revenue. Relevant issues related to information accessibility, privacy, and ethical use include being fluent with the computer (computer l knowing how to use the tool effectively to where information is universally available. This correlates to the digital divide "the h where having access to information is limited. When lookng at privacy and ethical use of computers, being able to protect ours as citizens is crucial for individual and business use. Additionally, those that have access and the knowledge of information ove willing to act ethically when in use. All systems that are connected to an internet are at risk for internal and external threats. Companies must be on the lookout fo viruses, theft of private information, and unauthorized users that may steal company information or computers/storage system to defend themselves from these threats, they can update their password/login information reguarly, maintain a strong and effi and also encryption when sending and receving information or data. They can also use an audit system software that maintain in the computer as well as backing up the system weekly or sometimes daily.
1 List and define five optical illusions that can effect one's perception of graphed data. 3 2 List and define five components of effective graphing.
PartyAffiliation 4 Compute PartyAffiliation freq Democrat Democrat Democrat Democrat Independent Republican Independent Republican Independent Republican Independent Republican Independent Democrat Democrat Republican Democrat Democrat Democrat Republican Republican Independent Republican Democrat Republican Republican Independent Republican Republican
You've reached the end of your free preview.
Want to read all 192 pages?
- Fall '09