What is CRM Describe What are relevant issues related to information

What is crm describe what are relevant issues related

This preview shows page 8 - 12 out of 192 pages.

What is CRM? Describe. What are relevant issues related to information accessibility, privacy, and the ethical use? Describe typical security attacks and ways to defend against them. ERP, which stands for Enterprise Resource Planning, is a software that attempts to integrate all departments and functions acro single system that serves the departments needs. When installed, having an ERP available turns into one of the best ROI (retur a company can make. SCM which stands for Supply Chain Management, enables enterprises to source the raw materials components needed to crea deliver that product or service to customers. The components of a SCM system include Planning (strategic planning and manag Sourcing (choosing suppliers to provide the goods and services needed to make the company's products), Making/Manufactur product), Delivery (delivering the product to the end user), and Returning (accepting defective or unwanted products from the CRM, which stands for Customer Relationship Management, is a system that helps a company have a better understanding of t how they can meet/satisfy those needs while improving their bottom line. Having an effective CRM system in a company can su acquire new ones, offer better customer service, cross sell products more effectively, providing products and services that are e want, and help sales staff close deals faster to bring in expedited revenue. Relevant issues related to information accessibility, privacy, and ethical use include being fluent with the computer (computer l knowing how to use the tool effectively to where information is universally available. This correlates to the digital divide "the h where having access to information is limited. When lookng at privacy and ethical use of computers, being able to protect ours as citizens is crucial for individual and business use. Additionally, those that have access and the knowledge of information ove willing to act ethically when in use. All systems that are connected to an internet are at risk for internal and external threats. Companies must be on the lookout fo viruses, theft of private information, and unauthorized users that may steal company information or computers/storage system to defend themselves from these threats, they can update their password/login information reguarly, maintain a strong and effi and also encryption when sending and receving information or data. They can also use an audit system software that maintain in the computer as well as backing up the system weekly or sometimes daily.
Image of page 8
1 List and define five optical illusions that can effect one's perception of graphed data. 3 2 List and define five components of effective graphing.
Image of page 9
Image of page 10
PartyAffiliation 4 Compute PartyAffiliation freq Democrat Democrat Democrat Democrat Independent Republican Independent Republican Independent Republican Independent Republican Independent Democrat Democrat Republican Democrat Democrat Democrat Republican Republican Independent Republican Democrat Republican Republican Independent Republican Republican
Image of page 11
Image of page 12

You've reached the end of your free preview.

Want to read all 192 pages?

  • Fall '09
  • ELLIOT
  • Threesome

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes