How much should a business look into the background


Ques #2 .Discuss the following statements, be precise. Must relate to concepts in the book and/or lectures. Generic answers will not get much credit

a. How can value-chain be used by GIANT food store to identify competitive advantage?

b. Expert systems capture human expertise. Will expert system be ever able to behave like experts? Why or why not?

c. How much should a business look into the background of employees to try to identify those with potential problems? What ethical issues arise in this situation?
Q # 3
At Viacom International Inc., the New York based parent of MTV, Mr. John Nutt, the CFO teamed with executives from marketing, sales, manufacturing, human resources and contracting to lead the company into new directions. Because financial processes are so intertwined with the processes in other department, he felt that redesigning finance should ideally be part of company-wide effort. Although some turf were inevitable, executives involved in large scale effort to reorganize the company were persuaded to support company-wide efforts.

Some of the goals mentioned were, the new system should allow any department access to "work-in-progress" information. Also, the new system should reduce dependence on paper, particularly financial transactions. Further it should managers more time to analyze the data to make better decisions, rather than spending their time in collecting the data.

a. What system(s) (ex: DSS, GDSS, NN, SCM, CRM, ES, ERP, GIS etc..)would you advice and why?

b. What problems might be encountered in installing this system?

Ques #4 Identify and discuss four emerging technologies (as discussed in the class) that are performing several tasks for the following situation. Must discuss these technologies in relation to the case below (how technology is functioning and helping them in each case). Generic answers will not get much credit 
(4 points)

Ms Lin and Mr. Johnson are going to Paris . They are stuck in the traffic due to an accident and
will miss their flight on United Airlines. Recognizing this an automated voice-activated system,
after discussing with them, arranges for an alternate flight on Air France. They arrive
at the IAD (Dulles international) airport and are directed by a voice to an empty space "3C" in the international parking lot.

They are cleared through the security by a camera and proceed to boarding gate. They speak their names and are informed by a voice about their seat assignment 5C & 5D and upgrade. When they arrive in Paris they scan their ticket on a machine and their luggage comes rolling in. As soon as they get their luggage their rental car is waiting at the curb to take them to their hotel.

Emerging technology One______________
(explain how it is helping in the above process)

Emerging technology TWO______________
(explain how it is helping in the above process)

Emerging technology THREE______________
(explain how it is helping in the above process)

Emerging technology FOUR______________
(explain how it is helping in the above process)

Ques #5

P & B is a defense contractor and every employee has to pass security clearance. They recently fired John Doe who they believe was copying sensitive data from their files. John claims he is innocent. P &B has quarantined his computer. They do find some altered file in their database but are not sure if John altered them. You are a Computer forensics expert and have been hired by P & B to investigate this further.

Identify the FOUR steps involved in Forensic investigation and how you will proceed in this case. Must relate steps to the case to get full credit. Generic answers will not get much credit.
(5 points)

Ques #6

Ben & Jerry's, located in Waterbury, Vermont, produces 190,000 pints of ice cream and frozen yogurt daily to ship to over 50,000 grocery stores in the united states and 12 other countries. Every single pint is meticulously tracked, first by being entered into an ACCESS database with the information carefully organized. Ben & Jerry uses a sophisticated data-mining tool set from a company called Business Objects to track customer tastes.

Answer the following:
a. assuming following tables identify Primary (PK) and foreign key (FK)s of the following tables.

ICECREAM table
Ice_cream_type price years_first offered total_sales

Vanilla $2/scoop 1981 $45M
Cherry $3/scoop 1976 $45M
Chocolate $3/scoop 1981 $60M

INGREDIENT

Ingredient _name Ice_cream_type quantity_used

Vanilla beans Vanilla 20 oz
Vanilla beans Cherry 20 oz
Cherry pits Cherry 30 oz
Etc...

a. 
PK of ICECREAM table________________

PK of INGREDIENT table_____________

FK of INGREDIENT table_____________

FK of ICE CREAM table_____________

b. Draw the relationship (1:1 or 1M or m:n) between ICECREAM and INGREDIENT tables. (see weekly lectures) and justify it.

c. Write a query in SQL to get the names of different ice cream types and the years they were first offered in SQL

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: How much should a business look into the background
Reference No:- TGS0104307

Expected delivery within 24 Hours