How is technology being used for customer relationship management?

Module 4 Writing Assignment

In 500 words using APA format (remember not to exceed the threshold of 15% similarity score in turinitin) explain the following:

View the following video: https://youtu.be/iOF7aAVZMqA

Please watch the *VIDEO* the answer is there.

Answer the following questions:

What are some elements of the Harley Davidson buyer persona?

How is technology being used for customer relationship management?

Evaluate the business-level strategy of either Starbucks or Lockheed Martin to determine whether you believe the strategy is appropriate to offset forces in the industry.

Please respond to the following:

  • Evaluate the business-level strategy of either Starbucks or Lockheed Martin to determine whether you believe the strategy is appropriate to offset forces in the industry. Provide specific examples to support your response.
  • Make recommendations for improving this strategy as well as describing any challenges you foresee in executing those recommendations. Provide specific examples to support your response.
compare the characteristics of IPv4 and IPv6. Discuss any benefits one provides over the other.

You have learned a great deal about the Internet Protocol (IP). IP is a set of rules for how data is sent across networks and arrive at the intended destination. An IP address is a numeric identifier assigned to each device on an IP network. Unfortunately, the internet has finally run out of IPv4 addresses. The good news is that everyone knew this would eventually occur and there is a solution: IPv6.

For this discussion, compare the characteristics of IPv4 and IPv6. Discuss any benefits one provides over the other.

Both IPv4 and IPv6 have the option to subnet. Some of the reasons to subnet a network is to improve network performance and speed, reduce network congestion, control network growth, and ease administration.

Next, select a Class A, B, and C IP (v4) address for input into the subnet calculator.

Class A: 1.0.0.1 – 126.255.255.254
Class B: 128.1.0.1 – 191.255.255.254
Class C: 192.0.1.1 – 223.255.254.254
Take a screenshot and post each of your results to include in your post.

If you want to increase the number of subnets, you simply change the Maximum Subnets field input to your desired number. When you increase this number, what happens to the Host per Subnet field and why?

Describe the three-step process for training adaptation and delivery.

 

Instructions

Research the databases in the CSU Online Library, and locate an article for a critique that covers effective training delivery methods for adult learners. The article must be at least four pages in length and published within the last 7 years. Be sure to cover the topics below in your critique.

  • Identify and explain the author’s main ideas. Begin your critique of the article with an introduction that defines the subject of your critique and your point of view.
  • Based on the research in your chosen article, what is the one factor that has a direct and positive impact on knowledge retention, and why?
  • Describe the three-step process for training adaptation and delivery. Does the author cover this process in your article? If not, do you think the author’s method would benefit from including this process? Explain your rationale.
  • What is the importance of employee-driven content?
  • To appeal to adult learners, what do delivery methods need to include, and why?

Your article critique must be at least two pages in length and use at least two outside sources, one of which must be the article you are critiquing. Adhere to APA style when constructing this assignment, and use in-text citations and references for all sources that are used. Please note that no abstract is needed.

what do you think it could be better to improve the antivirus software?

 

If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.?

Answer the question with a short paragraph, with a minimum of 300 words. Count the words only in the body of your response, not the references.  APA formatting but do not include a title page, abstract or table of contents. Body and references only in your post.

A minimum of two references are required.  One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.

Why was the manufacturer losing money on this program

Week 7 Discussion

Context

Asymmetric information and/or imperfect information can cause two forms of market failure: 1) adverse selection and 2) moral hazard. Asymmetric information is where one party in the transaction has more information than the other party in the transaction. Imperfect information is a situation in which neither party has perfect information about the good/service being exchanged in a transaction. Such goods and services are sometime referred to as “experience goods.”

In the late 1990s, car leasing was very popular in the United States. A customer would lease a car from the manufacturer for a set term, usually two years, and then have the option of keeping the car. If the customer decided to keep the car, the customer would pay a price to the manufacturer, the “residual value,” computed as 60% of the new car price. The manufacturer would then sell the returned cars at auction. In 1999, the manufacturer lost an average of $480 on each returned car. (The auction price was, on average, $480 less than the residual value.)

Also see the help provided in the discussion preparation.

Instructions

For your discussion post, address the following within the context of the above scenario:

  • Why was the manufacturer losing money on this program? Was this a problem of adverse selection or moral hazard?
  • What should the manufacturer do to stop losing money? Will rational actors use rules of thumb?

To earn full credit for your discussion, you must complete one post and one follow-up or reply to a classmate. Make sure both the post and the reply focus on the questions asked.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

What was the nurse’s role in ascertaining that the care was provided?

 

Think back to your most recent time in the clinical setting when another discipline (respiratory, physical therapy, nutrition, occupational therapy) was utilized.

Describe a form of interdisciplinary collaborative care you’ve seen on your current assigned clinical or work site. Then have a discussion about the following questions:

  • Who coordinated that care? What was the nurse’s role in ascertaining that the care was provided?
  • Was the patient’s outcome met? How or why not? What would you, a novice nurse-leader, have done differently to achieve the patient’s goals?
How would you evaluate the level of cooperation or communication between investigators and the community? Were the police able to warn potential victims?

Instructions

Investigation and Effects on the Community

For this assignment you will return to the case that you chose for the Week 3 written assignment.

Create a report in Microsoft Word that covers the investigation and the effects of the case on the community with regards to the following points:

  • Describe the investigation. How did the investigators proceed? Was there any interaction between the killer and the police? How did investigators finally catch the killer?
  • How would you evaluate the level of cooperation or communication between investigators and the community? Were the police able to warn potential victims?
  • What was the effect on the local community while this killer was active?
  • Lastly, did this case have any impact on law, policing, the criminal justice system, etc.?
Identify and explain the author’s main ideas.

 

Instructions

Research the databases in the CSU Online Library, and locate an article for a critique that covers effective training delivery methods for adult learners. The article must be at least four pages in length and published within the last 7 years. Be sure to cover the topics below in your critique.

  • Identify and explain the author’s main ideas. Begin your critique of the article with an introduction that defines the subject of your critique and your point of view.
  • Based on the research in your chosen article, what is the one factor that has a direct and positive impact on knowledge retention, and why?
  • Describe the three-step process for training adaptation and delivery. Does the author cover this process in your article? If not, do you think the author’s method would benefit from including this process? Explain your rationale.
  • What is the importance of employee-driven content?
  • To appeal to adult learners, what do delivery methods need to include, and why?

Your article critique must be at least two pages in length and use at least two outside sources, one of which must be the article you are critiquing. Adhere to APA style when constructing this assignment, and use in-text citations and references for all sources that are used. Please note that no abstract is needed.