Categories
Writers Solution

Information about Canada and its colonial legacy

Course Name: Indigenous Business Management. Assignment: Individual Reflection Assignment to reflect everything learned throughout the course. Write a one page reflection about what you learned, not only about Indigenous peoples In Canada but also how it relates to your experiences from your home country, which is India, and also as an international student studying in Canada. How are you changing with this information about Canada and its colonial legacy? 

How have the experiences changed you? What insights and experiences led to your change overtime? What lessons have you learned that add different dimensions to your story. 

Describe the evolution of your learning journey and reflect on the changes you would like to influence in business. 

Consider the following questions to guide your story:

  • What do I know now that I didn’t know before beginning this class?
  • How does this shift or change your perspective?
  • What does this learning mean to you?
  • How does your story relate to the future of reconciliation and Call to Action #92?

Submission requirements

  • Reflective examination using 2-3 linkages between course materials and themes that demonstrate your learning journey in understanding Indigenous peoples and Canadian business.
  • One page typed and single spaced.
  • When talking about course themes use third person (he, she, they) and personal comments in first person (I).

THE ASSIGNMENT INSTRUCTIONS AS WELL AS THE COURSE MATERIAL TO REFER TO IS ATTACHED WITH THE QUESTION. PLEASE MAKE SURE THAT THE REFLECTION REPORT IS BASED ON THE COURSE MATERIAL PROVIDED AND LINKED PERSONALLY your experiences from your home country, which is India, and also as an international student studying in Canada.

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class on Information about Canada and its colonial legacy

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

Chief Information Officer (CIO) for a local health system

You are the Chief Information Officer (CIO) for a local health system. Your organization held its annual strategic planning session and decided that there needed to be a change in the Emergency Departments (ED) relative to the triage process at one of the facilities. The Chief Executive Officer has suggested a pilot program utilizing telemedicine to supplement its ED services. The use of telemedicine may reduce wait times at the ED and triage non-emergent needs to the appropriate level of care (i.e., urgent care or primary care). It would also allow for more resources to be deployed for ED related services, such as on-call physicians operating remotely.

Instructions

In your role as CIO, you will need to research the use of telehealth in the ED and its implications for the organization. Draft a memo outlining the readiness of the organization to implement the change strategy. Your memo should include:

  • A SWOT analysis identifying internal and external forces and trends that may impact the change initiative.
  • A discussion of the challenges facing the ED based on research into the utilization practices of the ED in your community or in a community with which you are familiar.
  • Recommendation of the organization’s potential readiness for the change, including any actions that should be taken to increase readiness.

Using the Rasmussen library, research common challenges facing Emergency Departments. In addition, research utilization practices commonly aligned with ED visits. Use information from your current facility (or one you are familiar with or can research) to develop a SWOT analysis. Your recommendation should be based on both your SWOT analysis and your research into ED challenges.

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class on Chief Information Officer (CIO) for a local health system

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

Risks associated with information technology

AUDIT, ASSURANCE AND COMPLIANCE

WORD COUNT- 1000 TO 1500 WORDS

INSTRUCTIONS

HERE IS AN EXAMPLE OF A COMPANY YOU CAN CHOOSE: SONIC HEALTHCARE

Go to the website of your allocated company. Then, go to the Investor Relations section of the website. This section may be called: “””Investors”””, “”Shareholder Information”,” or similar titles. In this section, find the ‘company’s annual report and other related reports. Download the ‘firm’s latest annual report and other related information and reports and save it to your computer. For example, these reports may be dated 30 June 2021 or 30 June 2022.

Questions

Assume that you have been appointed as the external auditor for your allocated company for the financial year ending June 2021 or 2022. Prepare a report to adequately address the following:

Examine and assess the Revised ASA315 with a focus on identifying risks, including risks associated with information technology and the auditor’s obligation to utilize automated tools and techniques to perform the audit in a professional, effective and efficient manner

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class on Risks associated with information technology

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

Information captured by point-of-sale software

HOSPITALITY WORK PLACEMENT STAGE 2

Part A Questions (working all rounder in café)

  1. List three (3) types of financial transaction.

Answer:

  1. List three (3) types of reconciliation records which are likely to be subject to organisational procedures.

Answer:

  1. List three (3) types of information captured by point-of-sale software.

Answer:

  1. Explain why the reconciliation process is important for all businesses.

Answer:

  1. List three (3) security procedures that a business may instigate.

Answer:

  1. What is GST, to which goods and services does it apply and how does it affect the cost of those goods and services?

Answer:

  1. List the four (4) steps involved in providing the correct change for cash payments.
    Answer:
  1. What is a cash float?

Answer:

  1. List three (3) responsibilities you have when it comes to checking customer payments.

Answer:

10. List the steps involved in counting and calculating customer

payments.

Answer:

Part B Questions (working all rounder in café)

  1. Outline four (4) sources of information on food, including what type of information you can get from them.

Answer:

  1. Name two (2) past trends and two current or emerging trends in the Australian food industry.

Answer:

  1. Explain the meaning of the following:
  • Drug-food interactions
  • Food allergy
  • Food intolerance
  • Genetically modified foods.

Answer:

  1. What information may you need to share with colleagues regarding menu development?

Answer:

  1. What special dietary requirements might exist for customers?

Answer:

  1. What business considerations in the provision of information and advice on food do you have? Give a brief description of each and why you need to consider them.

Answer:

  1. What are the main research methods you can use to update your knowledge about food? Give both informal and formal methods. Which of these have you used?

Answer:

  1. What are the health and legal consequences of not addressing special dietary requirements?

Answer:

  1. What are the dietary guidelines for older Australians, children, and adolescents?

Answer:

Part C Questions (working all rounder in café)

  1. Within your job role, provide details of the organisational information that is applicable to you.

Answer:

  1. Provide an overview of the information applicable to customers, as applicable to your organisation and/or area of hospitality.

Answer:

  1. What common operational tasks do you need to participate within?

Answer:

  1. What are end of shift procedures and what do you need to do to fulfil these in your role?

Answer:

  1. Explain the roles and responsibilities at your organisation/or within your area of hospitality for the following:
  • Your supervisor or manager
  • Your team members and/or work colleagues.

Answer:

  1. Relay your organisation’s policies and procedures for three of the following:
  • Administration and reporting, e.g., completing financial transaction, completing work plans and schedules and work handovers
  • Hygiene, health, and safety requirements
  • Security requirements
  • Customer service
  • Complaint handling.

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class on Information captured by point-of-sale software

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

specific information technology and a specific business application

Assignment 1 Research Proposal on a specific information technology and a specific business application

Objective(s)

This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve student learning skills and to give students experience in researching the literature on a topic relevant to the Unit of Study subject matter, critically analysing current academic papers then presenting idea or question and expected outcomes with clarity and definition in a referenced written report.

Instructions

For this component you will write a research proposal on a particular topic. The topic you select must be directly relevant to IT in Business. Your topic must include a specific information technology and a specific business application, e.g., AI For fraud detection.

All students must have a different topic. Students can choose to write about the same technology, but the approach and the thrust of each paper must be different. For instance, you could look at cloud computing from a security viewpoint, or from an environment impact viewpoint, or from the perspective of a manager trying to reduce their hardware costs. There will be many perspectives to look at each technology and its relation to Business IT.

To ensure this uniqueness, each student must email their topic and title to their tutor within the first two weeks. Your tutor will respond with an approval or with a message that you will either need to choose a different technology or to change the thrust of your paper. Once it has been approved you should begin by working towards the first deliverable.

Note: specific information technology and a specific business application, It is important to realize, that you must have prior approval for a topic before you can submit. If you submit something for assessment without approval for the specific topic, it will not be graded. Once you have a topic approved, you cannot change it without consent from your subject lecturer.

The Key elements of the research proposal

Your research proposal must include the following components:

1. An introduction or context to the study problem or subject, identifying the research gap in the existing literature

2. A thesis statement that answers the research question and, if possible, the research question

3. The need for the research, as demonstrated by the research’s justification

4. A preliminary literature study detailing prior work in the field.

5. The theoretical foundation that would guide the planned study

6. A statement of the research’s contribution to the field as a whole

7. The suggested research approach

8. A research strategy and plan

9. The anticipated research’s timetable

10. References listed for the proposal’s preparation

Submissions

The outline will include the title and a description of the sections in your paper and the key topics in each, along with at least five preliminary references and a note as to in which section they will be included.

• You are required to address Elements 1,2,3,4,10 in your outline (200 words).

The draft version is just that, a draft. The first draft can be messy, rough and amenable to change, allowing you to re-mould your structure with successive drafts. You can avoid trying to write perfect sentences and paragraphs (polishing). Additionally, you can include bullet points, sentence fragments, and temporary section headings, but I would expect approximately half of the paper to be near complete at this stage. Don’t worry about being repetitive or boring. Avoid making your writing eloquent, stylistic or succinct in the first draft: you can revise and improve your writing as your rework later drafts. The idea of the draft is to get down initial ideas and develop an overall structure of the paper.

• You are required to address Elements 1-10 in your draft (≥ 1250 words).

The final version of your paper is the polished version, the approach should follow the same plan as your draft, but obviously some change may have occurred from the draft. You should not use a lot of small sections and bullet points in the final version. Your research proposal should be presenting the state of current knowledge in a specific area and as such, should have a narrative that flows from one paragraph to another. You cannot achieve this with bullet points and small disjoint sections. All references included with your paper must be cited within the paper and be appropriate to the context of the citation.

• You are required to address Elements 1-10 in your final proposal (2500 words).

Some Notes:

  • All references must use the Harvard referencing style.
  • The length of the paper is to be 2500 words (excluding the references, contents etc.)
  • The font of the body text should be 12pt Times New Roman font, 1.5 line spaced
  • Section Heading should be in Arial Bold 12-point font
  • At NO time should you use Wikipedia as a reference

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on specific information technology and a specific business application

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

Information Technology and Mobile Application 

Course: Information Technology and Mobile Application 

Practical Connection Assignment: 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course (Information Technology and Mobile Application) have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study

Requirements:

Categories
Writers Solution

The Critical Need for Information Security

Case Study: The Critical Need for Information Security

5 page paper in which you:

  • Identify at least three benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research.
  • Suggest how this insight could assist in defining the needs for security within an organization.
  • Analyze and determine which sector, public or private, has greater insight on the potential of cyberattacks. Justify your answer by citing at least three examples.
  • Suggest at least four best practices that should be implemented when developing a cybersecurity strategy within a security enterprise.
  • Evaluate the required roles and functions of Information Technology (IT) personnel that would be required to sustain these best practices.
  • Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure effective implementation and transition.
  • Suggest how public-private partnerships can strengthen cybersecurity efforts and effectiveness in a:
    • Corporate environment
    • Regional level
    • National level
  • Use three sources to support your writing.

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on The Critical Need for Information Security

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

Laws Influencing Information Security and Privacy in the Financial Sector

Introduction & Overview
This is the ISOL 633 Residency Project: Portfolio Assignment, which is a label that merely
reflects that one of the overarching M.S. Information Systems Security degree program’s Learner
Outcomes (a/k/a, “PLOs”; see syllabus and below) will be tested in your work. This is a
relatively light research and writing project to be done in a group unless your Instructor advises
you to conduct it individually. Although it is relatively light, for example as compared to a
master’s thesis or a dissertation, it is an academic research paper that requires rigor,
commitment, and care.
In ISOL 633 all your work is focused on obtaining the five Course Objectives (also on the
syllabus) and this MSISS PLO:
✓ Program Outcome 3.1- Students determine which laws apply to different types of
business environments.
A successful Portfolio will unequivocally prove that your group has attained the PLO, which is
partially why this is not due until the end of the term (see your course dates for details). Also, a
successful Portfolio will evince graduate-level written English, and conformity to APA Style
guidelines. See the Residency Project: Portfolio Assignment’s rubric for a detailed view about
how to learn the most in this process, and how to earn the most in terms of a grade on the work.
Requirements
Writing Style and Constructive Requirements
Through experience it is clear that, for some reason, page length is top-of-mind amongst
students’ curiosities. You are required to write at least five substantive pages (excluding Title,
Abstract, References, and Appendices) and no more than 10 without approval from your
Instructor.
If you are familiar with APA Style, which is another requirement, you know that the
parenthetical above points to the main components of this Portfolio Assignment: Title Page,
Abstract Page, Body, References, and Appendices if needed. As graduate students studying in
STEM sciences you must follow APA. There are ample resources in UC’s Library to learn how
to conform.
Besides the Library, you can get all the help desired from UC’s The Learning Commons and its
Writing Center. You have no excuse to fail at these basic style and construction requirements.
This is the so-called low-hanging fruit. Experience shows us that far too few of you will heed
this seemingly simple direction. Please take advantage of these resources lest your excellent
research and analyses never actually gets communicated. Sometimes the mode is as important as
the message. See the course materials for links and tons of help in this vein.ISOL Residency Project: Portfolio Assignment 2
The Research Challenges
Your group’s task is to conduct reliable, valid, scholarly research about one of the following
bodies of law, and then discuss your findings and critical thoughts about it. As a separate
assignment, your group will also present the research and its findings in a way that engages and
informs an audience. There have been and will be many areas of information security and
privacy laws, so select one of the options that engages you, or perhaps relates to work you’re
doing.
1. Laws Influencing Information Security and Privacy in the Financial Sector
Select one American financial institution that frames your research. Describe the organization, its
business(es), its scope, and any additional descriptive information that will inform your reader
about your subject matter.
Describe and define at least one the laws focused on compliance within the financial sector that
came up during our course. Research the law itself, any legal cases that were based on that law,
and the critique of the law that you found through your research. Of course, if your selected
financial institution was involved in such litigation, or has published their critique, include that
information too.
In addition to compliance laws that directly target financial institutions, countless other laws
apply to them. Use the U.S. Patent and Trademark Office’s website to discover whether your
selected institution has been awarded intellectual property rights for their trademarks, patents, or
IP. Describe whether and how it protects its trade secrets. Describe for your reader some of the
most prominent criminal or tort risks that your entity faces; or perhaps has been involved in.
In addition to risks in the realms of criminal or tort law, every organization faces the potential
risk of enduring a cyber-attack or other incident that must be followed by a forensics
investigation. Keeping the focus on your organization and the financial sector, research and
discuss an incident or case in which such an institution was compelled to go through the forensic
investigation process. There are no sectors exempt from those incidents or cases, regrettably, so
be diligent and you will find one to discuss.
Conclude the Portfolio with your overall assessment of whether the legal system—from
compliance mandates, to IT, criminal, and tort laws, to forensic investigations—benefits, hurts,
or otherwise affects the organization. Assume the role of information security and privacy risk
consultant in this section.
2. Laws Influencing Information Security and Privacy in the Education Sector
Select one American academic institution that frames your research. Describe the school, its
place in academia, its student body and curricular expanse, and any additional descriptive
information that will inform your reader about your subject matter.
Describe and define at least one the laws focused on compliance within the education sector that
came up during our course. Research the law itself, any legal cases that were based on that law,
and the critique of the law that you found through your research. Of course, if your selectedISOL Residency Project: Portfolio Assignment 3
institution was involved in such litigation, or has published their critique, include that
information too.
In addition to compliance laws that directly target educational institutions, countless other laws
apply to them. Use the U.S. Patent and Trademark Office’s website to discover whether your
selected institution has been awarded intellectual property rights for their trademarks, patents, or
IP. Describe whether and how it protects its trade secrets. Describe for your reader some of the
most prominent criminal or tort risks that your entity faces; or perhaps has been involved in.
In addition to risks in the realms of criminal or tort law, every organization faces the potential
risk of enduring a cyber-attack or other incident that must be followed by a forensics
investigation. Keeping the focus on your organization and the educational sector, research and
discuss an incident or case in which such an institution was compelled to go through the forensic
investigation process. There are no sectors exempt from those incidents or cases, regrettably, so
be diligent and you will find one to discuss.
Conclude the Portfolio with your overall assessment of whether the legal system—from
compliance mandates, to IT, criminal, and tort laws, to forensic investigations—benefits, hurts,
or otherwise affects the institution. Assume the role of information security and privacy risk
consultant in this section.
3. Laws Influencing Information Security and Privacy in the Healthcare Sector
Select one American healthcare organization (“covered entity” in HIPAA parlance) that frames
your research. Describe the organization, its components assuming it’s a healthcare “system,” its
business in general, and any additional descriptive information that will inform your reader about
your subject matter.
Describe and define at least one the laws focused on compliance within the healthcare sector that
came up during our course. Research the law itself, any legal cases that were based on that law,
and the critique of the law that you found through your research. Of course, if your selected
covered entity was involved in such litigation, or has published their critique, include that
information too.
In addition to compliance laws that directly target healthcare institutions, countless other laws
apply to them. Use the U.S. Patent and Trademark Office’s website to discover whether your
selected institution has been awarded intellectual property rights for their trademarks, patents, or
IP. Describe whether and how it protects its trade secrets. Describe for your reader some of the
most prominent criminal or tort risks that your entity faces; or perhaps has been involved in.
In addition to risks in the realms of criminal or tort law, every organization faces the potential
risk of enduring a cyber-attack or other incident that must be followed by a forensics
investigation. Keeping the focus on your organization and the healthcare sector, research and
discuss an incident or case in which such an institution was compelled to go through the forensic
investigation process. There are no sectors exempt from those incidents or cases, regrettably, so
be diligent and you will find one to discuss.ISOL Residency Project: Portfolio Assignment 4
Conclude the Portfolio with your overall assessment of whether the legal system—from
compliance mandates, to IT, criminal, and tort laws, to forensic investigations—benefits, hurts,
or otherwise affects the institution. Assume the role of information security and privacy risk
consultant in this section.
4. Laws Influencing Information Security and Privacy in the Federal Government
Select one U.S. federal government agency, bureau, directorate, or another organizational entity
in the Administrative Branch that frames your research. Describe the organization, its place in
the structure of the federal government, its scope of control or legal influence, what types of
organizations or individuals are subject to its regulations, and any additional descriptive
information that will inform your reader about your subject matter.
Describe and define at least one the laws focused on compliance within the federal government
system that came up during our course. Research the law itself, any legal cases that were based
on that law, and the critique of the law that you found through your research. Of course, your
selected agency was likely involved in such litigation, or has published their critique of the laws,
so include that information foremost.
In addition to compliance laws that directly target the federal government’s security and privacy,
countless other laws apply to them. Use the U.S. Patent and Trademark Office’s website to
discover whether your selected agency has been awarded intellectual property rights (yes, the
federal government both owns and awards IP protection through USPTO) for their trademarks,
patents, or IP. Describe whether and how it maintains or protects its trade secrets. Describe for
your reader some of the most prominent criminal or tort risks that your entity faces; or perhaps
has been involved in. Again, even the government is subject to the laws that it creates in this
regard.
In addition to risks in the realms of criminal or tort law, every organization faces the potential
risk of enduring a cyber-attack or other incident that must be followed by a forensics
investigation. Keeping the focus on your agency, and likely also looking to NIST materials,
research and discuss an incident or case in which such the agency or another within its greater
organization was compelled to go through the forensic investigation process. There are no
sectors exempt from those incidents or cases, regrettably, so be diligent and you will find one to
discuss.
Conclude the Portfolio with your overall assessment of whether the legal system—from
compliance mandates, to IT, criminal, and tort laws, to forensic investigations—benefits, hurts,
or otherwise affects the agency. Assume the role of information security and privacy risk
consultant in this section.
Additional Requirements as Mandated by Your Instructor
This Portfolio Assignment is subject to changes introduced by your instructor, whose
requirements supersede these when the two directions appear at odds. As always, work with your
Instructor, ask questions when you’re unclear, and do so as soon as practical.

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on Laws Influencing Information Security and Privacy in the Financial Sector

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

accurately represents the information presented in the multimedia presentation

A.  Present your written message plan by doing the following:

1.  Describe the audience, organization, or community you wish to target with your proposed policy or process change, including 2–3 defining characteristics of that group.

2.  Describe the policy or process change and explain why this change is of concern to the chosen audience, organization, or community.

3.  Discuss your proposed change to the policy or process and how the change will affect the chosen audience, organization, or community. 

B.  Present your proposed policy or process change from part A by doing the following:

1.  Create a narrated multimedia presentation that meets the following criteria:

•   appropriate for the selected audience

•   describes the problem to be solved

•   proposes the change

•   integrates the following principles of multimedia design:

o   effective organization

o   effective opening and closing

o   appropriate choice and placement of relevant visuals

o   effective use of vocalics (i.e., pitch, tone, inflection, volume) 

2.  Submit a written transcription of the narration for your multimedia presentation. The transcription should meet each of the following criteria:

•   accurately represents the information presented in the multimedia presentation

•   appropriately addresses and enhances the content of the presentation

C.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. This includes source citation for any visual elements used in the digital presentation

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on accurately represents the information presented in the multimedia presentation

NO PLAGIARISM, Get impressive Grades in Your Academic Work

Categories
Writers Solution

Explain what kind of information you will gather about Jorge before the meeting

Read the scenario below and complete the assignment.

Presidential Aviation Scenario: 

Presidential Aviation has provided charter flights to a wide array of customers, including business travelers worldwide. Thanks to the Presidential online booking system, business travelers can secure reliable quotes and book both domestic and international flights. Presidential has a sizable fleet of aircrafts, including jets (light, midsize, and large) and turboprops. 

The company is known for its ability to cater to passengers’ every desire, including gourmet meals, special beverages, entertainment while in the air, and other luxury accommodations. Presidential also staffs a full-service VIP jet concierge program, similar to what major airlines offer. 

Miguel Lopez is a salesperson for Presidential Aviation. He is currently planning an important first visit to Jorge Morales, a procurement officer at Regent Seven Seas Cruises. Company officials travel across the country a great deal in their work. Miguel would like to tell Jorge how Presidential can provide outstanding benefits to the Regent Seven Seas Cruises. Some of the special features for business travelers include the following: 

  • Privacy – you have the entire aircraft to yourself and can travel with passengers you know and enjoy.
  • Comfort – including roomy leather seats, in-flight movies, a fully stocked bar, and gourmet meals that you choose.
  • Ease – no time-consuming check-in process. You drive right up to the plane, and your luggage goes from your car into the plane.
  • Point-to-point travel – there are no set schedules, you can fly when you want. Presidential uses 10 times more airports than commercial airlines, so you can fly from less congested airports closer to where you live.

Miguel will be making his first sales call and giving an initial presentation to Jorge.  

Assignment:

Take on the role of Miguel. 

Write a 700-1000 -word email to your boss to describe your approach to the initial sales call and the initial presentation. 

Complete the following in your email: 

  • Explain what kind of information you will gather about Jorge before the meeting.
  • Explain what kind of information you will gather about Regent Seven Seas Cruises before the meeting.
  • Summarize what sources you will use to gather the needed information.
  • Describe 3 methods of communication you plan to use in your initial sales presentation to Jorge.

If you use references please cite APA and use American based resources as this is based in America

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com on Explain what kind of information you will gather about Jorge before the meeting

NO PLAGIARISM, Get impressive Grades in Your Academic Work