CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation. O Analytical Operational Next-generation Partner Employee QUESTION 24 1 points E Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes: employee relationship systems, employee management systems, knowledge work systems. knowledge management systems. learning management systems. QUESTIONE nainte A restaurant client has asked you to develop a system that would provide smartphone alerts about special discounts to potential customers in the vicinity. Which of the following tools will provide the solution? Location analytics Neural networks Big data analytics Operational analytics Genetic algorithms OOOO QUESTION 26 1 points Save Ans Operational management typically makes which type of decisions? Procedural Documented Semi-structured Low-level Structured OOO Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? Controls Legacy systems SSID standards Security policy Vulnerabilities QUESTION 28 1 points A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the effect. diffraction whirlpool ripple bullwhip network Which of the following is the most prominent data manipulation language today? DB2 SQL Hadoop Access Crystal Reports QUESTION 30 1 points Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? Safety stock Demand planning Just-in-time strategies Continuous replenishment Perfect information Which of the following tools is used to analyze customer buying patterns? O Analytical CRM Operational CRM Demand planning CLTV SFA QUESTION 32 1 points Save Ar Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? Controls Benchmarking Security Identity management Algorithms QUESTION 33 1 points Save Ans