Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ing Signavio to model a business process described below. Name your process: First Name st Name Assignment 1 so your name will be displayed in

image text in transcribed
ing Signavio to model a business process described below. Name your process: "First Name st Name Assignment 1 so your name will be displayed in your submission file. This is a sourcing process used by Blackwood Inc. to find prospective vendors to provide kitchen ware products to its restaurant chains. It starts when the company Blackwood identifies a list of products that its restaurants need. The company then sends the list to its sourcing experts in Vietnam. The experts start to search and contact local vendors with product information and order details. If they find a vendor, they will need to verify first whether the vendor has the manufacturing capability to meet to demands for Blackwood's requests. Second, they will need to verify whether the vendor has a local showroom. Throughout these two verification steps, if the vendor fails, the experts will go back to searching for another vendor. If the vendor satisfies both requirements, the experts will schedule a meeting to a sales representative in the showroom. During the showroom visit, the experts will inspect product quality and discuss the order details with the vendor. After the visit, they will engage in a long negotiation process with the vendor. In this process, the experts will send a contract to the vendor. If the vendor does not agree, they will counter-offer and send back the contract. The experts will resend a new contract. This process repeats until both sides reach an agreement. At this time, the experts will send the contract back to Blackwood for final approval while at the same time send the contract to the local legal team for final review. The process finishes when both Blackwood headquarter and the local legal team approves the contract. equirements: - Need to have the correct name for the file so it will be printed out in the PDF (0.5pt) - Need to have appropriate connectors and follow EPC modeling rules (2-3 pts) - Include all appropriate events and functions ( 23pts) - Follow the naming convention of events and functions (1 pt)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Handbook Of Database Security Applications And Trends

Authors: Michael Gertz, Sushil Jajodia

1st Edition

1441943056, 978-1441943057

More Books

Students also viewed these Databases questions

Question

What two forms were used to depict the solar deity Ra-Horakhty?

Answered: 1 week ago