Monday, May 25, 2020

Swot Analysis Financial Analysis - 1388 Words

Financial Analysis According to INVESTOPEDIA the definition of the DuPont analysis is that â€Å"assets are measured at their gross book value rather than at net book value in order to produce a higher return on equity (ROE)† (INVESTOPEDIA, 2003, pg.1). The DuPont analysis breaks down the return on equity into three parts. These three parts include: operating efficiency which would be measured by profit margin, assets and there use of efficiency which is measured by total asset turnover, and financial leverage which can be measured by equity multiplier (INVESTOPEDIA, 2003). The basic formula to measure the return on equity would be profit margin (profit/sales) X turnover (sales/assets) X equity multiplier (assets/equity). In September 2015 Church Dwight had a return on equity of 20.16%. In June of 2015 Church Dwight had a return on equity of 19.99%, and in March of 2015 Church Dwight had a return on equity of 20.45% (YCharts, 2016). The growth potential of the company looks very promising ac cording to their return on equity percentages. RD Analysis â€Å"A company’s RD intensity is a principal means of gaining market share in a global completion† (Wheelen, Hoffman, Hunger, and Bamford, 2015, pg. 144). Due to the fact that Church Dwight are not as present in foreign countries as many other companies are, Church Dwight does not have the RD intensity as many other company’s they are competing against. With the majority of company sales concentrated in the United StatesShow MoreRelatedAnalysis And Evaluation Of The Business And Financial Performance Of An Organization1365 Words   |  6 Pagesinformation pack from OBU and in that they offered wide variety of topics to choose from evaluation and analysis of organisation to critical review of key factors affecting organisation or brands. But topic no. 8 made most sense to me which is â€Å"Analysis and evaluation of the business and financial performance of an organisation over a three year period†. Reason is my incline towards handling financial data and number crunching. Personally I feel comfortable dealing with numbers, even during my studiesRead MoreInformation Gathering for Business Analysis1121 Words   |  5 Pagesa big source of information for me, but I had to look into other secondary sources like company’s annual reports, newspaper, internet etc to make my analysis more comprehensive I used the following secondary sources to gather my information which enabled me to get the broad view of Lucky Cement’s Business and it helped me to make a better analysis of Lucky Cement’s Performance. Annual Reports and Books Lucky Cement’s annual reports for years 2008-2010 provided me with a bulk of informationRead MoreSwot Analysis Foxtel Introduction to Marketing1700 Words   |  7 PagesFOXTEL SWOT Analysis Introduction to Marketing Assessment 1 (10%) Spotlight – Foxtel (from required text): Read the case – Foxtel – from chapter 2 of the required text.As per the text book: â€Å"Use the information in this Spotlight and any other necessary research to develop a SWOT analysis for Foxtel† 2011 3/18/2011 The SWOT analysis is a method used by organisations as a marketing strategy to better understand and identify positive and negative factors effecting the business, in present and inRead MoreSwot Analysis1676 Words   |  7 PagesSWOT Analysis is a strategic planning tool used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. It involves specifying the objective of the business venture or project and identifying the internal and external factors that are favorable and unfavorable to achieving that objective. The technique is credited to Albert Humphrey, who led a research project at Stanford University in the 1960s and 1970s using data Strategic Use: OrientingRead MoreGroupon : The Fastest Growing Company Ever Essay1341 Words   |  6 Pagesthey can manage the internal factors. We will analyze the internal and external environment using the following †¢ Pestle Analysis †¢ SWOT Analysis †¢ Porter’s Five Forces Analysis PESTLE ANALYSIS The PESTEL analysis is a tool used by companies to analyze their environment using six factors - Political, Economic, Social, Technological, Environmental and Legal. The PESTEL analysis of Best Buy Co. Inc. is as follows: Political Political influence on Groupon is little; however, the tax, environmental lawRead MoreMarketing Planning Of H M986 Words   |  4 Pagesbusiness plan it is a critical on-going success as a Low-Cost operations for HM. Q3 Techniques For Organisational Audit The Auditing team monitors HM financial reporting which includes monitoring the effectiveness of HM internal control along with management. The organisational work for HM includes handling auditing issues and financial reports published by HM The Auditing team constantly receives information with supporting documentation for decision-making from HM involving the ManagingRead MoreCsx Swot Essay678 Words   |  3 Pagesprofits/losses, mission, vision and core values. 2) Situational Analysis: (60 points) A situational analysis is a business term that means evaluation of trends and situation of a particular industry or market. An organizations competitive position, market and growth trends, operating and financial condition, and the general state of the companys internal and external affairs are evaluated in a situational analysis. * Is management planning to expand the business? * What strategy(ies)Read MoreSwot Analysis : Organizational Growth And Development1298 Words   |  6 PagesThe organization’s adaptation is formed around its internal (controllable) and external (non-controllable) variables. These variables are a part of the open systems theory that influence how and when the system grows. A SWOT (strengths, weaknesses, opportunities, and threats) analysis is a useful tool used to assess the affect these variables have on the organizational development. According to Virtualstrategist (2008), strengths and weaknesses are internal variables that are controlled by the organizationRead MoreCountry Road1239 Words   |  5 PagesBrochure More information from http://www.researchandmarkets.com/reports/2412467/ Country Road Limited (CTY) - Financial and Strategic SWOT Analysis Review Description: Summary Country Road Limited (Country Road) is a retailer of apparel, homewares and related accessories. The company operates as a subsidiary of Woolworths Holdings Limited. Country Road designs, wholesales, and licenses apparel products. Its products include apparels for men, women and children, gift cards, gift wraps, and tailoringRead MoreMarketing Strategic Planning : Marketing Strategy1042 Words   |  5 Pagescompany will be easily to identify the elements for the market, and how to prevent or handle them. Through the internal and external analysis, a company can make an option of market strategy. Lastly, it had provided guidelines of useful planning process strategy for the case company to achieve the goals. 2.4.1 SITUATION ANALYSIS Situation analysis is used to analysis the current market environment, and involves assessing market conditions and trends in the company. Subhash C. Jain introduced, marketing

Friday, May 15, 2020

Child Abuse Ethics Case Study - 614 Words

Ethics Case Study An eight month old girl arrives at an emergency room in which it was discovered that the child had bilateral fractures on her femur. The hospital determined that there was no child abuse present by having a conversation with the mother. They did not base this decision on anything other than the conversation with the mother. The mother informed them that the child complained about the condition after daycare and from this the hospital staff concluded that the child was not being abused. The problem within this case is that the hospital staff did not go to great lengths to verify the mothers story. If the mother would have been the source of the injures by abusing her child then the hospital could be held liable. Relying solely on the mothers statement could possible put both the hospital and the child at risk. Instances of potential child abuse should be handled with great care and concern. Nurses, as well as many other types of professionals, are required by law to report any incide nce or evidence of child abuse or neglect. The nurse or other professional is immune from liability after reporting an incidence of child abuse, but the nurse can be held civilly and criminally liable if he or she fails to make a report of suspected abuse (Lewin, 1994). Therefore, the hospital could be liable for damages and the hospital staff could also be held criminally liable if it was found that they were negligent in their decision to rule out child abuse from theShow MoreRelatedEthics Case Study Essay911 Words   |  4 PagesEthics Case Study Nurses are faced with ethical issues and dilemmas on a regular basis. Nurses must understand his or her values and morals to be able to deal adequately with the ethical issues he or she is faced with. Some ethical issues nurses are exposed to may be more difficult than others and the ethical decision making process is learned over time. The purpose of this paper is to identify the ethical issues in the case study provided in the week one assignment. A discussion of how to useRead MoreDrugs And Alcohol Of The New World1656 Words   |  7 Pagesare common themes at â€Å"celebrations, religious rituals, during recreation and for pain relief† (Stevens Smith, pg. 1). Some people though abuse drugs. We see more instances of people â€Å"both young and old abusing drugs† (Stevens Smith, pg. 1). We’ll discuss how â€Å"common drug abuse is, who it affects and how it correlates to violence, child and domestic abuse† (Stevens Smith, pg. 1). Drugs and Alcohol Nicotine One drug, nicotine is intertwined within the fabric of our society. The â€Å"IndiansRead MoreThe Effect Of Child Abuse On The Emotional Development Of The Infant To Five Year Old Child In The United States. 681 Words   |  3 PagesThe Effect Of Child Abuse On The Emotional Development Of The Infant To Five Years Old Child In The United States. Child abuse is one of the most serious issues in the United States today. Child abuse is generally the maltreatment of a minor, and includes a physical, emotional or psychological harm to a child. Neglecting a minor is another type of abuse such as malnutrition, abandonment, and inadequate care of a child’s safety. Additionally, any neglectful act can lead to physical or emotionalRead MoreEthics And Law For Marriage And Family Therapy1633 Words   |  7 Pages Ethical and Legal Considerations in Therapy Tahani M. Abu-Khalaf MFT 630 - Ethics Law for Marriage and Family Therapy September 6th, 2015 Ethical and Legal Considerations in Therapy Professional counselors have mandatory responsibilities to protect the rights and to promote the welfare of his or her clients, and should take all reasonable steps to avoid harm to their clients, maintain professional boundaries, maintain confidentiality, avoid [dualRead MoreEthics and Archer Daniels Midland646 Words   |  3 Pagesincident show about the view that â€Å"to be ethical it is enough for business people to follow the law â€Å"? Human trafficking and child abuse are major problems along the west coast of Africa. Cocoa plantations are so notorious for the use of forced child labor (and forced adult labor) that U.S. Representative Eliot Engel and Senator Tom Harkin created a protocol to end child slavery and initiate labeling for products that are produced â€Å"slave free.† A joint committee was formed and called the InternationalRead MoreSubstance Abuse Is An Addiction1626 Words   |  7 PagesIntroduction Substance abuse is an addiction and it is the addition, which is referred to a chronic disease. It is this chronic disease that is a significant and growing issue, especially among family units where either one or two parents and/or parental guardians suffer from. Despite the various and complex reasons that cause the parents or parental guardians to abuse substances, it is their children who suffer thus, significantly affecting the parent/parental guardian and child bonding relationshipRead MoreIdentify and Respond to Children and Young People at Risk of Harm1159 Words   |  5 Pages1. List the observations that together indicate possible ‘risk of significant harm’ Risk of harm is the indication that the child may suffer physical, emotional, and psychological harm because of neglect by the parent or guardian responsible for his care. In Jamelle’s case, indication includes physical signs like; †¢ Various large bruises †¢ Smelling strong urine stale †¢ Dirty and unwashed skin †¢ Lack of fresh changing clothes †¢ Vomiting †¢ Bloodshot eyes †¢ Psychological l problems suchRead MoreCase Study Approaches to Ethical Dilemas Essay1151 Words   |  5 Pagesï » ¿ Case Study Approaches to Ethical Dilemmas LaDonna Landry BSHS 335 January 12, 2015 Nicole Zmuda Case Study Approaches to Ethical Dilemmas The case study I chose is that of six-year-old Tavion Robinson who was taken to Methodist Hospital by his father for a broken arm and abrasions. There were a couple of things in this case that could insinuate that the broken arm and abrasions were not an accident. The father being hesitant to leave Tavion alone with hospital staff was the firstRead MoreHumans Learn Ethics From Their Environment1597 Words   |  7 PagesHumans Learn Ethics from their Environment There has been a huge debate throughout the years as to whether human beings are ethical by nature or whether ethics is acquired in other ways. Christian Keyser’s research has evidence showing that humans are ethical by nature; conversely the Milgram experiment propagates that humans are not ethical by nature. Humans learn ethics as a result of their genetic predisposition, as well as, environmental factors such as: culture, socialization, andRead MoreThe Debate On Virtual Child Pornography734 Words   |  3 PagesLindsay Hall Thinking and Doing Ethics Professor Wisniewski November December 8, 2015 Word count 849 Case 1(Ruggiero 173). We have the debate and Supreme Court ruling in 2002 that stated the ban on ‘virtual child pornography’ was unconstitutional, and in turn, The Federal Child Pornography Prevention Act was overturned. The parties involved are the disgusting, scum of the earth who produce this ungodly entertainment for sick minded pedophiles, the US Supreme Court who have taken an oath to protect

Wednesday, May 6, 2020

Essay about Acquaintance Rape - 2625 Words

It’s 3:20 am. on a Friday morning, and pitch black out. The only things visible are the tree branches and pavement shining from yellow streetlights that carve out a path from the parking lot to the back door of my building. Living on campus at Towson I should’ve owned mace, but I clutched my car key instead, pointed outward ready to stab the eye of anyone deciding to come out of the dark after me. The brisk walk up the hill seems to take half an hour. Finally under the bright lights of the overhang I swipe my card quickly to get inside. The door bolt locks behind me with a loud click. I’m safe. nbsp;nbsp;nbsp;nbsp;nbsp;This is the typical scenario were one would assume a rape to take place. When people think about rape, they usually†¦show more content†¦Even in early age, boys are taught to be more aggressive than girls are. They are expected to enjoy playing sports. Girls are expected to play less aggressive sports. Boys are taught that they should get anything in their ways, even if it means using violence. Girls are taught to stay away from conflicts. Boys are sometimes taught to have a lot of girlfriends, and not to get tied down by one girl when they are young. They are supposed to play the field. Girls are often taught that they should have a steady boyfriend. They are taught to guard their â€Å"reputations.† All of these childhood â€Å"lessons† come into play in date rape for obvious reasons. (Mufson et all, 1993). nbsp;nbsp;nbsp;nbsp;nbsp;Rape is defined as a forced sexual intercourse against the will of the victim (Parrot, 1988). Rape is a violent act, not a sexual act. The myth that men who rape women are sexually pathological has begun to be dispelled and replaced with an understanding that rape is an act of anger, power and control rather than lust. nbsp;nbsp;nbsp;nbsp;nbsp;Rape can happen to anyone. Women from different cultures, races, ages, and economic level are all vulnerable. So no matter who you are or where you live. Most rape, and specifically most acquaintance rape, happens between the ages of fifteen and twenty-five. Because this is the time when young women are most likely to date, it is therefore are most vulnerable age of date rape, though acquaintance rape is not limited toShow MoreRelatedAcquaintance Rape And The College Social Scene1595 Words   |  7 PagesAcquaintance Rape and the College Social Scene In Acquaintance â€Å"Rape and the College Social Scene,† the authors, Sally K. Ward, Kathy Chapman, Ellen Cohn, Susan White and Kirk Williams, main purpose was to report on a study they performed of the cases of sexual assaults at a specific college campus. The article provides estimates of the rate of acquaintance rape, recounting the situations surrounding the acquaintance rape, and people working toward making policies against this type of aggressionRead MoreAcquaintance Rape3225 Words   |  13 PagesRunning Head: ACQUAINTANCE RAPE Acquaintance Rape: It Could Happen To Anyone Abstract Anyone can be a victim of acquaintance rape. It does not matter if the victim is male or female, old or young; it can still happen. Just by being at a party full of friends or even going on a date with a significant other, everyone is at risk. It is never the victims fault. There is no possible way to know when or to whom it will happen. Acquaintance Rape: It Could Happen To Anyone We are taught â€Å"don’tRead MoreAcquaintance Rape Victims: To Blame or Not to Blame?585 Words   |  2 Pages Acquaintance rape victims: to blame or not to blame? There is presently much controversy regarding acquaintance rape victims and their level of culpability. Benevolent sexists promote the belief that these individuals can actually be blamed for their experiences because they adopted behaviors that were sexually immoral and that influenced the perpetrators to go through with their plans. Barbara Masser, Kate Lee, and Blake M. McKimmies article Bad Woman, Bad Victim? Disentangling the EffectsRead MoreDifferent Crime Scripts Of Acquaintance And Decision Making Processes Adopted By Offenders1534 Words   |  7 PagesAlthough largely unreported, sexual offending by adult acquaintances is a highly prevalent crime (Silva, 2004). This review will look at how crime scripts , through a rational choice perspective, aids in the situational prevention of crime. Furthermore, it will analyse the literature concerning this crime, identifying the modus operandi and decision making processes adopted by offenders, defining the different crime scripts of acquaintance rape illustrated in previous empirical literature. This reviewRead MoreThe Harmful Effects of Rape Essay1076 Words   |  5 Pagesidea of rape is a scary thought. Rape is defined as a type of sexual assault, usually involving sexual intercourse, which is initiated by one or more persons against another person without that person’s consent (Kelland, 2011). Rape is a demoralizing crime that can leave the victim with lasting negative psychological affects. This paper will discuss the different types of rape, the cause and effects with rape and the harm rape can cause to its victims. When most people hear the word â€Å"rape†, theyRead More Rape Culture Essay1625 Words   |  7 PagesRape Culture Many of the attitudes, beliefs, and mistaken ideas about rape have been with us for centuries. By looking at myths, such as â€Å"women ask for it,† and â€Å"it would do some women good to get raped,† from a historical perspective, lead us for better understanding how they evolved. Women are still seen as the property of men, are protected as such. Men and women are still taught to occupy very different roles in today’s world. Men are usually more aggressive, and women are seen as passiveRead MoreAquaintance Rape Essay667 Words   |  3 PagesAquaintance Rape There are many types of rape. A very important type of rape is acquaintance rape. According to a researcher named R. Lance Shotland, there may be five kinds of acquaintance rape: beginning, early, relational, rape within sexually active couples (RSCA) with battery and RSAC without battery. They are described both in terms of length of the relationship and previous sexual activity. The first type of acquaintance rape is the beginning date rape. This form of rape happensRead MoreLiterature And Film : Crimes And Punishment : Literature Film, True Crimes1630 Words   |  7 Pages Date Rape Tami B. Eikelboom Arizona State University MLS 598 Crimes Punishment: Literature Film, True Crimes Professor Angela Giron While rape among acquaintances has undoubtedly occurred for many centuries, the phenomenon now known as date rape was not named until 1982, when Mary Koss, a feminist and professor of family and community medicine at the University of Arizona reported the results of her study on a new and unusual type of sexual aggression which she termed dateRead MoreThe Increasing Need to Reform Rape Laws771 Words   |  3 Pages Rape is one of the most widespread and ubiquitous violent crimes facing America, making laws regarding rape and the judicial processing of rape increasingly important. The judicial process itself deters both rape reports and rape convictions. Not only does the judicial processing or rape cases itself deter reports and convictions, but it also has a negative impact on the moral and mental well being of the victims who decide to pursue their cases. According to the Rape, Abuse, and Incest NationalRead MoreMarital Rape Essay1195 Words   |  5 PagesSociety’s view of rape is that it only occurs at night to women in dark alleys by men they have never seen or met before. In reality there are two types of rape in which the victim knows the attacker. One of these is known as Acquaintance rape and the other being marital rape. All forms of rape have long term impacts on the victims, for a victim of acquaintance rape they can feel especially shameful if the attacker was a relative or superior at school or work. For victims of marital rape the assaults

Tuesday, May 5, 2020

Essentials of systems analysis and design - MyAssignmenthelp.com

Question: Discuss about the Essentials of systems analysis and design. Answer: Time Management Plan Task Name Duration Start Finish Predecessors CloudPlex 48 days Wed 1/3/18 Fri 3/9/18 Email marketing 17 days Wed 1/3/18 Thu 1/25/18 Design email template 2 days Wed 1/3/18 Thu 1/4/18 Write email content 3 days Fri 1/5/18 Tue 1/9/18 3 Design email campaign 3 days Wed 1/10/18 Fri 1/12/18 4 Send emails to prospects 4 days Mon 1/15/18 Thu 1/18/18 5 Track users behavior 2 days Fri 1/19/18 Mon 1/22/18 6 Analyze the users 3 days Tue 1/23/18 Thu 1/25/18 7 SMS marketing 11 days Fri 1/26/18 Fri 2/9/18 Design SMS template 2 days Fri 1/26/18 Mon 1/29/18 8 Write SMS content 2 days Tue 1/30/18 Wed 1/31/18 10 Send SMS to prospects 3 days Thu 2/1/18 Mon 2/5/18 11 Track users behavior 2 days Tue 2/6/18 Wed 2/7/18 12 Analyze the users 2 days Thu 2/8/18 Fri 2/9/18 13 Webinar/Tutorials 12 days Mon 2/12/18 Tue 2/27/18 Develop tutorials 2 days Mon 2/12/18 Tue 2/13/18 14 Develop lab sessions 3 days Wed 2/14/18 Fri 2/16/18 16 Organize webinar 1 day Mon 2/19/18 Mon 2/19/18 17 Track users on website 4 days Tue 2/20/18 Fri 2/23/18 18 Analyze the users 2 days Mon 2/26/18 Tue 2/27/18 19 Social Media 8 days Wed 2/28/18 Fri 3/9/18 Make recommendations based on keywords 2 days Wed 2/28/18 Thu 3/1/18 20 Seek potential customers 3 days Fri 3/2/18 Tue 3/6/18 22 Make posts on users account using automation tools 3 days Wed 3/7/18 Fri 3/9/18 23 Figure 1: Work Break Down Structure (Source: Created By Author) TO BE Process Figure 2: TO BE Process (Source: Created By Author) Comparing AS IS and TO BE Process Taking into consideration the AS IS and TO BE procedures has been created for the implementation of the process for the CloudPlex Company. The AS IS diagram shows the direct flow of information from the marketing point of view and then dividing up into three different process of webinars, SMS and E-Mails. The templates that are to be used for the three processes are created and the respective information is shared with the clients. In the TO BE process, three different departments of the company create these templates and tutorials. They are then stored in a single database connected to the three departments. After the designing of the campaign, the process is again shifted to a single department and the next steps are followed until end. Physical and Logical Network The physical and logical network topology to be used for the implementation of the system would be star topology. The system can be designed as follows: Figure 3: Network Topology to be implemented (Source: Created By Author) This designed implementation would help individual department to be connected to the database individually without the hindrance from other department. All data from the three departments would flow to the database server and then flow back to the common department where the data can be sent out. This system would help in the safeguarding of the database server and the individual connected network would be able to work simultaneously. If one of the network falls then the other networks would be able to continue working as per the connectivity. Testing For the testing of the connectivity in the network topology, being created for the connection of the three department and the database is to be done with the help of connection checking and ping checking. Another process that can be followed for the testing of the TO BE process would be use black box testing where the users of the system would be used for the testing of the network. The users would be able to find the best possible solution for the network that has been provided to the company. The test data to be used for the testing of the system would be of the three types. This would help in the evaluation of the system easily. Training After the system has been cleared out of all the bugs and drawbacks, the TO BE scenario is implemented into the company. The new system then needs to be made understandable to the users of the company. This requires a series of training processes where the group of users of the system would be trained by the developers of the system. This training would help the users of the system to work without any hindrance later on in the company while using the same system. The groups of people that needs to be trained are as follows: Marketing Analyst: this training would help them to understand the process to follow which would enable them to market the specific products to the clients. Social Media Manager: the social media workers would be able to asses the clients who are using the system and to find come more users who would be willing to use the products of the system. Web content writer: the training would help them to save the writing that is being done by them and then save them to the database that has been implemented into the TO BE system. System Changeover For a changing of the system from the AS IS to the TO BE scenario there needs to be ac complete changeover of the system that is in use. The new system that would be implemented would be developed with the use of a new database server. The connection, which was previously implemented in the company, has to be changed as per the topology diagram provided in the report. The new requirements of the system are: A database server A new common department People from the three department to be included into this New workstations for the department New recruitment for the other three department Following the above requirement fulfillment would result in the creation of the TO BE scenario for the company. The first step to be followed for the implementation of the scenario would be clear out the connection already being used. This would help in the laying out of the new system. The workstations needs to be arranged in such a way so that all the files being created can be easily dispatched to the common database server. Following this, a new department needs to be created with the collection of old employees from the three department. As the common department would be working on the information from their respective department, the later steps in the follow up would be easily completed. There also needs to be new recruit in the previous three department, which would help in the speeding up of the process. At the end all, the work stations needs to be connected to the database through a single workstation domain in the company. The use of the database would help in the storing of the information being created including the webinars and the templates. This would help in the reuse of the information at the later stages of the process or later on. Report to Top Management Objectives The main objective for the designing and the analysis of the new system for CloudPlex is to make the company to use a common data base server for their marketing team to store information related to the development of the marketing procedures. The different department produce their respective content and campaign for the marketing and forward them to the client. This has been the process that has been followed by the company. The new system that is being suggested in the use of a database within the system to store the information that is being developed by the three departments. Background The implementation of a database system for the marketing department has been considered one of the best improvement in a company. The process of using a database would help in the management of the information related to the company and the marketing to be useful for the storing of information as well as the management of information. The use of a data base server would eventually help in the process of storing information other than the marketing department. The information related to the employees as well as the clients can be easily stored as well as analyzed at later stages to make the working of the company faster. The use of a database system can be said to be helpful in the after process of the marketing team. The information regarding the client would also be able to be stored in the database. Processes Undertaken For the implementation of the database, the new TO BE scenario is to be implemented into the system of the company. The company needs to change their working condition and make use of the database to make the working of the marketing team and the other employees easier as well as faster. Having a common database would also facilitate in the process of sharing of information within the employees of the company and the different departments. For the connection of the workstations with the common database, the topology to be followed has been discussed to be of star format. This star would help in keeping the working of the individual department of the marketing portion of the company. The marketing team would be able to develop the procedural videos and the templates for SMS and E-Mail and eventually store them in the database for the common department to work on them. This process would help in the fast forwarding of the work that is being done by the marketing department of the compa ny. Scope The scope of the working process in the company is limited to the implementation of the database and connecting the workstations to it. The connection needs to be established for the workstations individually for the proper working of the database. The company needs to implement the new system in the company so that the employees are able to share the information within themselves as well as the higher authority. The storing of the large amount of information being generated would help in the process of making the company increase its resources as well as make the working environment smoother than before. Recommendations For the company it can be recommended that they need to follow the new TO BE scenario generated and designed so that they are able to work without the recreation of a certain template of a webinar tutorial video. There needs to be no thought to be put into the process of training the employees of the company on the process of how to follow the working of the new system with the data base system. The developers of the system would provide the training once the complete system has been implemented. Bibliography Abu Omar, M.M., 2014. A New Approach to Increase the Efficiency of Classical Approach In Designing Management Information Systems (MISS).IJRCCT,3(11), pp.1421-1424. Azar, A.T. and Vaidyanathan, S. eds., 2015.Chaos modeling and control systems design. Germany: Springer. Buede, D.M. and Miller, W.D., 2016.The engineering design of systems: models and methods. John Wiley Sons. Dennis, A., Wixom, B.H. and Tegarden, D., 2015.Systems analysis and design: An object-oriented approach with UML. John Wiley Sons. Garfield, J., 2017. Assessing Theoretical Concepts in Systems Analysis and Design: A Scaffolded Case Study Approach. Hendrick, H.W. and Kleiner, B. eds., 2016.Macroergonomics: theory, management, and applications. CRC Press. Hjalmarsson, A., Recker, J.C., Rosemann, M. and Lind, M., 2015. Understanding the behavior of workshop facilitators in systems analysis and design projects: Developing theory from process modeling projects.Communications of the Association for Information Systems,36(22), pp.421-447. Montgomery, D.C., 2017.Design and analysis of experiments. John Wiley Sons. Salisbury, W.D., Ferratt, T.W. and Wynn Jr, D., 2015. Issues and Opinions: Assessing the Emphasis on Information Security in the Systems Analysis and Design Course.Communications of the Association for Information Systems,36. Taranath, B.S., 2016.Structural analysis and design of tall buildings: Steel and composite construction. CRC press. Valacich, J.S., George, J.F. and Hoffer, J.A., 2015.Essentials of systems analysis and design. Pearson Education. Vera, Y. and Fabian, N., 2016. Crime prevention through environmental design.