Use the background information to develop a business profile for Personal Trainer. Be sure to indicate where more information will be needed.

What will be an ideal response?


According to Gray Lewis, who will manage the new facility at the new “supercenter,” Personal Trainer will offer exercise equipment, a health food store, a pool, a snack bar, sporting goods, child care, child-fitness programs, a teen center, and a computer cafe. Each of these activities represents a major business function, which in turn includes various business processes. Examples of business processes might include the following:
• Add new member
• Create fitness class
• Schedule fitness instructor
• Register member in class
• Sell health food products
• Sell sporting goods
• Design training program for member
• Enter member charges
• Prepare monthly bills
• Apply member payments
According to Gray Lewis, who will manage the new facility at the new “supercenter,” Personal Trainer will offer exercise equipment, a health food store, a pool, a snack bar, sporting goods, child care, child-fitness programs, a teen center, and a computer cafe. Each of these activities represents a major business function, which in turn includes various business processes. Examples of business processes might include the following:
• Add new member
• Create fitness class
• Schedule fitness instructor
• Register member in class
• Sell health food products
• Sell sporting goods
• Design training program for member
• Enter member charges
• Prepare monthly bills
• Apply member payments

Computer Science & Information Technology

You might also like to view...

Two tasks that are operating ________ are both making progress at once.

a. sequentially b. concurrently c. iteratively d. recursively

Computer Science & Information Technology

________ Online allows users to design a presentation with text, illustrations, images, SmartArt, transitions, and animations

A) PowerPoint B) Excel C) Word D) OneNote

Computer Science & Information Technology

Information warfare is any attempt to manipulate information in pursuit of a military or political goal

Indicate whether the statement is true or false.

Computer Science & Information Technology

Give two reasons for using a telephony WAN connection, such as SONET or ATM.

What will be an ideal response?

Computer Science & Information Technology