Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1- The Privacy Policy:

The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them in any illegal issues.

2- The Security Policy:

The vendor must explain to the customer that the money information will be totally secured, like credit card details, and the customer will be informed when the money for the current operation gets decremented from his balance.

3- The Delivery and Shipping Policy:

The vendor must explain to the customer how and when the purchased products will be delivered, and if there are any charges for the shipment.

4- The Return Policy:

The vendor must explain if the purchased products could be returned or not, and if yes then they could be returned under what conditions, within how many days after the delivery.

5- The Replace or Refund Policy:

The vendor must explain when and how the customer returns the purchased product and the available options he can choose from.

6- Customer Satisfaction Policy:

The vendor must explain to the customer how to guarantee that he will be satisfied with the product or service, and how to measure his satisfaction. Also the vendor must take care of their feedbacks.

7- The Warranty Policy:

The vendor must explain to the customer if the purchased product will be under warranty or not and for how long, and under what conditions.

When a customer decides to purchase a product or to get a service online he should read carefully the policies of the vendor, so he knows how all his rights will be saved, as polices are not standard for all vendors, and not all vendors explain clearly their policies, so the customer must be careful to not be a victim of crooks.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9523096

Have any Question?


Related Questions in Computer Engineering

Discussion a network-based intrusionimagine you live by

Discussion : A Network-Based Intrusion Imagine you live by yourself on a quiet street. Each day, you leave your house in the morning and drive to work. One day while you are at work, someone breaks into your house by kic ...

A set of coins makes change fornbspnnbspif the sum of the

A set of coins makes change for n if the sum of the values of the coins is n. For example, if you have 1-cent, 2-cent and 4-cent coins, the following sets make change for 7: 7 1-cent coins 5 1-cent, 1 2-cent coins 3 1-ce ...

Design layout reference mailings review view consolas 105 a

Design Layout Reference Mailings Review View Consolas 10.5 A. A Styles styles H- 1. Report the total payments by date when the total payments are greater than $20,000. 2. List the amount paid by each customer who has pai ...

Why should one listen to peter drucker in other words what

Why should one listen to Peter Drucker? In other words, what are his credentials/expertises? Provide at least three reasons. Copy question to the beginning of answer.

Describe the role of an ethical hacker and describe what

Describe the role of an ethical hacker and describe what you can do legally as an ethical hacker

Given a list of numbers l a value x is said to be a

Given a list of numbers L, a value x is said to be a majority value if the value of over half the elements in L is x; in other words, if L has n elements and nx is the number of elements in L with value x, then x is a ma ...

Question 1 describe and explain the role and function of

Question: 1. Describe and explain the role and function of network connectivity in current computing. 2. Describe and explain the protocols and interactions that implement network communications. 3. Describe and explain ...

What are the characteristics of perfect competition and

What are the characteristics of perfect competition, and does is exist in the real world?

Question a with respect to huffman coding devise a formula

Question : (a) With respect to Huffman Coding, devise a formula to compute the average compression based on the number of characters in a piece of text, n, and the number of unique characters in its alphabet, m. (b) Does ...

Taylor found that 8 of the recipients of loans from a

Taylor found that 8% of the recipients of loans from a particular mortgage lending institute default within the first 3 years. If he takes a random sample of 4 customers, who received loans 3 years ago, what is the proba ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As