Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Have you ever visited a web site and wondered what the company was thinking when they created it? Or perhaps you've visited a web site and thought it was fantastic.What made you think either or both of these things? The title of Chapter 4 is "Marketing on the Web".In this chapter, marketing strategies that relate to web sites are covered. Related topics such as search engines and domain name selection are included in this chapter.The assignment will require you to apply the material in the chapter.

1. Select a retail store with which you are familiar that has a Web site on which it sells products or services similar to those it sells in its physical retail stores. Explore the Web site and examine it carefully for features that indicate the level of service it provides. Using your experience in the physical store and your review of the Web site, write an evaluation of the company's touchpoint consistency using the first four stages of the 5 stage customer loyalty model. Be sure to explain where there are similarities and differences in the touchpoints of the two modes (web site and physical retail store.)Use a table or chart if that helps!

2. In the same web site as question 1, discuss if the company is using a product-based or customer-based marketing strategy.Explain your answer.

3. Explain how CRM analysts might use the information contained in a data warehouse to increase their company's online sales.Be sure to include a specific example.

4. Select a topic you are interested in knowing more about.You can pick any topic.Answer the following questions:

a. What was your topic and what search engine did you use?

b. Take a screen shot of the results of your search and include it in your homework.

c. Examine the top 3-5 links (actually click on them and examine them).

i.Why do you think those links are at the top of the search?

ii.Are there any in the top that surprised you?

iii.Discuss any banner, pop-up, pop-behind, interstitial, or rich media ads, etc. you encountered.

iv.If you did or did not encounter any of the above on these sites, in general, how do these make you feel?Why do you think they are used?

d. Use another browser and perform the same search.What search engine did you use?

e. Include a screen shot of those results.

f. Write a few sentencescomparing the results of the two search engines and explain the two results - why do you think they were similar/different?

5. Consider your own business....

a. Choose a business that you would like to own and write a short description of that business, including the business name, the products or services it would sell, and the types of customers the business would have.

B. Use BuyDomains.com or a similar online service to search for suitable domain names for the Web site for your business and to get an idea of the cost of those names. Evaluate at least three specific names to determine whether the cost of the name would be worth its benefits for your business. Be specific in what you discovered.

C. Explain how you would go about using a viral campaign for your business.

6. Read Case C1. Oxfam on pages 197-199.

a. Oxfam used its existing opt-in e-mail list only for this campaign; it did not purchase 9or borrow from other charitable organizations) any additional e-mail addresses. Explain at least two advantages and at least two disadvantages of acquiring other e-mail addresses for a campaign of this nature.

b. For this campaign, Oxfam chose to use e-mails that contained HTML, audio, and video elements rather than using plain-text e-mails.List at least two advantages and at least two disadvantages of using formats other than plain-text in this type of e-mail campaign.Be sure to identify any specific trade-offs that Oxfam faced in deciding not to use plain-text e-mail.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9749754

Have any Question?


Related Questions in Computer Network & Security

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Short answers1 the discussion question to debate is how

Short Answers: 1. The discussion question to debate is how have companies like Apple, Microsoft and the big providers (ATT, Verizon, Sprint, etc) impacted communication today? 2. Technology wise what do you imagine for t ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Question in regards to encryption does the public key and

Question : In regards to encryption, does the public key and private key come from the sender or does the receiver already have the private and is given the public key by the sender? The response must be typed, single sp ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As