How will you be able to drive customers to the site

Assignment Help Computer Network Security
Reference no: EM131034332 , Length:

Question:

Suppose you have a friend that either owns or works for a small business. They really don''t want to spend the time or money designing and building their own website. He or she has narrowed the selection down to four of the following websites and wants your opinion on which to go with:

.eBay
.Amazon
.Etsy
.Facebook

Create an 8- to 10-slide presentation including Introduction, Conclusion, and Reference slides.

Include speaker notes with each slide.

Describe the company and the product or service your friend''s company provides.

Eliminate one of the websites that does not fit, and state why you don''t think it fits.

Include the following information:

.What are the advantages of using each site?

.What are the risks of using each site?

.How will you be able to drive customers to the site?

.Would you change your strategy if your friend was selling products to a business (B2B)?

Reference no: EM131034332

Questions Cloud

Find current news article related to current national issues : You are expected to find a current news article- of approximately 600-800 words related to current national/international issues that might include topics such as internationalization/globalization political/economic challenges/changes and/or soci..
Who do you think is right : Another person refutes the claim, saying that this would be a violation of the first law of thermodynamics. Who do you think is right?
Which of commentators opinions made the most sense to you : How did your opinions about what should be done differ before you read the commentaries and after you read them? Which of the commentators' opinions made the most sense to you? Why?
Can the volume of the solution be more or less than the 5 l : Can the volume of the solution be more or less than the 5 L? Explain.
How will you be able to drive customers to the site : Describe the company and the product or service your friends company provides - Would you change your strategy if your friend was selling products to a business (B2B)?
What volume will the balloon occupy : A) A balloon filled with 2.00 L of helium initially at 1.55 atm of pressure rises into the atmosphere. When the surrounding pressure reaches 490. mmHg, the balloon will burst. If 1 atm = 760. mmHg, what volume will the balloon occupy in the instant b..
Prepare a paperabout balsa glider project : Prepare a paperabout Balsa Glider Project. The Glider Information section should include your research into gliding in general and balsa wood gliders in particular.
What is an ideal solution : Comment on the volume change, enthalpy change, entropy change, and chemical potential change during the formation of ideal and non-ideal solutions.
Develop a group emergency management plan : What are the functions and tasks that will be performed to fulfill the plans goals and missions - Who is in charge of specific functions and tasks? Why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyse how trust is used in controlling access

Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent environments such as BYOD, cloud and pervasive environments.

  Discuss the security of the network

Discuss the security of the network and suggested best practices for securing the business network.

  Assignment on cryptographic systems

The Week 10 Critical Thinking assignment continues with the scenario set up for the Critical Thinking assignment in Week 8. You have been hired as the chief officer of information technology at a retail store in Medina City. The store has 5000 cus..

  Operations of an atm machine

Simulate the operations of an ATM machine. First, the customer is prompted to enter his personal identification number pin (for this case study, we test only if this pin is formed by 4 digits, otherwise a message like "Invalid PIN, try again..." w..

  Ealuate the significance of the internet describe how the

1. analyze the evolution of internet to do this show how it has changed over time.2. evaluate the significance of the

  Identify the vulnerabilities and threats to the organization

Describe what techniques and processes you would use to identify the vulnerabilities and threats to the organization you have chosen

  Knowing the threat

Explain the added challenges of securing wireless devices versus securing LAN-connected devices. Imagine you are starting a new small- to-midsized cybercafe business from the ground up. Explain which areas of your network would be LAN based and wh..

  How is biometric method more beneficial than keypad

Those links are just for downloading required files. There is no work needed from any links. How is this biometric method more beneficial than keypad where the employee just presses in Pin number?

  Specify the vlan assignment

Specify the commands that you would use to set up the routers to use EIGRP. Outline the requirements to set up a VLAN and VPN access for the accountants. Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to elimin..

  You may use various sources be sure to cite any sources

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources. be

  To make fur coats is unethical and thus defaces the web site

A method of identifying items that are related and then identifying the principle that ties them together into a group

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd