Social media strategy design, Computer Engineering

Assignment Help:

For this phase of the project you are required to formulate a social media strategy for a product/service/business/concept/charity...etc. the strategy can include technologies such as social networking (face book), micro-blogging (twitter), media sharing (YouTube), blogging (blogger), wiki/forum (stack overflow).

Key Deliverables

1. Clear objective of the social media strategy

2. Identification of target audience

3. Clear outline of the technologies used and the reason for using them

4. Timeline of actions

5. Identification of metrics for evaluation

Part- Social media strategy implementation and evaluation.

This should be a demonstration of your implemented social media campaign. The social media campaign should map directly to the strategy outlined in Part 1. This campaign should be accompanied with a report highlighting the following key components.

1. Evidence of the social media campaign (like to profile page...)

2. Analysis of the strategy outlined (what worked, what didn't)

3. Analysis of implementation in comparison the objectives outlined in Part 1

Format for each part

a. All external sources of information must be referenced

b. Font- Times New Roman Size 12

c. Spacing - 1.5

d. No word account limit just aprox 1000 or 1200


Related Discussions:- Social media strategy design

What is the cih, CIH, also known  as Chernobyl or Spacefiller, is a Microso...

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform

Determine in detail about the vhdl, Determine in detail about the VHDL ...

Determine in detail about the VHDL Multiple design-units (entity/architecture pairs), which reside in the same system file, may be separately compiled if so desired. Though, it

When do we need to use cgi, There are innumerable caveats to this answer, b...

There are innumerable caveats to this answer, but basically any Webpage containing a form will need a CGI script or program to process the form inputs.

Bit manipulation techniques, We can also use the logical operators to numbe...

We can also use the logical operators to numbers directly and  perform simple bit manipulation . The operators are     &  Bitwise AND     |  Bitwise OR     ^  Bitwise exclusiv

What is the use of the statement leave to list-processing, What is the use ...

What is the use of the statement Leave to List-processing? Leave to List-processing statement is used to make a list from a module pool.  Leave to list processing statement per

Explain about the network security, Explain about the network security. ...

Explain about the network security. Network security implies the protection of networks and their services through unauthorized access, destruction or disclosure, modificati

Hardware interrupts - computer architecture, Hardware interrupts: Har...

Hardware interrupts: Hardware interrupts -from I/O devices, processor, memory Software interrupts-produced by a program. Direct Memory Access (DMA)  Interrupt or Poll

Execution of a program in cpu, Execution of a program in CPU is completed e...

Execution of a program in CPU is completed employing different set of registers and their individual circuitry. As CPU registers are used for execution of interrupt service routine

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd