Social media strategy design, Computer Engineering

Assignment Help:

For this phase of the project you are required to formulate a social media strategy for a product/service/business/concept/charity...etc. the strategy can include technologies such as social networking (face book), micro-blogging (twitter), media sharing (YouTube), blogging (blogger), wiki/forum (stack overflow).

Key Deliverables

1. Clear objective of the social media strategy

2. Identification of target audience

3. Clear outline of the technologies used and the reason for using them

4. Timeline of actions

5. Identification of metrics for evaluation

Part- Social media strategy implementation and evaluation.

This should be a demonstration of your implemented social media campaign. The social media campaign should map directly to the strategy outlined in Part 1. This campaign should be accompanied with a report highlighting the following key components.

1. Evidence of the social media campaign (like to profile page...)

2. Analysis of the strategy outlined (what worked, what didn't)

3. Analysis of implementation in comparison the objectives outlined in Part 1

Format for each part

a. All external sources of information must be referenced

b. Font- Times New Roman Size 12

c. Spacing - 1.5

d. No word account limit just aprox 1000 or 1200


Related Discussions:- Social media strategy design

Operating systems, Consider the state transition diagram of Figure 3.9b . S...

Consider the state transition diagram of Figure 3.9b . Suppose that it is time for the OS to dispatch a process and that there are processes in both the Ready state and the Ready/S

Explain a scheme of capability list to implement protection, Describe the s...

Describe the scheme of capability lists to implement protection? Capability lists (C- lists): These lists are utilized to make sure that uses only access files that are e

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Explain the effect of cell breathing, Problem : (a) State and describe ...

Problem : (a) State and describe the transmission ranges associated with wireless transmission. Illustrate your answer with a diagram. (b) Sketch a graph representing how a

System requirements for chip design, The Peripheral interface chip system r...

The Peripheral interface chip system requires the construction of the interface chip circuit, which is controlled by main micro-controller via the user interface. I also need set

Explain definition of fibonacci, Explain definition of fibonacci Where ...

Explain definition of fibonacci Where an input value gives a trivial result, it is returned directly, otherwise the function calls itself, passing a changed version of the inpu

Explain what are the different hazards, There are situations, called hazard...

There are situations, called hazards that stop the next instruction in the instruction stream from implementing during its designated clock cycle. Hazards decrease the performance

Explain data parallel programming, Q. Explain Data Parallel Programming? ...

Q. Explain Data Parallel Programming? In data parallel programming model major focus is on performing concurrent operations on a data set. The data set is characteristically or

Logical drives is it possible to fit onto a physical disk, How many logical...

How many logical drives is it possible to fit onto a physical disk? Ans) Maximum of 24 logical drives can be fit into physical disk. The extended partition can only have 23 lo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd