About social media information systems

Assignment Help Basic Computer Science
Reference no: EM133076471

In Chapter 9, you learned about social media information systems. Businesses are now using social media to market to users and possibly customers. Have you ever made a purchase based on an ad or information you saw on social media? Do you think these campaigns are successful? Why, or why not? Your journal entry must be at least 200 words in length. No references or citations are necessary.

Reference no: EM133076471

Questions Cloud

Determining the major ethical considerations : According to the textbook, sales managers usually deal with five major ethical considerations when it comes to dealing with salespeople.
Future changes in the value of the pound : Given David's expectations, will Vin's be favourably or unfavourably affected by the future changes in the value of the pound?
What is the present value of investment : Your client just purchased an investment that generates the following cash flows for the next four years. He are able to reinvest these cash flows at 8.9 percen
Contrast the loan requirements of the different banks : You are a financial officer of a specific company and you are planning to loan in a financial institution as additional source of fund for your organization. Ch
About social media information systems : You learned about social media information systems. Businesses are now using social media to market to users and possibly customers.
Determine the amount of funding : Buildstuff Ltd. is a construction company which in the past had a large market capitalisation and turnover, but, after the great recession of the late 2000's an
Goal of information security in relation to mobile devices : Explain the goal of information security in relation to mobile devices. discuss which technical safeguard(s) should be used for mobile devices.
About safeguards against security threats : In this unit, you learned about safeguards against security threats. Do you use any of these in your personal life or at work?
What is the total capital requirement for fanbank : After applying the regulator-stipulated risk weightings, FanBank has estimated that it has risk-weighted assets of $10.30 billion out of a total asset figure of

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Developing long-term archival plan for company

What considerations would have to be made in developing a long-term archival plan for a company within a retail industry?

  Write a c function escape

Write a C function escape(char s[], char t[]) that converts the characters newline and tab into two character sequences n and t as it copies

  What is the value of next after making these insertions

What is the minimum number of record insertions that will cause a split of all four buckets? Explain very briefly.

  What are some emerging technology trends

What are some emerging technology trends that have influenced your personal choice of an SDLC, either in your experience

  How to motivate your employees

Describe also how to motivate your employees to accept the change and positively contribute to it and show its advantages and disadvantages. Characterise differences between the regions when appropriate.

  Subset of the year baseball cards

The baseball card collector problem is as follows: Given packets P1, P2, ... , PM, each of which contains a subset of the year's baseball cards, and an integer, K, is it possible to collect all the baseball cards by choosing ≤ K packets?

  Gail industries security-infrastructure policies

Write a review of Gail Industries' security and infrastructure policies and practices, and formulate recommendations for improvements. I

  What kind of information was compromised

Briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem.

  You are expected to research the necessary commands

You are expected to research the necessary commands by themselves. There are numerous web sites available that discuss Linux networking. You are expected to list your sources of information for the different tasks.

  Negative and positive risk response plans

What are the four negative and positive risk response plans? Please give an example of each also please

  Build an eportfolio page to describe your work

ITECH1100 Understanding the Digital Revolution - Interpret and construct representations of business data flow and processes - Outline the basic principles

  Describe types of cloud computing service categories

Describe at least 3 types of cloud computing service categories. Give details of function of the service with an example. What are architecture considerations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd