Reference no: EM131330456 , Length: 7
Write a five to seven (5-7) page paper in which you:
Describe the selected company including but not limited to its size, industry, main products / services and target market, and objectives.
Create an inventory of the company's existing social media platforms including name, type, and general description for each platform.
Next, determine each platform's main purpose and analyze the main role and influence that each platform has on this company's marketing strategy.
Examine how each social media platform fits in the social media marketing strategy / plan in order to generate business for the company. Examine the main pros and cons of each platform regarding the company's marketing strategy. Justify your response.
Determine the type of social media platform that received the most activity both from the audience and within the company. Next, determine the type of social media that has the most positive influence regarding the company's market strategy. Provide a rationale for your response.
Propose one (1) overall strategy for the company's social media campaign in order to leverage the content to increase more customer usage. Provide a rationale for your response.
Examine the company's mobile computing technology within its marketing strategy. Next, suggest how you would use mobile computing for the company's marketing. Provide a rationale for your suggestion.
Use at least three (3) quality academic resources. Note: Wikipedia does not qualify as an academic resource.
Format your assignment according to the following formatting requirements:
Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.
Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.
Elements in a one million-element vector
: An SMP UMA system contains 64 processors and is to compute a running sum by adding all of the elements in a one million-element vector. Each processor takes one cycle to perform a single addition. How many cycles would it take just to do the requi..
|
Which methods would you consider better first-choice methods
: MGMT 404- Which methods would you consider better first-choice methods by most project sponsors? Would any of these methods apply to Agile projects? How does Agile address schedule compression?
|
How many different memory blocks
: A 2 GB (i.e., 2 * 230 byte) memory system with 32-bit addresses is used with a 4-way set associative cache that contains a total of 65536 lines (each line is 512 bytes in size). How many different memory blocks could map to set 3 within this cach..
|
Modify the fire simple model to use fire-patches reporters
: Write a reporter procedure for the Segregation model that reports the agentset of unhappy turtles. Write a second reporter that reports a statistic from the first reporter.
|
Create an inventory of the companys existing social media
: Describe the selected company including but not limited to its size, industry, main products / services and target market, and objectives.Create an inventory of the company's existing social media platforms including name, type, and general descri..
|
Execution time accounted for by the sequential part
: If a speedup of 15 is to be achieved using all available cores compared to using a single core, what must be the value of f, the fraction of the execution time accounted for by the sequential part? Express your answer as a fraction (e.g., 2/3, 1/8..
|
Secure encrypted communications
: Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted.
|
How are key stakeholders involved in the given process
: How are key stakeholders involved in this process? Are communication requirements different on an Agile project versus a traditional project?
|
Describe the concepts of confidentiality
: Describe the concepts of confidentiality, integrity, and availability (C-I-A), and explain each of the seven domains of a typical IT infrastructure. Summarize the threat triad, and explain how security personnel can maintain proficiency in the sec..
|