Data analysis and results in e-commerce, Computer Engineering

Assignment Help:

There were 50 respondents to our survey.

The first component of the data examined here focuses on student's preference (ecommerce or traditional commerce).

The Second component of the data examined here focuses on the range of procedure's easiness.

 Discussion

We were surprising with our survey's results. Most of people prefer e-commerce over traditional commerce, on the other hand most of them think of it as a hard procedure!

Pies Chart of Range of Student Preference

1728_Students’ preference between e-commerce and traditional commerce.png

Figure Students' preference between e-commerce and traditional commerce

Pie Chart of Range of Procedure Easiness

1818_Procedure’s easiness of e-commerce.png

Figure Procedure's easiness of e-commerce

All this data leads us to the fact that the next decade will be an innovative and demanding one for e-commerce. Also, it indicates that there are some obstacles for some people, such as thinking of e-commerce as a complex procedure, or fearing of their privacy. And of course all people have fear of criminal hackers. According to these results, our job here is to define the whole aspects of e-commerce, focusing on these obstacles, aware people of them and how to handle these issues and make the procedure understandable and much easier for the readers.

Conclusion

These result and pre-work provided us a great opportunity to start our research with a right background, so we were able to explain the causes that lead to this quantitative information we got.


Related Discussions:- Data analysis and results in e-commerce

Discuss the mount and unmount system calls, Discuss the mount and unmount s...

Discuss the mount and unmount system calls. The privileged mount system call is used to join a file system to a directory of another file system; the unmount system call detach

Briefly explain array processing in detail, Array Processing We have se...

Array Processing We have seen that for executing vector operations the pipelining conception has been used. There is other method for vector operations. If we have array of n p

What does realized mean, Realized mean that the component has been painted ...

Realized mean that the component has been painted on screen or that is prepared to be painted. Realization can take place by invoking any of these methods. setVisible(true), show()

Explain the isa and hasa class relationships, How would you implement each ...

How would you implement each in a class design? Ans) A specialized class "is" a specialization of another class and, thus, has the ISA relationship with the other class. An Em

Explain about olap, OLAP is called as online analytical processing which gi...

OLAP is called as online analytical processing which gives answers to queries which are multi dimensional in nature. It composes relational reporting and data mining for giving sol

Execution of micro-program, The micro-instruction cycle can comprises two b...

The micro-instruction cycle can comprises two basic cycles: the fetch and execute. Here in the fetch cycle address of micro-instruction is produced and this micro-instruction is pu

Define the meaning of registers and counting, Define the meaning of Registe...

Define the meaning of Registers and Counting? Registers: Group of flip-flops use for data storage. Counting: Another extremely important application of flip-flops is in dig

Why is TCP called end-to-end protocol, Why is TCP called end-to-end protoco...

Why is TCP called end-to-end protocol? TCP is termed as an end-to-end protocol as this provides a connection directly by an application in one computer to an application on a r

State about the firewalls - intranet, Firewalls While getting one fire...

Firewalls While getting one firewall for the company's Intranet it should be well known that firewalls come in both hardware and software forms, and that even though all firew

Explain function of network layer in tcp/ip protocol stack, Explain about t...

Explain about the function of network layer briefly in TCP/IP protocol stack. Internetwork Layer: The best-called TCP/IP protocol at internetwork layer is Internet Protoc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd