Data analysis and results in e-commerce, Computer Engineering

Assignment Help:

There were 50 respondents to our survey.

The first component of the data examined here focuses on student's preference (ecommerce or traditional commerce).

The Second component of the data examined here focuses on the range of procedure's easiness.

 Discussion

We were surprising with our survey's results. Most of people prefer e-commerce over traditional commerce, on the other hand most of them think of it as a hard procedure!

Pies Chart of Range of Student Preference

1728_Students’ preference between e-commerce and traditional commerce.png

Figure Students' preference between e-commerce and traditional commerce

Pie Chart of Range of Procedure Easiness

1818_Procedure’s easiness of e-commerce.png

Figure Procedure's easiness of e-commerce

All this data leads us to the fact that the next decade will be an innovative and demanding one for e-commerce. Also, it indicates that there are some obstacles for some people, such as thinking of e-commerce as a complex procedure, or fearing of their privacy. And of course all people have fear of criminal hackers. According to these results, our job here is to define the whole aspects of e-commerce, focusing on these obstacles, aware people of them and how to handle these issues and make the procedure understandable and much easier for the readers.

Conclusion

These result and pre-work provided us a great opportunity to start our research with a right background, so we were able to explain the causes that lead to this quantitative information we got.


Related Discussions:- Data analysis and results in e-commerce

Algorithm and pseudocodes, develop an algorithm using pseudocode for comput...

develop an algorithm using pseudocode for computing cos(x) and sin(x). use a sentinel controlled while loop. use the series definition of e^+-jx

Security features used in client-server types of network, Security features...

Security features used in Client-Server types of network are as follows :  i) Digital Signatures ii)  Encryption / Decryption iii) Secure Socket Layer (SSL) iv) Firewa

Process of breadth first search, Process of Breadth first search: It's...

Process of Breadth first search: It's very useful to think of this search as the evolution of the given tree, and how each string of letters of word is found via the search in

What are concentrators, What are concentrators? Explain how it helps in con...

What are concentrators? Explain how it helps in connecting number of subscribers. In rural areas, subscribers are usually dispersed. This is both unessential and expensive to g

Constructor, what is meant by private copy constructor

what is meant by private copy constructor

Define various applications of shift register, Lists out some applications ...

Lists out some applications of Shift Register. Ans: Applications of Shift Registers: a. Serial to Parallel Converter b. Parallel to Serial Converter c. Delay li

Program level-parallelism based on granularity size, Program Level : It ...

Program Level : It is the next level consisting of independent programs for parallelism. Coarse Granularity  size is used at this level containing ten thousands of instructions.

Interval b/w time of submission and completion of the job, Interval between...

Interval between the time of submission and completion of the job is? Ans. Turnaround time is the interval in between the time of submission and completion  of the job.

Explain moores law and amdahls law, Question (a) Imagine you need to mo...

Question (a) Imagine you need to move people through a distance of 10 miles, with the following specifications. • Car: capacity = 5, speed = 60 miles/hour • Bus: capacity

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd