Data analysis and results in e-commerce, Computer Engineering

Assignment Help:

There were 50 respondents to our survey.

The first component of the data examined here focuses on student's preference (ecommerce or traditional commerce).

The Second component of the data examined here focuses on the range of procedure's easiness.

 Discussion

We were surprising with our survey's results. Most of people prefer e-commerce over traditional commerce, on the other hand most of them think of it as a hard procedure!

Pies Chart of Range of Student Preference

1728_Students’ preference between e-commerce and traditional commerce.png

Figure Students' preference between e-commerce and traditional commerce

Pie Chart of Range of Procedure Easiness

1818_Procedure’s easiness of e-commerce.png

Figure Procedure's easiness of e-commerce

All this data leads us to the fact that the next decade will be an innovative and demanding one for e-commerce. Also, it indicates that there are some obstacles for some people, such as thinking of e-commerce as a complex procedure, or fearing of their privacy. And of course all people have fear of criminal hackers. According to these results, our job here is to define the whole aspects of e-commerce, focusing on these obstacles, aware people of them and how to handle these issues and make the procedure understandable and much easier for the readers.

Conclusion

These result and pre-work provided us a great opportunity to start our research with a right background, so we were able to explain the causes that lead to this quantitative information we got.


Related Discussions:- Data analysis and results in e-commerce

Pebble merchant, c programming code for pebble merchant

c programming code for pebble merchant

4, Ask question 4#Minimum 100 words accepted#

Ask question 4#Minimum 100 words accepted#

Proof by contradiction - artificial intelligence, Proof by Contradiction - ...

Proof by Contradiction - Artificial intelligence So, both backward chaining andforward chaining have drawbacks. Another approach is to think regarding proving theorems by contr

Determine the method for updating the main memory, The method for updating ...

The method for updating the main memory as soon as a word is removed from the Cache is known as  (A) Write-through                  (B) write-back   (C) protected write

C, usability of union

usability of union

.master-slave flip flop, JK, SR, D master FF 1)draw block diagram 2) combin...

JK, SR, D master FF 1)draw block diagram 2) combinational circuits using NOR & NAND gate thank you

Analysts in telecommunications area, Q. Analysts in Telecommunications area...

Q. Analysts in Telecommunications area? Here computer networks which play a critical role in success of any business are designed, implemented and managed. Here Network analyst

History, #what is the history of computer science

#what is the history of computer science

What is test requirements, Test requirements are definite in the Requiremen...

Test requirements are definite in the Requirement Hierarchy in TestManager. The requirements hierarchy is a graphical outline of requirements and nested child requirements. Req

Padovan string, how to write this program,what are the declaration and func...

how to write this program,what are the declaration and function are needed in java program in java // aakash , suraj , prem sasi kumar kamaraj college program 1 : pack

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd