Data analysis and results in e-commerce, Computer Engineering

Assignment Help:

There were 50 respondents to our survey.

The first component of the data examined here focuses on student's preference (ecommerce or traditional commerce).

The Second component of the data examined here focuses on the range of procedure's easiness.

 Discussion

We were surprising with our survey's results. Most of people prefer e-commerce over traditional commerce, on the other hand most of them think of it as a hard procedure!

Pies Chart of Range of Student Preference

1728_Students’ preference between e-commerce and traditional commerce.png

Figure Students' preference between e-commerce and traditional commerce

Pie Chart of Range of Procedure Easiness

1818_Procedure’s easiness of e-commerce.png

Figure Procedure's easiness of e-commerce

All this data leads us to the fact that the next decade will be an innovative and demanding one for e-commerce. Also, it indicates that there are some obstacles for some people, such as thinking of e-commerce as a complex procedure, or fearing of their privacy. And of course all people have fear of criminal hackers. According to these results, our job here is to define the whole aspects of e-commerce, focusing on these obstacles, aware people of them and how to handle these issues and make the procedure understandable and much easier for the readers.

Conclusion

These result and pre-work provided us a great opportunity to start our research with a right background, so we were able to explain the causes that lead to this quantitative information we got.


Related Discussions:- Data analysis and results in e-commerce

What is random access memory, What is random access memory(RAM or MAIN MEMO...

What is random access memory(RAM or MAIN MEMORY) and mention its types? The main memory in the central storage unit in a computer system. It is relatively large and fast memory

Explain the term confidentiality - firewall design policy, Explain the term...

Explain the term Confidentiality - Firewall Design Policy Whilst some corporate data is for public consumption, the vast majority of it should remain private.

Mpi, write an8086 alp to exchange a block of N bytes of data between sourc...

write an8086 alp to exchange a block of N bytes of data between source and destination

Mobility management in mobile systems, Instruction 1. You can do this i...

Instruction 1. You can do this individually or in groups of 2-3 students. 2. Any material copied and pasted from anywhere (e.g., figures and text) is considered plagiarism even

What are the rules of timescale directive, What are the Rules of Timescale ...

What are the Rules of Timescale directive Rules -  'Timescale directive, like all compiler directives, affects all modules compiled after directive,  whether  in  same  fi

Program that will blink as led, Take the last two digits of your UTCID. Thi...

Take the last two digits of your UTCID. This is your duty cycle in percent. If your duty cycle is less than 10%, add 30 to your number. Create an assembly program that runs on t

What is hashing, What is Hashing? Hashing: Hashing gives the direct acc...

What is Hashing? Hashing: Hashing gives the direct access of record from the file no matter where the record is in the file. This is possible with the help of a hashing functio

Find the number of PROM chips & address lines, The capacity of 2K × 16 PROM...

The capacity of 2K × 16 PROM is to be expanded to 16 K × 16.  Find the number of PROM chips required and the number of address lines in the expanded memory. Ans. Capacity requi

Data structure, what are the fundamental data structures

what are the fundamental data structures

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd