Targeting for new business, Computer Engineering

Assignment Help:

Assume you own your own small party supply and rental business. You keep an Excel list of potential customers and clients who have rented or purchased from you in the past 2 years. The list has both physical mailing addresses and e-mail addresses for every person listed. You have a “category“code to demonstrate whether the contact is a client. If they have done business with you, they demonstrate a code of “CUST” for customer. If they are potential customers who have not yet purchased or rented from you, they are coded as “PROS” for prospect.
 
You want to produce your business, and feel the best way to do this is to solicit business from customers who show a physical address in the similar zip code as your business location. Respond fully to the following questions regarding this task:
 
A - Describe how you will use Excel to find in your list the people you are targeting for new business. Be specific.
B - You want to send a letter to every person on your list from Part A of this question. You have a nice form letter that you have used in the past. Explain how you might personalize the letter by adding your customer names.
C - If you get the results you expect to get from contacting your prospects, you want to be able to do this every month. Explain how you might use Excel to automate the process of separating your list as you did in Part A.
D - You want to gauge the impact of mailing to only your customers, to only your prospects, or to everyone on your list. You have the numbers for each group, the estimated cost per letter, and the expected increase in income for each letter mailed. What Excel tools might you use to see the anticipated outcome for each of the three situations?


Related Discussions:- Targeting for new business

Handlers classification, Handler's Classification In 1977, Wolfgang Han...

Handler's Classification In 1977, Wolfgang Handler proposed an detailed notation for expressing the parallelism and pipelining of computers. Handler's classification addresses

What is a table attribute, What is a Table attribute? The table's attr...

What is a Table attribute? The table's attributes verifies who is responsible for maintaining a table and which types of access are permitted for the table.  The most signific

Explain minimum hardware to indicate direction of rotating, The circle can ...

The circle can rotate clockwise and back. By using minimum hardware build a circuit to indicate the direction of rotating? Two sensors are required to determine the direction o

Utilization summary, Utilization Summary The Utilization Summary shows ...

Utilization Summary The Utilization Summary shows the status of each processor i.e. how much time (in the form of percentage) have been spent by every processor in busy mode, o

What interface is extended by awt event listeners, All AWT event listeners ...

All AWT event listeners expand the java.util.EventListener interface.

Explain what logic gets synthesized , What logic gets synthesized when I us...

What logic gets synthesized when I use an integer instead of a reg variable as a storage element? Is use of integer recommended? An  integer  can  take  place  of  a  reg  as

Explain about the term false path, Explain about the term false path? How i...

Explain about the term false path? How it find out in circuit? What the effect of false path in circuit? By timing all the paths into the circuit the timing analyzer can find o

Draw the logic diagram of 4-bit twisted ring counters, Draw the logic diagr...

Draw the logic diagram of 4-bit Twisted Ring counters and explain its operation with the help of timing diagram. Ans: Twisted ring counter (4 BIT): We ready know that shi

Which types of software programs are usually supported, Which types of soft...

Which types of software programs are usually supported? Our organization is unique in that we are very flexible and can meet most client requires relative to the integration of

Voice identifier - biometric computer security systems, Voice Identifier - ...

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd