Targeting for new business, Computer Engineering

Assignment Help:

Assume you own your own small party supply and rental business. You keep an Excel list of potential customers and clients who have rented or purchased from you in the past 2 years. The list has both physical mailing addresses and e-mail addresses for every person listed. You have a “category“code to demonstrate whether the contact is a client. If they have done business with you, they demonstrate a code of “CUST” for customer. If they are potential customers who have not yet purchased or rented from you, they are coded as “PROS” for prospect.
 
You want to produce your business, and feel the best way to do this is to solicit business from customers who show a physical address in the similar zip code as your business location. Respond fully to the following questions regarding this task:
 
A - Describe how you will use Excel to find in your list the people you are targeting for new business. Be specific.
B - You want to send a letter to every person on your list from Part A of this question. You have a nice form letter that you have used in the past. Explain how you might personalize the letter by adding your customer names.
C - If you get the results you expect to get from contacting your prospects, you want to be able to do this every month. Explain how you might use Excel to automate the process of separating your list as you did in Part A.
D - You want to gauge the impact of mailing to only your customers, to only your prospects, or to everyone on your list. You have the numbers for each group, the estimated cost per letter, and the expected increase in income for each letter mailed. What Excel tools might you use to see the anticipated outcome for each of the three situations?


Related Discussions:- Targeting for new business

What is looping, What is looping Loop is a control structure used to do...

What is looping Loop is a control structure used to do repetitive operation. Some programs include repeating a set of instruction either a particular number of times or until a

IT PMP project managemnet., Identify at least eight milestones for this pro...

Identify at least eight milestones for this project. Write a one-page paper describing each milestone using the SMART criteria?

Explain about common addressing modes, Q. Explain about common addressing m...

Q. Explain about common addressing modes? Most of machines use a set of addressing modes. The following tree displays common addressing modes: Figure: Common Addres

What is inheritance, What is Inheritance? Inheritance is the method of ...

What is Inheritance? Inheritance is the method of deriving a feature of super class into sub class. Every sub class inherits the attributes, operations and association of its s

What is microcomputer system, Q. What is microcomputer system? The micr...

Q. What is microcomputer system? The microcomputer has a single microprocessor and a number of RAM and ROM chips as well as an interface unit which communicates with several ex

Which technique is an encryption technique, Which technique is an encryptio...

Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.

Where shared resources are accessed, A critical section is a program segmen...

A critical section is a program segment? Ans. A critical section is a program segment where shared resources are accessed.

Explain LRU page replacement algorithm, Explain LRU Page replacement algori...

Explain LRU Page replacement algorithm. LRU policy: It expands to least recently use. This policy proposes that we remove a page that last usage is farthest from present time

Generic techniques developed - artificial intelligence, Generic Techniques ...

Generic Techniques Developed: In the pursuit of solutions to various problems in the above categories, various individual fundamental techniques have sprung up which have been

How is a valid user identifier accomplished, How is a valid user identifier...

How is a valid user identifier accomplished? A valid user identifier is accomplished within one or more of given ways: • Provide some password, which only user knows. • P

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd