Targeting for new business, Computer Engineering

Assignment Help:

Assume you own your own small party supply and rental business. You keep an Excel list of potential customers and clients who have rented or purchased from you in the past 2 years. The list has both physical mailing addresses and e-mail addresses for every person listed. You have a “category“code to demonstrate whether the contact is a client. If they have done business with you, they demonstrate a code of “CUST” for customer. If they are potential customers who have not yet purchased or rented from you, they are coded as “PROS” for prospect.
 
You want to produce your business, and feel the best way to do this is to solicit business from customers who show a physical address in the similar zip code as your business location. Respond fully to the following questions regarding this task:
 
A - Describe how you will use Excel to find in your list the people you are targeting for new business. Be specific.
B - You want to send a letter to every person on your list from Part A of this question. You have a nice form letter that you have used in the past. Explain how you might personalize the letter by adding your customer names.
C - If you get the results you expect to get from contacting your prospects, you want to be able to do this every month. Explain how you might use Excel to automate the process of separating your list as you did in Part A.
D - You want to gauge the impact of mailing to only your customers, to only your prospects, or to everyone on your list. You have the numbers for each group, the estimated cost per letter, and the expected increase in income for each letter mailed. What Excel tools might you use to see the anticipated outcome for each of the three situations?


Related Discussions:- Targeting for new business

What is synchronous reset, What is Synchronous reset? Synchronous reset...

What is Synchronous reset? Synchronous reset: Synchronous reset logic will synthesize to smaller flip-flops, mainly when the reset is gated along with the logic generating t

Time complexity, Take a look at the code and try to understand the logic, p...

Take a look at the code and try to understand the logic, particularly, the way scrambled words are disambiguated, i.e.., whether they are matched successfully against a correct wor

What is external procedures, Q. What is External Procedures? These proc...

Q. What is External Procedures? These procedures are written as well as assembled in separate assembly modules and afterwards linked together with the main program to form a bi

What is disk controller and word count, What is disk controller The ele...

What is disk controller The electronic circuit that controls the operation of the disk known as disk controller.  word count The number of words in the block to be tran

What are ramps, Ramps A network planning method that makes the most wel...

Ramps A network planning method that makes the most well-organized use of manpower, materials and cash resources between several projects going on concurrently.

What is hit and hit rate , What is hit? A successful access to data in ...

What is hit? A successful access to data in cache memory is known as hit. Normal 0 false false false EN-IN X-NONE X-NONE

Open system interconnection networking model, Q. Open System Interconnectio...

Q. Open System Interconnection Networking Model? An open system is a model which allows any two different systems to communicate regardless of their underlying architecture. Th

Difference between search and search all, SEARCH is a sequential search fro...

SEARCH is a sequential search from the starting of the table. SEARCH ALL is a binary search, continually dividing the table in two halves until a match is found. SEARCH ALL is more

Explain the parallel data storage - application of flip flop, Explain the P...

Explain the Parallel Data Storage - application of flip flops? In digital systems, data are usually stored in groups of bits that represent numbers, codes, or other information

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd