Targeting for new business, Computer Engineering

Assignment Help:

Assume you own your own small party supply and rental business. You keep an Excel list of potential customers and clients who have rented or purchased from you in the past 2 years. The list has both physical mailing addresses and e-mail addresses for every person listed. You have a “category“code to demonstrate whether the contact is a client. If they have done business with you, they demonstrate a code of “CUST” for customer. If they are potential customers who have not yet purchased or rented from you, they are coded as “PROS” for prospect.
 
You want to produce your business, and feel the best way to do this is to solicit business from customers who show a physical address in the similar zip code as your business location. Respond fully to the following questions regarding this task:
 
A - Describe how you will use Excel to find in your list the people you are targeting for new business. Be specific.
B - You want to send a letter to every person on your list from Part A of this question. You have a nice form letter that you have used in the past. Explain how you might personalize the letter by adding your customer names.
C - If you get the results you expect to get from contacting your prospects, you want to be able to do this every month. Explain how you might use Excel to automate the process of separating your list as you did in Part A.
D - You want to gauge the impact of mailing to only your customers, to only your prospects, or to everyone on your list. You have the numbers for each group, the estimated cost per letter, and the expected increase in income for each letter mailed. What Excel tools might you use to see the anticipated outcome for each of the three situations?


Related Discussions:- Targeting for new business

Logistics planning, During the Persian Gulf crisis of 1991, U .S forces dep...

During the Persian Gulf crisis of 1991, U .S forces deployed a Dynamic Analysis and Re planning Tool, DART ( Cross and Walker, 1994) to do automated logistics planning and schedu

At least two optional data fields, As an XML expert you are needed to model...

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information: The detail of th

What are the barcode readers, What are the Barcode readers These collec...

What are the Barcode readers These collect data from printed barcodes and allow automatic stock control in, for illustration, supermarkets.

What is .net and .net framework, What is .NET / .NET Framework?  It is ...

What is .NET / .NET Framework?  It is a Framework in which Windows applications might be developed and run. The Microsoft .NET Framework is a platform for building, deploying,

How do i publish an xml message, Follow these steps: 1. Produce XML from...

Follow these steps: 1. Produce XML from the DOM document tree. 2. Serialize the generated DOM document to a StringWriter. 3. Call toString on the StringWriter and pass it into

Layers of distributed system architecture, Q. Layers of Distributed System ...

Q. Layers of Distributed System architecture? Layers of Distributed System architecture are: Presentation Layer is actual user interface. This layer receives input and

Hard disk technology - computer architecture, Hard Disk Technology: Fi...

Hard Disk Technology: Figure of a computer hard disk drive           HDDs record data by magnetizing ferromagnetic material directionally, to represent

Explain the test instruction, Explain the TEST instruction TEST instru...

Explain the TEST instruction TEST instruction performs the AND operation. The difference is that AND instruction changes the destination operand whereas TEST instruction doesn

Briefly explain the floating point representation, Briefly explain the floa...

Briefly explain the floating point representation with an example? The floating point representation has 3 fields 1.sign bit 2.siginificant bits 3.exponent For  exa

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd