Preview

AMB201 Tutorial 2

Satisfactory Essays
Open Document
Open Document
1206 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
AMB201 Tutorial 2
AMB201
Marketing and Audience Research
Tutorial 2
Exploratory Research and Exploratory Report

Today’s Agenda
 Practice questions
 Exploratory research
 Requirements for Exploratory Report

 Attendance sheet (ensure your name is checked off)

Practice Questions
1. The research question “What are the most popular tourist destinations for visitors to Australia?” would be addressed with which type of research?

a) Exploratory
c) Causal

b) Descriptive
d) Analysis

Practice Questions
2. A researcher is interested to learn about the reasons for why some people continue to buy physical newspapers, despite the same content being available for free online. Which type of research is most suited?
a) Exploratory
c) Causal

b) Descriptive
d) Analysis

Practice Questions
3. Research that is designed to address a real life problem is called:

a) Exploratory research b) Basic research
c) Questionable research d) Applied research

Practice Questions
4. A toy company shows different versions of a proposed
TV commercial to different groups of children and measures which one they attend to most. This type of study is best described as a(n)…
a) Developmental study
c) Case study

b) Experimental study
d) Focus group study

Exploratory research
 What is exploratory research?
 Initial research to clarify the nature of the problem
 Typically uses qualitative approach:
 Unstructured study of a small sample
 Interpretive rather than conclusive
 Aims for understanding rather than measurement

Exploratory research
 Why do exploratory / qualitative research?
 When a greater understanding of the problem is required before conducting further research
 To generate new ideas or screen possible alternatives  To assist with narrowing the scope of a project
 Can you think of any other reasons?

Exploratory research examples:
Secondary data
 Any data that has been previously collected for another purpose than the current project
 Advantages?
 Disadvantages?

Exploratory

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Project part 1

    • 317 Words
    • 1 Page

    First off e-commerce is one of the best things for business whether you have your whole business through the web or partly. If you have a physical store, you are limited by the area that you can sell your product or offer service. An ecommerce website opens your business to the world. In addition to these two drivers,online retail is also driven by traffic from search engines. One of the most important positives of ecommerce is the lowered cost. A part of these lowered costs could be passed on to customers in the form of discounted prices. Advertising and marketing is global and you get a better buying market. For personnel use the automation of checkout, billing, payments, inventory management, and other operational processes, lowers the number of employees required to run an ecommerce setup. last but not least Real estate, the store does not need a prominent physical location. you can Locate the Product Quicker, eliminate travel time and cost, provide comparison shopping, also cross reference deals, bargains, coupons, and group buying.if you do open a e-business vulnerabilities that need to be taken into account if you decide to create an e-commerce site is security internal and external. Hackers attempting to steal customer information or disrupt the site or server containing customer information that is stolen. Also Imposters can mirror your ecommerce site to steal customer's money. authorized administrators/users of an ecommerce website downloading hidden active content need to watch the attacks on ecommerce system. Scans should be frequently done on your server. this will help identify any malicious programs that may be running worms, viruses or Trojan horses. Limited user access will ensure that you know exactly who has access to your ecommerce system and assign each user with unique access authentication method.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    The account policy for first World Bank would be a very simple and easy policy. Basically all personnel will only have one account at a time, each person will only have their account on the system that they have business being on. You can be assigned to multiple groups within the system if need be. Before anyone can be added to the system, they will have to read and sign the User Account Policy; this will make sure that no one can say that they “didn’t know”.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Instructions: Using complete sentences answer the following questions. Use the following criteria in your response. Living where?, career/job/school?, married?, children?, expected annual income? Vacations, Cars, Buy home or rent?, additional?, etc.)…

    • 125 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 5

    • 343 Words
    • 2 Pages

    What exactly is SDLC? SDLC stands for Software Development Life Cycle. SDLC is a series of phases that provide model for the development and lifecycle management of an application and/or software. Within SDLC, security should also be considered. How is the application going to be secured? Are we using these phases to the best of our knowledge and incorporating as much security as possible? There are six phases within SDLC. They are Systems analysis, design, implementation, testing, acceptance and deployment, and maintenance. There are four ways to secure SDLC. They are Governance, Construction, Verification, and Deployment. Within each way to secure SDLC, Governance there is strategy and metrics, policy and compliance, education and guidance, threat assessment, security requirements, security architecture, design review, code review, security testing, vulnerability management, hardening environments, and operations.…

    • 343 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    First World Bank Savings and Loan's Linux-based infrastructure requires an in-house custom kernel or a kernel provided by a vendor…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Good Essays

    c. Modify the program of Part b so that at the option of the user, it displays…

    • 300 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Acc 205 Final Paper Example

    • 1671 Words
    • 26 Pages

    Walmart helps people around the world save money and live better -- anytime and anywhere -- in retail stores, online and through their mobile devices. Each week, more than 245 million customers and members visit our nearly 11,000 stores under 71 banners in 27 countries and e-commerce websites in 10 countries. With fiscal year 2014 sales of approximately $473 billion, Walmart employs 2.2 million associates worldwide.…

    • 1671 Words
    • 26 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Acc202 Module 5

    • 257 Words
    • 2 Pages

    (1) Is this a static or flexible budget? The sample budget for a charter school in this case assignment is a flexible budget. This is because this budget provides results for more than one activity or in this case level.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Asb Appliction

    • 400 Words
    • 2 Pages

    1. As a member of ASB, I would like to see all the leaders taking charge and realizing what a privilege we have going to such an amazing school, like ours. I would also like to see them having pride and school spirit, because those things are such a big part of being a leader, it shows others around you that you are proud to be called a (School Mascot). Another thing that would be great to see around the school is people taking care of our campus like they would their home, not wanting anyone to trash it, or mess with it, because it is like our home.…

    • 400 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ACS124_Tutorial answers

    • 2341 Words
    • 12 Pages

    Note: 1 slug = 37.17 lb, 1 Btu/s = 778 ft-lbf/s & 1 ft-lbf/s = 1.356 x 10-3 kW…

    • 2341 Words
    • 12 Pages
    Powerful Essays

Related Topics