Premium Essay

Unit 3 Pass 1

In: Business and Management

Submitted By jacksands12
Words 3865
Pages 16
Unit 3: Introduction to Marketing
Pass 1
Marketing is the activities of a company associated with buying and selling a product or service. It includes advertising, selling and delivering products to people. People who work in marketing departments of companies try to get the attention of target audiences by using slogans, packaging design, celebrity endorsements and general media exposure. The four 'Ps' of marketing are product, place, price and promotion.
Mini cooper
It is determined that Mini’s marketing strategy has shifted in terms of targeting and brand positioning. As previously it was an affordable iconic British car, now it has become a cool luxury car dominantly for a young segment. Its international marketing strategy is differentiated in a way that a brand is built up on the historical iconic image of Mini for the UK and associated market. The business strategy of the mini is based on having a powerful brand image. This strategy forms the foundation of the success of the mini Group. Mini believes in maintain core values as technology, innovation, performance, quality, reliability, exclusivity and customer satisfaction. The company slogans of mini in English i.e. “The Ultimate Driving Machine” and “Sheer Driving Pleasure” give us an overview of the marketing strategy it adopts. The strategy of mini is clearly defined on the homepage of the company i.e. “Identify potential and encouraging growth. Knowing what we represent. Recognizing where our strengths lie and making the best use of every opportunity. Goals we have attained are in essence the point of departure for new challenges”.
Mini adopts a marketing campaign of targeting its customers. In the slogans i.e. “The Ultimate Driving Machine” and “Sheer Driving Pleasure”. Mini tells its customers and other people that mini cars give a pleasure in driving that no other car can give. The marketing…...

Similar Documents

Free Essay

Unit 3 Assigment 1

...Define the following terms: 1. Horizontal Cable : A type of inside cable designed for horizontal use in non-plenum areas. While horizontal cable must be fire retardant, the National Electrical Code (NEC) specifications are not as demanding as those governing the use of plenum cable or riser cable. See also NEC, plenum, plenum cable, and riser cable. 2. Backbone Cable : Backbone cabling is the inter-building and intra-building cable connections in structured cabling between entrance facilities, equipment rooms and telecommunications closets. Backbone cabling consists of the transmission media, main and intermediate cross-connects and terminations at these locations. This system is mostly used in data centers. 3. Patch Cords: a short cord with a plug at each end, or a plug at one end and a pair of clips at the other, used for temporarily connecting two pieces of equipment or signal paths. 4. Connectors: A device for holding two parts of an electrical conductor in contact. 5. Conduit: A tube or duct for enclosing electric wires or cable. 6. Racks: A computer rack (commonly called a rack) is a metal frame used to hold various hardware devices such as servers, hard disk drives, modems and other electronic equipment. Some may refer to a rack as "LAN or network furniture" as resembles a shelving structure where components can be attached vertically, stacked on top of one another. A computer rack can also be called a relay rack or open rack. ......

Words: 932 - Pages: 4

Premium Essay

Unit 3 Assignment 1

...Short Answer: 1. What two things must you normally specify in a variable declaration? a. variable type b. identifier i. int n; // type - int, identifier - n 2. What value is stored in uninitialized variables? c. is a variable that is declared but is not set to a definite known value before it is used. Algorithm Workbench Review: 3. Write assignment statements that perform the following operations with the variables a, b, and c. d. Adds 2 to a and stores the result in b e. Multiplies b times 4 and stores the result in a f. Divides a by 3.14 and stores the result in b g. Subtracts 8 from b and stores the result in a ii. b = a + 2 iii. a = b * 4 iv. b = a / 3.14 v. a = b - 8 4. Assume the variables result, w, x, y, and z are all Integers, and that w=5, x=4, y=8, and z=2. What value will be stored in result in each of the following statements? h. Set result= x+y i. Set result= z*2 j. Set result=y/x k. Set result=y-z vi. result = x++ - y; vii. Answer -4 viii. result = 4 – 8 = -4 ix. result = ++w + y; x. Answer xi. w = w + 1 = 5 + 1 = 6 xii. result = 6 + 8 = 14 5. Write a pseudo code statement that declares the variable cost so it can hold real numbers. * Declare Real price= 0.00 * Display "the original price." * Input item......

Words: 731 - Pages: 3

Premium Essay

Btec Unit 1 Pass 1

...Unit 1 Ferdi Dinç IBM-0-3-D ---MBO BUSINESS SCHOOL--- 2013-2014 Table of contents * Pass 1 - Mercedes-Benz - Clini clowns Assignment 1: Select a profit and a non-profit organisation. Profit: Mercedes-Benz Non-profit: Clini-Clowns Assignment 2: Write two summaries for the companies that you have chosen. Profit: Mercedes-Benz: The profit organisation which I have chosen is Mercedes-Benz it’s a automotive brand that comes from Germany. History of Mercedes-Benz: Mercedes-Benz traces its origins to Karl Benz's creation of the first petrol-powered car, the Benz Patent Motorwagen, patented in January 1886 and Gottlieb Daimler and engineer Wilhelm Maybach's conversion of a stagecoach by the addition of a petrol engine later that year. The Mercedes automobile was first marketed in 1901 by Daimler-Motoren-Gesellschaft. The first Mercedes-Benz brand name vehicles were produced in 1926, following the merger of Karl Benz's and Gottlieb Daimler's companies into the Daimler-Benz company. Mercedes-Benz has introduced many technological and safety innovations that later became common in other vehicles. Mercedes-Benz is one of the best known and established automotive brands in the world, and is also the world's oldest automotive brand still in existence today. For information relating to the famous three-pointed star, see under the title Daimler-Motoren-Gesellschaft including the merger into Daimler-Benz. * Formal name:...

Words: 1578 - Pages: 7

Free Essay

Unit 1 Pass 1

...BUSINESS REPORT UNIT 1 PASS 1 TO: Mrs Burn FROM: Chantelle Trim DATE: 26/02/14 Terms of references: Describe the type of business, purpose and ownership two contrasting businesses. FINDINGS; The first business I’ll be investigating is RSPCA; Type of business, they’re purpose and what they want to achieve; RSPCA is a non-profit organisation; this is because there are a charity. Meaning all goes money goes towards to organisation. RSPCA specialises in the welfare off pet animals since 1824. However there purpose and main goal is to provide a service to all animals and their welfare. By specialising in animals there mission and the way they’re going to improve the welfare of animals is by ensuring that every pet is cared for properly and has a good home, ending cruelty to pet animals, raising standards for pet animals worldwide and stopping pet overpopulation. Another purpose of the RSPCA is to improve the lives and reduce the suffering of all farm animals. The RSPCA aims to do this by having all UK farmed animals kept to the RSPCA higher welfare standards. Improving farm animal welfare legislation and ensuring it is enforced, ensuring animal products are properly labelled so consumers can make higher welfare choices. They also specialize in improving welfare of wild animals, they aim to do this by stopping the use of wild animals in circuses making it socially unacceptable to hunt and kill any wild animals in the name of sport, ensuring any use of performing......

Words: 2258 - Pages: 10

Premium Essay

Unit 3 Assignment 1

...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really......

Words: 411 - Pages: 2

Free Essay

Unit 3 Assignment 1

...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not......

Words: 294 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this......

Words: 283 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...different group users. The administrator could then assign different individuals to one or multiple groups. The permissions of the user is dictated by the administrator. Identification- Richman Investments must assign a unique identifier that compliments each user. This way they can keep track of who has access to what systems and data, the most commonly has used is a user identification number and password. Authentication- “In order to keep the remote access to Richman Investments secure, there must be proof that the person trying to gain access to the network remotely is the same person who has been granted access by identification.” (Technology, 2014)The best way for this company is to use a knowledge based system that includes PIN, pass phrase, or password along with a ownership authentication which includes but is not limited to a key, badge, token, or smart card. Using a combination of will provide the most adequate form of security. Accountability- Richman Investments has to hold all users responsible for what they do or not do on their systems. They must makes sure log systems can detect, prevent, and/or monitor the system due to all the laws that have to do with privacy. Richman Investmens must secure its own data. Reference/Cited Technology, C. a. (2014, July 09). Term paper warehouse. Retrieved from TermPaperWarehouse.com: focoprendido.org/essay-on/remote-access-control-policy-for-richman/95267...

Words: 282 - Pages: 2

Free Essay

Unit 1 Task 3

...'doing' for example 'being' drunk in charge of a vehicle (Duck v Peacock 1949) or 'being' an illegal alien (R v Larsonneur 1933). Occasionally an omission can amount to the actus reus of a crime. The general rule regarding omissions is that there is no liability for a failure to act for example if you see a child drowning in shallow water and you don't do anything to save that child you will not incur criminal liability for your inaction no matter how easy it may have been for you to save the child's life. This general rule however, is subject to exceptions like these: 1. Statutory duty: In some situations there is a statutory duty to act for example to provide details of insurance after a traffic accident or to notify DVLA when you sell a vehicle. 2. Contractual duty: If a person owes a contractual duty to act, then a failure to meet this contractual duty may result in criminal liability: R v Pittwood (1902) 3. Duty imposed by law: The actus reus can be committed by an omission where there exists a duty imposed by law. There are three situations in which a duty may be imposed by law. These are where the defendant creates a dangerous situation, where there has been a voluntary assumption of responsibility and misconduct in a public office. Additionally an omission may be classified as part of a continuing act. Creating a dangerous situation and failing to put it right: R v Miller (1983) Second element is the Mens rea which translates as 'to have in mind’ from Latin. It......

Words: 2256 - Pages: 10

Premium Essay

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Free Essay

Unit 3 Assignment 1

...Craig Roxbury Unit 3 Assignment 1 Erica Lanier Video Summary 1 In video 1.07 the lesson is on ports and connectors. There are three different types of ports, those are serial port, parallel port and game port. The serial port is usually male and have 9 or 25 pins. The parallel port is usually female and has 25 pins. The game ports are female and have 15 pins. All of those ports have been replaced by USB ports. The video also discusses how the modem connects to a phone line and converts digital to analog. It explains there are two types of SCSI narrow and wide SCSI, the narrow SCSI has 50 pins and the wide has 68 pins. Video 1.09 teaches that there are two types of monitors, you have CRT and LCD. CRT stands for cathode ray tube and LCD stands for liquid crystal display. The CRT is similar to an old television and the LCD uses thin film transistors and the back lighting is through polarized panels. Your specifications of a monitor include screen size, contrast ratio, refresh rate, response time, interfacing, dot pitchand pixel pitch. Video 1.11 focuses on types of printers and the types of problems that come with each. There is the Dot Matrix, Ink Jet and the laser printers. Overall the videos covered your computer basics and the parts that make it productive. I could comprehend the objective of the videos but they all covered a plethora of information in a matter of minutes, so I feel there was a lot that I missed. Fortunately what I did not catch in the video......

Words: 322 - Pages: 2

Premium Essay

Unit 3. Assignment 1

...Unit 3. Assignment 1. IPv6 Addressing 1. Research the following organizations and explain their involvement with the Internet public IP addresses a. American Registry for Internet Numbers (ARIN) ARIN, a nonprofit member-based organization, supports the operation of the Internet through the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. IP address space allocation, transfer, and record maintenance http://www.arin.net/about_us/overview.html b. Internet Assigned Numbers Authority (IANA) IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. http://www.iana.org/numbers c. Asia-Pacific Network Information Center (APNIC) The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. The Internet number resources include antonymous system numbers as well as IP addresses that assist in clearly......

Words: 577 - Pages: 3

Premium Essay

Unit 1 Pass 1

...united Munich air disaster-The Munich air disaster occurred on 6 February 1958 when British European Airways flight 609 crashed on its third attempt to take off from a slush-covered runway at Munich-Riem Airport, West Germany. On the plane was the Manchester United football team, nicknamed the "Busby Babes", along with supporters and journalists. 20 of the 44 on the aircraft died. Sir matt busby way- Sir Matt Busby Way is a road in Old Trafford, Greater Manchester, England. It is the location of Manchester United's Old Trafford football ground. Formerly known as Warwick Road North, it was renamed in honour of the legendary Manchester United manager, Sir Matt Busby, in 1993. Busby died less than a year later on 20 January 1994, aged 84.[1] A bronze statue of Sir Matt Busby, erected in 1996, stands on the exterior of the East Stand of the Old Trafford stadium, overlooking Sir Matt Busby Way. Player’s appearances-Manchester United's record appearance-maker is Ryan Giggs, who made a total of 963 appearances over a 23-year playing career; he broke Bobby Charlton's previous appearance record in the 2008 UEFA Champions League Final. Giggs also holds the record for the most starts, having started in 797 games. The purpose of Manchester united The purpose of Manchester united is to Win Games, Win the League and therefore make money. However, they aim to be the best team in the world and in order to become the best team that means they have to win competitions such as the......

Words: 4797 - Pages: 20

Free Essay

Unit 1 Pass 3

...TITLE HEADING Discipline and self-discipline definitions Self-order is the place you have teach yourself and need to get to lessons and work on time you additionally need to have self-control to get every one of the things you are advised to do right. Self-restraint We require discipline in general society administrations on the grounds that in the event that we didn't nobody would complete the assignments or operations legitimately or in the time set, for instance in the armed force in the event that they had no self-restraint and the fighters had got solicited to something most from them just would not be tried to do it. The requirement for order in the Formally dressed UPS What might happen if there was Absence of Discipline?? Arrange should be kept up on the grounds that if there was no request in general society administrations everything would simply look extremely amateurish and nothing would complete when you are requested that do it. Why does request should be kept up?? Discipline is fundamentally quiet and controlled conduct. It is the place you request and control other individuals for instance in the armed force the greater part of the officers need to need to have order to advise alternate warriors what to do and to do it legitimately. Discipline should be followed in general society administrations in light of the fact that in the event that they weren't the assignment set would not complete in time everybody would simply do the undertakings time......

Words: 354 - Pages: 2