Premium Essay

Computer Plan

In: Business and Management

Submitted By kelliparis1
Words 937
Pages 4
Mobile Computer Repair Marketing Plan

Market Summary
Market: Past, Present, and Future

The mobile computer repair business has been around for quite some time now, and will remain to stay in the business. The nature of the computing industry has an astonishing rate of technological growth and continuous changes will work in our benefit immensely. According to (Mobile Computer Repair | Computer Service.), “In recent times, the mobile computer repair industry has seen a sharp rise in demand services. This is due to the busyness of the average working lifestyle increasing by large amount.” Mobile computer repair will stay strong within the industry of repairs because of it’s in home accessibility. Most consumers are busy in their day to day lives, and feel it is necessary for the computer experts to come fix their computers in the comfort of their own homes. Personal market research done indicates a striking market place for our services, which we are going to take full advantage of. Our marketing strategy is to take on our competitor’s weaknesses. Our main focus will be to get our name out there in advertising, and show our consumer’s how we out beat our competitors in every single way. We out beat our competitors because of our dedication to consumer satisfaction, amazing services, and prices that won’t cost you an arm and a leg. Our dedication providing consumer satisfaction will make out company out shine all of our competitors because we will do whatever needs to be done to be positive every single consumer is satisfied with our level of work. We will continue to keep competitive prices, so consumers are more likely to choose our services over the overly expensive companies.

Market Cycle

It is very apparent the market cycle of mobile computer repair businesses has sky rocketed within the last six years, which means more consumers for…...

Similar Documents

Premium Essay

Computer

...What is Computer : Computer is an electronic device that is designed to work with Information.The term computer is derived from the Latin term ‘computare’, this means to calculate.Computer can not do anything without a Program.it represents the decimal numbers through a string of binary digits. The Word 'Computer'usually refers to the Center Processor Unit plus Internal memory. Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions (called program) and gives the result (output) and saves output for the future use. It can process both numerical and non-numerical (arithmetic and logical) calculations.The basic components of a modern digital computer are: Input Device,Output Device,Central Processor. A Typical modern computer uses LSI Chips. Charles Babbage is called the "Grand Father" of the computer.The First mechanical computer designed by charles Babbage was called Analytical Engine. It uses read-only memory in the form of punch cards. Four Functions about computer are: accepts data | Input | processes data | Processing | produces output | Output | stores results | Storage | Input (Data): Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc. Process: Process is the operation of data as per given instruction. It is totally internal process of the computer system. Output:......

Words: 1953 - Pages: 8

Premium Essay

Computer

...Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is an......

Words: 47755 - Pages: 192

Premium Essay

Computers

...monitoring to detect unauthorized activity.  Understand cloud provider security policies and SLAs. Barry O Loughlin * The Internet’s vulnerable design. * The shift to profit-induced crime. * The Internet Underground economy. * The dynamic nature of EC systems. * The role of insiders. What is cyber crime? Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. http://www.webopedia.com/TERM/C/cyber_crime.html What is cyber security? Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity. According to a December 2010 analysis of U.S. spending plans, the federal government has allotted over $13 billion annually to cybersecurity over the next five years. Ensuring cybersecurity requires coordinated efforts throughout an information system. Elements of cybersecurity include: http://whatis.techtarget.com/definition/cybersecurity...

Words: 1105 - Pages: 5

Premium Essay

Computer

... THE HISTORY OF COMPUTER One of the earliest machines designed to assist people in calculations was the abacus which is still being used some 5000 years after its invention. In 1642 Blaise Pascal (a famous French mathematician) invented an adding machine based on mechanical gears in which numbers were represented by the cogs on the wheels. Englishman, Charles Babbage, invented in the 1830's a "Difference Engine" made out of brass and pewter rods and gears, and also designed a further device which he called an "Analytical Engine". His design contained the five key characteristics of modern computers:- 1. An input device 2. Storage for numbers waiting to be processed 3. A processor or number calculator 4. A unit to control the task and the sequence of its calculations 5. An output device Augusta Ada Byron (later Countess of Lovelace) was an associate of Babbage who has become known as the first computer programmer. An American, Herman Hollerith, developed (around 1890) the first electrically driven device. It utilised punched cards and metal rods which passed through the holes to close an electrical circuit and thus cause a counter to advance. This machine was able to complete the calculation of the 1890 U.S. census in 6 weeks compared with 7 1/2 years for the 1880 census which was manually counted. In 1936 Howard Aiken of Harvard University convinced Thomas Watson of IBM to invest $1 million in the development of an electromechanical version of Babbage's......

Words: 1597 - Pages: 7

Premium Essay

Marketing Plan - Apple Computer

...Executive Summary The Company designs, manufactures and markets personal computers and related software, services, peripherals and networking solutions. Apple computers also designs, develops, and markets a line of portable digital music players along with related accessories and services. The company’s situation, marketing strategies and mix relate to the quality value of Apple products and services such as the Macintosh line of desktop and notebook computers, the iPod line of portable digital music players, the Xserve server and Xserve RAID storage products, a portfolio of consumer and professional software applications, the Mac operating system, the iTunes Store, portfolio of peripherals that support and enhance the Macintosh and iPod product lines, and a variety of other service and support offerings and sells its products worldwide through its online stores, its retail stores, its direct sales force and third party wholesalers, resellers and value-added resellers and sells products for the purpose of education, consumer, creative professional, business as well as government customers. Situational Analysis History/Background Apple Computers was incorporated under the laws of the State of California last January 1977 as Apple designs, manufactures and markets personal computers and related software, services, peripherals and networking solutions. The Company also designs, develops and markets a line of......

Words: 900 - Pages: 4

Premium Essay

Computers

...all of security needs from the second level in Maslow's hierarchy. Resource allocator and disturbance handler are both under decisional roles. If UiTM established that students can play varsity sports only when their cumulative grade points of an average 2.0 or higher, UiTM is establishing a rule. Henri Fayol was the very first person to recognize that the successful managers had to understand the basis managerial functions which consists of planning, leading, organizing and Controlling. If Company A has an objective to transfer finished goods inventory from one warehouse to another, determining amount available floor space of the new location is an example of a standing plan. Identifying problem is the first step in planning process. There are three kinds of operational plans used, single-use plan, standing plans and budgets. When the goods produced by an Organization calied for differing manufacturing technologies and marketing methods, the Organization is calied division by customer. El Felia wishes to be married in the next two years. Her desire is driven by selfesteem needs. Legitimate power can influence others by Controlling their want's, such as for money, recognition, praise and Status. Timeliness is a degree to which a control system provides information when it is needed. Control is described as making something to happen the way it was previously planned to happen. Communication is a dynamic yet rather straightforward process. Feedback should be general rather......

Words: 1717 - Pages: 7

Free Essay

Computer

...Create a Business Letter 5 Unit 5 Presentation 1: Small Group Presentation: Leadership, Conflict Resolution, and Teamwork 7 Unit 5 Assignment 1: Compare and Contrast Effective and Ineffective Leaders 8 Unit 6 Assignment 1: Create a Long-Term Financial Plan 10 Unit 7 Assignment 1: Calculating Credit Scores 11 Unit 8 Assignment 1: Writing a Prospective Schedule 12 Unit 9 Assignment 1: Using Social Media for Job Searches 14 Unit 10 Assignment 1: Putting the Finishing Touches on Your ePortfolio 15 Laboratory Assignments 17 Unit 1 Lab 1: Personal Persistence Narrative 17 Unit 1 Lab 2: Grit Test 21 Unit 2 Lab 1: Optimism 24 Unit 2 Lab 2: Self-Control 25 Unit 3 Lab 1: Curiosity in Modern Times 27 Unit 3 Lab 2: Integrity Matters 28 Unit 4 Lab 1: Create a Research Summary Memorandum 29 Unit 5 Lab 1: Resolving Systemic Conflict: Scenario Analysis 31 Unit 6 Lab 1: Time Value of Money 32 Unit 6 Lab 2: Budget Exercise 33 Unit 7 Lab 1: Calculating House Cost 35 Unit 7 Lab 2: Delayed Gratification 37 Unit 8 Lab 1: Initiative Reflection 39 Unit 8 Lab 2: Time Management Reflection 40 Unit 9 Lab 1: Creating a Professional Profile 41 Unit 10 Lab 1: Creating a Personal and Professional Development Plan 43 Graded Assignments Unit 1 Assignment 1: It Takes Courage Course Objectives and Learning Outcomes Apply tools for overcoming obstacles and tools of connection to various business and personal scenarios. Evaluate choices for overcoming......

Words: 11662 - Pages: 47

Free Essay

Xyz Computers Disaster Plan

...When composing a disaster plan the most important step is to perform a very comprehensive investigation of all risks in the network. This includes all computer systems, servers, networks, and etc. When investing the network there are many risks to consider. These risks can include attacks from viruses, deletion of data from company employees, floods or other natural disasters and etc. When listing these threats it should be taken in effect which risks have more impact on the company. Once risks are determined and put in categories of importance, XYZ Computers should consider some very common questions. • How would the following affect XYZ Computers? o Virus attacks o Loss of personal information (company’s or employees) o Power outages o Loss of Internet service o Loss of phone service o Natural Disasters (floods, hurricanes, earthquakes, tornados, fires, and etc.) • What would be company costs in the event of any of these disasters? • What can XYZ Computers do to lessen the effect of disasters on our company? • What can XYZ Computers do to prevent certain disasters from happening? Some companies in areas that power outages are common may have emergency power in place. They will also back up all of their data on RAID tapes frequently. While prevention can cost the company money, recovery from disasters that could have been prevented could cost much more. Some businesses have even had to close due to certain disasters that could have been prevented. ......

Words: 1399 - Pages: 6

Premium Essay

Computer

...been over 90 lawsuits against Target since the data breach last year from customers and banks for negligence and compensatory damages. How did it happen? A few days before thanksgiving a hacker installed malware in Targets security and payment system designed to steal every credit card used at any US stores. Event time the customer swiped the card it would capture the numbers and stored it on a Target server commandeered by the hackers. Six months earlier the company began installing a $1.6 million malware detection tool made by the computer security firm Fire Eye (FEYE), whose customers also include the CIA and the Pentagon. Target had a team of security specialists in Bangalore to monitor its computers around the clock. If Bangalore noticed anything suspicious, Target’s security operations center in Minneapolis would be notified. On Saturday, Nov. 30, the hackers had set their traps and had just one thing to do before starting the attack: plan the data’s escape route. As they... View Full Essay...

Words: 341 - Pages: 2

Premium Essay

Computer Lab Plan

...| Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | | | Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | | Executive Summary Auckland University of Technology (AUT) is ranked in the top 500 universities of the world. The university has experienced a significant increase in the number of students enrolling in its Business and Law faculty over the years. Its Business and Management Studies was ranked as one of the top 200 in the world. As a result, there has been an increasing requirement for using computer systems in all its faculties, including the non-technological subject areas. Due to the growth envisioned over the next five years, AUT has decided that it requires two new computer labs to accommodate its Business and Law faculty students.To meet this requirement, level 7 of WF building will be refurbished to accommodate the new computer labs, instead of the exisiting seven classrooms. The renovation will be carried out as a 6 months long project commencing on 30th June 2015. Taking the Christmas and New Year’s holiday period into account, the project will be completed by 22nd December 2015, before the beginning of Term 1, 2016. The calculated budget for the project is $1.294 million, which includes 10% of contingency amount. The key deliverables for the project are: * Lab designs and architectural layouts for the computer labs * Two new computer labs The major tasks that......

Words: 4005 - Pages: 17

Premium Essay

Computer

...COMPUTER ARCHITECTURE PC headway has grabbed mind blowing ground in the around 60 years since the first by and large profitable electronic PC was made. Today, not exactly $500 will buy a PC that has more execution, more standard memory, and more plate stockpiling than a PC obtained in 1985 for 1 million dollars. This rapid change has come both from advances in the advancement used to accumulate PCs and from progress in PC design. Though mechanical enhancements have been genuinely persisting, progress ascending out of better PC architectures has been by and large less persevering. Amidst the starting 25 years of electronic PCs, both powers made an essential obligation, going on execution change of around 25% for reliably. The late 1970s saw the headway of the microchip. The utmost of the chip to ride the redesigns in formed circuit headway incited a higher rate of advancement—around 35% change for reliably in execution. This headway rate, joined with the expense purposes of eagerness of a mass made chip, prompted an amplifying bit of the PC business being in light of microchips. Also, two crucial changes in the PC business center made it less troublesome than at whatever point in late memory before to be fiscally beneficial with a new assistant organizing. Regardless, the virtual exchange of low level handling form programming reduced the essential for article code similarity. Second, the making of directed, seller free satisfying desires structures, for example, UNIX and...

Words: 567 - Pages: 3

Premium Essay

Computer

...A BRIEF COMPUTER HISTORY The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. He designed the Analytical Engine and it was this design that the basic framework of the computers of today are based on. Generally speaking, computers can be classified into three generations. Each generation lasted for a certain period of time,and each gave us either a new and improved computer or an improvement to the existing computer. First generation: 1937 – 1946 - In 1937 the first electronic digital computer was built by Dr. John V. Atanasoff and Clifford Berry. It was called the Atanasoff-Berry Computer (ABC). In 1943 an electronic computer name the Colossus was built for the military. Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built. It is said that this computer weighed 30 tons, and had 18,000 vacuum tubes which was used for processing. When this computer was turned on for the first time lights dim in sections of Philadelphia. Computers of this generation could only perform single task, and they had no operating system. Second generation: 1947 – 1962 - This generation of computers used transistors instead of vacuum tubes which were more reliable. In 1951 the first computer for commercial use was introduced to the public; the Universal Automatic Computer (UNIVAC 1). In 1953 the International Business Machine......

Words: 7002 - Pages: 29

Premium Essay

Computer

...instructions that tell a computer how to carry out tasks that are referred to as computer program. These programs form the software that prepares a computer to do a specific task, such as document production, photo editing, virus protection, file management, or Web browsing. It determines the tasks a digital device can help you accomplish. Some software helps you create documents; while other software helps you block viruses or fine-tune computer performance. The two main categories of Software System software are operating systems i.e. device drivers, utilities, and programming languages. It is designed for computer-centric tasks. For example, you would use system software to diagnose a problem with your hard disk drive or Internet connection. Application software includes music, graphics, mapping, finance, and entertainment. It is designed to help people accomplish real-world tasks. For example, you would use application software to edit a photo, write a term paper, or play a game. Music software offers many ways to work with music, sound effects, and narration from your desktop, laptop, or handheld computer. The most popular music software capabilities are as follows: download music and other sound files, play music and sound files, create playlists, transfer music to handheld devices, convert audio CDs into digital music, record music and narrations, edit volume, speed, and quality of digital recordings, crop and mix recordings, stream radio music to your computer,......

Words: 1319 - Pages: 6

Premium Essay

Computers

...In: Computers and Technology Computers Sergio Malone Chapter 1 Check Your Understanding Which of the following statements accurately describe differences between a LAN and a WAN? (Choose two) Companies can use a WAN to connect remote locations, and a LAN can make a local connection in a building D. Only WANs require a CSU/DSU to be used on the ends of the cable. Network professionals belong to organizations that plan and define standards used in networking. Which of the following are recognized industry organizations? (Choose two) A. IETF C. ISO D. EIA F. ITU Which of the following are true about a router? (Choose three) A. Routers enable different IP networks or IP subnets to communicate with each other. C. Path selection is one of the main functions of a router E. Routers have a central processing unit and memory. Which of the following are main components of a router? (Choose three) A. ROM B. Flash memory E. RAM Which of the following statements describe the function of RAM in a router? (Choose two) C. RAM stores the current configuration information. E. RAM stores routing tables for the router. Which of the following statements are true about DTE? (Choose two) C. DTE usually resides on the customer’s premises D. DTE is an acronym for data terminal equipment. Which of the following statements are true about DCE? (Choose two) B. DCE provides clocking to the DTE. C. DCE is an acronym for data circuit-terminating......

Words: 456 - Pages: 2

Premium Essay

Computer Support Business Plan

...Chart: Sales Monthly 16 Chart: Sales by Year 16 5.5 Strategic Alliances 17 6.0 Management Summary 17 6.1 Organizational Structure 17 6.2 Management Team 17 6.3 Personnel Plan 18 Table: Personnel 18 6.4 Training 18 6.5 Feedback and Control 18 7.0 Financial Plan 19 7.1 Break-even Analysis 20 Chart: Break-even Analysis 20 Table: Break-even Analysis 20 Table: General Assumptions 21 7.3 Key Financial Indicators 22 Chart: Benchmarks 22 7.4 Projected Profit and Loss 23 Table: Profit and Loss 23 Chart: Gross Margin Monthly 24 Chart: Gross Margin Yearly 24 Chart: Profit Monthly 25 Chart: Profit Yearly 25 7.5 Projected Cash Flow 26 Chart: Cash 26 Table: Cash Flow 27 7.6 Projected Balance Sheet 28 Table: Balance Sheet 28 7.7 Business Ratios 28 Table: Ratios 29 8.0 Contingency Planning 30 Table: Sales Forecast 1 Table: Personnel 2 Table: General Assumptions 3 Table: Profit and Loss 4 Table: Cash Flow 5 Table: Balance Sheet 6 1.0 Executive Summary I Tech Solutions is a consulting-oriented company, intending to fill in the market need for a professional, customer-focused computer company. The company emphasizes service and support to differentiate itself from more price-oriented computer companies. We are on the brink of penetrating a lucrative market in a rapidly growing industry. The current trend towards an increase in the number of entrepreneurs and competition......

Words: 7733 - Pages: 31

Misaki Kuno | Herrenschmuck | gaine tressée extensible PET noir diamètre 4,6,10 ou 12 mm au mètre