Premium Essay

Ms Rebecca

In:

Submitted By pemisire
Words 3964
Pages 16
Table of Contents
Serial No 1. Task1 Introduction 2. Marketing: Definition

Topic
Introduction
Marketing: Definitions

Page No 1.

A REPORT OF THE MARKETING DEPARTMENT TO THE CHAIRMAN OF TESCO
DATED: 08/10/2013
Lo1.0 INTRODUCTION
The ideals of a detailed marketing plan demand a critical approach. The marketing processes, the market environment variables are essentially relevant to the overall ideals of a campaign. In this study it will be important to ascertain certain definitions which are fundamental to the study. According toAMA (1985) marketing involves the ideals of planning and execution of the concept, pricing strategies, promotional tactics, and the distribution of ideas, commodities and services and the creation of exchange and the satisfaction of objectives. Pettinger(2002) states that the ideals of marketing encompasses the offering of goods and services to the buyer at a price to achieve profit.CIM(2001) insists that marketing is managerial in nature and it involves the activities of identification, anticipation, and the satisfaction of customer needs with the intension of making profit,

DISCUSSION/FINDINGS
LO1.1 MARKETING PROCESSES
Kotler, Amstrong, Saunders and Wong (1999) explain that the market process involves activities of critical analysis of the market. This involves the system of analyses regarding the market. Lancaster (1998) suggests that the marketing process consist of the
Strategic market analysis

This encompasses a managerial activity where the organisation focuses on utising opportunities that are opened to them with the intension of creating a long-term competitive advantage. This process inculcates formulation, evaluation, and the selection of strategies that are market oriented and meets the standards of the organisation.
Marketing mix planning
Kotler (2006) emphasises that the marketing mix

Similar Documents

Free Essay

Rebecca Analysis

...Most love stories as we know them, have your typical storyline boy meets girls, they fall in love and live happily ever after. The author, Daphne Du Maurier, of this mystery romance, Rebecca, had a similar tone to that of Shakespeare’s Othello, in mind when writing the story of a complex love that was the target of a villainous character looking to end the relationship only with a few differences along the way. It is a bittersweet story that takes place in the 19th century around the Cornish Coast and deals with the ups and downs of life for the unknown narrator and her much older husband, the owner of Manderly, Maxim De Winter. The story has a strong character line up some who’s identity have been with withheld until further through the book. The heroin also the narrator, Mrs. De Winter as she is known throughout the book, is a self conscious young woman who never seems to let go of the idea that she will never be as good as the first wife Rebecca. The story revolves around her and the trials and tribulations she endured at her stay at the Manderley. Mrs. Van Hooper, the rich older American woman whom the narrator was her travel companion and allowed her the travel experience where she met Maxim De Winter. Her husband, Maxim De Winter, the older gentlemen who swept her off her feet and gave her the life she so desperately sought out, who tries to make her understand that she is what he is really looking for and loves but seems to grow tired of the endless reminder that...

Words: 1829 - Pages: 8

Premium Essay

Rebecca's Structure (Daphne Du Maurier)

...Explain the effectiveness of the structure of the text, Rebecca Daphne du Maurier’s Rebecca is structured in a circular form, which is effective in displaying elements of the gothic genre and producing a sense of mystery and ambiguity. The fact that details are revealed gradually creates tension, and a desire to know, so that by the end of the novel the audience is satisfied with the complete story, despite the horrific truth regarding Rebecca’s murder. The text virtually revolves around a murder By using a BAB form, with a reference to the ending at the beginning of the novel, a sense of confusion and abstruseness is evoked among readers. The first chapter, in which the narrator supernaturally returns to Manderley, relives her experiences and mourns for the loss of such an exquisite property, is perplexing for the reader as the scene, characters and setting have not been established. This causes the audience to disregard the first chapter, as the second chapter begins with an entirely different setting and mood. Upon reaching the end of the novel, the reader grasps the meaning of the dream sequence, and the forgotten abstruseness is resolved. The audience is left content with all details of the story revealed, but, like most gothic tales, also chilled and unsettled with the shocking conclusion. Rebecca shows elements of the horror genre through the structure, in which the details are revealed throughout the story, by being analogous to many crime shows...

Words: 545 - Pages: 3

Free Essay

Women

...The novel Rebecca was written by Daphne Du Maurier in 1938. There are many elements that make Rebecca a work of gothic literature. Some of these include the fact that Daphne Du Maurier has used isolation and darkness to create a suspenseful and mysterious atmosphere. The fact that Du Maurier has emphasised the narrators fear of the unknown by creating a supernatural atmosphere through the ghost of Rebecca and her servant Mrs Danvers. Also the way Du Maurier describes the characters and the setting using elements of death successfully make Rebecca a piece of gothic literature. Rebecca can be classified as a piece of gothic literature because of the way Du Maurier uses isolation in the novel. Du Maurier uses words such as rusted and unkept to suggest that Manderley had not been visited for a while. Du Maurier describes the surrounding nature around Manderely as unkept and untidy. The way Du Maurier describes the nature surrounding Manderley resembles the darkness in human nature. “The trees choked the terrace” Du Maurier uses personification to give human actions to the trees around Manderley. The use of the word choked makes it seem as if the trees around the house are just as evil as the house itself. This gives the reader an image of Manderley which is dark and empty. The numerous dark and empty rooms also help in making Rebecca a piece of gothic literature. The rooms and passages in Manderely create a ominous atmosphere and a sense of foreboding. Du Maurier’s use of adjectives...

Words: 825 - Pages: 4

Free Essay

History of Judaism

...Lorraine Rice REL/134 September 30, 2015 Dr. Kimberly Miracle History of Judaism In the history of Judaism God speak to a few people in lighting them of their future. Rebecca the second wife of Isaac is one that has heard the words of God. He spoke to her about the children that she was carrying, her two son would found two great nations, but the elder would serve the younger. So Rebecca gave birth to two sons, the eldest Esau and the younger Jacob. Jacob a shepherd tricked his brother into giving away his birthright with a simple bowel of food. But that was not the most important thing that happened to Jacob. Years later Jacob tricked his father into giving him blessing that were meant for Esau. Enraged Esau he spoke of killing him after their father passed. Rebecca hears of the threats and sends Jacob to live with his uncle. On his journey to his uncle home in Haran it is said that he seen God walking up a ladder that went to the heavens, God promised the lands of Canaan to Jacob and his descendants. Jacob continued on his journey reaching his uncle house. When reaching his uncle home Jacob, was introduce to his cousins Leah the elder daughter and Rachel the younger. At first sight of his cousin Rachel he fell in love, but his uncle would not let him marry her so easy, Jacob have to work for seven years to earn Rachel hand. His uncle had other plans, he tricked Jacob by presented his eldest daughter Leah instead of Rachel for him to wed. Jacob could not stop his love for...

Words: 728 - Pages: 3

Premium Essay

Basic Commands in Linux and Windows

...LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS “License for Use” Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at www.hackerhighschool.org/license. The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused. The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship. All works copyright ISECOM, 2004. 2 LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS Table of Contents “License for Use” Information....................

Words: 2543 - Pages: 11

Free Essay

Realization

... 10 out of 10 points | | | A multi-tasking operating system is capable of executing more than one program at a time for a user.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 2 10 out of 10 points | | | ASCII code is one of the code schemes used to represent characters in a byte.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 3 10 out of 10 points | | | Operating systemAnswer | | | | | Selected Answer: |  d.  all of the above | Correct Answer: |  d.  all of the above | | | | |  Question 4 10 out of 10 points | | | About 95 percent of the UNIX operating system is written in C language.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 5 10 out of 10 points | | | The two major versions of the UNIX operating system are AT&T's UNIX version V and Berkeley UNIX.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 6 10 out of 10 points | | | You must login to use the system. It means that, in response to prompts you type your user Id and password.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 7 10 out of 10 points | | | You can change your password as many times as you wish.Answer | |...

Words: 285 - Pages: 2

Premium Essay

Zara Case

...ZARA: IT for Fast Fashion With ZARA's fashion business expanding, Salgado and Sanchez have a critical decision to make on whether to upgrade the current, seemingly out of date IT system. Like other large clothing retailers, ZARA adopts a highly standardized business model for ordering, design, manufacturing and procurement across all product categories and regions. However, unlike most clothing retailers, ZARA's business model is based on fast delivery times with minimal inventory, decentralized decision making process and very low data integration among different stores. Unlike its competitors, Zara relies on its individual store managers and designers, rather than an elite team of senior managers, to perform market research on latest trends and decide what clothes to design and procure. ZARA's approach to Information Technology is based on its business needs. In order to establish itself as a brand, which aligns closely with customers' taste, ZARA needs to have information on latest trends from all its stores to keep pace with the ever-changing fashion world. On the other hand, ZARA's popularity and high growth requires an upgraded IT system, which can be easily replicated and scalable to new stores. ZARA's current DOS system serves this purpose efficiently as it is easy to install in a newly opened store and requires little training. ZARA's approach of simple, non-integrated low cost IT investment is well in sync with its decentralized...

Words: 1179 - Pages: 5

Free Essay

Zara Case

...According to the point of view of Salgado , Zara is getting bigger and bigger and its operating system getting more and more obsolete. Thus, it gives Zara to have a comparative advantage because for a strategic perspective. Although Zara's advantage over its competitors is not so much a result of IT leverage, the sustainability of its competitive edge might be at risk due to a lack in IT investment.The current assumption for the IT investment states about 18,000 hours. The Zara's staff devoted to IT contains about 50 people divided in several departments. So we can suppose that only 10 people are devoted to POS software and so 10 people are able to handle this project. With a brief calculation, we can figure that it would take too much time to set up this project with an internal team. That is why we are prone to think that externalize would provide a more efficient solution, completely handle by an outsourced professional team. It could be a little more expensive at short and long term that is why if we choose this option we have to integrate a training system of our staff to lower the outsourced fees. An important point is that Zara has always developed its own IT solutions and if we make it through subcontractors we are not sure that it would match with Zara values or way of doing. Zara has been used to make it alone. Thus we think that some member of the IT staff could work with subcontractors in order to lower these expenses and help them to create an It solution...

Words: 600 - Pages: 3

Premium Essay

Effective Managerial Skills

.... Evaluate Microsoft’s strategy in good and poor economic times. In Good Economic Times: Microsoft is the world’s most successful software company. The original mission of this company is “a computer on every desk and in every home, running Microsoft software.” Microsoft's tactic was to be a software manufacturer and make its operating system available to computer manufacturers for use in their personal computer products, and then sell the owners of PCs software to run on that operating system. The history was begins in early 1980, where Microsoft creates DOS Operating System for IBM computer. The company used this inertial success with IBM to sell software to other manufacturer, quickly making Microsoft a major player in this industry. This is one of the changes for Microsoft to grown faster with the inertial advertising efforts focused on communicating the company range products from DOS to the launch of Excel and Windows. Later in 1986, Microsoft went to public with windows operating system and Microsoft office. The strategy contribute to launch this two application is a milestone for Microsoft to future successful. After that, Microsoft found an instant success where they launch the window 3.0 which is offered an improved set of windows icons and application like file manager and program manager where still being used today. Microsoft doing a magazine advertising and received endorsement from the top computer magazine in the industry is another...

Words: 321 - Pages: 2

Premium Essay

The Immortal Life Of Henrietta Lacks Analysis

...The book The Immortal Life of Henrietta Lacks [HeLa] by Rebecca Skloot is a very well written and insightful book that discusses the life of Ms. Henrietta Lacks as well as the journey that her immortal cells have taken since her untimely death. After reading the first half of the book, many conclusions were made about the author’s style of writing and ways of informing the reader on facts about both Ms. Lacks and her cells. One of the creative ways that were very much appreciated about the book’s layout is the fact that the author switches from one subject to another throughout the chapters. Instead of telling the story in a “straight line” so to speak, the author switches from telling the story of Henrietta’s life and death to her (the author’s)...

Words: 296 - Pages: 2

Premium Essay

Henrietta Lacks Research Paper

...my opinion, subsequent releases of Mrs. Lacks genetic information will increase the privacy contraventions. However, National Institute Health (NIH) has reached an agreement between the privacy of Lacks family and interests of researchers, where researchers who wish to get access to HeLa genome should take consent from NIH. The committee which includes Lacks family will get to decide whether are not the access should be given. Lastly, I really feel that the Immortal Life of Henrietta Lacks written by Rebecca Skloot is a fascinating story. Ms. Skloot revealed the origin of HeLa cells, names and also the family associations without the consent of Lacks family. She certainly took it at a time where consent was not contemplated and the consequences in terms of genetic legacy or effects on the understanding of biology on people were not thought of. I understand Ms. Skloot's aspiration to correct an old wrong and the curious nature of journalism on HeLa cells. I'm very certain that Ms. Skloot had the best intentions and didn't mean any harm even though her work discloses generations of Lacks family members. In conclusion, I think researchers should consider various viewpoints, needs, and interests of the people making substantial contributions to the science. Additionally, researchers should decide the limits of their say in regard to what happens with such contributions, regardless of whether biospecimens or information, both now and later on. There is no single right way of ethics...

Words: 1787 - Pages: 8

Free Essay

Week Five

...While contrasting UNIX systems to Windows a few of the features discovered in UNIX incorporate: the usage of simple text for saving data; a ordered file system; UNIX manages tools for example printing equipments, mouse and keyboard and also other tools like files. The UNIX system also manages directories and procedures like files. There's only one root directory inside the UNIX operating system hierarchical tree. UNIX utilizes devices and applications via the command line in contrast to utilizing a single monolithic application which includes all the same functionality. The kernel offers services to begin and stop applications, deals with the file system that saves and arranges the computer system files and data. The kernel usually shifts data into as databases for storage and use. Both UNIX and Windows file systems are ordered and both support lengthy names as much as 255 characters. File Processing Evaluation UNIX programs that are based upon simple text files for setup use a lot of powerful devices that are utilized to process text files. Piping is widely utilized to reroute the result of one command to the input of the subsequent command. UNIX deals with most command in a consecutive order (first in first out) but the procedure may be overridden by making use of variables and alternatives (ADD). This lets commands to be installed collectively and implemented without storing all the results to an output file. UNIX utilizes commands that include: Echo - shows text...

Words: 2702 - Pages: 11

Premium Essay

Unix vs Windows Critique

...manufacturers (Apollo Group, Inc., 2005). With manufacturing plants in Albany, Georgia, Pontiac, Michigan, and Hangzhou, China, Riordan’s e-business plays a vital role in continued growth. Riordan’s Internet site states, “Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. Purpose The purpose of this paper is to discuss the differences between UNIX/Linux versus Microsoft Windows. Our paper will discuss facts that cover security, administrative, networking, performance, programmability. Security Technical One of the key differences between the Unix approach to system security and the MS Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design. Modularity within the system is another example of architectural security in UNIX, but lacking in MS Windows. These differences in the design and relative security of Unix and Microsoft OSs illustrate a distinct difference in philosophy between them. A couple of factors considered in regards to the security features are the importance of privilege separation, user control and automatic execution. Unfortunately, the difference appears to be that where Unix has a philosophy of security built into the...

Words: 2022 - Pages: 9

Free Essay

Os History

...Sistemas Operativos Historia En la década de 1940, los primeros sistemas electrónicos digitales no tenían sistemas operativos. Los sistemas de la década de 1950 en general funcionaban solamente con un proceso a la vez. Y se permitía una sola persona a la vez para utilizar la máquina. Todos los recursos de la máquina estaban a disposición del usuario. La facturación por el uso de la computadora era simple- porque el usuario tenía toda la máquina. Originalmente, cada usuario escribía todo el código necesario para implementar una aplicación concreta, incluidas las muy detalladas de la máquina de nivel de entrada/salida de instrucciones. Muy rápidamente, la codificación de entrada/salida necesaria para implementar funciones básicas se consolidó en un sistema de control de entrada/salida (IOCS). Los usuarios que deseaban realizar operaciones de entrada/salida ya no tenían que codificar las instrucciones directamente. En su lugar, utiliza las rutinas IOCS para hacer el trabajo real. Los primeros sistemas de almacenamiento real para un solo usuario fueron dedicados al trabajo más que al tiempo de ejecución del trabajo en sí. Los trabajos generalmente requerían un tiempo de configuración considerable alto durante el cual el sistema operativo, cintas y paquetes de discos se montaban, y las formas adecuadas se colocaban en la impresora, etc. Cuando los trabajos se completaban, se requería un tiempo considerable de "desmontaje" como cintas y paquetes de discos que eran retiradas, etc...

Words: 4031 - Pages: 17

Premium Essay

Nt1210 Intro to Networking Lab 5.4

...NT1210 Lab 5.4 Basic Network Troubleshooting Exercise 5.4.1 If you needed to determine the computer name used for node E on the network (starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a 192.168.1.5 to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping 192.168.1.5, Ping 192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise...

Words: 344 - Pages: 2