Assignment 4 Task 1

In: Business and Management

Submitted By ChrisStrong123
Words 1446
Pages 6
Assignment 2

Task 1:
There are six different ways that markets can be segmented. One of the ways is by using psychographic segmentation. Psychographic segmentation involves putting people into different categories by social class, lifestyle, activities, opinions, interests, behaviour and attitudes.
Within this segmentation is socio-economic segmentation. These are classified depending on their similarities in income, occupation and education. There is a table used called the social grade definitions table that is used for classifications. Social grade | Social status | Occupation | A | Upper middle class | Higher managerial, administrative or professional | B | Middle class | Intermediate managerial, administrative or professional | C1 | Lower middle class | Supervisory or clerical and junior managerial, administrative or professional | C2 | Skilled working class | Skilled manual workers | D | Working class | Semi-skilled and unskilled workers | E | Those at the lowest level of subsistence | State pensioners or widows, casual or low grade workers |

Lifestyle looks at the people and not the product trying to relate lifestyle patterns to purchasing behaviour. A lifestyle is a way that someone behaves, which they have got from part of the community. There are a few models of lifestyle; one of the most well-known is sagacity life cycle groupings. This basically looks at how people have different aspirations and behavioural patterns at different stages in their life.
There are four main stages of the life cycle which are pre-family, family, late and dependant. Dependant – mainly under 24s, living at home or full time students
Pre-family – under 35s, have been established with their own household but no children
Family – Parents under 65, with one or more children…...

Similar Documents

Week 4 Assignment 1

...by giving them rights that were unheard of at that time in most nations (Absar 2012) Before meeting Wadie Hussein I did not know much about the Islamic religion and I had no idea the religion was this detailed and informative, so my understanding of the religion was altered to a better state. I believe peoples misconceptions of this religion are very common, for example Islam is associated with how followers look, automatically they are categorized as Arabic which; while Islam is often associated with Arabs, they make up only 15% of the world's Muslim population. The country with the largest population of Muslims is Indonesia (which is a non-Arab country). Muslims make up about 1/5 of the world's population (about 1.2 billion), with large numbers found in Asia (~69%), Africa (~27%), Europe/USA (~4%) and other parts of the world (factbook.net). Seven million Muslims live in the United States; approximately half of them immigrated to this country, and the remainder was born here. The Muslims now outnumber the Jews in this country. If you think about it, Islam is no more foreign to this country than Judaism or Christianity; all three of these religions have their roots in the Middle East. There are 60 countries in the world where the majority of the people are Muslim. However, there is not a single country among them that can truly be called an ‘Islamic State’; where the government and the people conduct themselves truly in accordance with the message that was given to......

Words: 1911 - Pages: 8

Week 4 Assignment 1

...Week 4 Assignment 1 Soc 100 July 29, 2012 In this paper I will be discussing the article “Study of delinquent, diverted, and high-risk adolescent girls: Implications for mental health intervention”. I will start by giving a brief summary of the article I have chosen. Followed by discussing the type of article this is and my conclusion I have drawn form the information found in this article. Lastly I will discuss how this article fits into our sociology class as well as how this article differs from non-scholarly periodicals The article begins by describing the issue of increasing numbers of adolescent girls being entered into our nation’s juvenile judicial system. The study aims to assess the most common risk factors that are affecting adolescent girls being entered into the juvenile judicial system. It also aims to find the effectiveness of the prevention factors in place to keep adolescents out of the system. For the study a survey was administered over the course of nine months to a hundred and fifty-nine adolescent girls. These adolescent girls were broken into three categories delinquent, diverted and high-risk. Delinquent girls are the girls that have been entered in the juvenile justice system in some form ranging from home care to a penitentiary. The diverted girls group consists of girls that have engaged in behaviors that have brought them to the attention of the juvenile justice system but instead of being entered into the judicial system were referred to......

Words: 924 - Pages: 4

Unit 4 Assignment 1

...UNIT 4. Assignment 1. Copper vs Fiber As the name suggests, fibre optic technology uses pulses of light to carry data along strands of glass or plastic. It's the technology of choice for the government's National Broadband Network (NBN), which promises to deliver speeds of at least 100Mbps. When we're talking about 'speed' were actually talking about throughput (or capacity) — the amount of data you can transfer per unit time. And fiber optics can definitely transfer more data at higher throughput over longer distances than copper wire. For example, a local area network using modern copper lines can carry 3000 telephone calls all at once, while a similar system using fiber optics can carry over 31,000. So what gives it the technical edge over copper wires? Traditional copper wires transmit electrical currents, while fiber optic technology sends pulses of light generated by a light emitting diode or laser along optical fibers. In both cases you're detecting changes in energy, and that's how you encode data. With copper wires you're looking at changes in the electromagnetic field, the intensity of that field and perhaps the phase of the wave being sent down a wire. With fiber optics, a transmitter converts electronic information into pulses of light — a pulse equates to a one, while no pulse is zero. When the signal reaches the other end, an optical receiver converts the light signal back into electronic information, the throughput of the data is determined by the frequency......

Words: 396 - Pages: 2

Week 4 Assignment 1

...Week 4 Assignment #1 Me’Shaw A. Taylor Dr. Anne Keyes REL 212 4/29/12 Discuss the criteria you will employ to determine if people on earth are religious — in other words, what does religion look like? Religion is a collection of cultural systems, belief systems, and worldviews that relate humanity to spirituality and sometimes, to moral values (Talal, 1982). Religions most notably are represented by symbols, stories, traditions or anything that tends to explain the meaning of life or the creation of earth and its beings. Each religion has its take on morality, ethics, religious laws, and lifestyle. Many religions have determined behaviors which include meetings or worship services. During these services they are worshipping their deity or praying to him or her. In observing religion, you may also see other services that members may be involved in which include sacrifices, revivals, feasts or dinners, initiations, funerals, marriage ceremonies, meditations, music, dances, and art. Describe three (3) examples of behaviors or beliefs you observe that meet the criteria you established above. 1. Baptism is a Christian rite or ceremony that Christians participate in. It is a form of rebirth and it done by water and the Holy Spirit. 2. Ramadan is another belief for Muslims which is a month of fasting in which they refrain from eating or drinking during the daytime. It is practiced to teach members about patience and submissiveness to their god. 3.......

Words: 410 - Pages: 2

Unit 4 Assignment 1

...Motherboards Marc Burzynski Unit 4 Assignment 1 NT1110 07/20/2013 Video 1.04 Summary This video talked about the differences in the different form factors motherboards as well as the similarities. It explains for those of us who prefer to build our own systems that we should select our motherboard before buying the tower and after we have selected the CPU. It also explains about the different types of connectors found on motherboards. List Of Topics, Terms And Definitions * Motherboard – The most important consideration, the size and shape is determined by form factor * ATX Form Factor – Replaced the AT form factor, ATX is smaller, easier to work on, better organization, has support for a wide variety of I/O devices, usually has is the P1 20 pin or 24 pin power connector, on the older ATX form factor motherboards were connected via the PS/2 connector at the back of the case, the newer ATX form factor motherboards connected keyboard and mouse via a USB, usually has between two and four DIMM slots, has either PCI E Oren AGP slot but not both, usually has 2 40 pin IDE slots, and usually 1 to 2 serial ATA slots. The ATA form factor was the first to introduce the soft power switch on the front of the computer; the soft power switch does not immediately cut power but instead allows the computer to go through the normal shutdown procedure. There is however a power switch on the back of the computer, flipping the switch immediately kills power. Another......

Words: 540 - Pages: 3

Fht 4 Task 1

...Human Development & Learning FHT 4 601.2.1-02 During the last few decades, psychologists have put forth many theories regarding cognitive development, especially as it relates to education. Two that I feel align most with my own ideas of how children best learn are the theories of Jean Piaget and Lev S. Vygotsky. They both developed theories that have been accepted throughout the educational arena, and in fact are still taught in education classes to today. They strived to learn and understand the best way, the best age, and the best environment for children to develop their cognitive ability. Before we discuss their theories we first need to define cognitive development. The literal meaning of cognition is “knowing,” defined as the “mental act or process by which knowledge is acquired” (Mcleod, 2007), and development is defined as “orderly and lasting growth, adaptation, and change over the course of a lifetime” (Slavin, 2009, p30). To simplify cognitive development means the acquisition of knowledge that grows, and lasts throughout a life span. Before cognitive development can take place, there must be cognitive learning. Cognitive learning is the process of acquiring knowledge for processing. The acquired knowledge is processed by our brain into higher thinking skills in a, “a series of gradual, orderly changes by which mental processes become more complex and sophisticated.” That is cognitive development, (Slavin, 2009, p31). The first......

Words: 2367 - Pages: 10

Econ 1 Assignment 4

...1-) (Categories of Price Elasticity of Demand) For each of the following absolute values of price elasticity of demand, indicate whether demand is elastic, inelastic, perfectly elastic, perfectly inelastic, or unit elastic. In addition, determine what would happen to total revenue if a firm raised its price in each elasticity range identified.
 a) ED = 2.5:elastic b) ED = 0.8:inelastic 2-) (Price Elasticity of Supply) Calculate the price elasticity of supply for each of the following combinations of price and quantity supplied. In each case, determine whether supply is elastic, inelastic, perfectly elastic, perfectly inelastic, or unit elastic in each case. Please give details to your numeric answers.
 a)    Price falls from $2.25 to $1.75; quantity supplied falls from 600 units to 400 units. 200/600= 1/3=33.3/22.2=.667 b)    Price falls from $2.25 to $1.75; quantity supplied falls from 600 units to 500 units.
100/600=.1667 / 2.25/1.75=.757 3-) Consider the following pairs of goods. Which would you expect to have the more elastic demand? Why?
 a) water or diamonds=water b) insulin or nasal decongestant spray=insulin
 c)  food in general or breakfast cereal=food d) gasoline over the course of a week or gasoline over the course of a year

= week 4-) Outsourcing Inpatient Care to India   The Wall Street Journal, Monday April 26, 2004. Global health care has arrived. During 2003, Canadian resident Terry Salo flew to India to have his hip replaced. He paid only...

Words: 981 - Pages: 4

Unit 4 Assignment 1

...IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?. MBSA command line interface 2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? Security Configuration and Analysis (SCA) 3. Your organization wants to encourage its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? Secunia Security Analyzers 4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer’s settings to its corresponding template to see if......

Words: 271 - Pages: 2

Unit 4 Assignment 1

...even buy a case because sometimes the motherboard will not fit into the case. There are three form factors today. Atx which replaced older AT Motherboards. They are also easier to work on. ATX also has a soft power switch on the front of the computer and a power switch on the back. The second form is the BTX form. This has better air flow for cooling by having an intake vent on the front of the computer and an exhaust vent on the back. The last is an NLX form used on low end computers and is also known as daughter boards. On the bottom of the motherboard there are numerous copper traces know as Buses. A motherboard will have expansion slots. It will have either several PCi slots and one AGP slot or several PCI slots and one PCIe slot. 3 &4. ATX-easy to work on, replace old At form BTX- better cooling for cpu NLX- daughter boards Riser cards- plug into motherboard, and support additional expansion slots Soft power- button on front of computer that does not immediately cut off computer. Allows normal OS shutdown process Wake on LAN- Configured in CMOS any keyboard or network activity will repower your system if it is in standby Motherboard Connectors- P1 Power, 40 pin IDE, 34 pin floppy drive, SATA, 50 or 68 pin SCSI 5. Before choosing anything with your computer you should choose both a cpu and a motherboard. There are three forms to choose from. PCIe or PCI express slots are expected to replace old AG connectors because they are the fastest to date. This information is a......

Words: 313 - Pages: 2

Unit 4 Assignment 1

...Roy Emerson Unit 4 Assignment 1 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman investments' network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc. 2.0 Scope This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending an email and viewing intranet web resources. Remote access implementations that are covered by this policy include but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments. 2. General access to the Internet for recreational use by immediate household members......

Words: 726 - Pages: 3

Week 4 Assignment 1

...organization. Starting a new organization is no easy task, especially when you have to develop teams and processes from the ground up. A critical part of the security strategy for ACME is the creation of a Information Security Office (ISO). The ISO will have the primary responsibility to protect the company’s critical business, intellectual and computing resources. In addition to the creation of the ISO, ACME must also create the Chief Information Systems Security Officer (CISSO) position. The CISSO will be responsible for the development and implementation of an IT Security Program for the company. In addition to developing an IT Security Program, the CISSO will also play a lead role on ensuring the delivery and objectives of the Security Strategy Plan. All coordinated security efforts will need to be introduced and approved by all impacted stakeholders in the company. References: 1. John Haller, Samuel A. Merrell, Matthew J. Butkovic, Bradford J. Willke April 2011 Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability, Version 2.0 http://www.sei.cmu.edu/reports/11tr015.pdf 2. Cyber Security Planning Guide http://www.dhs.gov/sites/default/files/publications/FCC%20Cybersecurity%20Planning%20Guide_1.pdf 3. Bernier, M., Chapman, I., Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation. 4. Maughan, D. (2010, February).......

Words: 511 - Pages: 3

Econ 1 Assignment 4

...Econ 1 Assignment 4 1-) (Categories of Price Elasticity of Demand) For each of the following absolute values of price elasticity of demand, indicate whether demand is elastic, inelastic, perfectly elastic, perfectly inelastic, or unit elastic. In addition, determine what would happen to total revenue if a firm raised its price in each elasticity range identified.
 a) ED = 2.5:elastic b) ED = 0.8:inelastic 2-) (Price Elasticity of Supply) Calculate the price elasticity of supply for each of the following combinations of price and quantity supplied. In each case, determine whether supply is elastic, inelastic, perfectly elastic, perfectly inelastic, or unit elastic in each case. Please give details to your numeric answers.
 a) Price falls from $2.25 to $1.75; quantity supplied falls from 600 units to 400 units. 200/600= 1/3=33.3/22.2=.667 b) Price falls from $2.25 to $1.75; quantity supplied falls from 600 units to 500 units.
100/600=.1667 / 2.25/1.75=.757 3-) Consider the following pairs of goods. Which would you expect to have the more elastic demand? Why?
 a) water or diamonds=water b) insulin or nasal decongestant spray=insulin
 c) food in general or breakfast cereal=food d) gasoline over the course of a week or gasoline over the course of a year

= week 4-) Outsourcing Inpatient Care to India The Wall Street Journal, Monday April 26, 2004. Global health care has arrived. During 2003, Canadian resident Terry Salo flew to India to have......

Words: 347 - Pages: 2

Unit 4 Task 1

...[pic] BTEC Level 3 Subsidiary/Diploma in HEALTH & SOCIAL CARE UNIT 4 DEVELOPMENT THROUGH THE LIFE STAGES Name : …………………….. Target Grade ………………. Current Grade ……………… January – April 2014 |Pass |Merit |Distinction |Attempted |Complete | |P1 – Produce a series of posters that|M1 : Write a report that discusses |D1 : As a conclusion to your report, |P1 | | |describe physical, intellectual, |the nature – nurture debate in |evaluate how nature and nurture may | | | |emotional and social development for |relation to the development of the |affect the physical, intellectual, |M1 | | |each of the life stages of an |individual |emotional and social development of 2| | | |individual | |stages of the development on an |D1 | | | | |individual | | | |P2 – Using examples from someone’s | | |P2 | | |life, explain the......

Words: 2321 - Pages: 10

Unit 1 Task 4

...Unit 1 & 38 – Task 4 To: Neeta Mistry From: Zarafsha Hussain Re: The Global Environment Date: 11/01/16 Political Factors: Enhancing skills of the working population This political factor is used to increase the skills of the working population and also for young adults whom are preparing and adapting for the world of work. The government create the education plan. This includes vocational qualifications, a levels, apprenticeships, NVQ’s and training courses. ASDA and the NHS The government’s choices on education and training has a very big impact on the ways that ASDA and the NHS operate and the level of skills in their businesses. This is to ensure that employees are being trained for new employment in areas that will help the economy. This political factor dictates the type of qualifications that are studied and which qualifications money is invested in. It also supports different types of training such as literacy and numeracy skills that can help train employees that are already working within ASDA and NHS. An important training course that the government regularly provide for free is first aid and health and safety. This impacts ASDA and NHS as this is a key skill for many employees to be educated on when working in modern careers and roles. This will impact on both government and employees within ASDA’s and NHS’s stakeholders. The government will need to fund for any new and updated training within the employees of these two organisations. This means a......

Words: 2252 - Pages: 10

Unit 4 Assignment 1

...1 Running head: UNIT 4 ASSIGNMENT 1 Fundamentals of Finance BUS 3062 Rodtrice Johnson 3/7/16 Unit 4 Assignment 1 Dennis Hart 1. Q: Proficient-level: "How do Cornett, Adair, and Nofsinger define risk in the M: Finance textbook and how is it measured?" (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Describe the risk relationship between stocks, bonds, and T-bills, using the standard deviation of returns as the measure of risk. Answer Proficient-level: Risk is defined as the volatility of an asset’s returns over time. Specifically, the standard deviation of returns is used to measure risk. This computation measures the deviation from the average return. The idea is to use standard deviation, a measure of volatility of past returns to proxy for how variable returns are expected to be in the future. Answer Distinguished-level: Stocks and bonds have very different risk-return characteristics. In general, while stocks are more volatile than bonds, over the long run, stocks are expected to yield higher returns than bonds. By varying the mix of stocks and bonds in a portfolio, an investor can achieve her desired level of risk exposure. However, the level of risk in a portfolio depends not only on the risks of individual assets, but also on the movements of the individual assets in the portfolio. 2. Q: Proficient-level: "What is the source of firm-specific risk? What is the source of market risk?" (Cornett, Adair, & Nofsinger, 2016,......

Words: 1067 - Pages: 5

Escape from Alcatraz | Dimension 404 | Adventure Time – Abenteuerzeit mit Finn und Jake