132 - Iswa
132 - Iswa
INDEX
Sr. Grade
Date Title Sign
No.
14-Aug Study of Host based security and Perimeter
1
Security.
2 21-Aug Study of web data Analytics.
3 28-Aug Monitoring User Engagement:Analyzing
Interactions with Home Page and Site
Content
04-Sep Page Load Time Measurement: Analyzing
4
Home Page and Other Page Performance
11-Sep Build and Host Your Website Using a
5
Free Hosting Service
18-Sep Utilize Google Analytics to assess your
6 website's performance and provide a
comprehensive list of analytics properties
7 25-Sep Understanding the Practice of A/B Testing
1 04-Sep Assignment – 1
2 25-Sep Assignment – 2
3 16-Oct Assignment – 3
ISWA (3171616) LY IT 2-C Batch 200410116132
Host-based security and perimeter security are two fundamental concepts in the field of
cybersecurity. They refer to different layers of security measures used to protect an
organization's digital assets, but they serve distinct purposes and focus on different areas of
the IT infrastructure.
1. Perimeter Security:
Perimeter security, also known as network security, involves safeguarding an organization's
network from external threats. It's like the outer defense layer of the organization's IT
infrastructure. The primary goal of perimeter security is to prevent unauthorized access to the
network and protect against external threats. Key components and strategies of perimeter
security include:
• Firew ,s: Firew ,s are network devices or software that control incoming and outgoing
network traffic based on an organization's security policies. They act as barriers
between the internal network and the external world, ,owing or denying traffic based
on predefined rules.
• Intrusion Detection and Prevention Systems (IDPS): These systems monitor network
traffic for suspicious or malicious activity and can respond by blocking or alerting on
detected threats.
• Virtual Private Networks (VPNs): VPNs provide secure, encrypted communication over
untrusted networks like the internet, ensuring the confidentiality and integrity of data
in transit.
• Access Control Lists (ACLs): ACLs are used to control access to network resources by
specifying who is ,owed to connect to specific systems or services.
• Security Information and Event Management (SIEM): SIEM solutions collect and analyze
data from various security and network devices to identify and respond to security
incidents.
• Email and Web Security: Protection against email and web-based threats, like phishing
and malware, is also a part of perimeter security.
2. Host-Based Security:
Host-based security focuses on securing individual devices or systems (hosts) within the
organization. These measures are designed to protect against threats that have breached the
perimeter and provide a more granular level of control. Host-based security typic ,y includes:
• Antivirus and Antimalware Software: These programs run on individual devices and
servers to detect and remove malicious software.
1
ISWA (3171616) LY IT 2 C-Batch 200410116132
• Host-Based Firew ,s: Like network firew ,s, host-based firew ,s provide protection at the
device level, controlling what processes and applications can communicate over the
network.
• Data Encryption: Protecting data at rest and in transit through encryption, which is
often used to safeguard sensitive information on host systems.
2. Key Metrics:
2
ISWA (3171616) LY IT 2-C Batch 200410116132
Traffic Metrics: These include metrics like page views, sessions, visitors, and unique visitors,
which help in understanding the volume of website traffic.
User Engagement Metrics: Metrics like bounce rate, time on page, and click-through rate
provide insights into how users interact with the website.
Conversion Metrics: Metrics related to conversion goals, such as conversion rate, revenue, and
transactions, measure the success of a website in achieving its objectives.
Acquisition Metrics: These metrics reveal how users find the website, whether through search
engines, social media, referrals, or other channels.
4. Interpreting Data:
Analyzing the data involves identifying trends, patterns, and anomalies. For instance, a sudden
increase in traffic from a specific source might indicate a successful marketing campaign.
6. Segmentation:
Segmenting data ,ows you to focus on specific user groups, enabling a deeper understanding
of user behavior and preferences. Segments can be based on factors like demographics,
geography, or device type.
7. A/B Testing:
A/B testing involves comparing two or more versions of a webpage to determine which one
performs better in terms of achieving a specific goal. Web analytics can provide insights into
which version is more effective.
9. Content Strategy:
3
ISWA (3171616) LY IT 2 C-Batch 200410116132
Analyzing which content performs well and resonates with users helps in creating and
promoting content that aligns with user interests.
Studying web analytics is an ongoing process that involves continuous monitoring, analysis,
and adaptation. It empowers organizations to make data-driven decisions, enhance their online
presence, and ultimately achieve their online objectives.
1. Google Analytics
2. Hotjar
3. Segment
4
ISWA (3171616) LY IT 2-C Batch 200410116132
4. Google Optimize
5. Similar web
• Engagement metrics to track to build a better website:
Website engagement tracking is the process of tracking and measuring specific metrics that
indicate how successful your site is at engaging and retaining visitors, and show you how users
engage with your site.
Understanding how your visitors are engaging—and identifying blockers to website
engagement—helps you improve your user experience (UX) and better meet customer needs.
Let's dive into the different types of engagement metrics you can use for website monitoring to
track and analyse user engagement and understand your customers’ experiences on your site:
(The given Screenshot and data provided is for Instagram.)
5
ISWA (3171616) LY IT 2 C-Batch 200410116132
• Total Visits: Sum of , visits on desktop and mobile from the last month.
• Bounce Rate: Average percentage of visitors who view only one page before leaving the
website.
• Page per Visit: Average pages per visit.
• Average Visit Duration: Average duration of time spent on the site.
• Instagram.com Ranking:
Website ranking helps evaluate the value of a business. Over the last three months,
instagram.com's global ranking has not changed. (graph form)
6
ISWA (3171616) LY IT 2-C Batch 200410116132
7
ISWA (3171616) LY IT 2 C-Batch 200410116132
• Total last visit of 3 Months The trend of visits for the past 3 months on desktop and
mobile. (graph form)
• Geography & Country Targeting: Which countries sent the most traffic to google.com
lately? Where is their core audience from? Last month United States was the top
country sending desktop traffic to google.com - click below to discover , countries.
• Top Countries: The top countries sending traffic to the analysed website on desktop.
• Instagram.com Audience Demographics: Audience composition can reveal a site's
current market share across various audiences. instagram.com's audience is 52.63%
male and 47.37% female. The largest age group of visitors are 25 - 34 year olds.
8
ISWA (3171616) LY IT 2-C Batch 200410116132
• Top instagram.com Audience Interests: Audience interests reveal key details on the
browsing interests of instagram.com's visitors. instagram.com's audience is interested
in Games > Video Games Consoles and Accessories & news.
• Similar Sites & instagram.com Competitors: Reveal instagram.com top alternatives and
find potential or emerging competitors. twitter.com is the website with the highest
similarity score to instagram.com
with 16.93% of traffic. The most underutilized channel is Paid Search. Drill down into
the main traffic drivers in each channel below.
• Instagram.com Top Keywords by Traffic Share: See the list of top keywords driving
organic traffic to instagram.com (Desktop, worldwide)
• Instagram.com Referral Traffic: The top referral sites sending desktop traffic to
instagram.com
10
ISWA (3171616) LY IT 2-C Batch 200410116132
• Social Media Traffic to instagram.com: instagram.com gets most of its social media
traffic from Youtube, followed by Facebook and Twitter (Desktop). Engaging audiences
through Pinterest may reveal new opportunities.
Practical 4 Aim: Page Load Time Measurement: Analysing Home Page and
Other Page Performance
Defining Metrics:
11
ISWA (3171616) LY IT 2 C-Batch 200410116132
Historic ,y, web performance has been measured with the load event. However, even though
load is a well-defined moment in a page's lifecycle, that moment doesn't necessarily
correspond with anything the user cares about.
For example, a server could respond with a minimal page that "loads" immediately but then
defers fetching content and displaying anything on the page until several seconds after the load
event fires. While such a page might technic ,y have a fast load time, that time would not
correspond to how a user actu ,y experiences the page loading.
➢ GTmetrix Grade: Your GTmetrix Grade is an assessment of your over , page performance. It
reflects, both, how fast your page loaded for users, and how well it's built for performance.
➢ Structure: Your Structure Score is our proprietary assessment of Lighthouse and Custom
GTmetrix audits. It represents how well your page is built for optimal performance.
➢ Largest Contentful Paint: LCP measures how long it takes for the largest content element
(e.g. a hero image or heading text) on your page to become visible within your visitors'
viewport. For a good user experience, aim for an LCP of 1.2 seconds or less.
➢ Total Blocking Time: TBT tells you how much time is blocked by scripts during your page
loading process. For a good user experience, aim for a TBT of 150 milliseconds or less.
➢ Cumulative Layout Shift: CLS indicates how much layout shift is experienced by visitors as
your page loads. For a good user experience, aim for a CLS score of 0.1 or less.
12
ISWA (3171616) LY IT 2-C Batch 200410116132
Performance Metrix:
The following metrics are generated using Lighthouse Performance data.
➢ First Contentful Paint: How quickly content like text or images are painted onto your page.
A good user experience is 0.9s or less.
➢ Speed Index: How quickly the contents of your page are visibly populated. A good user
experience is 1.3s or less.
➢ Largest Contentful Paint: How long it takes for the largest element of content (e.g. a hero
image) to be painted on your page. A good user experience is 1.2s or less.
➢ Time to Instructive: How long it takes for your page to become fully interactive. A good
user experience is 2.5s or less.
➢ Total Blocking Time: How much time is blocked by scripts during your page loading
process. A good user experience is 150ms or less.
➢ Cumulative Layout Shift: How much your page's layout shifts as it loads. A good user
experience is a score of 0.1 or less.
Browser Timings:
13
ISWA (3171616) LY IT 2 C-Batch 200410116132
➢ Redirect Duration: How much your page's layout shifts as it loads. A good user experience
is a score of 0.1 or less.
➢ Time to First Byte(TTFB): How much your page's layout shifts as it loads. A good user
experience is a score of 0.1 or less.
➢ DOM Content Loaded Time: This is the time at which the DOM is ready and there are no
stylesheets blocking JavaScript execution.
➢ Connection Duration: This is the time spent connecting to the server, after , redirects, to
make the request to the page.
➢ First Paint: This timing is the first point at which the browser does any sort of rendering on
the page.
➢ Onload Time: This timing occurs when the processing of the page is complete and , the
page resources have finished downloading
➢ Backend Duration: This is the time it takes the server to generate the intial response.
➢ DOM Interactive Time: Ths timing is when the browser has finished loading and parsing
HTML, and the DOM has been built.
Fully Load Time: This is the maximum time after FCP and Onload have triggered, and there has
been network and CPU idle (5.25 s each) after the last request has been captured.
Practical 5 Aim: Build and Host Your Website Using a Free Hosting Service
Building and hosting a website using a free hosting service is a cost-effective way to establish
an online presence. Here are the steps to get you started:
Define Your Website's Purpose, Goals and built it :
Determine the purpose of your website and the goals you want to achieve. Is it for personal
blogging, showcasing a portfolio, or running a sm , business?
14
ISWA (3171616) LY IT 2-C Batch 200410116132
Select a Template:
Choose a website template that suits your website's style and content. Many free hosting
services offer a variety of templates you can customize.
The website template chosen is about a Klink clinic whose home/index page as shown below.
15
ISWA (3171616) LY IT 2 C-Batch 200410116132
(The template chosen contains about, features, testimonial, service and team web pages.
Along with css, img, js, lib, scss folders for styling)
Now we are required to host this website using a free web host tool. Tool use is 000WebHost.
(Reference: https://in.000webhost.com/)
The above image shows how the website template folders are added to 000WebHost.
16
ISWA (3171616) LY IT 2-C Batch 200410116132
The below image shows the addition of Google code under head section for hosting.
17
ISWA (3171616) LY IT 2 C-Batch 200410116132
Using Google Analytics to assess your website's performance is an effective way to gain insights
into visitor behavior, traffic sources, and other important metrics. To get started, follow these
steps:
18
ISWA (3171616) LY IT 2-C Batch 200410116132
19
ISWA (3171616) LY IT 2 C-Batch 200410116132
20
ISWA (3171616) LY IT 2-C Batch 200410116132
Once your tracking code is set up, Google Analytics will begin collecting data. You can
access this data through the Google Analytics dashboard. Here's a list of key analytics
properties you can explore within your Google Analytics account:
21
ISWA (3171616) LY IT 2 C-Batch 200410116132
a. Realtime: Shows you live data, such as the number of current visitors, their locations,
and the pages they are viewing.
c. Acquisition: Helps you understand where your traffic is coming from, such as search
engines, social media, or referral websites.
d. Behavior: Shows how visitors navigate your site, which pages they visit, and how long
they stay on each page.
e. Conversions: If you have set up conversion goals, this section provides data on goal
completions, e-commerce transactions, and other valuable actions on your site.
f. Events: If you track events like downloads, video plays, or interactions, you can see this
data in the Events section.
22
ISWA (3171616) LY IT 2-C Batch 200410116132
Practical 7 Aim:
Understanding the Practice of A/B Testing
What is A/B testing?
A/B testing, also known as split testing, is a marketing experiment wherein you split your
audience to test several variations of a campaign and determine which performs better. In
other words, you can show version A of a piece of marketing content to one half of your
audience, and version B to another.
A/B testing is one of the components of the overarching process of Conversion Rate
Optimization (CRO), using which you can gather both qualitative and quantitative user insights.
You can further use this collected data to understand user behavior, engagement rate, pain
points, and even satisfaction with website features, including new features, revamped page
sections, etc. If you’re not A/B testing your website, you’re surely losing out on a lot of
potential business revenue.
23
ISWA (3171616) LY IT 2 C-Batch 200410116132
25
ISWA (3171616) LY IT 2 C-Batch 200410116132
A structured A/B testing program can make marketing efforts more profitable by pinpointing
the most crucial problem areas that need optimization. A/B testing is now moving away from
being a standalone activity that is conducted once in a blue moon to a more structured and
continuous activity, which should always be done through a well-defined CRO process. Broadly,
it includes the following steps:
Step 1: Research
Before building an A/B testing plan, one needs to conduct thorough research on how the
website is currently performing. You will have to collect data on everything related to how
many users are coming onto the site, which pages drive the most traffic, the various conversion
goals of different pages, etc. The A/B testing tools used here can include quantitative website
analytics tools such as Google Analytics, Omniture, Mixpanel, etc., which can help you figure
out your most visited pages, pages with the most time spent, or pages with the highest bounce
rate. For example, you may want to start by shortlisting pages that have the highest revenue
potential or the highest daily traffic. Following this, you may want to dive deeper into the
qualitative aspects of this traffic.
Heatmap tools are the leading technology used to determine where users are spending the
most time on, their scrolling behavior, etc. This can help you identify problem areas on your
website. Another popular tool used to do more insightful research is website user surveys.
Surveys can act as a direct conduit between your website team and the end-user and often
highlight issues that may be missed in aggregate data.
Further, qualitative insights can be derived from session recording tools that collect data on
visitor behavior, which helps in identifying gaps in the user journey. In fact, session recording
tools combined with form analysis surveys can uncover insights into why users may not be
filling out your form. It may be due to some fields that ask for personal information or users,
maybe abandon your forms for too long.
As we can see, both quantitative and qualitative research can help us prepare for the next step
in the process, making actionable observations for the next steps.
The next step in your testing program should be to create a variation based on your hypothesis,
and A/B test it against the existing version (control). A variation is another version of your
current version with changes that you want to test. You can test multiple variations against the
control to see which one works best. Create a variation based on your hypothesis of what
might work from a UX perspective. For example, are enough people not filling out forms? Does
your form have too many fields? Does it ask for personal information? Maybe you can try a
variation with a shorter form or another variation by omitting fields that ask for personal
information.
For example, one such condition is the timing of the test campaign. The timing and duration of
the test have to be on point. Calculate the test duration keeping in mind your average daily and
monthly visitors, estimated existing conversion rate, minimum improvement in conversion rate
you expect, number of variations (including control), percentage of visitors included in the test,
and so on
Use our Bayesian Calculator to calculate the duration for which you should run your A/B tests
for achieving statistic ,y significant results.
27
ISWA (3171616) LY IT 2 C-Batch 200410116132
28
ISWA (3171616) LY IT 2-C Batch 200410116132
Session cookies
A session cookie helps a website track a user's session. Session cookies are deleted after a
user's session ends — once they log out of their account on a website or exit the website.
Session cookies have no expiration date, which signifies to the browser that they should be
deleted once the session is over.
Persistent cookies
Unlike session cookies, persistent cookies remain in a user's browser for a predetermined
length of time, which could be a day, a week, several months, or even years. Persistent cookies
always contain an expiration date.
Authentication cookies
Authentication cookies help manage user sessions; they are generated when a user logs into an
account via their browser. They ensure that sensitive information is delivered to the correct
user sessions by associating user account information with a cookie identifier string.
Tracking cookies
Tracking cookies are generated by tracking services. They record user activity, and browsers
send this record to the associated tracking service the next time they load a website that uses
that tracking service.
Zombie cookies
Like the "zombies" of popular fiction, zombie cookies regenerate after they are deleted.
Zombie cookies create backup versions of themselves outside of a browser's typical cookie
storage location. They use these backups to reappear within a browser after they are deleted.
29
ISWA (3171616) LY IT 2 C-Batch 200410116132
Zombie cookies are sometimes used by unscrupulous ad networks, and even by cyber
attackers.
First-party cookies are directly created by the website you are using. These are gener ,y safer,
as long as you are browsing reputable websites or ones that have not been compromised.
Third-party cookies are more troubling. They are generated by websites that are different from
the web pages users are currently surfing, usu ,y because they're linked to ads on that page.
Output:
30
ISWA (3171616) LY IT 2 C-Batch 200410116132
Practical 9
Aim: Write content so that users come back to the site.
The content of your website should provide the Following
Providing visitors with a unique, personalized experience makes it easier to turn them into brand
advocates. Here’s how you can customize their experience:
31
ISWA (3171616) LY IT 2 C-Batch 200410116132
An easy way to turn visitors into brand advocates is to give them a reason to come back to
your site . . . and to keep coming back. Offering new content on a regular basis and
highlighting your greatest hits will foster repeat engagement.
Your website design and usability are two of the most important factors that influence how
much time visitors spend on your site, and whether they’ll return. A clean, attractive design
and easy navigation will go a long way in turning first-time visitors into brand advocates.
navigate site with , the important information you’ll need to decide whether or not to join
right on the front page.
Email is a great tool for engaging one-on-one with your audience, keeping them engaged
with your content, or re-engaging them after they’ve abandoned your site. Personalize your
emails with content that targets exactly what the consumer needs. When you provide users
with specific content beyond what they can find on the website, they’ll feel “in the know”
and will be more likely to become brand advocates.
Once your brand advocates start spreading the word about your products or services, it’s time
to say thank you. There are a number of ways you can reward your loyal users, including:
33
ISWA (3171616) LY IT 2 C-Batch 200410116132
34
ISWA (3171616) LY IT 2 C-Batch 200410116132
Practical – 10
Aim:Build your keyword list; write content around those keywords and track
performance and rankings.
What is a keyword list?
Your SEO keyword list is just a list of the key terms that you’re focusing on for any given
project. There isn’t a specific format that keyword lists need to follow. You can easily create
one with a spreadsheet.
It’s important to keep a permanent list for several reasons. Creating a keyword research list gives
you:
• A lasting record of what you’ve targeted
• A starting point for further development
• A resource that you can pass off to other team members
It should include , of the terms that you’re using, including a variety that is fit for different
customers or different stages of the buying process. In most cases, that’s going to mean a
healthy selection of:
35
ISWA (3171616) LY IT 2 C-Batch 200410116132
• question keywords
• buyer intent keywords
• long-tail keywords
SEO keywords vs. PPC keywords
It’s important to understand the difference between SEO keywords and PPC keywords.
SEO keyword lists are broad and fit to be used for long-term strategies. They may change a lot
over time because there is a lot of room for testing and error.
PPC keyword lists, on the other hand, focus on a tight set of keywords that target buyers at
the end of the buying process. They are designed to be cost-effective for the budget of the
project. That may mean that high- competition keywords won’t even make the cut.
Basic tips for building a keyword list
Selecting the right keyword list for your campaign can help you show your ads to the right
customers. Your keywords should match the terms your potential customers would use to
find your products or services
Think like a customer when you create your list
Write down the main categories of your business, and then write down the terms or phrases
that might f , under each of those categories. Include terms or phrases your customers
would use to describe your products or services.
Example
If you sell men’s athletic footwear, you might start off with some basic Categories that
customers would use, like mens sports shoes. You can also Add mens sneakers, and mens
tennis shoes, if you find out these are commonly used terms for your products. Expand your
list further by including your brand and product names.
Select specific keywords to target specific customers
Select more specific keywords that directly relate to your ad ‘;s theme if you want to target
customers who may be interested in a particular product. Using more specific keywords
would mean that your ad only appears for terms that apply to your business. But keep in
mind that if the keywords are too specific, you might not be able to reach as many people as
you like.
Example
If you sell men athletic footwear, you might choose specific keywords like basketb , shoes a
type of shoe you offer. That way, for example, your ad would be eligible to appear when
someone searches for these types of shoes or visits a website about basketb ,. Select general
keywords to reach more people Select more general keywords if you prefer to reach as many
people as possible. Keep in mind that you might find it difficult to reach potential customers
when adding very general keywords because your ad could appear for searches that aren’t
36
ISWA (3171616) LY IT 2 C-Batch 200410116132
always related to your business. Also, more general keywords can be more competitive and
may require higher bid amounts. Layer broad targeting with Smart Bidding, so machine
learning technology can prioritize the best performing searches regardless of their match
type.
Test general keywords, and then decide which ones give you better results. No matter how
general your keywords are, they should always be relevant to your ads and website.
Example
If you’re a large shoe store, you might choose a general keyword like shoes. That way, for
example, your ad would be eligible to appear when someone searches for a wide variety of
shoes or visits websites about fashion.
Group similar keywords into ad groups
To show more relevant ads to potential customers, group your keywords and ads into ad
groups based on your products, services, or other categories. If multiple keywords match a
given search term, Google chooses the keyword to serve based on the ranking outlined
about similar keywords in the same ad group. Having the same keyword in different match
types shouldn’t increase your costs or hurt performance in any way.
If instead, you add , your keywords and ads to one ad group, a customer searching for , women’s
evening shoes , may see your ad about, men’s tennis shoes.
Example
If you own a shoe store, you might create 2 ad groups: 1 for running shoes and 1 for evening
shoes. Your ad group for running shoes could include ads with keywords like,running shoes.
37
ISWA (3171616) LY IT 2 C-Batch 200410116132
consumers and grab their attention. Without blogging, your website would remain invisible,
whereas running a blog makes you searchable and competitive.
So, the main purpose of a blog is to connect you to the relevant audience. Another one is to
boost your traffic and send quality leads to your website.
Definition of blogging
Blogging is a collection of skills that one needs to run and supervise a blog. This entails
equipping a web page with tools to make the process of writing, posting, linking, and sharing
content easier on the internet.
Understanding where your website‘s traffic comes from is crucial for effective marketing and
Optimization. Tracking referral traffic, ows you to identify which blogs or websites are
sending visitors to your site, helping you make informed decisions to improve your online
presence.
Step 1: Set Up Google Analytics
Sign up for Google Analytics:
Go to Google Analytics and sign up for an account if you don ‘;t already have one.
Add Your Website:
After creating an account, add your website by following the prompts.
Tracking Code:
Google Analytics will provide you with a tracking code. Copy and paste this code into your
website ‘;s HTML before the tag on every page you want to track.
Verify Tracking:
Wait for Google Analytics to collect data, and verify that it ‘;s tracking correctly. This May take
some time.
Step 2: Analyzing Referral Traffic
Access Google Analytics:
Log in to your Google Analytics account and select the website you want to analyze.
Navigate to Acquisition:
In the left sidebar, click on ,Acquisition, , then , , Traffic, , and fin ,y, ,Referrals. , View
Referral Traffic:
Here, you ‘;ll see a list of websites and blogs that have referred visitors to your site. Step
3: Analyzing Referral Sources
38
ISWA (3171616) LY IT 2 C-Batch 200410116132
Review Data:
Analyze the data to identify which blogs or websites are sending traffic to your site. You can see
the number of sessions, average session duration, and other relevant metrics.
Sort and Filter:
Sort the list by various metrics like sessions, bounce rate, or conversion rate to identify the most
effective referral sources.
Identify Top Referrers:
Pay attention to the top referrers, which are the blogs or websites sending you the most traffic.
Step 4: Taking Action
Engage with Top Referrers:
If certain blogs or websites are sending a significant amount of traffic, consider building
relationships with them, such as through guest posting or collaboration.
Optimize Content:
Analyze which content on your website is performing well through referrals. Optimize it to
ensure it continues to attract visitors.
Monitor Continuously:
Regularly review your referral traffic data in Google Analytics to track changes and adjust
your strategy accordingly. Tracking referral traffic is a valuable practice for understanding
your websites performance and identifying the blogs and websites that are driving traffic to
your site. Use this information to optimize your content, build relationships with top
referrers, and continue ,y improve your online presence.
39
ISWA (3171616) LY IT 2 C-Batch 200410116132
Assignment 1
1. Explain OSI Model with all layers in detail.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes and
organizes the functions of a telecommunication or networking system into seven distinct layers.
These layers facilitate communication between different devices and systems by breaking down the
complex task of networking into more manageable components. Each layer has a specific set of
functions and interacts with adjacent layers to ensure data transmission and reception. Let's explore
each layer in detail
1. Physical Layer
• Function The physical layer deals with the physical transmission of data over a physical
medium, such as cables, wireless signals, or optical fibers. It defines how bits are transmitted
as electrical or optical signals.
• Key Concepts Signal encoding, transmission medium, connectors, and physical topologies.
2. Data Link Layer
• Function This layer is responsible for the reliable and error-free transmission of data frames
between directly connected nodes. It handles issues such as framing, addressing, and error
detection and correction.
• Key Concepts MAC (Media Access Control) addresses, Ethernet, switches, and bridges.
3. Network Layer
• Function The network layer is concerned with routing packets of data between devices
across different networks. It determines the best path for data to reach its destination, taking
into account network topologies and addressing.
• Key Concepts IP (Internet Protocol), routing, subnets, and routers.
4. Transport Layer
• Function The transport layer ensures end-to-end communication and data integrity. It is
responsible for breaking down large messages into smaller segments, managing flow control,
and providing error detection and correction. It establishes, maintains, and terminates
connections.
• Key Concepts TCP (Transmission Control Protocol), UDP (User Datagram Protocol), ports, and
socket programming.
5. Session Layer
• Function The session layer manages and establishes communication sessions between
devices. It handles session setup, maintenance, and termination, as well as synchronization
and checkpointing of data streams.
• Key Concepts API (Application Programming Interface), sessions, dialog control, and session
tokens.
6. Presentation Layer
• Function The presentation layer is responsible for data translation, encryption, compression,
and formatting, ensuring that data sent by the application layer is presented in a readable
and coherent manner to the receiving application.
• Key Concepts Data encryption, data compression, character encoding, and data format
conversion.
7. Application Layer
1
ISWA (3171616) LY IT 2 C-Batch 200410116132
• Function The application layer is the topmost layer and is closest to the end-user. It provides
network services directly to user applications and serves as the interface between the
software and the network. It includes various application-specific protocols and services.
• Key Concepts HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), FTP
(File Transfer Protocol), and DNS (Domain Name System).
Each layer in the OSI model performs a specific function and interacts with the layers above and
below it to enable data communication across networks. By breaking down networking into these
distinct layers, it becomes easier to design, troubleshoot, and develop network protocols and
systems, as each layer has a well-defined set of responsibilities.
2
ISWA (3171616) LY IT 2 C-Batch 200410116132
The TCP/IP model, like the OSI model, is a conceptual framework for networking and
communication. It consists of four layers the Network Interface (Link) Layer, Internet Layer,
Transport Layer, and Application Layer. While the TCP/IP model is widely used in the real world, it
has its own set of security issues and vulnerabilities
1. Network Interface (Link) Layer
• Address Resolution Protocol (ARP) Spoofing Attackers can manipulate ARP to associate
their MAC address with the IP address of a legitimate device, leading to traffic redirection
and eavesdropping.
• MAC Address Spoofing Attackers can forge MAC addresses to intercept or manipulate
traffic, which can lead to unauthorized access or data interception.
2. Internet Layer
• IP Spoofing Attackers can forge the source IP address of packets to impersonate a trusted
device or network, potentially bypassing security measures and causing confusion.
• Routing Attacks Attackers can manipulate routing tables or inject malicious routing
updates, leading to traffic interception, rerouting, or denial of service.
3. Transport Layer
• TCP SYN Flooding Attackers can flood a system with a large number of TCP SYN requests,
overwhelming it and causing a denial of service.
• TCP Session Hijacking Attackers can intercept and take control of an established TCP
session, potentially gaining unauthorized access to sensitive data.
• TCP Sequence Number Prediction If an attacker can predict the TCP sequence numbers,
they may be able to forge packets and inject them into a session.
• UDP-Based Amplification Attacks Attackers can exploit certain UDP-based services to
amplify the volume of traffic sent to a victim, facilitating distributed denial of service
(DDoS) attacks.
4. Application Layer
• Application Vulnerabilities Vulnerabilities in application layer protocols, such as HTTP,
SMTP, and FTP, can be exploited by attackers to gain unauthorized access, inject malicious
code, or steal data.
• SQL Injection Attackers can exploit poorly sanitized user inputs to execute arbitrary SQL
queries on a database server, potentially gaining access to sensitive data.
• Cross-Site Scripting (XSS) Malicious scripts injected into web applications can execute
within the context of a user's browser, leading to data theft or session hijacking.
• Command Injection Attackers can inject malicious commands into input fields or
parameters, potentially gaining control over the server or running unauthorized commands.
To mitigate these security issues, various security mechanisms and best practices are
employed, including firewalls, intrusion detection systems, encryption, strong access
controls, and regular software updates to patch known vulnerabilities. Security awareness,
education, and monitoring are also essential to protect against evolving threats in the
TCP/IP-based networks.
4. Write a short note Strategies for developing security policies and secure network.
3
ISWA (3171616) LY IT 2 C-Batch 200410116132
Developing security policies and creating a secure network is crucial to protect sensitive data and
ensure the confidentiality, integrity, and availability of resources. Here are some key strategies for
developing security policies and establishing a secure network
1. Risk Assessment
Conduct a comprehensive risk assessment to identify and evaluate potential security threats,
vulnerabilities, and their potential impact. This assessment forms the basis for developing
security policies.
2. Policy Development
Create clear and comprehensive security policies that define acceptable use, access controls,
data protection, incident response, and other critical aspects of network security. Involve
relevant stakeholders in the policy development process.
3. Access Control
Implement strong access controls to ensure that only authorized individuals and devices have
access to network resources. This includes user authentication, role-based access control, and
two-factor authentication.
4. Encryption
Use encryption protocols to protect data both in transit and at rest. Secure sensitive data with
technologies like SSL/TLS for web traffic and encryption for stored data.
5. Network Segmentation
Divide the network into segments to limit the scope of potential breaches. This isolates sensitive
data and critical systems from less secure areas.
4
ISWA (3171616) LY IT 2 C-Batch 200410116132
Host-based security, also known as endpoint security, is centered around protecting individual
devices (hosts), such as computers, servers, workstations, and mobile devices. The primary goal of
host-based security is to secure the individual devices themselves and the data they store or access.
Perimeter Security
5
ISWA (3171616) LY IT 2 C-Batch 200410116132
Web analytics tools are essential for collecting, analyzing, and reporting data on website
performance and user behavior. These tools come with a range of features to help businesses gain
insights into their online presence. Here are some common features of web analytics tools
1. Data Collection Web analytics tools collect data from various sources, such as website visits,
page views, events (e.g., clicks, downloads), and user interactions. They may use JavaScript
tags or other tracking mechanisms to capture this data.
2. Real-Time Analytics Many tools offer real-time analytics, allowing users to monitor current
website activity, traffic sources, and user behavior as it happens.
3. Traffic Sources Analysis These tools identify and classify where website traffic originates,
including search engines, referrals, social media, and direct visits. This helps in evaluating the
success of marketing channels.
4. Content Analytics Tools allow businesses to assess the performance of individual web pages
or pieces of content. Metrics may include page views, bounce rates, time spent on pages, and
engagement metrics.
5. Keyword Analysis Web analytics tools help organizations track keywords that drive organic
and paid search traffic. They also provide insights into keyword rankings and click-through
rates from search engine results.
6. A/B Testing and Experimentation Some advanced tools support A/B testing and
experimentation to assess the impact of changes to website elements, such as design,
content, or calls to action.
7. Mobile Analytics These tools offer insights into how users interact with a website on mobile
devices, including mobile-specific metrics and device capabilities.
Web analytics tools vary in terms of features and capabilities, so organizations should choose the
tool that best aligns with their goals, budget, and technical requirements. These features collectively
enable businesses to track, analyze, and optimize their online presence for better results and user
experiences.
The analytics metrics lifecycle is a structured process that organizations follow to effectively use data
metrics for decision-making and continuous improvement. It involves several key stages, from
6
ISWA (3171616) LY IT 2 C-Batch 200410116132
defining objectives to taking action based on the insights gained from data analysis. Here's an
overview of the analytics metrics lifecycle
Define Objectives
• The process begins by identifying specific business objectives and goals that data analysis can
help address. These objectives should be clear, measurable, and aligned with the
organization's strategic priorities.
Data Collection
• Data is collected from various sources, such as websites, mobile apps, databases, sensors,
and external data feeds. It's essential to ensure that the data is accurate, complete, and
relevant to the defined objectives.
• Collected data may contain errors, inconsistencies, or missing values. Data processing and
cleaning involve transforming and structuring data to make it suitable for analysis. This
includes data validation, normalization, and handling outliers.
Data Analysis
• In this stage, data is analyzed to derive meaningful insights. Various statistical and analytical
techniques are applied to understand patterns, trends, and relationships within the data.
• Based on the analysis, key performance indicators (KPIs) and metrics relevant to the defined
objectives are identified. These metrics should be actionable and aligned with the business
goals.
Data Visualization
• Visualizing data through charts, graphs, and dashboards can help make complex information
more understandable and actionable. Visualization is a crucial step in conveying insights to
stakeholders.
Data Interpretation
• Data analysts interpret the results to extract insights and conclusions. They assess whether
the metrics align with the defined objectives and provide recommendations based on their
findings.
• Communicating the findings and insights is crucial. Reports and presentations are created to
share the results with stakeholders, including executives, management, and team members.
Actionable Insights
• The key objective of data analysis is to uncover actionable insights. These insights should
guide decision-making, helping organizations improve processes, make informed choices, and
achieve their goals.
7
ISWA (3171616) LY IT 2 C-Batch 200410116132
Implementation of Changes
The analytics metrics lifecycle is a dynamic and ongoing process, enabling organizations to use data
effectively to make informed decisions, optimize operations, and achieve their strategic objectives. It
ensures that data analysis remains a valuable and evolving practice within the organization.
The "So What Test" is a framework used in data analysis and reporting to determine the significance
and relevance of findings, insights, or data-driven conclusions. It involves three layers or questions
that help assess the importance and impact of the information being presented. The three layers of
the "So What Test" are as follows
1. Descriptive Layer
• The first layer of the "So What Test" focuses on describing the data or findings. In
this stage, you provide a straightforward account of the data, metrics, or facts
without drawing any conclusions or making judgments. This layer answers the
question, "What happened?"
• Example If you're analyzing website traffic data, at the descriptive layer, you would
report that the website had 10,000 visitors in the last month.
2. Diagnostic Layer
• The second layer delves deeper into the data to identify patterns, trends, or
anomalies. This is where you seek to understand why the data is the way it is. You
start to draw connections between different pieces of data and uncover the reasons
behind specific outcomes. This layer answers the question, "Why did it happen?"
• Example Building on the previous example, at the diagnostic layer, you might find
that the increase in website traffic was due to a successful social media advertising
campaign.
3. Prescriptive Layer
• The third and final layer of the "So What Test" goes beyond describing and
diagnosing data to provide actionable recommendations and insights. Here, you
suggest what actions should be taken based on the analysis and findings. This layer
answers the question, "What should we do about it?"
8
ISWA (3171616) LY IT 2 C-Batch 200410116132
• Example In the case of the website traffic analysis, at the prescriptive layer, you
might recommend continuing the successful social media advertising campaign,
expanding it to other platforms, and improving the website's content to keep visitors
engaged.
The "So What Test" helps ensure that data analysis goes beyond simply presenting data and moves
toward making data-driven decisions. By systematically progressing through these layers, analysts
and decision-makers can better understand the implications of the data and develop actionable
strategies based on their findings. This framework promotes the practical application of data insights,
which is essential for driving positive outcomes and improvements within an organization.
Assignment 2
Data capturing tools, also known as data acquisition or data collection tools, are software or
hardware solutions used to collect, record, and store data from various sources. These tools are
essential for gathering data for analysis, reporting, and decision-making. Here are some examples
of data capturing tools and their applications
9
ISWA (3171616) LY IT 2 C-Batch 200410116132
Creating a web analytics report involves several steps to effectively communicate insights and
datadriven conclusions to stakeholders. Here's a general outline of the steps to create a web
analytics report
• Define Objectives
• Identify Key Metrics
• Select the Data Source
• Data Collection and Analysis
• Data Visualization
• Report Structure
• Executive Summary
• Methodology
• Findings
• Interpretation
• Recommendations
• Conclusion
Creating a web analytics report is not only about presenting data but also about providing actionable
insights and value to the organization. Effective communication and clear visualization of data are
crucial in making the report impactful and informative.
Measuring blog performance is essential for understanding the effectiveness of your content
marketing efforts and optimizing your strategy. To measure blog performance, you can use a
combination of key performance indicators (KPIs) and analytics tools. Here's a step-by-step guide on
how to measure the performance of your blog:
10
ISWA (3171616) LY IT 2 C-Batch 200410116132
Trust and security are essential components of e-commerce websites. They are critical for building
customer confidence, protecting sensitive information, and ensuring the success and credibility of
online businesses. Here's an overview of trust and security in e-commerce:
Trust in E-commerce:
a. Keyword Research:
• SEO begins with keyword research. This involves identifying the specific words and phrases
(keywords) that potential users enter into search engines when looking for information,
products, or services. Tools like Google Keyword Planner are used to discover relevant
keywords.
b. On-Page Optimization:
• On-page SEO involves optimizing individual web pages to make them more search
enginefriendly. Key practices include:
• Keyword Optimization: Incorporating selected keywords into page titles, headings,
meta descriptions, and content.
• High-Quality Content: Creating informative, engaging, and original content that
provides value to users.
11
ISWA (3171616) LY IT 2 C-Batch 200410116132
• URL Structure: Creating clean and descriptive URLs that include keywords.
• Internal Linking: Linking to other relevant pages within your website.
• Optimizing Images: Compressing and properly labeling images to improve page load
times.
• Mobile Responsiveness: Ensuring your website is mobile-friendly.
c. Off-Page Optimization:
• Off-page SEO focuses on factors outside your website that influence your search
engine rankings. Key practices include:
• Backlinks: Acquiring high-quality, authoritative backlinks from other websites, as
search engines often consider these links as "votes" of trust and credibility.
• Social Signals: Building a strong presence on social media platforms, as social signals
can indirectly impact search rankings.
• Online Reputation Management: Monitoring and managing online reviews and
mentions of your brand or website.
d. Technical SEO:
• Technical SEO involves optimizing the technical aspects of your website for search
engines.
Key elements include:
• Website Speed: Ensuring your site loads quickly, as page speed is a ranking factor.
• Crawlability: Making sure search engine bots can access and crawl your website
easily.
• Sitemaps: Creating and submitting XML sitemaps to help search engines index your
site's pages.
• Robots.txt: Configuring a robots.txt file to control which pages should or should not
be indexed.
• Schema Markup: Implementing schema markup to provide structured data that can
enhance search results with rich snippets.
e. Monitoring and Analysis:
• SEO is an ongoing process. Regularly monitor your website's performance and analyze key
metrics, such as traffic, rankings, and conversions. Tools like Google Analytics and Google
Search Console can help with tracking and reporting.
f. Content Marketing:
• Content marketing plays a vital role in SEO. By consistently producing high-quality, valuable
content, you can attract and engage your target audience. This content can also help with
keyword optimization and acquiring backlinks.
g. User Experience (UX):
• Providing an excellent user experience is essential for SEO.
PPC (Pay-Per-Click) is an online advertising model in which advertisers pay a fee each time one of
their ads is clicked. It's a way of buying visits to your website, rather than earning those visits
organically through SEO. PPC ads can appear on search engines, social media platforms, and various
websites, and they are typically associated with sponsored listings or search engine advertising.
12
ISWA (3171616) LY IT 2 C-Batch 200410116132
• Keywords
• Keyword Match Types
• Bid Strategy
• Quality Score
• Ad Copy
• Ad Extensions
• Geographic Targeting
• Ad Schedule and Timing
• Device Targeting
• Competitive Landscape
• Ad Placement
• Ad Budget
• Conversion Tracking and Goals
• Ad Testing
• Analytics and Reporting
Internal Search and External Search refer to different methods of searching for information, and
they have distinct characteristics. Here's a comparison of the two:
Internal Search:
Scope:
Internal search is focused on finding information within a specific platform or environment, such as a
website, database, or local file system.
Control:
Organizations and individuals have control over internal search environments. They can define search
parameters, structure the content, and customize the search experience. Example:
Searching for a specific document on your computer's hard drive or searching for a product on an
ecommerce website are examples of internal search.
Purpose:
Internal search is often used to find specific pieces of information or content within a controlled
environment. It's commonly used for information retrieval and navigation.
Customization:
Users can implement advanced search features, filters, and sorting options in internal search to
improve search precision and user experience.
Performance:
The performance of internal search can be optimized and fine-tuned, making it efficient and effective
in returning relevant results.
External Search:
Scope:
External search involves looking for information on the broader internet or external platforms that
are not controlled by the user or organization.
Control:
13
ISWA (3171616) LY IT 2 C-Batch 200410116132
Users have limited control over external search environments, as the content is hosted on external
websites or services, and the algorithms are determined by search engines.
Example:
Conducting a web search on Google, Bing, or other search engines is an example of external search.
Purpose:
External search is used to explore the vast and diverse content available on the internet. It's typically
used for research, information discovery, and general web browsing.
Customization:
While users can refine search queries, they have limited control over the algorithms and ranking
mechanisms of external search engines.
Performance:
External search engines strive to provide relevant and accurate search results, but the performance
can vary depending on factors like search engine used, search query, and website rankings.
Assignment 3
1. Explain Multichannel marketing.
Multichannel marketing is a strategic approach in which a company uses multiple channels and
platforms to reach and engage with its target audience. The goal of multichannel marketing is to
create a seamless and consistent customer experience across various touchpoints, both online and
offline. By doing so, businesses can increase brand visibility, reach a broader audience, and improve
customer engagement. Here are key aspects of multichannel marketing:
• Multichannel marketing uses multiple online and offline channels.
• It emphasizes brand consistency across all channels.
• Tailors marketing to customer preferences.
• Integrates data for personalization.
• Maps the customer journey to enhance the buying experience.
• An omni-channel approach offers a seamless customer experience.
• Measurement and analytics guide decision-making.
• Adaptability is essential in a dynamic digital landscape.
• Extends to customer support and service.
• Ongoing testing and optimization are crucial for success.
Email marketing starts with building and managing an email list of subscribers. These subscribers can
be obtained through sign-up forms on websites, social media, in-store sign-ups, or other methods.
14
ISWA (3171616) LY IT 2 C-Batch 200410116132
Managing the list includes handling subscriptions, unsubscribes, and keeping the list clean and up to
date. ii. Segmentation:
Segmenting your email list involves dividing subscribers into smaller groups based on various criteria,
such as demographics, behaviors, purchase history, or engagement level. Segmenting allows for
personalized and targeted email campaigns, increasing their effectiveness. iii. Content Creation:
Creating valuable and engaging content is essential for email marketing. Content can include
newsletters, promotional offers, educational resources, product updates, and more. The content
should be relevant to the recipient and provide real value. iv. Personalization:
Personalization involves tailoring email content to the recipient's preferences and behavior. This can
include using the recipient's name, recommending products based on past purchases, or sending
personalized recommendations.
v. A/B Testing:
A/B testing is a method of testing different email elements, such as subject lines, content, and calls
to action, to determine what resonates best with your audience. It helps optimize email campaigns
for better performance. vi. Design and Layout:
The design and layout of emails should be visually appealing and mobile-responsive. A clean,
wellstructured design with a clear call to action (CTA) can improve click-through rates and
conversions. vii. Timing and Frequency:
The timing and frequency of email sends are important. Consider when your audience is most likely
to check their emails, and avoid overwhelming them with too many emails. Test different send times
to determine the optimal schedule. viii. Compliance with Regulations:
Email marketing is subject to various regulations, including the CAN-SPAM Act and GDPR (General
Data Protection Regulation). Adherence to these regulations is crucial to avoid legal issues and
maintain a positive sender reputation. ix. Metrics and Analytics:
Tracking and analyzing email campaign performance is a fundamental aspect of email marketing. Key
metrics include open rates, click-through rates, conversion rates, bounce rates, and unsubscribe
rates. Understanding these metrics helps refine future campaigns. x. Automation:
Email marketing automation allows for the creation of automated email sequences triggered by user
actions or specific time intervals. It is used for tasks like welcome emails, abandoned cart reminders,
and drip campaigns. xi. Testing and Optimization:
Ongoing testing and optimization involve continually improving email campaigns based on data
and insights. It's a process of refining subject lines, content, design, and strategies to achieve better
results. xii. Integration:
Email marketing can be integrated with other marketing channels and customer relationship
management (CRM) systems to provide a seamless customer experience and capture data for more
effective campaigns.
Email marketing is a versatile tool that, when executed effectively, can be a powerful way to connect
with an audience, drive conversions, and achieve a variety of marketing goals. It relies on the
principles of building relationships, delivering value, and respecting the preferences and privacy of
recipients.
15
ISWA (3171616) LY IT 2 C-Batch 200410116132
B. Triggered Emails: Automation allows for emails to be triggered by user actions or events. This
can include actions like signing up, making a purchase, abandoning a shopping cart, or
celebrating a birthday. Triggered emails are highly relevant and timely.
C. Drip Campaigns: Drip campaigns are a common form of email automation. These campaigns
involve sending a series of emails to leads or customers over a predefined time period. Drip
emails nurture leads, provide educational content, and guide users through the customer
journey.
D. Personalization: Personalization is a key element of email automation. Using data from
subscriber profiles or previous interactions, automation can deliver highly personalized
content, product recommendations, and tailored messages.
F. Optimization: Email automation tools often include A/B testing capabilities to determine
which email elements, such as subject lines and content, perform best. Optimization is an
ongoing process to improve email effectiveness.
G. Timing: Automated emails can be scheduled to go out at the most opportune times,
maximizing the chances of recipients opening and engaging with the content.
H. Efficiency: Email automation significantly reduces manual effort. Once workflows are set up,
emails are sent automatically, saving time and resources.
I. Consistency: Automation ensures that emails are consistently sent based on the predefined
rules, maintaining regular communication with subscribers.
J. Measurable Results: Email automation provides detailed analytics and reporting, enabling
marketers to track the performance of campaigns, understand user behavior, and make
datadriven decisions.
16
ISWA (3171616) LY IT 2 C-Batch 200410116132
Email automation enhances the effectiveness of email marketing by delivering the right message to
the right people at the right time. It's a concept that combines the power of technology with
personalization and efficiency, making it an indispensable tool in modern marketing strategies.
A/B testing, also known as split testing, is a method used in marketing and website optimization to
compare two versions of a web page or an email to determine which one performs better. It is a
controlled experiment where two or more variants (A, B, C, etc.) are tested against each other to
identify which one yields the desired results, such as higher conversion rates, click-through rates, or
user engagement. Here's how A/B testing works:
i. Objective Definition: The first step in A/B testing is to define a specific objective or a key
performance indicator (KPI) that you want to improve. For example, you may want to
increase the click-through rate (CTR) of a call-to-action button on your website.
ii. Variants Creation: You create two or more variations of the element you want to test. In a
simple A/B test, you have a control version (A) and one or more variations (B, C, etc.). These
variations differ in one or more elements, such as the color of a button, the wording of a
headline, or the placement of an image.
iii. Random Assignment: Visitors or users are randomly assigned to one of the variants when
they access your web page or receive an email. This randomization helps ensure that the
results are not biased.
iv. Data Collection: As users interact with the different variants, data is collected on their
behavior. This can include metrics like click-through rates, conversion rates, bounce rates, or
time spent on a page.
v. Statistical Analysis: Statistical analysis is applied to the collected data to determine if there is
a statistically significant difference in performance between the variants. This analysis helps
you identify which variant is the most effective at achieving the desired objective. vi.
Winner Determination: Based on the statistical analysis, a winner is determined. The
winning variant is the one that shows a significant improvement in the chosen KPI. It
becomes the new control (A) if you wish to continue testing or implementing the change
permanently.
vii. Implementation: If a variant is declared the winner, you can implement the changes on your
website or in your email campaigns to optimize for the desired outcome.
viii. Continuous Testing: A/B testing is an iterative process. After implementing changes, you can
set up new tests to further refine and optimize your web pages or emails. Continuous testing
helps improve user experience and conversion rates over time.
Testing product prices and promotions is an essential aspect of marketing and sales optimization. A/B
testing, also known as split testing, is a valuable method to assess the impact of different pricing
strategies and promotional tactics. Here's how to test prices and promotions effectively:
17
ISWA (3171616) LY IT 2 C-Batch 200410116132
Testing Promotions:
18