Skip to main content

benefits of online shopping


Benefits of Online shopping

Online shopping is the activity or action of buying products or services over the Internet. It means going online, landing on a seller’s website, selecting something, and arranging for its delivery. The buyer either pays for the good or service online with a credit or debit card or upon delivery.
Benefits of online shopping :
  •     Convenience. There are no lines to wait in or cashiers to track down to help you with your purchases, and you can do your shopping in minutes. Online shops give us the opportunity to shop 24/7
  •       Better prices. Cheap deals and better prices are available online, because products come to you direct from the manufacturer or seller
  •     More variety. The choices online are amazing. You can find almost any brand or item you're looking for. You can get in on the latest international trends without spending a lot of money.
  •    No crowds. If you are like me, you hate crowds when you're shopping. Especially during holidays, festivals, or on weekends, they can be such a huge headache.
  •       Easy to find products. You can find the products on the internet very easily by just visiting the sites than going to the local shopping store to find the products.









Bella Regina

106218089

http://www.businessdictionary.com/definition/online-shopping.html

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

Computer Security, Law Enforcement Officials, and Personal Privacy Issues

Computer security system is an effort made to secure the performance and computer processes. The application of computer security in daily life is useful as a guardian of system resources so that it is not used, modification of interruptions and is disturbed by unauthorized people. There are benefits from the use of a computer security system that is maintaining a computer system from accessing someone who does not have the right to access the computer system. Computer security systems are increasingly needed today along with the increasing use of computers throughout the world. Factor of computer crime   Some things that make computer crime continue to occur and tend to increase are as follows: Increased use of computers and the internet, the amount of software that was initially used to audit a system by looking for weaknesses and loopholes that might be misused to scan other people's systems, the amount of software to infiltrate available on the Intern...