Friday, January 31, 2020

Trust Builders in a Sales Person Essay Example for Free

Trust Builders in a Sales Person Essay Trust is the binding force of great relationships. This leads to greater cooperation and better solutions, especially in sales and customer service situations. When trust increases, communication is more effective and understanding in enhanced. Since most people won’t buy from someone they don’t trust, building and maintaining a strong bond of trust is essential for developing long term customer satisfaction and loyalty. Customers believe in getting the best and feeling comfortable with what they have received. Having a long term customer takes more than good customer service. Sales representatives of any company need to have the â€Å"trust-builders† characteristics to help them build strong relationships with clients. In the end this will help the overall profitability of the company. The first characteristic is expertise; this is the extent to which a salesperson possesses relevant knowledge and capability to get the job done right. An example is Digicel, their sales persons are well trained and equipped with relevant information and knowledge of their prices and sale promotions. Customers can ask a salesperson about a promotion and when the customer research for themselves, it is accurate. This builds trust, when a salesperson shows competence and knowledge. This has pushed Digicel to be the top efficient service provider of telecommunication in Jamaica. Second characteristic is dependability; this is the extent to which a salesperson consistently and predictably follows through on commitments he/she makes to others. Digicel sales practices indicates this when they offer free nights promotion to customers. This promotion was always offered once a customer puts on two hundred dollars before 9pm. This allows customers to depend on what Digicel said they would deliver. Candor is the third characteristic of a trust-builder type; it is the extent to which a salesperson is honest and upfront with others, especially with regard to issues/factors that may impact those others. Digicel portraits this by allowing their sales personnel or customer care agent to tell customer the truth when they are having technical problems, they even go as far as sending out texts to inform and apologise for the disruptions. The fourth trust-builder type is customer orientation; this is the extent to which a salesperson values and protects the interests of his/her customers. Digicel trained their salespersons to show empathy while adding value and giving back to the customer’s community and even their lives. Encouraging rebuilding of schools, community centers and developing public areas push customers to trust and build long term relationship with Digicel. The fifth trust-builder is likeability; this is the affection customers have towards you. There are many factors that contribute to how likeable you are as a person, but in the context of relationships with your customers, these factors encompass courtesy, respect, remembering names and key facts, treating each customer as special, and being interested in them and their lives. Digicel depicts this in their advertisements and when a sale agent is speaking to you. They ensured Jamaican culture and people are portrayed in their ads. They also ensure high quality service by asking for your name and throughout the conversation they refer to you by your name.

Thursday, January 23, 2020

Four Weddings And A Polaroid :: essays research papers

Ruby looked up from her cold mug of coffee just as a mysterious man walked into the diner. the sound of the bells on the door handle had startled her and interrupted her usual day dreaming. She watched the man from her counter stool as he seated himself at a nearby booth. He gazed out the window with a troubled look on his face and finally turned and met eyes with Ruby. He offered her a kind smile but Ruby turned her head quickly out of embarrassment. She hadn't even realized she was starring at him, but there was something so familiar about him she couldn't help herself. "Wishful thinking, gals like us never get guys like that." Ruby's thoughts were immediately shut off bye her friend Elaine's comment. "And just why not?" Ruby replied, Elaine just smiled and continued drying the silver wear. Elaine worked at the diner as a waitress, though Ruby never quite understood why. She hated her job, always complaining about everything and everyone there. But that was just Elaine's nature, never satisfied. "Well I better get going, I still have to get my dress from the tailor's, for the big event," started Ruby as she gathered her coat and purse. "I would hardly call your sister's wedding a big event," commented Elaine. "If I recall this is her third big event in two years." "Fourth!" Ruby called out over her shoulder on her way out the door. The days of the week seemed to fly by and before she knew it, Ruby was in her apartment dressing for her sister, Jillian’s wedding. The mysterious man from the diner had almost completely escaped her thoughts. Running late, as usual, she finished fastening the clasp on her bridesmaid gown and hurried outside to catch a cab. Ruby was her sister’s maid of honor and to her it was an honor, at least the first time she was chosen for the position. â€Å"Where to?† beckoned the cabby from the front seat. â€Å"Church of the Redeemer on 38th Street,† Ruby told the cabby as she searched through her purse for the lipstick she had bought strictly for the occasion. She recalled standing, starring at the cosmetics shelf of the drug store for close to twenty minutes trying desperately to locate a shade that would match her dress. She felt foolish for wasting so much time on such an insignificant thing, but how in the world do you match a color like sea-foam?

Tuesday, January 14, 2020

Appendix G

Associate Program Material Appendix GWireless LAN Vulnerabilities MatrixComplete the following matrix by filling in the blank boxes in the table.Security protection Brief description Vulnerabilities Prevention (if any) MAC address filtering Only allows access to a device if its MAC address matches that of a pre-approved list on the router. MAC Spoofing Don’t rely on MAC filtering alone. Open system authentication (SSID beaconing) Disables SSID from being broadcast so wireless networks are harder to detect. A spectrum analyzer can still be used to find the network name. Create a more complex SSID and password settings in your APWEPStands for Wired Equivalency Privacy. Uses 64 bit or 128 bit encryption. (including 24-bit IV) In larger networks, IV’s can be duplicated and cause collisions, which are easy to detect by outside influences Use WPA2 with AES or similar instead on larger, enterprise deployments.Of the six categories of attackers, the one I would most want to bre ak into my network would be hackers, as they attempt to penetrate your network and expose vulnerabilities, then inform you of them. This is opposed to a cracker, which will do the same thing, only steal the data and attempt to sell it. A script kiddie is very dangerous, as they are generally under-experienced hackers and crackers who use someone else’s codes and almost always have malicious intent.Between MAC filtering, WEP, and authentication, I believe that WEP is the most secure of the three. MAC filtering can be easily overcome by MAC spoofing, and is not part of the 802.11 standard. Authentication is somewhat weaker than WEP, as someone could capture the cleartext challenge phrase and the encrypted response frame and gain access to the network. WEP is the strongest of the 3, but is still weak due to IV collisions which can be monitored and the hacker can recover the security key during those collisions.In fact, hackers can even cause massive IV collisions to speed up the process. It should be noted this is really only an issue on larger wireless networks as there are approximately 16 million IV’s that can be handed out. But in an enterprise application, 16 million can happen in a matter of hours or days.