Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Mera.Net Cafe - Essay Example

Comments (0) Cite this document
Mera.Net, derived from the owners name; (M)aria (E)rissa (R)achelle (A)besamis. Unlike a typical cafe, will provide a unique forum for communication and entertainment through the medium of the Internet.
Mera.Net Cafe is the answer to an increasing demand…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Mera.Net Cafe
Read TextPreview

Extract of sample "Mera.Net Cafe"

Download file to see previous pages The large initial capital investment will allow Mera.Net to provide its customers with a full featured Internet cafe. A unique, upscale, and innovative environment is required to provide the customers with an atmosphere that will spawn socialization.
Mera.Net, soon to be located near at Sacred Heart College on 10th of March, will offer the community easy and affordable access to the Internet. Mera.Net will provide full access to email, WWW, FTP, Usenet and other Internet applications.
Mera.Net will appeal to individuals of all ages and backgrounds. The instructional Internet classes, and the helpful staff that MeraNet provides, will appeal to the audience that does not associate themselves with the computer age. This educational aspect will attract younger and elderly members of the community who are rapidly gaining interest in the unique resources that online communications have to offer.
Mera.Net's customers can be divided into two groups. The first group is familiar with the Internet and desires a progressive and inviting atmosphere where they can get out of their offices or bedrooms. The second group is not familiar with the Internet, yet, and is just waiting for the right opportunity to enter the online community. Mera.Net's target market falls anywhere between the ages of 18 and 50. This extremely wide range of ages is due to the fact that the Internet appeal to a variety of people. In addition to these two broad categories, Mera.Net's target market can be divided into more specific market segments. The majority of these individuals are students and business people.
Potential Customers
University Students
Office Workers
IV. Required Capital
4.1 Start-up Summary
Mera.Net's start-up costs of P200,000 that will cover for site renovation and modification and the communications equipment necessary to get its customers online.
The communications equipment necessary to provide Mera.Net's customers with a high-speed connection to the Internet and the services it has to offer make up a large portion of the start-up costs. These costs will include the computer terminals and all costs associated with their set-up. Costs will also be designated for the purchase of two laser printers and a scanner.
V. Equipments and Facilities
List of Startup Equipments and facilities. Cost at least P200,000 of capital.
10 computer set P150 000
1 aircon ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Mera.Net Cafe Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from
(Mera.Net Cafe Essay Example | Topics and Well Written Essays - 1500 Words)
“Mera.Net Cafe Essay Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Net Neutrality

... Net neutrality The internet is meritocratic in it’s propose. The move to place restrictions on the owners of networks that provide access to the internet in a bid to ensure equal access and non discriminatory treatment is regarded as net neutrality. This is a major issue for the congressional policy makers in the telecommunication reforms. If people prefer one site to the other, that’s where they will go. It is a problem if the gate keepers of the internet (local phone and cable companies) discriminate between disfavored and favored uses of the internet. For example, AT&T can make it slower and harder for an internet user to access and make it faster to reach yahoo mail(1). Over the past years a debate has grown up over the meaning...
3 Pages(750 words)Book Report/Review


...NET Introduction: Securing information required for research purposes traditional involved securing them from hard copies located in Libraries or purchased from book shops. The Internet has revolutionized the manner in which such information is sought for research purposes. Databases: A database is “a collection of data and items organized for convenient access” (What are databases? Common terms and definitions). Through the Internet it is possible to get into the databases and access the information available at the databases. Invariably the databases collect a membership fee to provide access. In academic circles with the frequent need of large quantities of information the use of databases has become popular and can be seen...
2 Pages(500 words)Essay


... Case study: Levendary Cafe What are a) the roles and responsibilities, and b) the current situation and concerns/worries of the following three people? Mia Foster: The roles and responsibilities of Mia Foster included: Ensuring the continuous running of the Cafe business locally (USA); making strategic decisions that would enable the company to stay competitive. The current situation at that time was that Mia Foster was facing some challenges with regard to company operations in China. The concerns/ worries of Mia Foster included: Wall Street’s opinion that her lack of international business management skills would affect the running of the Cafe on an international scene – China; unwillingness by the CEO of Levendary Cafe - Louis Chen...
3 Pages(750 words)Case Study

Net neutrality

... The Net Neutrality Debate The internet (net) links billions of devices worldwide using the TCP/IP protocol suite by interconnecting computer networks. The Net neutrality (internet/ network neutrality) is a component of open internet. It is the principle that the government and the internet service providers should not charge differently or discriminate any data on the internet by content, site, user, platform or modes of communication. According to Hazlett, the Federal Communications Commission (FCC) sees the internet as a fragile ecosystem, which is under threat from opportunistic broadband providers (1). In 2010, the FCC imposed network neutrality regulations on both wireless and wired broadband-access providers (Hazlett 1). The agency...
4 Pages(1000 words)Research Paper

Multimedia Learning Resources for the Net Generation

accordingly, they build up social networks to acquire needed know-how from peers and other contacts. Instant messaging, text messaging, and easy access to the information highway have grown to be the norm for social networking. Wireless communication for this generation is not so much technology as a staple of their young lives (Oblinger & Oblinger, 2005).
These students easily take for granted engaging multimedia settings with striking graphics and quality sound and expect comparable features in digital educational tools. Most have grown up with dynamic video games and multimedia entertainment and, by school age, almost all possess some personal experience of the marvels of technology (Tapscott, 1999). Besides offering a...
9 Pages(2250 words)Assignment

Broadway Cafe: an E-Business Strategy

...The Broadway Café Introduction: The Broadway Café started in 1952, is known for its specialized coffees, teas, etc. It has been a very famous and successful and has been appreciated by all over the years. The café has been extremely successful however, now the café is facing a slight decline. This is due to the fact that the café has not been able to keep up with the intense competition of the 21st century. This report aims at understanding the current position of the café in terms of its competitors and building a strategic plan for the company to move into E – Business. Also the report will include a very essential element which is a very fast growing feature and is one that can ensure better service to customers – Customer... Broadway...
8 Pages(2000 words)Case Study

ASP NET and the Three-Tier Architecture

...ASP .NET and the Three Tier Architecture Section 1: ASP .NET (Active Server Pages in the dotNet framework) is one of the major technologies that can be used to develop dynamic pages for websites. This technology is superior to the client – server architecture and provides flexible ways to present and process information in the websites. It is a code behind model similar to that of its predecessor ASP (Active Server Pages). The web pages developed in .net have the extension of ‘.aspx’. Though the web browser does not require any framework to be installed, the web server which is executing the requests, need to have the .Net framework installed for the ASP .NET pages to work. Three - Tier Architecture: ASP .NET functions on a three...
6 Pages(1500 words)Assignment

Financial Analysis of Commonwealth Australia Bank and BHP Billiton and Calculation Net Present Value

...PROJECT EVALUATION Question a) Calculation Net Present Value (NPV) of new investment proposal Net Present Value is the difference between the present value of cash inflow and the present value of cash outflow. An investment opportunity is advised to accept only when the NPV is positive and otherwise the project is said to be ineligible for investment. Here the investment will be achieving return in the next five years of investment and the anticipated return of the firm from similar kind of investment is 12%. Therefore, the present value factor with which the future likely return s converted is 3.605 (at 12% for three years annuity). Present Value of Cash Inflow The annual return for the next five years is given as $60 M less $18 M cost...
8 Pages(2000 words)Assignment

Mobile Marketing Applications: The Broadway Cafe

... network is that the Broadway cafe could advertise their m-coupon promotion and get people to opt-in for mobile coupons. This way, the Broadway café can then use the database to continually market to via email or SMS with updated offers, which in turn maintains the trust with the customer base and increases loyalty. Whilst the possibilities of using mobile coupons have potentially great benefits in terms of financial reward, customer retention and building up a customer base, there are potential legal issues particularly in the collection of consumer information if using opt-ins. Accordingly, any mobile campaign should comply with the CAN-SPAM legislative provisions on consumer information. Furthermore, whilst the potential rewards...
6 Pages(1500 words)Research Paper

The Link between the Current Account and Changes in a Countrys Net Foreign Wealth

...Discuss the Link between the Current Account and Changes in a Country’s Net Foreign Wealth Essentially the traditional balance of payment is Change in Net Foreign Asset = Current Account Net Foreign wealth or Net Foreign Asset is the exposure of a country in terms of its liability. Simply put, Net Foreign Asset is the total current value of its offshore asset less the current value of other countries’ asset within its borders. And, Current Account is the sum of Balance of Trade, net Factor Income and net Transfer Payments. Balance of Trade, in the meantime, is the total current value of exported goods and service less the total value of imported goods and services. Factor Income is the return or income of a particular asset an example...
6 Pages(1500 words)Term Paper

Why Net Assets and the Capital Section on the Balance Sheet are Equal

........................................................................................... 5 Profit and Loss........................................................................................... 5 Balance Sheet............................................................................................ 6 Why Net Assets and the Capital Section on the Balance Sheet are Equal...... 6 Analyzing Company’s Performance................................................................ 7 Gross Profit Margin................................................................................... 7 Net Profit Margin...................................................................................... 7 Current Ratio...
6 Pages(1500 words)Lab Report

Net Work Security

... Q1: Poorly configured peripheral allows attackers to compromise internet based company networks. Using IPv6 can enhance the security of a company’s network, but not eliminate these attacks. Attackers can be divided into opportunistic and focused attackers. Assuming that a company allows corporate officers, and middle managers to have laptops and home computer access to corporate networks, explain how these computers might be used to compromise a corporate network and then explain several ways that the network administrator might use policy and network tools to minimize these vulnerabilities. In your explanation also include the added security that IPv6 would add and explain the difference between the two types of attackers... Q1: Poorly...
6 Pages(1500 words)Assignment

History of Computers from Early Machines to Net-Books

The paper thoroughly discusses the complete history of computers. It looks into its advancement through decades, especially those enhancements of the technology, which were kept secret for decades.

Charles Babbage is known as the father of the computer. He was the man who designed the first computer in the form of different engines. There were two different engines in his possession. One was called the Analytical engine. The combination of these two engines is also known as the Babbage engines. Unfortunately, Charles Babbage could not witness the completion of his invented machines in his life but the process continued for many decades. Due to the preservation of the computer design by Charles Babbage, the process of d...
6 Pages(1500 words)Coursework

Cyber Net Fraud and How They Can Affect Accounting Information Systems

...Cyber Net Fraud and How They Can Affect Accounting Information Systems Cyber net fraud also commonly known as internet fraud refers to the process of using the internet and software that can access it to defraud people. It can also be defined as any form of intentional deception for unlawful and unfair gain through the use of the internet. Cyber fraudsters usually do this by either giving distorted information or concealing information. The most common form of cyber net fraud is the distribution and use of rogue security software. Given the fact that businesses’ are increasingly warming up to the idea of e-business, cyber net fraud can be said to be one of the major threats to modern businesses. This paper aims at illustrating...
6 Pages(1500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Mera.Net Cafe for FREE!

Contact Us