Iswa Gecg
Iswa Gecg
Iswa Gecg
Institute logo
Place: __________
Date: __________
Preface
Main motto of any laboratory/practical/field work is for enhancing required skills as well as
creating ability amongst students to solve real time problem by developing relevant
competencies in psychomotor domain. By keeping in view, GTU has designed competency
focused outcome-based curriculum for engineering degree programs where sufficient weightage
is given to practical work. It shows importance of enhancement of skills amongst the students
and it pays attention to utilize every second of time allotted for practical amongst students,
instructors and faculty members to achieve relevant outcomes by performing the experiments
rather than having merely study type experiments. It is must for effective implementation of
competency focused outcome-based curriculum that every practical is keenly designed to serve
as a tool to develop and enhance relevant competency required by the various industry among
every student. These psychomotor skills are very difficult to develop through traditional chalk
and board content delivery method in the classroom. Accordingly, this lab manual is designed
to focus on the industry defined relevant outcomes, rather than old practice of conducting
practical to prove concept and theory.
By using this lab manual students can go through the relevant theory and procedure in advance
before the actual performance which creates an interest and students can have basic idea prior to
performance. This in turn enhances pre-determined outcomes amongst students. Each
experiment in this manual begins with competency, industry relevant skills, course outcomes as
well as practical outcomes (objectives). The students will also achieve safety and necessary
precautions to be taken while performing practical.
This manual also provides guidelines to faculty members to facilitate student centric lab
activities through each experiment by arranging and managing necessary resources in order that
the students follow the procedures with required safety and necessary precautions to achieve the
outcomes. It also gives an idea that how students will be assessed by providing rubrics.
Internetwork security helps in identifying security points and helps in identifying the protocols
where security is deployed. Web Analytics helps in identifying online/offline patterns and
trends of web traffic. It is used to collect, measure, report, and analyze website data. Web
analytics tracks key metrics and analyze visitors' activity and traffic flow. It provides a platform
for students to analyze the performance of a website and optimize its web usage.
Utmost care has been taken while preparing this lab manual however always there is chances of
improvement. Therefore, we welcome constructive suggestions for improvement and removal
of errors if any.
Advance Java Programming (3160707)
DTE’s Vision
Institute’s Vision
Institute’s Mission
To develop human potential to its fullest extent so that intellectual and innovative
engineers can emerge in a wide range of professions.
To advance knowledge and educate students in engineering and other areas of scholarship
that will best serve the nation and the world in future.
To produce quality engineers, entrepreneurs and leaders to meet the present and future
needs of society as well as environment.
Department’s Vision
Department’s Mission
The graduate will be a competent professional with high-level technical proficiency in the
field of Information Technology to identify problems and develop innovative solutions to
meet the industrial needs.
The graduate will exhibit professionalism, teamwork, leadership skills and exposure to
current needs.
The graduate will be capable enough to adapt the changes in roles and responsibilities
through professional development and lifelong learning over self-study or continuing
education in IT or managerial studies.
The graduates will ethically apply their computing knowledge and skills considering
societal, economic and environmental factors.
Index
(Progressive Assessment Sheet)
Sr. Objective(s) of Experiment Page Date of Date of Assessme Sign. of Remar
No. No. perform submiss nt Teacher ks
ance ion Marks with date
Consider the college web site or department
web site for all the experiments given below
and Use web analytics to
Track engagement with home page and other
1.
site content.
Measure the time taken to load home page and
2.
other pages
3. Perform A/B testing
Date:
Competency and Practical Skills: Basic knowledge regarding Information and Network
security, Web analytics.
Theory:
Procedure:
1. Sign in to your google account .
2. Create a web stream, add your website URL (home page or the page you want to track) and
stream name.
3. After this, configure types of interaction you want to track by selecting them in “Enhanced
measurement” section. Google analytics allows to measure 6 different kind of user
interactions.
4. Then add the global code into the header of your site, or add the “Measurement id” in you
sites.google analytics section.
5. After following above given steps, you will be able to track user engagement on your page
Observations:
Conclusion:
Quiz:
Suggested Reference:
https://searchbusinessanalytics.techtarget.com/definition/Web-analytics
Web analytics by Avinash Kaushik Wiley publication
Web Analytics For Dummies by Jennifer LeClaire and Pedro Sostre
Rubrics 1 2 3 4 5 Total
Marks
Experiment No: 2
Measure the time taken to load home page and other pages
Date:
Competency and Practical Skills: Basic knowledge regarding Google analytics and Web
analytics.
Theory:
Website load time — or web page load time — refers to how long it takes for a website, or web
page, to fully load and appear on the screen. This includes all content on the page such as text,
images, and videos. Simply, it's how fast all content on a web page loads.
Page speed can depend on a number of factors — some examples include Page type, user
behavior, file sizes, website server/host, inefficient code, hotlinking, and too many plugins and/or
widgets.
In its simplest terms, page load time is the average amount of time it takes for a page to show up
on your screen. It's calculated from initiation (when you click on a page link or type in a Web
address) to completion (when the page is fully loaded in the browser). Usually measured in
seconds, page load time is made up of two different parts:
Network and Server Time: based on how speedy the internet connection is and how swiftly
static assets like photos and other files are served up
Browser Time: how long it takes for the browser to parse and execute the document and render
the page to make it available for user interaction
The same Web page can easily have different page load times in different browsers (e.g. Safari vs.
Internet Explorer), on different platforms (e.g. mobile vs. desktop), and in different locations. If
your site is served by one data center in the U.S. but you sell to customers in Australia and the
U.K., for instance, those international shoppers are likely to experience much lengthier load times.
But if your site's static assets are copied onto different data centers around the world, the page will
pull from the data center that's closest to where your shoppers are. That can drastically speed up
page load times.
Different pages on the same site can also have radically different load times, because of developer
decisions like richer design elements, beefier functionality, and more content on a page. There are
several online tools for determining average page load times, meaning it's possible for your Web
development team to focus on streamlining your slowest-loading pages first.
Page Load Times and SEO
There’s reason to believe that page load times can have an impact on your SEO efforts. This is
because of something known as Rank Brain. This is something used by Google to help determine
how it should go about ranking sites.
If someone visits your website and the page takes a long time to load, they might end up clicking
the back button. This is often called ‘pogo-sticking.’ Google will take this into account. Google’s
aim is to provide the people using its search engine, with a good user experience.
If someone visits your site, and shortly after, clicks the back button, it’s a sign your site didn’t
provide them with a good experience. Following this, Google has a reason to downgrade your
rankings.
Following this, it’s important you factor page load times into your SEO strategy.
Most companies agree that a good desktop page load time is under 2 seconds (about 28% say that
a good load page time is under 1 sec and about 39% think the good load time is under 2 seconds)
Procedure:
1. Set up Google Analytics: Create a Google Analytics account and add the tracking code to
your website's HTML code.
2. Enable Site Speed Tracking: In your Google Analytics account, go to Admin > Property
Settings > Tracking Info > Data Collection, and turn on "Site Speed Sample Rate."
3. Create a new view: Create a new view in your Google Analytics account specifically for
site speed data.
4. Set up Site Speed reports: In your Google Analytics account, go to Admin > View Settings
> Site Speed, and turn on "Site Speed Tracking."
5. Enable Page Timing: In your Google Analytics account, go to Admin > View Settings >
Site Speed > Advanced Settings, and turn on "Page Timing."
6. Wait for data to populate: It may take some time for Google Analytics to start tracking site
speed data. Wait for a few days for the data to populate.
7. View Site Speed reports: In your Google Analytics account, go to Behavior > Site Speed
to view the site speed reports. Here, you can see the average page load time, page timings,
and other performance metrics for your website's pages.
Observations:
Conclusion:
Quiz:
1. What are the tools to check the page load time in a different browser?
2. Give the steps to reduce page load time.
Suggested Reference:
https://searchbusinessanalytics.techtarget.com/definition/Web-analytics
Web analytics by Avinash Kaushik Wiley publication
Web Analytics For Dummies by Jennifer LeClaire and Pedro Sostre
Rubrics 1 2 3 4 5 Total
Marks
Experiment No: 3
Date:
Competency and Practical Skills: Basic knowledge regarding Web analytics, Google optimize
and statistical analysis.
Theory:
A/B testing (also known as split testing) is the process of comparing two versions of a web page,
email, or other marketing asset and measuring the difference in performance. You do this giving
one version to one group and the other version to another group. Then you can see how each
variation performs. Think of it like a competition. You’re pitting two versions of your asset
against one another to see which comes out on top. Knowing which marketing asset works better
can help inform future decisions when it comes to web pages, email copy, or anything else.
The main objective of performing A/B testing is to determine which version of a webpage,
advertisement, or other marketing asset performs better in terms of achieving a specific goal or
objective. A/B testing allows you to test two variations of a webpage or asset and see which
version performs better in terms of user engagement, click-through rates, conversion rates, and
other key metrics.
By conducting A/B testing, you can identify which changes to your website or marketing assets
result in the highest engagement and conversion rates, which can ultimately lead to improved
business outcomes, such as increased revenue, higher customer satisfaction, and better user
experience.
Procedure:
1. Create a Google Optimize account: Go to https://optimize.google.com/ and sign up for a
new account.
2. Create a new experiment: In the Google Optimize dashboard, click on the "Create
Experiment" button.
3. Choose the A/B testing option: Select "A/B Test" as the experiment type.
4. Set up experiment details: Fill in the experiment name, website URL, and objective.
5. Define experiment variants: Create the variant(s) for your experiment. These could be
changes to the website's design, layout, copy, or functionality.
6. Target your experiment: Define the audience for your experiment by selecting specific
URL or audience segments.
7. Configure your experiment: Set the parameters for the experiment, such as the traffic
allocation, experiment duration, and experiment options.
8. Preview and launch experiment: Preview the experiment to ensure everything is set up
correctly. Once ready, launch the experiment.
9. Monitor experiment results: Keep an eye on the experiment results in real-time through the
Google Optimize dashboard.
10. Analyze experiment data: Once the experiment has run for the desired period, analyze the
results to determine the winner(s) and take the appropriate action(s).
Observations:
Conclusion:
Quiz:
1. What are the tools available in the market for A/B testing other than google optimize?
2. Which statistical approach to use to run an A/B test?
Suggested Reference:
https://searchbusinessanalytics.techtarget.com/definition/Web-analytics
Web analytics by Avinash Kaushik Wiley publication
Web Analytics For Dummies by Jennifer LeClaire and Pedro Sostre
Rubrics 1 2 3 4 5 Total
Marks
Experiment No: 4
Competency and Practical Skills: basic understanding of web development languages such as
HTML, CSS, and JavaScript.
Objectives: (a) to teach learners how to set and retrieve cookies using a server-side
programming language like PHP or Python, as well as how to use client-side JavaScript code to
interact with the cookie stored in the user's browser.
Theory:
Session management
For example, cookies let websites recognize users and recall their individual login information
and preferences, such as sports news versus politics.
Personalization
Customized advertising is the main way cookies are used to personalize your sessions. You may
view certain items or parts of a site, and cookies use this data to help build targeted ads that you
might enjoy.
Tracking
Shopping sites use cookies to track items users previously viewed, allowing the sites to suggest
other goods they might like and keep items in shopping carts while they continue shopping.
While this is mostly for your benefit, web developers get a lot out of this set-up as well.
Cookies are stored on your device locally to free up storage space on a website’s servers. In turn,
websites can personalize while saving money on server maintenance and storage costs.
Procedure:
1) Create a login form: Create a login form where users can enter their username and
password.
2) Create a server-side script: Create a server-side script that will handle the form submission
and verify the user's credentials.
3) Set a cookie: Once the user is authenticated, create a cookie and set it to the user's
username. The cookie can be set using the document.cookie property in JavaScript or
using a server-side scripting language.
4) Retrieve the cookie: On subsequent visits to the website, retrieve the cookie and use it to
display the user's username.
5) Handle expired cookies: Set an expiration time for the cookie and handle expired cookies
appropriately. You can either redirect the user to the login page or display a message
asking them to log in again.
6) Handle cookie deletion: Provide an option for users to log out, which deletes the cookie
and logs the user out of the system
Observations:
Conclusion:
Quiz:
Suggested Reference:
https://searchbusinessanalytics.techtarget.com/definition/Web-analytics
Web analytics by Avinash Kaushik Wiley publication
Web Analytics For Dummies by Jennifer LeClaire and Pedro Sostre
Rubrics 1 2 3 4 5 Total
Marks
Experiment No: 5
Date:
Competency and Practical Skills: Basic knowledge regarding Web analytics, understanding of
search engine optimization (SEO), and how to optimize your content for search engines.
Objectives: (a) To familiarize learners with how to conduct research on their target audience to
understand their interests, preferences, and pain points.
(b) Learn how to write engaging and valuable content that meets the needs of the
audience.
Equipment/Tools Required: Personal Computer, Analytics tools, Internet and Writing software.
Theory:
1. Personalize Your Website
Providing visitors with a unique, personalized experience makes it easier to turn them into brand
advocates. Here’s how you can customize their experience:
Procedure:
1) Identify your target audience: Before writing content, it is important to understand who
your target audience is. This will help you tailor your content to their interests and needs.
2) Choose a topic: Choose a topic that is relevant and interesting to your target audience.
Conduct keyword research to identify popular search terms related to your topic.
3) Plan your content: Create an outline or a rough draft of your content, including the main
points you want to cover and the structure of your article or blog post.
4) Conduct research: Conduct research on your topic to gather information and statistics to
support your content. Use reputable sources to ensure the accuracy and credibility of your
information.
5) Write your content: Write your content in a clear and concise manner. Use subheadings,
bullet points, and other formatting techniques to make your content easy to read and scan.
6) Use visuals: Use images, videos, or infographics to enhance your content and make it
more engaging.
7) Edit and proofread: Edit and proofread your content for grammar and spelling errors.
Make sure your content is easy to understand and free of typos.
8) Optimize for search engines: Use relevant keywords and phrases in your content to
improve its visibility in search engines. Use header tags, meta descriptions, and alt tags for
images to improve your SEO.
9) Publish and promote: Publish your content on your website and promote it on social media
and other relevant channels. Monitor its performance and make changes as needed.
Observations:
Conclusion:
Quiz:
Suggested Reference:
https://searchbusinessanalytics.techtarget.com/definition/Web-analytics
"Content Strategy for the Web" by Kristina Halvorson
Web Analytics For Dummies by Jennifer LeClaire and Pedro Sostre
References used by the students:
Rubrics 1 2 3 4 5 Total
Marks
Experiment No: 6
Date:
Competency and Practical Skills: Basic knowledge regarding Web analytics, understanding of
search engine optimization (SEO), and how to optimize your content for search engines.
Objectives: (a) To familiarize learners with how to conduct research on their target audience to
understand their interests, preferences, and pain points.
(b) Learn how to write engaging and valuable content that meets the needs of the
audience .
Equipment/Tools Required: Personal Computer, keyword research tools, Internet and Google
Analytics
Theory:
Your SEO keyword list is just a list of the key terms that you’re focusing on for any given project.
There isn’t a specific format that keyword lists need to follow. You can easily create one with a
spreadsheet.
It’s important to keep a permanent list for several reasons. Creating a keyword research list gives
you:
A lasting record of what you’ve targeted
It should include all of the terms that you’re using, including a variety that is fit for different
customers or different stages of the buying process. In most cases, that’s going to mean a healthy
selection of:
question keywords
long-tail keywords
Selecting the right keyword list for your campaign can help you show your ads to the right
customers. Your keywords should match the terms your potential customers would use to find
your products or services
1) Start by researching your industry and target audience to identify relevant keywords. Use
keyword research tools such as Google Keyword Planner, SEMrush, or Ahrefs to find
keywords that are attainable and relevant to your business.
2) Create a spreadsheet to organize your list of keywords, including the search volume,
competition level, and relevance to your business.
3) Develop a content strategy around your keyword list. This could include creating blog
posts, videos, infographics, or other types of content that align with your keywords and
provide value to your audience.
4) Optimize your content for search engines by including your keywords in the title, meta
description, headers, and throughout the body of the content.
5) Monitor the performance and rankings of your content using a tool like Google Analytics
or a rank tracking tool like SEMrush or Ahrefs.
6) Use the data from your tracking tools to make adjustments to your content and optimize
your keyword strategy as needed.
7) Identify blogs and websites that could drive traffic to your site based on their relevance to
your industry and target audience.
8) Reach out to these blogs and websites to pitch guest posts or collaborations that could lead
to backlinks and increased traffic to your site.
9) Monitor the performance of your guest posts and collaborations using your tracking tools
to measure the impact on your site's traffic and rankings.
10) Use the insights gained from your tracking and analytics tools to continually refine your
keyword strategy, content creation, and outreach efforts to drive ongoing traffic and
engagement to your site.
Observations:
Conclusion:
Quiz:
Suggested Reference:
https://searchbusinessanalytics.techtarget.com/definition/Web-analytics
"Keyword Research: The Definitive Guide" by Brian Dean
Web Analytics For Dummies by Jennifer LeClaire and Pedro Sostre
Rubrics 1 2 3 4 5 Total
Marks
Experiment No: 7
Date:
Competency and Practical Skills: Basic knowledge regarding Web analytics, understanding of
web development, HTML, and CSS, and how to handle basic social media platforms.
Objectives: (a) By analyzing the blogs that are driving traffic to your site, students can gain a
better understanding of the importance of backlinks for improving their
website's
search engine rankings and driving more traffic to their site.
(b) Students will develop strong research skills as they search for relevant blogs
that are driving traffic to their site.
Equipment/Tools Required: Personal Computer, backlink analysis tool, Internet and Google
Analytics
Theory:
What is a blog?
A blog (a shortened version of “weblog”) is an online journal or informational website displaying
information in reverse chronological order, with the latest posts appearing first, at the top. It is a
platform where a writer or a group of writers share their views on an individual subject.
Definition of blogging
Blogging is a collection of skills that one needs to run and supervise a blog. This entails equipping
a web page with tools to make the process of writing, posting, linking, and sharing content easier
on the internet.
Procedure:
1) Check your referral traffic: In your website analytics tool, look for the "Referral" section
to see which websites are sending traffic to your site. This will give you an idea of which
blogs or websites are already linking to your site.
2) Search for backlinks: Use a backlink analysis tool like Ahrefs, Majestic, or Moz to find
backlinks to your website. This can help you identify blogs that are linking to your site,
and potentially driving traffic to it.
3) Search for mentions: Use a tool like Google Alerts, BrandMentions, or Mention to find
mentions of your brand or website across the web. This can help you discover blogs or
websites that are talking about your business, even if they haven't linked to your site.
4) Use search engines: Use search engines like Google to search for keywords related to your
business or industry. Look for blogs or websites that appear in the search results and see if
they link to your site or have the potential to do so.
5) Engage with your audience: Engage with your audience on social media, forums, and
other online communities related to your industry. This can help you discover bloggers or
influencers who may be interested in featuring your business on their site.
Remember, building relationships with bloggers and website owners takes time and effort. Be
patient and focus on creating quality content and engaging with your target audience, and
eventually, you'll start to see traffic coming from blogs and websites that are linking to your
site.
Observations:
Conclusion:
Quiz:
Rubrics 1 2 3 4 5 Total
Marks
Experiment No: 8
Try Password Attack To Check The Site Is Not Vulnerable To This Attack.
Date:
Competency and Practical Skills: Basic knowledge regarding Web analytics, understanding of
password cracking tools and techniques, familiarity with common password security.
Objectives: (a) Students can learn how passwords are stored and secured by websites, and how
password attacks can exploit vulnerabilities in these systems.
(b) Students can learn the various techniques used to crack passwords, including
brute-force attacks, dictionary attacks, and hybrid attacks.
Theory:
1. Phishing
Phishing is when a hacker posing as a trustworthy party sends you a fraudulent email, hoping you
will reveal your personal information voluntarily. Sometimes they lead you to fake "reset your
password" screens; other times, the links install malicious code on your device.
Here are a few examples of phishing:
Regular phishing.
You get an email from what looks like goodwebsite.com asking you to reset your password, but
you didn't read closely and it's actually goodwobsite.com. You "reset your password" and the
hacker steals your credentials.
Spear phishing.
A hacker targets you specifically with an email that appears to be from a friend, colleague, or
associate. It has a brief, generic blurb ("Check out the invoice I attached and let me know if it
makes sense.") and hopes you click on the malicious attachment.
2. Man-in-the-Middle Attack
Man-in-the middle (MitM) attacks are when a hacker or compromised system sits in between two
uncompromised people or systems and deciphers the information they're passing to each other,
including passwords. If Alice and Bob are passing notes in class, but Jeremy has to relay those
notes, Jeremy has the opportunity to be the man in the middle. Similarly, in 2017, Equifax
removed its apps from the App Store and Google Play store because they were passing sensitive
data over insecure channels where hackers could have stolen customer information.
To help prevent man-in-the-middle attacks:
Enable encryption on your router. If your modem and router can be accessed by anyone off the
street, they can use "sniffer" technology to see the information that is passed through it.
Use strong credentials and two-factor authentication. Many router credentials are never
changed from the default username and password. If a hacker gets access to your router
administration, they can redirect all your traffic to their hacked servers.
Use a VPN. A secure virtual private network (VPN) will help prevent man- in-the-middle attacks
by ensuring that all the servers you send data to are trusted.
4. Dictionary Attack
A type of brute force attack, dictionary attacks rely on our habit of picking "basic" words as our
password, the most common of which hackers have collated into "cracking dictionaries." More
sophisticated dictionary attacks incorporate words that are personally important to you, like a
birthplace, child's name, or pet's name.
To help prevent a dictionary attack:
Never use a dictionary word as a password. If you've read it in a book, it should never be part
of your password. If you must use a password instead of an access management tool, consider
using a password management system.
Lock accounts after too many password failures. It can be frustrating to be locked out of your
account when you briefly forget a password, but the alternative is often account insecurity. Give
yourself five or fewer tries before your application tells you to cool down.
Consider investing in a password manager. Password managers automatically generate
complex passwords that help prevent dictionary attacks.
5. Credential Stuffing
If you've suffered a hack in the past, you know that your old passwords were likely leaked onto a
disreputable website. Credential stuffing takes advantage of accounts that never had their
passwords changed after an account break-in. Hackers will try various combinations of former
usernames and passwords, hoping the victim never changed them.
To help prevent credential stuffing:
Monitor your accounts. There are paid services that will monitor your online identities, but you
can also use free services like haveIbeenpwned.com to check whether your email address is
connected to any recent leaks.
Regularly change your passwords. The longer one password goes unchanged, the more likely it
is that a hacker will find a way to crack it.
Use a password manager. Like a dictionary attack, many credential stuffing attacks can be
avoided by having a strong and secure password. A password manager helps maintain those.
6. Keyloggers
Keyloggers are a type of malicious software designed to track every keystroke and report it back
to a hacker. Typically, a user will download the software believing it to be legitimate, only for it
to install a keylogger without notice.
To protect yourself from keyloggers:
Check your physical hardware. If someone has access to your workstation, they can install a
hardware keylogger to collect information about your keystrokes. Regularly inspect your
computer and the surrounding area to make sure you know each piece of hardware.
Run a virus scan. Use a reputable antivirus software to scan your computer on a regular basis.
Antivirus companies keep their records of the most common malware keyloggers and will flag
them as dangerous.
Procedure:
1) Obtain proper authorization: Obtain explicit written permission from the website owner or
administrator to perform a password attack.
2) Identify the target: Identify the specific website or system that you are authorized to test
for password vulnerability.
3) Gather information: Gather as much information as possible about the target system,
including the operating system, web server software, and any other relevant details that
could help in the password attack process.
4) Identify attack vectors: Identify potential attack vectors that could be used to exploit the
system's password vulnerability. This could include weak passwords, default usernames
and passwords, or other vulnerabilities.
5) Choose password cracking tools: Choose appropriate password cracking tools and
software based on the type of attack vectors identified. Some of the popular password
cracking tools include John the Ripper, Hashcat, and Brutus.
6) Prepare wordlists: Prepare wordlists containing potential passwords that the password
cracking tool will use to attempt to crack the password.
7) Perform the password attack: Run the password cracking tool using the prepared wordlists
and attack vectors to attempt to crack the password. Monitor the progress of the attack and
adjust the parameters as needed.
8) Analyze the results: Analyze the results of the password attack, including any successful
or unsuccessful attempts to crack the password, and any vulnerabilities identified in the
process.
9) Document and report findings: Document the entire password attack process and any
findings, including successful and unsuccessful attempts, and report them to the website
owner or administrator in a clear and concise manner.
10) Follow responsible disclosure: If any vulnerabilities are identified during the password
attack, follow responsible disclosure practices by reporting them immediately to the
website owner or administrator and refrain from disclosing or exploiting them further
without proper authorization.
Observations:
Conclusion:
Quiz:
Suggested Reference:
https://searchbusinessanalytics.techtarget.com/definition/Web-analytics
"The Basics of Password Cracking" by ElcomSoft Co. Ltd
Web Analytics For Dummies by Jennifer LeClaire and Pedro Sostre
Rubrics 1 2 3 4 5 Total
Marks
Experiment No: 9
Measure the Most Important Metrics used for E-mail Marketing Analytics
Date:
Competency and Practical Skills: Basic knowledge regarding Web analytics, Knowledge of
HTML and CSS, familiarity with statistical analysis tools and techniques.
Objectives: (a) Students will learn about the various metrics used to measure the effectiveness
of email marketing campaigns.
(b) Students will gain practical experience using email marketing software and
tools
to set up and send campaigns, track metrics, and analyze data.
Equipment/Tools Required: Personal Computer, Email marketing software, Internet and Web
analytics software
Theory:
Email marketing is a form of digital marketing that involves sending commercial messages or
promotional content to a group of people using email. It is one of the most effective and cost-
efficient ways to reach out to a targeted audience, engage with them and drive business growth.
Email marketing can be used for a variety of purposes, such as promoting new products,
increasing sales, building brand awareness, educating customers, and nurturing leads. The success
of an email marketing campaign is dependent on several factors, including the quality of the email
list, the relevance and effectiveness of the email content, and the timing and frequency of the
emails.
Overall, email marketing can be a highly effective tool for businesses to connect with customers,
build relationships, and drive revenue growth.
There are several important metrics that are commonly used to measure the effectiveness of an
email marketing campaign. These include:
1) Open rate: This metric measures the percentage of recipients who opened your email. A
high open rate indicates that your subject line and pre-header text were engaging and
effective.
2) Click-through rate (CTR): This metric measures the percentage of recipients who clicked
on a link within your email. A high CTR indicates that your content was relevant and
engaging.
3) Conversion rate: This metric measures the percentage of recipients who took a desired
action, such as making a purchase or filling out a form, after clicking on a link in your
email.
4) Bounce rate: This metric measures the percentage of emails that were undeliverable and
returned to the sender. A high bounce rate can indicate issues with email list quality or
email deliverability.
5) Unsubscribe rate: This metric measures the percentage of recipients who unsubscribed
from your email list after receiving your email. A high unsubscribe rate can indicate issues
with email content or frequency.
6) Revenue generated: This metric measures the amount of revenue generated by your email
campaign. This metric is particularly important for e-commerce businesses.
7) Forward/Share rate: This metric measures the percentage of recipients who forwarded or
shared your email with others. A high forward/share rate indicates that your content was
engaging and shareable.
By measuring these metrics and analyzing the data, you can gain insights into the effectiveness of
your email marketing campaigns and make data-driven decisions to optimize your future
campaigns.
Procedure:
1) Identify the email marketing metrics to measure: Determine which email marketing
metrics are most important for your business goals. These may include open rate, click-
through rate, conversion rate, bounce rate, unsubscribe rate, revenue generated, and
forward/share rate.
2) Set up email marketing analytics tracking: Set up tracking codes or tags for your email
marketing campaigns to accurately track metrics. This may include using UTM parameters
or setting up tracking pixels in email messages.
3) Send out email campaigns: Send out email campaigns to your email list, making sure to
segment the list as appropriate.
4) Measure open rate: Measure the open rate by dividing the number of emails opened by the
total number of emails sent. This can typically be tracked using email marketing software.
5) Measure click-through rate: Measure the click-through rate by dividing the number of
clicks on links within the email by the total number of emails sent. This can typically be
tracked using email marketing software.
6) Measure conversion rate: Measure the conversion rate by dividing the number of
recipients who took a desired action, such as making a purchase, by the total number of
emails sent. This can typically be tracked using email marketing software or web analytics
tools.
7) Measure bounce rate: Measure the bounce rate by dividing the number of undeliverable
emails by the total number of emails sent. This can typically be tracked using email
marketing software.
8) Measure unsubscribe rate: Measure the unsubscribe rate by dividing the number of
recipients who unsubscribed from the email list by the total number of emails sent. This
can typically be tracked using email marketing software.
9) Measure revenue generated: Measure the revenue generated by tracking the amount of
revenue generated from email marketing campaigns. This may require integrating with e-
commerce platforms or other business systems.
10) Analyze data and optimize campaigns: Analyze the data collected and use it to optimize
future email marketing campaigns to improve performance.
By following this procedure and tracking the most important email marketing metrics,
businesses can gain valuable insights into the effectiveness of their email marketing
campaigns and make data-driven decisions to improve their results.
Observations:
Conclusion:
Quiz:
1. How can you track email engagement beyond traditional metrics such as open and click-
through rates?
2. How can you track and measure the impact of email marketing on sales and revenue?
Suggested Reference:
https://searchbusinessanalytics.techtarget.com/definition/Web-analytics
"The Ultimate Guide to Email Marketing Analytics" by Campaign Monitor
Web Analytics for Dummies by Jennifer LeClaire and Pedro Sostre
Rubrics 1 2 3 4 5 Total
Marks