...CSS Assignment Question1 Download the assignment files from class web-site. You will find HTML file and screen-capture images. Look at the HTML code which you downloaded. Write CSS to decorate the HTML code according to the conditions below, so the HTML will looks like the screen-capture images. <Conditions> 1. Write CSS code as an external file. 2. Use CSS to design the page. Don’t use HTML to decorate it. 3. You are allowed to edit HTML file, but don’t change it too much. (HINT: Editing the heading of the HTML code will be needed to link to the external CSS file.) 4. HINT: Inheriting will help you to make your code smart. 5. In your CSS code, all the properties and values must have aim. For example, if there is a property which is NOT applied in the HTML, it’s NO GOOD. We don’t need unnecessary “space”. Question 2 Make your own web-site according to the conditions below. Finish this before the 27th June lecture. <Conditions> * Your web-site must have more than 3 pages. All the pages have to be linked to each other. * The design for each pages have to be united. Make it smart, make it beautiful. (Hint: Use one same external CSS file for the design.) * Use CSS to design the page. Don’t use HTML to decorate it. * Use 10 or more properties in your CSS code. You can write any properties include which we didn’t see in the lecture. * In your CSS code, all the properties and values must have aim. For example, if there...
Words: 504 - Pages: 3
...CRT 205 Week 3 Assignment Analyzing Credibility To Buy This material Click below link http://www.uoptutors.com/crt-205/crt-205-week-3-assignment-analyzing-credibility Assignment: Analyzing Credibility Resources: “Giuliani Remembers 9/11‖ news clip and video ads located at one of the links listed below. Due Date: Day 7 [Individual forum] View and assess the credibility of these media and advertising examples: o The CNN Pipeline news clip located on the Materials tab of your student web page for Week Three. o Select one of the following links to view the video ads available at that Web site: http://www.toyota.com/corolla/demos.html http://www.progressive.com/commercials/progressive-commercials.aspx http://www.pedigree.com.au/tv/ http://www.wendys.com/ads/ Answer the following in regard to each of the two examples in a 100- to 200-word response: o Who paid for each example to be created? o Can you detect a slant—that is, a secondary opinion conveyed by the examples’ creators? o What does each example reflect about society at large? Is it credible? Explain your answers. Answer the following in regard to the news clip in a 50- to 100-word response: o Are you skeptical of the sources’ credibility? Why or why not? o Do you detect any bias? Why or why not? Answer the following in regard to the video ad on one of the links above in a 100- to 200-word response: o Does the ad make a claim? o What fear or desire does the ad play into? o...
Words: 319 - Pages: 2
...CRT 205 Week 3 Assignment Analyzing Credibility To Buy This material Click below link http://www.uoptutors.com/crt-205/crt-205-week-3-assignment-analyzing-credibility Assignment: Analyzing Credibility Resources: “Giuliani Remembers 9/11‖ news clip and video ads located at one of the links listed below. Due Date: Day 7 [Individual forum] View and assess the credibility of these media and advertising examples: o The CNN Pipeline news clip located on the Materials tab of your student web page for Week Three. o Select one of the following links to view the video ads available at that Web site: http://www.toyota.com/corolla/demos.html http://www.progressive.com/commercials/progressive-commercials.aspx http://www.pedigree.com.au/tv/ http://www.wendys.com/ads/ Answer the following in regard to each of the two examples in a 100- to 200-word response: o Who paid for each example to be created? o Can you detect a slant—that is, a secondary opinion conveyed by the examples’ creators? o What does each example reflect about society at large? Is it credible? Explain your answers. Answer the following in regard to the news clip in a 50- to 100-word response: o Are you skeptical of the sources’ credibility? Why or why not? o Do you detect any bias? Why or why not? Answer the following in regard to the video ad on one of the links above in a 100- to 200-word response: o Does the ad make a claim? o What fear or desire does the ad play into? o...
Words: 319 - Pages: 2
...Unit 3 Assignment Instructions: Download this document to your computer before filling it out. Each of the responses below should be appropriately filled in and the document saved again before submitting to the Unit 3 Dropbox. Be certain to answer each question completely. Unit 3 Assignment Outcomes addressed in this activity • Describe the origin of the internet • Explain various multimedia files found on the Web • Discuss how to search the internet effectively Course Outcomes practiced in this unit: IT190-2: Describe the basic components of a computer network. GEL-7.1: Identify the ethical issues within the field of study. Do not forget, whenever you look up information, you need to cite your sources! Please copy and paste the full URL of any website you use in researching your answers to the following questions. If you use your book, please place the page number from your book in parentheses next to the answer. Unit 3 is a Master Learning Unit. A Master Learning Unit presents an opportunity for you to grow and improve as a student. In order to qualify for Master Unit Grading you must: • Respond to all questions • Make a determined first attempt • Cite your responses • Submit your assignment on time If you meet the above criteria, your instructor will grade your assignment if it meets mastery level. However, if your assignment does not meet mastery level standards, your grade will be withheld and you will...
Words: 1405 - Pages: 6
...Additional Details for the Research Paper Overview: In addition to the course work from the books, you will do a research paper. You can suggest a topic, but it has to be coordinated with me during the first two weeks of the course. Objectives: * Complete study on specific topic related with the course subject. * Develop strategies for searching Library Catalogs and Databases for articles and books. * Develop strategies for searching the Internet. * Evaluate the validity of information. * Develop and improve effective writing skills. * Promote critical thinking skills. Grading guidelines: 1. An outstanding paper will: * Be clearly and concisely written, * Answer specifically the question(s) posed in the essay topic, * Be technically sound, * Be free of grammatical and spelling errors, * Use at least 4 scholarly publications as sources * Carefully provide proper citations for all references used, * Use APA style for citing and referencing, double spacing and between 10pt and 12pt font size * Follow the required outline. * Avoid plagiarism through citing sources correctly and identifying quotations. Paper will be submitted to Turnitin.com for plagiarism check before review. 2. The paper should not: * Simply parrot back information found in the text, lecture notes, or other references * Contain long passages quoted from other sources * Provide a general tutorial on the generic...
Words: 635 - Pages: 3
...|Module 3 Assignment: |Name: |/78 | |Using the Internet | | | | | |In this module you have learned all about the Internet and the various communication and collaboration tools it contains, the software plugins you install on your computer to allow it to interact with media on the web, how| |to be a safe online shopper, search engines and URLs. The questions below will allow you to apply what you have learned. | |Don’t forget to utilize the TechTalk discussion area if you need a bit of tech support while working on the assignment. | | ...
Words: 1607 - Pages: 7
...“IPad’s” Security Breach BUS 508: Contemporary Business August 16, 2011 Strayer University Dr. Robert L. Kight Assignment 4: iPad’s Security Breach This document will attempt to discuss hacking into a Web site. Is it ever justifiable? The document will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important for organizations like Gawker Media to be socially responsible. It will determine factors CEOs should consider when responding to a security breach. Finally, it will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue and state the rationale. Apply your theory to a real-world case in which someone hacked into a system, including the name of the company and details. As I attempt to discuss this assignment, I could not avoid thinking about the age-old opinion that Apple products were unique, and that they were protected against criminal encroachments. As such, Apple became one of the hottest technological innovations in the industry. Today, like most other such technology, Apple is becoming increasingly vulnerable to intrusion. It is becoming a medium for posing threats to an entire corporate network as well as devices for official and unofficial use. My answer to this question is twofold. In other words qualification of any kind for such conduct must be based...
Words: 1981 - Pages: 8
...shark tank assignment #1 by Cristian Pacheco 1. Select an episode of “Shark Tank” and watch the episode. You may watch an episode that has aired for this year, or you may watch an upcoming episode. Answer: The episode I watched is the number 305 Air Date: Friday, March 09, 2012 . 2. You are to select one of the segments, which is funded by the Sharks to research. Answer: In the second segment of the show, four entrepreneurs the Nardo’s brothers Dj Nardo, Kyle Nardo, Danny Nardo and Kj Nardo bring up their company “Nardo’s Natural” to the Shark Tank looking for help because the demand they had for the product was more then what they could produced they needed it $75.000.00 and they were offering 25% of their company in exchange, until Barbara Corcoran made an offer of $75.000.00 for 50% of the company, the brothers accepted the offer so Barbara become part of the company. 3. You are to visit the company web site and look for answers to any of the following questions: a. Does the company mention on their site the show “Shark Tank”. b. What type of sales or distribution does the company have? c. Will the funding from Shark Tank help the company grow? Answer: (A) In the web-side for this company www.nardosnatural.com the show is mention as a opportunity of a business to star or grow, they have offers related to the TV show but the don’t mention how much money they gain...
Words: 508 - Pages: 3
...Abstract Tujuane Social Portal (TSP) network is a web based social network site that enables students to interact and communicate with the interest of learning by uploading eBooks, Audio tutorials and sharing common interests in forums. With the introduction of online communication, students are able interact freely and solve each other’ academic problems with the intentions to unite all the JKUAT University students. This will be successful with the help of Tujuane portal that will incorporate Php scripts and MySQL oracle database. Students will be able to sign up and create new accounts and be able to edit their profiles by adding their personal details. They will also communicate with other students from other compasses and study online by creating educational forums and blogs. Above all, there will be a live chat platform for students to interact and share information of same interest. They will also be able to create clubs of different interests and develop their talents by inviting others and motivating the low self-esteemed students. A direct mailbox and messaging platform will enable the students to communicate directly. For the students to identify and know each other very well, they will upload their photos and have the ability to comment on the photos. Various administrators will have administrative rights and guide other students. Profiles will be highly built by introducing titles to the VIP students e.g...
Words: 1924 - Pages: 8
...eBusiness Assignment 1 eBusiness Development and Strategies Name | Maksis Rudovs | Class | BM | Exam No | 6506276P | Teacher | Marie Boner | Contents Methodology 3 Introduction 4 Current Developments in eBusiness 6 eBusiness Strategies 11 Conclusion 14 Recommendations 14 Refrences 14 Bibliography 14 Methodology Brief * Research the development of eBusiness to include emerging eBusiness technologies and applications. * Appraise the main eBusiness strategies and technologies in current use to include business to consumer, business to business and business to government markets. * Utilise a range of current eBusiness terms within the context of providing eBusiness solutions. Objectives * To define the terms eBusiness and eCommerce. * To talk about eBusiness types 1. Bricks and Clicks 2. Pureplay 3. Brick and Mortar * To discuss different eCommerce modules: 1. Business to Consumer 2. Business to Business 3. Business to Government * To investigate current developments of eBusiness including: 1. Web1,2,3 2. Mobile Technology 3. Social Media 4. Big Data, Data Mining, Data Warehousing, Data Analytics Research Design Scope and Limitations Action Plan Introduction This assignment is a report to gather information about eBusiness, eCommerce, current developments in the area and different types of Strategies in use. It is very popular nowadays to use the...
Words: 6150 - Pages: 25
...Chapter I THE PROBLEM AND REVIEW OF RELATED LITERATURE AND STUDIES Introduction: Some schools right now, especially those with huge numbers of students who are not yet using computerized based grading system has difficulty/problems concerning the records of grades of the students. The grades are the important record to keep even for the longest time for the referral and credentials of the student to enter their next level of attaining their goals. It is the tract record that recognizes of one student, this maybe use for analyzing of your attitude and values. Manual computation is very prompt to risk for any circumstances. It is time consuming in terms of recording grades, computation using of calculator. If some records are lost, they never retrieve it in case of unexpected calamity. Accuracy and security is not been so defined. Grading System is the most commonly used in computing and analyzing the performance, talent and skills of students. It is designed to provide incentive reward for achievement and assist in identifying problems of the student. The Computerized Grading System will help both the faculty staffs and the students to have easy access on the records and past records, the easier way. The said system will also lessen the staffs on consuming too much time recording and effort locating records of the students. It will also be connected to the schools’ website (if...
Words: 6071 - Pages: 25
...Team B was assigned a Virtual Organization website to redesign called City of Kelsey. Team B had to evaluate the use of design principles within the City of Kelsey site. Through the process of evaluation and redesign, Team B also suggested recommendations for improvements to the site and use a web design tool, such as Adobe Dreamweaver®, to develop a visual mockup. This documentation is the result of the evaluation of City of Kelsey website, including recommendations for improvement. Additionally, a prototype of proposed modifications was conducted to the City of Kelsey website as well. VO Purpose and Audience The virtual organization we (Team B) were assigned to evaluate was City of Kelsey. City of Kelsey purpose is to inform visitors of its location and various amenities as well as various interests that are available within the city such as history, communities, schools, business opportunities, and various parks and recreations to name a few. The intended audience are for the outdoor adventurous types, the young family to the retired, anyone looking to start a business, or relocate or expand a current business. Design Criteria and Importance According to Felke-Morris (2015), using a checklist is recommended for best web design practices. It is a guide to help you create easy-to-read, usable, and accessible web pages (p.227). The table below is a list of design criteria from Felke-Morris’s checklist chosen by the team with a description of why each design criteria was...
Words: 3305 - Pages: 14
...ASSIGNMENT 1 Technologies which can be used in presentation component * WPF The Windows Presentation Foundation is Microsoft’s next generation UI framework to create applications with a rich user experience. WPF combines application UIs, 2D graphics, 3D graphics, documents and multimedia into one single framework. Its vector based rendering engine uses hardware acceleration of modern graphic cards. This makes the UI faster, scalable and resolution independent. The advantages of WPF applications include, * Resolution Independence * Hardware Acceleration * Rich Composition and Customization * Easy Deployment: As WPF Applications come in all shapes and sizes, and the most appropriate business arrangements for such projects needs to be determined on a case-by-case basis together with the customers. It is essential to get relevant license from the Microsoft in order to use this technology because it is a proprietary technology. * Silverlight Silverlight is a powerful development tool for creating engaging, interactive user experiences for Web and mobile applications. Silverlight is a free plug-in, powered by the .NET framework and compatible with multiple browsers, devices and operating systems, bringing a new level of interactivity wherever the Web works. In Silverlight applications, user interfaces are declared in Extensible Application Markup Language (XAML) and programmed using a subset of the .NET Framework. Advantages of Silverlight include...
Words: 1248 - Pages: 5
...the faculty, and the technology. The Web 2.0 technologies of wikis and blogs can help faculty direct online learning activities that encourage peer support, collaboration, and dialogue. The authors discuss these tools and how they were used to engage students in a nursing research course. ince the mid-1990s, increasing numbers of people have come to rely on the Internet as a convenient source of information and education. In nursing, the growing need for convenient and nontraditional learning strategies fostered a proliferation of Web-based nursing education programs. Since teaching online requires faculty to use strategies that differ from those used in face-to-face classrooms, nurse researchers have investigated characteristics of online education environments that facilitate students’ engagement with learning.1-3 Thurmond concluded,3(p237) ‘‘Good teaching practices are deeply rooted in the concept of interaction.’’ MancusoMurphy4(p257) identified interaction among faculty and students as ‘‘the core element of an effective online environment.’’ Researchers determined that peer support, collaboration, and communicative dialogue were the characteristics of online learning environments that encouraged interaction.1-3 These can be facilitated through the 4 types of online interaction identified by Thurmond,3 which include the learners’ engagement with course content, faculty, one another as students, and the technological medium. The Web 2.0 technologies of wikis and blogs can...
Words: 3701 - Pages: 15
...[pic] Axia College Course Design Guide SCI/245 Version 5 Physical Geology Start Date: 9/24/2012 End Date: 11/25/2012 Course Materials Murck, B. W., Skinner, B. J., & Mackenzie, D. (2008). Visualizing geology. Hoboken, NJ: John Wiley & Sons. Axia College’s Writing Style Handbook, available online at https://axiaecampus.phoenix.edu/Writing_Style_Handbook_AxiaUOP.pdf All electronic materials are available on your student Web site. Please print a copy of this syllabus for handy reference. Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document. Copyright Copyright © 2009, 2008, 2007 by University of Phoenix. All rights reserved. University of Phoenix® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft®, Windows®, and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix® editorial standards and practices. Facilitator...
Words: 4447 - Pages: 18