...In designing any interface to be used with an information system, one must be clear, concise and unambiguous, in manners of text, or else risk losing the person performing interaction. One thing that will frustrate a user quicker than anything is not being able to find help when it is needed. We will discuss three aspects of text in the interface redesign of the KUCampus Course Landing page; they are commentary text, help text and hypertext. Commentary text should allow a user to see a system state or the functionality behind a system. As an example, if a user places the mouse over an icon that has a picture of a pair of scissors; the commentary text would be, cut, hopefully. If anything other than cut is displayed the user may be confused, since the pair of scissors is generally accepted as the cut icon. For the redesign of the KUCampus Course Landing page, I will endeavor to utilize generally accepted commentary text for all icons, and utilize common sense logic in relation to commentary text for all buttons and menus. Help text is critical for any interface design and/or redesign. Users at some point in their use of a computing system will come across stumbling blocks and require help. Providing help in a way that will benefit the user and keep them satisfied with the interaction is paramount to a healthy program. Microsoft defines help into four categories: Contextual Help, Procedural Help, Reference Help and Conceptual Help. (Heim, 2008) The Contextual help...
Words: 635 - Pages: 3
...Reflection 1 Short Reflection Paper Marqus L. Harris INF 103 Thomas Hennefer September 3, 2012 Reflection 2 Searching for information on Google is like trying to find a needle in a haystack. Is that true? Was the library of the 19th century more efficient? Explain. How is searching in a specific database, such as Ashford’s library, different from searching in Bing, Google, or Yahoo? The founder of Wikipedia has a noble mission – to share the entire world’s information with everyone everywhere, anytime. In what ways has this mission been successful? In what ways has it not been successful? It is defiantly a tough challenge when trying to research certain information that is needed. In my personal opinion I consider it to be a very tough task indeed. Once the information is gathered from Google, then the part of trying to determine is the information is accurate, credible, or more reliable to put in a research paper. Google is the main and most popular website for information, but yet you will at times still come across some misleading information that is not allowed for academic research papers. The web at times can mislead us with certain information missing and misconceptions. Belgian lawyer Paul Otlet in the 19th century understood that each profession was experiencing a substance growth of data. Science was above all the drawback as a result of the increasing publications of such. Otlet...
Words: 614 - Pages: 3
...January 21, 2014 CSIS 1010 EC Assignment 2 1. The basic idea of HTML came from one person’s ideas and thoughts and having another person add their ideas to it and so on and so forth. As most things that are invented and perfected. Html came about because someone wanted away to store all of their information including books, records, letters, and research results. Vannevar Bush wrote an article about a machine he called Memex that could do all of this. He was trying to use the skills that were learned from war in World War II and implement them into peacetime activities. After this idea other scientist and engineers started adding their input to the idea eventually ending up with Hypertext Markup Language. Markup tags are the basic fundamentals of HTML. Most markup tags come in pairs and are between commands in a webpage. Usually a text or a graphic are in between the two commands or markup tags. Markup tags are invisible though so you would never know that they are there. Parameters are included within the beginning command tag, placed before the second bracket that provide supplementary instructions such as color, size, location, ect. 2. HTML and XML are both markup languages. They both also use tags. They both are read by software. HTML describes attributes of text and XML does not. XML is like a data base. In XML a person has to create their own tags unlike HTML where it has a preset language. HTML also displays the data while XML does not. Anything that has pictures...
Words: 508 - Pages: 3
...Electronic Commerce – as the use of the computer to facilitate all of firm’s operation. Firm’s internal business areas; Finance, Human Resources, Information Services, Manufacturing, and Marketing. Finance deals mainly with the Financial Community, Stockholders and Owners and firm’s Customer. Human Resources has special interest in the Global Community and Labor Unions. Information Services interfaces with hardware and software Suppliers. Manufacturing is responsible for dealing with the firm’s Suppliers, and Labor Unions. Marketing is primarily responsible for interfacing with the firm’s Customers and Competitors. All of the areas interface with the Government. Anticipated Benefits from Ecommerce – Positive, Improvements, Advantage. 1. Improved customer service 2. Improved relationships with suppliers and the financial community 3. Increased return on stockholder and owner investments Ecommerce Constraints – Limitations or Disadvantage. * High cost * Security concerns * Immature or unavailable software The Pathway to Ecommerce – the planning stage for implementing the system to ecommerce. Business Intelligence – background about the business – anyone in the organization must know everything about the business. Or in the other hand [BI] defined broadly to include information on all environmental elements. Basic Intelligence Task Collect Data – is the firm may acquire either Primary data [P] or Secondary data [S]. [P] – is gathered by the firms...
Words: 1326 - Pages: 6
...Site Explorer Report for grand-theft-auto-cheats.org/ by © AHREFS Overview: grand-theft-auto-cheats.org/ URL Rank 0 0 Ahrefs Domain Rank n/a 2 Backlinks 13 2 Referring Domains 6 2 Linking Metrics: Referring Pages Total Backlinks Crawled Pages Referring IPs Referring Subnets Referring Domains: Governmental Educational .com .net .org 13 13 0 4 3 6 0 0 2 0 3 Backlink Types: text dofollow nofollow sitewide not sitewide redirect image frame form Governmental Educational 13 11 2 0 13 0 0 0 0 0 0 1/6 Site Explorer Report for grand-theft-auto-cheats.org/ by © AHREFS Referring Pages 18 6 16 5 New & Lost Referring Pages Referring Pages 14 4 12 3 10 2 8 1 6 Jan '13 Apr '13 Jul '13 Oct '13 0 Total Referring Pages New Referring Pages Lost Referring Pages Referring Domains 7 6 5 Referring Domains 4 3 2 1 0 16. Sep 30. Sep 14. Oct 28. Oct 11. Nov 2/6 Site Explorer Report for grand-theft-auto-cheats.org/ by © AHREFS 100% 75% 50% 25% 0% Jan '13 Mar '13 May '13 Jul '13 Sep '13 Nov '13 Text 100% Redirect 75% 50% 25% 0% Jan '13 Mar '13 May '13 Jul '13 Sep '13 Nov '13 NoFollow 100% DoFollow 75% 50% 25% 0% Jan '13 Mar '13 May '13 Jul '13 Sep '13 Nov '13 Sitewide NotSitewide 3/6 Site Explorer Report for grand-theft-auto-cheats...
Words: 385 - Pages: 2
...Socio-cultural Issues Perhaps the most enriching and obvious societal change influenced by the web is education. The Internet is a library of infinite knowledge, and like all knowledge, some can help us and some can hurt us. Although there are numerous beneficial effects that the web has on education, I will address three: research, interactivity, and advancement. Research Having a virtual library with the ease and convenience of the Internet, students can be more efficient, resourceful, and creative in their schoolwork and research. Schoolwork can be submitted legibly by electronic mail, saving paper, time, and difficulty. The mere understandable, clear, and consistent typography of electronic media is a benefit in itself. Marshall McLuhan, author of Understanding Media: The Extensions of Man, explains that typographic extensions brought man universal literacy and education (McLuhan 235). Furthermore, primary and secondary research can be conducted through the web. A student can interview a foreigner or visit the Library of Congress, the Smithsonian, the White House Archives, and libraries from all over the world, traveling to places their circumstances might prevent. I know personally that when I was in high school, research on the Internet was almost mandatory. Most schools were taking a proactive approach to the integration of technology in the education system. Teachers would research and find articles from the Internet to incorporate into the lesson for the day...
Words: 916 - Pages: 4
...IT CANNOT ONLY BE LINKED, IT HAS TO BE DESIGNED Angel Gabriel Galindo Roman March 10th, 2014 It Cannot Only Be Linked, It Has To Be Designed The American pioneer of information technology, Theodor Holm Nelson, brings us to a world of fantasy, a world of aspiration; he brings us to his world of dream machines, the dreams of artificial intelligence. In 1974, Nelson knew “computers will be embraced in very presentational medium and thoughtful medium very soon”[Nelson, 1974, 306]. He was convinced of the importance of media and the need of its interconnection because “we live in media, as fish live in water”. However, he was concerned about how the general framework and structure of our information could affect the way we study or understand the shared information. He believed that, by a linear structure, one could not learn all the aspects a topic or research was able to communicate. Yet, he was convinced that if people were motivated by clear, available and appealing material, the instructional sequences would not be needed. Thus, Nelson proposes his alternative to such systems with the creation of “responding resources”. He emphasizes the creation of “branching or performing presentations which respond to user actions”[313]. He would define this as hypermedia, which have not yet been achieved in its totality by the invention of the World Wide Web. Nelson’s main inspiration for the creation of the concept of hypermedia was the reflection of Vannevar Bush and...
Words: 1489 - Pages: 6
...THE FOLLOWING VIDEO WILL SOW YOU HOW TO EMBED A SCRIBD DOCUMENTE In your wiki page. First go to the wiki page where you want to embed the documente. Click on the edit button. Then with the cursor mark exactly where you want the documente to display on the wiki page. Go up to the gray edit tool bar at the top of the page and select “WIDGET”. On the left side colum select the “document” and then choose scribd for the option. You will see a brief set of instruction numbered 1 throug 4. now you have to complete those steps 1. Go to any scribd.com document Then go the the right hand side of the page and clik the option for embe document. If you click on “embed option it wil dispay a set of different characteristics for the display of the document in the page. Lets select the autosize and for the view style select slideshow. Leave the bos for including a link unchecked. You can play around with the different fuctions and once you have decided wich oone you want to use. Copy the Standard HTMLby Click on the button that says “copy. Then go back the the wiki edit page and paste Standard HTMl. Next hit the preview button , and save your work. Check that he widget is in the right place and then you can hit preview and save 2. Click on the "Embed" button. 3. Copy the Standard HTML and paste it in the box below. 4. Click Preview to preview the document or click...
Words: 265 - Pages: 2
...1. An internet (small "i") is a group of computer networks that have been interconnected, "internet" is short for "interconnected network." One particular internet which uses a specific set of rules and connects networks all over the world to each other is called the Internet (capital "I"). Network of computers and the Internet that connects them to each other form the basic technological structure that underlies virtually all electronic commerce. 2. Computers can be connected to each other using the Internet, for example a computer that monitors inventory levels using sensors connected to it over the Internet can us its Internet connection to place inventory orders with a vendor's computer automatically. The subset of the Internet that includes these computers and sensors connected to each other for communication and automatic transaction processing is often called the Internet of Things. 3. A combination of telephone lines and the closed switches that connect them to each other is called a circuit. This circuit forms a single electrical path between caller and receiver. The single path of connected circuits switched into each other is maintained for the entire length of the call. this type of centrally controlled, single connection model is known as circuit switching. Circuit switching works well for telephone calls, it does not work as well for sending data across a large WAN or an interconnected network like the Internet. The Internet was designed to be resistant...
Words: 528 - Pages: 3
...Foods network. Understanding the usefulness of a traffic analysis and the effect of latency response time and jitter are also necessary. Other aspects of developing an effective network design are understanding the effect of data rate on each part of the network and developing strategies to ensure the availability of network access in switched and routed networks. Communication protocols are the pre-defined set of rules which enable the networked devices to communicate effectively with each other. These protocols determine how messages are sent and received, detect and recover transmission errors and determine how messages are formatted. These protocols are important because they define the guidelines which determine how computers communicate with each other in a standardized manner. The protocol identified for Kudler Fine Foods is the Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol Suite. There are many advantages to using this protocol. It is compatible with all operating systems, hardware, software and network configurations. This protocol is routable and highly scalable which enables expansion of the network as needed. It also provides very reliable data delivery. The Suite includes protocols such as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP). HTTP transfers web pages including plain text, audio, video, images and hypertext. FTP transfers files from one computer to another. SMTP...
Words: 995 - Pages: 4
...Networking A network protocol is a set of rules and communication procedures used by all stations that exchange data networks. There are many network protocols, but they are not the same role, or the same approach. Some network protocols operate at multiple layers of the OSI model, others may specialize in the creation of a task with a single layer of the OSI model. A packet transmitted over the network comprises a plurality of information corresponding to each of the different processing of the protocol stack layers. Different protocol stacks can coexist on the same station, according to the model of communication. The packets are ordered so the transmission process tries first one then the other. A network with multiple segments should generally use a routable protocol. In a protocol stack, different protocols are organized, ordered, hierarchical, one after the other in order to accomplish a set of tasks corresponding to all or part of the OSI model. The operation of different protocols in the stack must be coordinated in order to prevent conflicts and unfinished operations. According to the OSI model, the process of transmitting data over a network is divided into several stages, in a fixed order. The OSI model distinguishes seven basic steps, and breaks down the process of data transmission in seven layers. The links are ranked them by priority. The binding order of the protocol stack determines the order in which the network operating system runs protocols. Thus...
Words: 687 - Pages: 3
...conducted internal penetration tests (also called a vulnerability scan) on each system and then helped secure those systems by configuring firewalls and removing vulnerable open ports. Lab Assessment Questions & Answers 1. What is the first Nmap command you ran in this lab? Explain the switches used. The first Nmap command I ran on the the lab was nmap -O -v 10.20.100.50. To explain the switches used winch are re presented with (-O) and (-v). (-O) means detect the operating system of the 10.20.100.50 machine and view or show the detail of the open ports. 2. What are the open ports when scanning 192.168.3.25 and their service names? After I have run the Nmap command for the 192.168.3.25 It show the port the were open such as port 80 HTTP hypertext transfer protocol, port 135 MSRPC Micro Soft Remote procedure Call, port 139 NetBios-ssn is use for file print sharing services. port 445 Microsoft AD Active Director services 3. What is the command line syntax for running an SMB vulnerability scan with Nmap against 10.20.100.50? The command to run gainst 10.20.100.50 is nma-p --script=smb-check -vulns -p445 notice that --script=smb-check-vulns -p445 4. Explain why SMBv2 DoS (CVE-2009-3103) is bad. The reason SMBv2 is because...
Words: 373 - Pages: 2
...UNIVERSIDAD SAN FRANCISCO DE QUITO Colegio de Ciencias de la Salud Ordenadores e Internet: Redes Gabriela Castellanos Morales Lenin Vinuesa, PhD, Director de Tesis Tesis de grado presentada como requisito para la obtención del título de Médico Veterinario Quito, 02 de Agosto del 2015 Universidad San Francisco de Quito Colegio de Ciencias de la Salud HOJA DE APROBACION DE TESIS Ordenadores e Internet: Redes Gabriela Castellanos Morales Lenin Vinuesa, PhD Director de Tesis Ivette Dueñas, M.S Miembro del Comité de Tesis Sebastián Galecio, M.S Miembro del Comité de Tesis Andrés Ortega, M.S Miembro del Comité de Tesis Ivette Dueñas, M.S Decano del Colegio de Medicina Veterinaria Quito, 02 de Agosto del 2015 © DERECHOS DE AUTOR Por medio del presente documento certifico que he leído la Política de Propiedad Intelectual de la Universidad San Francisco de Quito y estoy de acuerdo con su contenido, por lo que los derechos de propiedad intelectual del presente trabajo de investigación quedan sujetos a lo dispuesto en la Política. Asimismo, autorizo a la USFQ para que realice la digitalización y publicación de este trabajo de investigación en el repositorio virtual, de conformidad a lo dispuesto en el Art. 144 de la Ley Orgánica de Educación Superior. Firma: ------------------------------------------------------- Nombre: Gabriela Castellanos Morales C. I.: 1720874807 Fecha: 02 de Agosto del 2015 ...
Words: 4365 - Pages: 18
...Chapter 1 2 & 3 Review Questions Arcacia Godfrey 07/10/15 Mr. Gima (1). 1 bit represents one binary digit. (2). Kilobyte means approximately 106 byte. (3). 64 bits per quadruple word associated with each term. (4). The Random Access memory is used for short term memory and used to process data. (5). this is true the CPU tells the RAM which address holds the data that CPU wants to read. (6). A Character set determines in part what bits the computer stores. (7). the binary equivalent of decimal 123456789 stores in the RAM. (8). An Actuator arm is not a feature of a file system that might be used with a hard disk drive. (9). The Important features provides a convenient way to name a set of data for easier operations like copying and moving. The names gives users an easy way to reference the data and gives the CPU an easy way to identify the data it wants to read from RAM. (10). the classmate flash drive contents will not be usable by the classmate. (11). Changing the disk’s surface so that later the light will reflect differently for 0 or 1 describes how a hard disk drive physically writes a binary. (12). an internal hard disk drive is used for long term memory and connects to the CPU over a bus using a cable. (13). the components of an internal hard drive is an Actuator arm and platters. (14). RAM and optical disc drive are considered to be a solid state. (15). The Binary equivalent of decimal 123456789 the computer will need to consider. (16)....
Words: 1126 - Pages: 5
...Companies that sell luxury goods, such as Chanel, Lilly Pulitzer, and Vera Wang, were reluctant to offer their products for sale on their Web sites for many years. These businesses preferred to use their Web sites to display information about their products only and to sell their products through exclusive retail stores. Summarize the reasons these luxury goods producers might have been hesitant to sell online and speculate why they might have changed their thinking. [5] 2. You have decided to buy a new colour laser printer for your home office. List specific activities that you must undertake as you gather information about printer capabilities and features. Use the HPshopping.com, Office Depot, OfficeMax, and Staples Web sites to gather information. Write a short summary of the process you undertook so that others who plan to undertake a similar task can use your information. [5] 3. Choose one of the Web sites listed in the previous question and identify three ways in which the company has reduced its transaction costs by using a Web site to provide information about printers. List these three transaction cost−reduction elements and write a paragraph in which you discuss one transaction cost−reduction opportunity that you believe the company missed. [5] 4. Create a diagram (similar to the diagram in Figure 1-10) that describes the industry value chain for the retail book business. You can use the Online Companion links for this exercise to examine the Web sites...
Words: 259 - Pages: 2