Free Essay

Web-Based Programmed-Instruction in Php Programming

In:

Submitted By ymellereyes
Words 1258
Pages 6
Chapter 1

The Problem and Its Background

Introduction

The world of information has changed dramatically. These widespread changes may be considered a precursor to a second industrial revolution from which an information society may emerge. In the field of education, academic institutions are continuously challenged by social events unfolding in its midst. Developments in the workplace, changes in students’ demographics, and economic trends force educational institutions to change. Despite the improvement of educational institutions, employers and students have needs that the current education system failed to meet. In order to survive these upheavals, educators must improve their teaching and learning using technology.

Quality education calls for educator who can give quality teaching. Hence, quality teaching requires quality techniques. Techniques are the practices and refinement of presentations which an educator employs to make instructions more effective when using a specific method of teaching. Educators should select appropriate learning materials to associate learning into a larger whole. Cruz (2004) said that the nature of the computer subject calls for an intensive and comprehensive way of presenting the lessons through advanced technology.

The future ramifications of adopting technology into instructional settings can be significant and far-reaching and can produce a substantial and a direct result of technological innovations. Educational technology support plays a critical role in helping faculty add technology to their teaching (F. Moser, 2007)

Many educators, parents, and students believe that modern technology should be an integral part of education. This rationale is based on two major points. First is the widely accepted belief that technology plays an essential role in the educational system and that school and classrooms cannot deliver high-quality education without using technology-based methods. It was an established fact that applications of modern technology have contributed so much in improving learning process.

University students and instructors alike with little or no computer experience are often overwhelmed by the use of technology in the classroom. On the other end of the spectrum are those who are very proficient and comfortable in using computer-based technology. The specific technology installed in any university setting constantly changes in both sophistication and function. Classrooms are being wired so that faculty can use the latest software, incorporate electronic presentations into their teaching, present video, and/or connect to the Internet.

Higher education today requires that all students have a certain basic familiarity with the tools used throughout their educational programs. The continually advancing capabilities and the increasing variety of available functions and features result in a continuing need to test for the computer-skills necessary to ensure student success. Universities must accept the challenge of ensuring a technologically-adept student population.
Rapid technological advancements in contemporary workplaces require higher order thinking from employees. In preparing students for these workplaces, instructors and trainers in the field of technical education and training have an important role to play. They must provide opportunities for students to engage in higher order learning. In doing so, appropriate learning theories and pedagogical principles should be applied. With the increasing availability and accessibility of microcomputers, instruction that combines sound learning principles with the functionality of computers forms a potentially effective teaching method called computer-aided instruction (CAI).
The field known as Computer-Aided Instruction or CAI as it commonly called has guided considerable interest and support since the advent of microcomputers. More and more people, including those in supervisory positions are beginning to see the advantages both cost and time, in having training available in the workplace.

Meycauayan College, one of the prestigious institutions in Bulacan, aims to respond to the needs of the country by providing a well-balanced education emphasizing academic excellence enriched with moral values, formation of the human person by installing a sense of personal dignity and love of God and country leading to professional competence and responsible citizenship, through it’s Computer Education course takes pride to the challenges facing institution with the fast-rising global industrial trend brought by new technology. It envisions itself as a college of transparent and responsible members who commit themselves in the integral formation of self-reliant individuals who have strong faith in God equipped with knowledge, skills and virtues for excellent personal development, united to contribute towards the building of a peaceful, just and humane society.

As mentor, equipped with knowledge in computer technology, committed to the vision of the college, hereby presented a study on “Development of Web-based Programmed-Instruction Software in PHP: Hypertext Preprocessor Programming”. The nature of instructional delivery on the web has certainly become more open than the closed programmed instruction software available in the past. However, programmed-instruction has proven itself useful for some forms of learning via the web. It is worth considering how programmed-instruction was implemented for computer instruction in the past and how that might be combined with other theories to enhance instruction delivered by the Web.

PHP is an open source server-side and HTML-embedded scripting language for Web servers, which provide dynamic Web pages just like ASP, ColdFusion, Mod_Perl or JSP. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. PHP stands for PHP: Hypertext Preprocessor. This confuses many people because the first word of the acronym is the acronym. This type of acronym is called a recursive acronym. HP/FI 2.0 is an early and no longer supported version of PHP. PHP 3 is the successor to PHP/FI 2.0 and is a lot nicer. PHP 5 is the current generation of PHP, which uses the Zend engine 2 which, among other things, offers many additional OOP features. C and Perl developers will find it particularly intuitive to learn Dynamic Web pages are pages which interact with the user, so that each user visiting the page sees customized information - which may vary each time and which may be based on a form they've just filled in, or on information extracted from a database or some other external source. Typical applications include e-commerce, online newspapers, visitors' books, ticketing systems, project management, and other groupware projects. The traditional way to produce this type of dynamic page is via CGI scripts, but these are separate programs which must be executed as a new process for each page hit, so they scale badly and rapidly become memory and processor hogs as server load increases.

PHP solves this problem by becoming a part of the Web server, essentially extending the functionality of the server itself, so that the server can do the processing without having to spawn extra processes. It's not alone in doing this, but unlike most other scripting languages for Web page development PHP also offers excellent connectivity to most of the databases in use today. Perhaps the greatest advantage of PHP, when compared to other scripting languages such as ASP or ColdFusion, is that it is open source and cross-platform. PHP's natural home is on Linux servers running Apache server software, but it runs equally well on any other Unix or Windows platform, and can be used with other Web servers.

PHP started life as a Perl program written by Rasmus Lerdorf to track visitors to his online résumé. It was then rewritten in C and was extended to include support for database access. From these simple beginnings the open source community has expanded and developed PHP into a powerful server-side scripting language.

Imelda DC. Reyes
ymellereyes@yahoo.com

Similar Documents

Free Essay

Forex Analyst

...ANALYSIS OF PROGRAMMING LANGUAGE PARADIGMN BY GROUP 4 (M. Sc.) CSC 801 PROGRAMMING LANGUAGE PARADIGMNS TERM PAPER SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE, UNIVERSITY OF LAGOS, AKOKA June, 2015. ABSTRACT This is a survey on the programming languages paradigm: Imperative, Scripting, logic, Functional, object oriented and Markup. Our survey work involves a comparative study of these six programming languages with respect to the above programming paradigm using the following criteria: secure programming practices, web application development, OOP-based abstractions, reflection, Reusability, Portability, Reliability, Readability, Availability of compilers and tools, Familiarity, Expressiveness We study these languages in the context of the above mentioned criteria and the level of support they provide for each one of them. TABLE OF CONTENT 1. OVERVIEW OF PROGRAMMING LANGUAGE PARADIGMS 1.1 INTRODUCTION 1.2 CRITERIA OF LANGUAGE COMPARISON 2. IMPERATIVE LANGUAGES 2.1 Imperative Paradigm 2.1.2 Java as an Imperative Paradigm 2.1.3 Criteria 3. SCRIPTING LANGUAGES 3.1 Scripting Paradigm 3.2 Php as an Scripting Paradigm 3.3 Criteria 4. FUNCTIONAL LANGUAGES 4.1 Functional Paradigm 3.2 Php as an Scripting Paradigm 3.3 Criteria 5.1 LOGIC LANGUAGES 5.1.1 Readability 5.1.2 Ease of Learning 5.1.3 Ease of Maintenance 5.1.4 Extensibility 5.1.5 Pedagogy 5.1.6 Portability 6.1 OBJECT ORIENTED LANGUAGES (OOL) 6.1.1 Readability 6.1.2 Ease of Learning 6.1.3 Ease...

Words: 4013 - Pages: 17

Premium Essay

Computer Software

...software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it. In other words, software is a conceptual entity which is a set of computer programs, procedures, and associated documentation concerned with the operation of a data processing system. We can also say software refers to one or more computer programs and data held in the storage of the computer for some purposes. In other words software is a set of programs, procedures, algorithms and its documentation. Program software performs the function of the program it implements, either by directly providing instructions to the computer hardware or by serving as input to another piece of software. The term was coined to contrast to the old term hardware (meaning physical devices). In contrast to hardware, software is intangible, meaning it "cannot be touched".[1] Software is also sometimes used in a more narrow sense, meaning application software only. Sometimes the term includes data that has not traditionally been associated with computers, such as film, tapes, and records.[2] Examples of computer software include: * Application software includes end-user applications of computers such as word processors or video games, and ERP software for groups of users. * Middleware controls and co-ordinates distributed systems. * Programming languages define the syntax and semantics of computer programs. For example, many mature banking...

Words: 3223 - Pages: 13

Free Essay

Gvhjgjkbhjb

...Fax: Fax: 1-281-416-2806 E-mail: info@bipom.com Web: www.bipom.com 2 © 1996-2006 by BiPOM Electronics. All rights reserved. MINI-MAX/ARM Single Board Computer Technical Manual. No part of this work may be reproduced in any manner without written permission of BiPOM Electronics. All trademarked names in this manual are the property of respective owners. WARRANTY: BiPOM Electronics warrants MINI-MAX/ARM for a period of 1 year. If the board becomes defective during this period, BiPOM will at its option, replace or repair the board. This warranty is voided if the product is subjected to physical abuse or operated outside stated electrical limits. BiPOM Electronics will not be responsible for damage to any external devices connected to MINI-MAX/ARM. BiPOM Electronics disclaims all warranties express or implied warranties of merchantability and fitness for a particular purpose. In no event shall BiPOM Electronics be liable for any indirect, special, incidental or consequential damages in connection with or arising from the use of this product. BiPOM Electronics’ liability is limited to the purchase price of this product. 3 TABLE OF CONTENTS 1. OVERVIEW 2. SPECIFICATIONS 3. FUNCTIONAL BLOCKS 4. PERIPHERALS 5. SOFTWARE 6. BOARD LAYOUT 7. SCHEMATICS 4 5 5 14 14 15 16 4 1. Overview MINI-MAX/ARM-C and MINI-MAX/ARM-E are general purpose, low-cost, highly-reliable and highlyexpandable micro-controller systems, based on Philips LPC213x 32/16 bit ARM7TDMI-S CPU with...

Words: 2669 - Pages: 11

Premium Essay

Html

...The Missing Link: An Introduction to Web Development and Programming The Missing Link An Introduction to Web Development and Programming Michael Mendez SUNY Fredonia i The Missing Link An Introduction to Web Development and Programming by Michael Mendez Open SUNY Textbooks 2014 ©2014 Michael Mendez ISBN: 978-0-9897226-5-0 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Published by Open SUNY Textbooks, Milne Library (IITG PI) State University of New York at Geneseo, Geneseo, NY 14454 Cover design by William Jones Licensing This text is published by the Open SUNY Textbooks project under the Creative Commons 3.0 license format (see full length legal text at http://creativecommons.org/licenses/ by-sa/3.0/): You are free: 1. To share — to copy, distribute and transmit the work 2. To remix — to adapt the work 3. To make commercial use of the work Under the following conditions: 1. Attribution: You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). 2. Share Alike: If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. With the understanding that: 1. Waiver: Any of the above conditions can be waived if you get permission from the copyright holder. 2. Public Domain:...

Words: 78185 - Pages: 313

Premium Essay

Leo's Cuisine Point of Sale System

...CHAPTER 1 PROJECT BACKGROUND 1.1 Introduction The simple approach Open Data File for Input soon became fraught with all kinds of problems that needed to be addressed. Computer system vendors needed to be able to support the critical needs of a growing and evolving market place that supported the data processing needs of organizations in all fields of human endeavor1. So an innovation comes up – database and DBMS - as a remedy to these huge crises. A database is a collection of related files that are usually integrated, linked or cross-referenced to one another. The advantage of a database is that data and records contained in different files can be easily organized and retrieved using specialized database management software called a database management system (DBMS) or database manager. A database management system is a set of software programs that allows users to create, edit and update data in database files, and store and retrieve data from those database files all using a DBMS2. It consists of a combination of pre-written software programs controlling the following functions of a database: Storage; Organization; Management; Update; and Retrieval of data. A DBMS is categorized according to the data types and structures in use. It accepts and processes data requests from an application program, and responds by instructing the operating system to access and transfer the relevant data. With a DBMS in use, it is easier for an organization to make alterations to their...

Words: 9453 - Pages: 38

Premium Essay

Dphs Server

... Information is power. Providing significant and updated information is important to an administration because it is committed to promote transparency in school. It is grateful to a certain place that if it is linked to the rest of the world, it means that people could easily access vital information about the school. This set of web information could include data about the events of school or the school history, its vision and mission, its faculty and staff and its plans and programs. In this age of information, almost all fields of endeavor such as education, manufacturing, research, games, entertainment, and business treat information systems as a need. Indeed, every activity in our daily life today requires people to get involved in the use of information systems. Information technology is playing a crucial role in the development of modern society and social life. It has transformed the whole world into a global village. Now social life has moved to online. People are using discussion board, blogs and social networking sites through web-based technology to communicate digitally. World Wide Web, digital library, e-commerce and computer based distance learning have made our life easier. The advancement of information communication technology in developed country, education field should take advantage to upgrade their learning and management techniques. Students should be allowed to learn anytime, anywhere and at their own place. However, administration and lecture should...

Words: 22831 - Pages: 92

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...

Words: 3868 - Pages: 16

Premium Essay

Syllabus

...3 4 3 4 3 Credit 4 2 4 2 4 2 University External Marks 50 50 50 CSE361 CSE313 CSE363 AS301 EC316 EC366 EC317 EC367 Data Structures (Practical) Peripheral Devices & Interfaces Hardware Lab (Practical) Engineering Mathematics – III Digital Electronics Digital Electronics (Practical) Microprocessors Microprocessors (Practical) 0 3 0 3 3 0 3 0 15 0 1 0 1 1 0 1 0 5 3 0 2 0 0 2 0 2 09 3 4 2 4 4 2 4 2 29 2 4 1 4 4 1 4 1 25 50 50 50 50 250 Internal Total Sessional Marks 50 50 50 50 50 50 50 50 50 450 100 50 100 50 100 100 50 100 50 700 7. 8. Total ASC405 CSE 415 Analysis & Design of Algorithms Analysis & Design of Algorithms (Practical) Database Management System Database Management System (Practical) Object Oriented Programming Object Oriented Programming (Practical) Cyber Law & IPR Computer Architecture & Organization Internal Total Sessional Marks 50 100 50 50 50 50 50 50 100 50 100 50 3 3 15 0 1 4 0 0 9 3 4 28 3 4 25 50 50 250 50 50 400 100 100 650 2 Scheme of Examination of B.E. in Computer Science & Engineering Third Year - Fifth Semester Sr. Paper Subject Title Scheme of Teaching Univesity Internal Sessional Code External L T P Hou Credit Marks Total Marks rs s 1. CSE511 Operating System 3 1 0 4 4 50 50...

Words: 14784 - Pages: 60

Premium Essay

Social Information Technology

...Computer programming (often shortened to programming) is a process that leads from an original formulation of a computing problem to executable computer programs. Programming involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms including their correctness and resources consumption, and implementation (commonly referred to as coding[1][2]) of algorithms in a target programming language. Source code is written in one or more programming languages. The purpose of programming is to find a sequence of instructions that will automate performing a specific task or solving a given problem. The process of programming thus often requires expertise in many different subjects, including knowledge of the application domain, specialized algorithms and formal logic. Related tasks include testing, debugging, and maintaining the source code, implementation of the build system, and management of derived artifacts such as machine code of computer programs. These might be considered part of the programming process, but often the term "software development" is used for this larger process with the term "programming", "implementation", or "coding" reserved for the actual writing of source code. Software engineering combines engineering techniques with software development practices. Computer Programming Principles : Program Design Computer Programming is the process of writing, testing, troubleshooting, debugging and maintaining...

Words: 6404 - Pages: 26

Free Essay

Online Timetable System

...DEVELOPMENT OF LEGENDA ONLINE STUDENT TIME TABLE SYSTEM FINAL YEAR PROJECT FINAL REPORT ABUBAKAR MAGIRA TOM U0957657 A thesis submitted in part fulfillment of the degree of B.sc (Hons.) In Software Engineering with the supervision of Dr. Mia Torrez and moderated by Mdm Teo Siew School of Computer Science and Information Technology Linton University College In Collaboration with University of East London December 2012 DECLARATION I Abubakar Magira Tom, hereby declare that the project work entitled “[LEGENDA ONLINE STUDENT TIME TABLE]” submitted to [LINTON UNIVERSTIY COLLEGE], is a record of an original work done by me under the guidance of [Dr. MIA TORREZ], and this project work has not performed the basis for the award of any Degree or diploma/ associate ship /fellowship and similar project if any. ___________________ [ABUBAKAR MAGIRA TOM] Student Date: __________________ [Dr. MIA TORREZ] Supervisor Date: ___________________ Mdm TEO SIEW Project Coordinator Date: ACKNOWLEDGEMENT The special thank goes to my helpful supervisor, Dr Mia Torrez. The supervision and support that she gave truly help the progression and smoothness of my research topic. The cooperation is much indeed appreciated sir. My grateful thanks also go to both Mdm. TEO SIE. A big contribution and hard worked from both of you during the eight week is very great indeed. All projects during the program would be nothing without the enthusiasm and imagination...

Words: 48269 - Pages: 194

Free Essay

Innovation and Erp Systems

...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3 rd th TO 8 Semester 2014-2015 University Institute of Engineering and Technology, Panjab University, Chandigarh DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING VISION: To be recognized as an international leader in Computer Science and Engineering education and research to benefit society globally. MISSION: · · · · To move forward as frontiers of human knowledge to enrich the citizen, the nation, and the world. To excel in research and innovation that discovers new knowledge and enables new technologies and systems. To develop technocrats, entrepreneurs, and business leaders of future who will strive to improve the quality of human life. To create world class computing infrastructure for the enhancement of technical knowledge in field of Computer Science and Engineering. PROGRAMME: B.E. CSE (UG PROGRAMME) PROGRAMME EDUCATIONAL OBJECTIVES: I. Graduates will work as software professional in industry of repute. II. Graduates will pursue higher studies and research in engineering and management disciplines. III. Graduates will work as entrepreneurs by establishing startups to take up projects for societal and environmental cause. PROGRAMME OUTCOMES: A. Ability to effectively apply knowledge of computing, applied sciences and mathematics to computer science & engineering problems. B. Identify, formulate, research literature, and analyze complex computer science & engineering problems reaching substantiated conclusions...

Words: 23989 - Pages: 96

Free Essay

Home Automation

...REMOTELY CONTROLLED HOME AUTOMATION SYSTEM’ A thesis submitted in Patial fulfillment of the Requirements for the degree Bachelor of Technology in Information Technology by Saurav Chandra Anurag Sahu Anjali Agarwal Sachin Kushwaha Ved Prakash Gautamm to the COMPUTER SCIENCE AND ENGINEERING DEPARTMENT MOTILAL NEHRU NATIONAL INSTITUTE OF TECHNOLOGY allahabad May,2014 1 Undertaking We declare that the work presented in this thesis titled ”Remotely controlled Home automation” submitted to the Computer Science and engineering depatment,Motilal Nehru National Institute of Technology,Allahabad,for the awardof the Bachelor of Technology degree in Information Technology ,is our original work.We have not plagiarised orsubmitted tha same work for the award of any other degreeIn case this undertaking is found incorrect, we accept that our degree can be unconditionally withdrawn • Saurav Chandra May 2014, Allahabad • Anurag Sahu • Anjali Agarwal • Sachin Kushwaha • Ved Prakash Gautamm 2 Contents 1 Introduction 1.1 Project Overview . . . . . . . . . . . . 1.1.1 Automation . . . . . . . . . . . 1.1.2 Project Aim . . . . . . . . . . . 1.1.3 Project Scope and Limitations 1.1.4 Benefits of Project . . . . . . . 1.2 Report Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 4655 - Pages: 19

Free Essay

Student

...CONCEPTS OF PROGRAMMING LANGUAGES TENTH EDITION This page intentionally left blank CONCEPTS OF PROGRAMMING LANGUAGES TENTH EDITION R OB E RT W. S EB ES TA University of Colorado at Colorado Springs Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Executive Editor: Matt Goldstein Editorial Assistant: Chelsea Kharakozova Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Marketing Assistant: Emma Snider Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell Cover Designer: Anthony Gemmellaro Text Designer: Gillian Hall Cover Image: Mountain near Pisac, Peru; Photo by author Media Editor: Dan Sandin Full-Service Vendor: Laserwords Project Management: Gillian Hall Printer/Binder: Courier Westford Cover Printer: Lehigh-Phoenix Color This book was composed in InDesign. Basal font is Janson Text. Display font is ITC Franklin Gothic. Copyright © 2012, 2010, 2008, 2006, 2004 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured...

Words: 142312 - Pages: 570

Free Essay

Concepts of Programming Languages

...CONCEPTS OF PROGRAMMING LANGUAGES TENTH EDITION This page intentionally left blank CONCEPTS OF PROGRAMMING LANGUAGES TENTH EDITION R O B E RT W. S EB ES TA University of Colorado at Colorado Springs Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Executive Editor: Matt Goldstein Editorial Assistant: Chelsea Kharakozova Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Marketing Assistant: Emma Snider Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell Cover Designer: Anthony Gemmellaro Text Designer: Gillian Hall Cover Image: Mountain near Pisac, Peru; Photo by author Media Editor: Dan Sandin Full-Service Vendor: Laserwords Project Management: Gillian Hall Printer/Binder: Courier Westford Cover Printer: Lehigh-Phoenix Color This book was composed in InDesign. Basal font is Janson Text. Display font is ITC Franklin Gothic. Copyright © 2012, 2010, 2008, 2006, 2004 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States...

Words: 142253 - Pages: 570

Free Essay

Usability and Security

...Running Head: USABLE SECURITY THE IMPLEMENTATION Usable Security the Implementation Name Institution Abstract This project was about usability security and its implementation. It involved the designing and development of a suitable human computer interface to provide a log on module for the Kuwait armed forces computer system. The development focused on relieving the user from the load of creating, remembering and maintaining their passwords for the login process. Based on the fact that the Kuwait information and communication technology literacy levels are still in their infancy stage, the conventional authentication system was proved unfriendly to the user. This system was developed with this in mind. This proposed system relies on the user logging in to the system after identifying five pictures they uploaded earlier from among a grid of twenty five pictures. By selecting the five correct pictures which they uploaded, the system was able to successfully authenticate the user. Using these pictures greatly reduced the mental load on a user who was required to remember strong passwords that ended up being compromised (Badre 2002). The use of pictures or graphical images for authentication or access control is a practice called biometrics that is gaining popularity in establishing system security today. Due to the need to deliver a solution in the shortest time possible the...

Words: 17373 - Pages: 70