Professional Documents
Culture Documents
A. Search engine.
A search engine is a software program or script available through the
Internet that searches documents and files for keywords and returns the
results of any files containing those keywords. Today, there are
thousands of different search engines available on the Internet, each
with their own abilities and features. The first search engine ever
developed is considered Archie, which was used to search for FTP files
and the first text-based search engine is considered Veronica. Today, the
most popular and well-known search engine is Google. Other popular search
engines include AOL, Ask.com, Baidu, Bing and Yahoo.
How to access a search engine
For users, a search engine is accessed through a browser on their
computer, smartphone, tablet, or another device. Today, most new browsers
use an Omnibox, which is a text box at the top of the browser that shows
the address and is where you can also search on the Internet . You can
also visit one of the major search engines home page to perform a search.
How a search engine works
Because large search engines contain millions and sometimes billions of
pages, many search engines not only just search the pages but also
display the results depending upon their importance. This importance is
commonly determined by using various algorithms.
B. Smartphones.
A smartphone is a handheld personal computer with a mobile operating
system and an integrated mobile broadband cellular network connection for
voice, SMS, and Internet data communication; most if not all smartphones
also support Wi-Fi. Smartphones are typically pocket-sized, as opposed to
tablets, which are much larger than a pocket. They are able to run a
variety of third-party software components ("apps") from places like the
Google Play Store or Apple App Store, and can receive bug fixes and gain
additional functionality through operating system software updates.
Modern smartphones have a touchscreen color display with a graphical user
interface that covers the front surface and enables the user to use a
virtual keyboard to type and press onscreen icons to activate "app"
features. They integrate and now largely fulfill most people's needs for
a telephone, digital camera and video camera, GPS navigation, a media
player, clock, news, calculator, web browsing, handheld video games,
flashlight, compass, an address book, a note-taking application, digital
messaging, an event calendar, etc. Typical smartphones will include one
or more of the following sensors: magnetometer, proximity sensor,
barometer, gyroscope or accelerometer. Since the early 2010's,
smartphones have adopted integrated virtual assistants, such as Siri,
Google Assistant, Alexa, Cortana, and Bixby. Most smartphones produced
from 2012 onward have high-speed mobile broadband 4G LTE, motion sensors,
and mobile payment features.
In 1999 the Japanese firm NTT DoCoMo released the first smartphones to
achieve mass adoption within a country.Smartphones became widespread in
the late 2000s, following the release of the iPhone. In the third quarter
of 2012, one billion smartphones were in use worldwide. Global smartphone
sales surpassed the sales figures for feature phones in early 2013.
C.E-mail
Electronic Mail (email or e-mail) is a method of exchanging messages
between people using electronic devices. Email first entered substantial
use in the 1960s and by the mid-1970s had taken the form now recognized
as email. Email operates across computer networks, which today is
primarily the Internet. Some early email systems required the author and
the recipient to both be online at the same time, in common with instant
messaging. Today's email systems are based on a store-and-forward model.
Email servers accept, forward, deliver, and store messages. Neither the
users nor their computers are required to be online simultaneously; they
need to connect only briefly, typically to a mail server or a webmail
interface, for as long as it takes to send or receive messages.
Unit 5
A. Using social media effectively
1. Develop a comprehensive social media strategy.While Facebook And
Twitter are the most used social media platforms, a comprehensive social
media strategy should incorporate additional social media platforms where
customers, prospects, employees and candidates could be talking about the
company. Some examples include:Business networking and hiring platforms
such as LinkedinIndustry-specific platforms, e.g. travel
forums,automotive message boardsSpecialty multimedia sharing sites such
as YouTube and PinterestCountry-specific platforms such as Renren.comTo
be able to know which social media platforms to incorporate as part of
its social media strategy, a company needs to systematically track top
platforms where the company and its brands are being discussed.2.
Establish a two-way communication model.Companies who use social media
just to disseminate information to customers may not see high returns
from social media usage. Instead, companies who use social media
platforms as a two-way communication medium tend to have a more
successful social media approach. There are several tactics that can be
used to establish two-way communication, including:Posting questions and
surveys related to the company as well as general topics of
interestsGetting customers, prospects, employees, andcandidates to share
their queries and experiences related to the company and its products, as
well as themes related to the company’s business (e.g., best travel
stories).This can even extend to the sharing of photosand videosSet up
dedicated customer service pages, tabs, or handles, as well as dedicated
candidate query pages, with a promise of highresponsivenessDoing this
requires constant focus on generatingnew ideas and content for social
media, as well as the ability to post content and responses in a highly
efficient and streamlined manner.3. Retain control of content being
posted on behalf of the company.Some companies tend to outsource their
social media asset management to their advertising partners. In such
situations, however, companies should make sure they retain control of
and full editorial rights to what is being posted on their behalf.
Companies can do this by putting in placed automated approval workflows
and escalation processes between their partners and internal teams.4. Set
targets and measure performance.It is critical for companies embarking on
social media initiatives to set targets, measure performance against
those targets, and comparetheir performance against competitors. What is
measured gets improved. Some of the key performance indicators to track
include:Share of social media conversations for the company/brand vis-à-
vis competitorsPositive and negative sentiment for the company/brand vis-
à-vis competitorsMonthly addition in number of social media
followersAverage time taken to respond to comments by social media users
by type of comment (e.g. positive feedback, customer service
issue)Percent of résumés being sourced via social media, and percent of
positions being closed through social media
B. Blogs
A blog is a website using special software to create a series of articles
and pages containing various information they wish to share with the
world.Blog is short for weblog. Weblogs started out as an online means of
journaling. People originally used weblogs (blogs) as online diaries but
today they can be used for lots of different things.Blog posts (entries)
are shown in reverse chronological order on the home page of the blog.
Types of Blogs
There are various types of blogs around now.
*.Personal blogs – blogs that people write about their personal life
*.Corporate blogs – businesses have blogs to keep customers informed on
what’s new or to share information about their products or services.
*.Media blogs – news type blogs where the author(s) post the latest news
information related to a subject.
*.Topical blogs – blogs that focus on one topic. Basic Computer
Information is a topical blog for example, and so isWeb Page Mistakes.
C. Forum
Definition:
An online community where visitors may read and post topics of common
interest.
Information:
Forums can be a useful for anyone doing business online, both in terms of
reading the content and actively participating in the discussions.Reading
a forum’s archives can be a good way to obtain a basic knowledge about a
topic, and it also provides a historical perspective on trends and
opinions.Participation, whether as a member, moderator, or owner, can
help one achieverecognition within a business community, and may even
generate highly-qualified business leads. Forums differ, however, intheir
treatment of self-promotion; some disallow any hint of self-promotion,
some are geared specifically towards self-promotion, and many fall
somewhere in between, limiting URL’s to an off-the-page member profile.It
is very important to read the terms and conditions of each particular
forum for a basic guideline as to what is acceptable. Additionally, it is
a good idea to read archived posts in order to see the guidelines in
action. Failure to do so can have negative consequences, including
tarnishing your site’s reputation and getting permanently banned from the
community.
The core issues surrounding computer ethics are based on the scenarios
arising from the use of the Internet, such as Internet privacy, the
publication of copyrighted content and user interaction with websites,
software and related services.
Etiquette :
Online etiquette is ingrained into culture, etiquettein technology is a
fairly recent concept. The rules of etiquette that apply when
communicating over the Internet or social networks or devices are
different from those applying when communicating in person or by audio
(such as telephone) orvideophone(such asSkype video). It is a social code
of network communication.Communicating with others via the Internet
without misunderstandings in theheat of the momentcan be challenging,
mainly becausefacial expressionsandbody languagecannot be interpreted
incyberspace. Therefore, several recommendations to attempt to safeguard
against these misunderstandings have been proposed.
unit 6
A.Motivation
Motivation is the driving force which help causes us to achieve goals.
Motivation is said to be intrinsic or extrinsic. The term is generally
used for humans but, theoretically, it can also be used to describe the
causes for animal behavior as well. This article refers to human
motivation. According to various theories, motivation may be rooted in a
basic need to minimize physical pain and maximize pleasure, or it may
include specific needs such as eating and resting, or a desired object,
goal, state of being, ideal, or it may be attributed to less-apparent
reasons such as altruism, selfishness, morality, or avoiding mortality.
Conceptually, motivation should not be confused with either volition or
optimism. Motivation is related to, but distinct from, emotion
5 Importance of Motivation:
(1) Improves Performance Level
(2) Helps to Change Negative or Indifferent Attitudes of Employees
(3) Reduction in Employee Turnover
(4) Helps to Reduce Absenteeism in the Organisation
(5) Reduction in Resistance to Change
B.evaluating effectiveness
C.Adaptability
Adaptability (Latin: adaptō "fit to, adjust") is a feature of a system or
of a process. This word has been put to use as a specialised term in
different disciplines and in business operations. Word definitions of
adaptability as a specialised term differ little from dictionary
definitions. According to Andresen and Gronau[1] adaptability in the
field of organizational management can in general be seen as an ability
to change something or oneself to fit to occurring changes. In ecology,
adaptability has been described as the ability to cope with unexpected
disturbances in the environment.
With respect to business and manufacturing systems and processes
adaptability has come to be seen increasingly as an important factor for
their efficiency and economic success. In contrast, adaptability and
efficiency are held to be in opposition to each other in biological and
ecological systems, requiring a trade-off, since both are important
factors in the success of such systems.[2] To determine the adaptability
of a process or a system, it should be validated concerning some
criteria.
D.Technical issues
Many students are not provided with the high bandwidth or the strong
internet connection that online courses require, and thus fail to catch
up with their virtual classmates: Their weak monitors make it hard to
follow the Course Management System and their learning experience becomes
problematic. Moreover, most of them live off campus and find it difficult
to keep in tune with the technical requirements of the chosen course.
Some of them don't even own computers and seek help in Learning Resource
Centers for technical assistance. The only solution to this problem is
knowing exactly what kind of technological support they will need for
E.Time management
Time management is the process of planning and exercising conscious
control over the amount of time spent on specific activities, especially
to increase effectiveness, efficiency or productivity. It is a juggling
act of various demands of study, social life, employment, family, and
personal interests and commitments with the finiteness of time. Using
time effectively gives the person "choice" on spending/ managing
activities at their own time and expediency.[1]
Techopedia explainsThreat:
Threats are potentials for vulnerabilities to turn into attacks on
computer systems, networks, and more. They can put individuals’ computer
systems and business computers at risk, so vulnerabilities have to be
fixed so that attackers cannot infiltrate the system and cause
damage.Threats can include everything from viruses, trojans, back doors
to outright attacks from hackers. Often, the term blended threat is more
accurate, as the majority of threats involve multiple exploits. For
example, a hacker might use a phishing attack to gain information abouta
network and break into a network.
B.Desktop And Mobile Security
Mobile Security:
More and more users and businesses use smartphones to communicate, but
also to plan and organize their users' work and also private life. Within
companies, these technologies are causing profound changes in the
organization of information systems and therefore they have become the
source of new risks. Indeed, smartphones collect and compile an
increasing amount of sensitive information to which access must be
controlled to protect the privacy of the user and the intellectual
property of the company.
Desktop Security:
Desktop security is not just a matter of protecting your own machine and
the data on it. When a machine is compromised, one of the most common
outcomes is that it is used to launch attempts to break in to, or disrupt
service on, other systems located at Penn or anywhere on the Internet.
Given the automated tools currently available to find machines that can
be compromised and then exploit them, this is a serious concern.
C.Cyber Security
Cybersecurity is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from attack,
damage or unauthorized access. In a computing context, security includes
both cybersecurity and physical security.
Ensuring cybersecurity requires coordinated efforts throughout an
information system. Elements of cybersecurity include:
1.Application security
2.Information security
3.Network security
4.Disaster recovery / business continuity planning
5.Operational security
6.End-user education
unit8
A.Mooc
A massive open online course (MOOC) is a free Web-based distance learning
program that is designed for the participation of large numbers of
geographically dispersed students.
The word MOOC was coined in 2008 by Dave Cormier, from the University of
Prince Edward Island for a course offered by the University of Manitoba,
"Connectivism and Connective Knowledge." There were 25 tuition-paying
students from university and 2,300 non-paying students from the general
public who took the course online. There were RSS feeds for material and
participation was facilitated through a variety of venues including
Moodle (a learning management system), blog posts, Second Life and real-
time online meetings.
B.open Educational resources
Open educational resources (OER) are freely accessible, openly licensed
text, media, and other digital assets that are useful for teaching,
learning, and assessing as well as for research purposes. There is no
universal usage of open file formats in OER.
The term OER designs publicly accessible materials and resources for any
user to use, re-mix, improve and redistribute under some licenses.
The development and promotion of open educational resources is often
motivated by a desire to provide an alternate or enhanced educational
paradigm.
Definitions
"OER are teaching, learning, and research resources that reside in the
public domain or have been released under an intellectual property
license that permits their free use and re-purposing by others. Open
educational resources include full courses, course materials, modules,
textbooks, streaming videos, tests, software, and any other tools,
materials, or techniques used to support access to knowledge."
C.Mobile Apps
A mobile app is a computer program designed to run on a mobile device
such as a phone/tablet or watch.
Mobile applications often stand in contrast to desktop applications that
run on desktop computers, and with web applications which run in mobile
web browsers rather than directly on the mobile device.
The term "app" is a shortening of the term "software application". It has
become very popular, and in 2010 was listed as "Word of the Year" by the
American Dialect Society.In 2009, technology columnist David Pogue said
that newer smartphones could be nicknamed "app phones" to distinguish
them from earlier less-sophisticated smartphones.
Most such devices are sold with several apps bundled as pre-installed
software, such as a web browser, email client, calendar, mapping program,
and an app for buying music or other media or more apps. Some pre-
installed apps can be removed by an ordinary uninstall process, thus
leaving more storage space for desired ones. Where the software does not
allow this, some devices can be rooted to eliminate the undesired apps.
Apps that are not preinstalled are usually available through distribution
platforms called app stores. They began appearing in 2008 and are
typically operated by the owner of the mobile operating system, such as
the Apple App Store, Google Play, Windows Phone Store, and BlackBerry App
World. However, there are independent app stores, such as Cydia, GetJar
and F-Droid. Some apps are free, while others must be bought. Usually,
they are downloaded from the platform to a target device, but sometimes
they can be downloaded to laptops or desktop computers. For apps with a
price, generally a percentage, 20-30%, goes to the distribution provider
(such as iTunes), and the rest goes to the producer of the app.The same
app can therefore cost a different price depending on the mobile
platform.