This document discusses various communication applications, including flyers, brochures, newsletters, websites, and business cards. Flyers and posters can be created using word processors or desktop publishing software and images from the internet. Websites provide global reach but require maintenance. Business cards and letterheads help promote companies professionally. The document also describes internet telephony using Voice over Internet Protocol (VoIP) to allow calling over the internet.
Tweak the Tweet is an idea for utilizing the Twitter platform as a two-way communication channel for information during emergencies, crises, and disasters. Researchers in the area of crisis informatics have recognized that social media sites are places that people turn to during major events to both inform others and to get information from others. Tweak the Tweet seeks to formalize some of these communications to make the information shared more easily processed and redistributed back to the public.
Tweak the Tweet is an idea for utilizing the Twitter platform as a two-way communication channel for information during emergencies, crises, and disasters. Researchers in the area of crisis informatics have recognized that social media sites are places that people turn to during major events to both inform others and to get information from others. Tweak the Tweet seeks to formalize some of these communications to make the information shared more easily processed and redistributed back to the public.
XPages: You Know the 'How to'. Now Learn the 'Why and What'.Teamstudio
XPages: everybody wants them, and there are lots of great resources on how to add XPages to your applications, but they all show you the 'how'. There are a couple of critical decisions to make before you get to that point.
Before you start development, you need to identify which applications you're going to web-enable or mobilize. Then, within the identified apps, you need to identify which functions need to be web-enabled or mobilized. This webinar will help you identify which applications are good candidates for web-enablement or mobilization, and which are not. You'll discover reasons why they are or are not a good fit. Learn ways to analyze your portfolio of IBM Notes applications, and come up with a list of which applications to move to XPages and what functionality in those applications should be updated. You'll leave this webinar armed with the knowledge to make informed decisions about bringing your applications to the web and to mobile devices.
MBA 5401, Management Information Systems 1 Course Lea.docxaryan532920
MBA 5401, Management Information Systems 1
Course Learning Outcomes for Unit III
Upon completion of this unit, students should be able to:
8. Analyze the importance of software, hardware, and telecommunications to the business.
8.1 Examine how technologies such as software, hardware, and telecommunications support
business operations.
8.2 Explain current technologies used in organizations.
8.3 Explain emerging technologies in business.
Reading Assignment
Chapter 5:
IT Infrastructure and Emerging Technologies
Chapter 7:
Telecommunications, the Internet, and Wireless Technology
Unit Lesson
IT Infrastructure and Technology
How are IT infrastructure and emerging technologies important to organizations? In the last unit, we
talked about the role that information technology (IT) plays in organizations and business strategy. In this unit,
we will discuss a natural continuation of that topic with a focus on emerging technologies and communication
technologies such as wireless technology, the Internet, and telecommunications.
What is IT infrastructure? If you remember from the textbook reading in Chapter 1, our IT infrastructure
includes the shared technology resources that provide the platform supporting our information systems
applications. IT infrastructure includes everything technical that supports the business. It supports both the
business and IT strategies.
Think of it this way: If our strategy is to offer our customer a specific service such as electronic invoicing
(EDI), how can we do that without the infrastructure in place to carry out that goal? The IT infrastructure in this
case is the EDI software, the hardware (a server, database, and the Internet), the personnel, educational
services, management services, and so on.
How has the IT infrastructure evolved over time? Most of us have a sense of the scope’s answer to this
question. It is enormous! Just look at computers—the first ones were huge. Businesses used mainframes the
size of trucks, and now servers are the size of a desktop.
Simple applications of the past have now become suites, or bundles of applications that can work together.
Now, there are enterprise-level applications that help improve an organization’s productivity and efficiency via
a collection of programs with common business applications. They are designed to be customizable to solve
enterprise-wide problems rather than personal or departmental problems.
In addition, there are newly emerging enterprise-level tools such as enterprise database management
software. Again, this concept of enterprise level takes the already existing tools to a different level to answer
the need for more storage and enterprise-wide sharing.
Years ago, dialing into the Internet meant using a slow modem. Now, businesses can use fiber-optic and
wireless technologies. In the past, for small to medium-sized organizations, many of the emerging
UNIT III STUDY GUIDE
Infrastru ...
Tweak the Tweet is an idea for utilizing the Twitter platform as a two-way communication channel for information during emergencies, crises, and disasters. Researchers in the area of crisis informatics have recognized that social media sites are places that people turn to during major events to both inform others and to get information from others. Tweak the Tweet seeks to formalize some of these communications to make the information shared more easily processed and redistributed back to the public.
Tweak the Tweet is an idea for utilizing the Twitter platform as a two-way communication channel for information during emergencies, crises, and disasters. Researchers in the area of crisis informatics have recognized that social media sites are places that people turn to during major events to both inform others and to get information from others. Tweak the Tweet seeks to formalize some of these communications to make the information shared more easily processed and redistributed back to the public.
XPages: You Know the 'How to'. Now Learn the 'Why and What'.Teamstudio
XPages: everybody wants them, and there are lots of great resources on how to add XPages to your applications, but they all show you the 'how'. There are a couple of critical decisions to make before you get to that point.
Before you start development, you need to identify which applications you're going to web-enable or mobilize. Then, within the identified apps, you need to identify which functions need to be web-enabled or mobilized. This webinar will help you identify which applications are good candidates for web-enablement or mobilization, and which are not. You'll discover reasons why they are or are not a good fit. Learn ways to analyze your portfolio of IBM Notes applications, and come up with a list of which applications to move to XPages and what functionality in those applications should be updated. You'll leave this webinar armed with the knowledge to make informed decisions about bringing your applications to the web and to mobile devices.
MBA 5401, Management Information Systems 1 Course Lea.docxaryan532920
MBA 5401, Management Information Systems 1
Course Learning Outcomes for Unit III
Upon completion of this unit, students should be able to:
8. Analyze the importance of software, hardware, and telecommunications to the business.
8.1 Examine how technologies such as software, hardware, and telecommunications support
business operations.
8.2 Explain current technologies used in organizations.
8.3 Explain emerging technologies in business.
Reading Assignment
Chapter 5:
IT Infrastructure and Emerging Technologies
Chapter 7:
Telecommunications, the Internet, and Wireless Technology
Unit Lesson
IT Infrastructure and Technology
How are IT infrastructure and emerging technologies important to organizations? In the last unit, we
talked about the role that information technology (IT) plays in organizations and business strategy. In this unit,
we will discuss a natural continuation of that topic with a focus on emerging technologies and communication
technologies such as wireless technology, the Internet, and telecommunications.
What is IT infrastructure? If you remember from the textbook reading in Chapter 1, our IT infrastructure
includes the shared technology resources that provide the platform supporting our information systems
applications. IT infrastructure includes everything technical that supports the business. It supports both the
business and IT strategies.
Think of it this way: If our strategy is to offer our customer a specific service such as electronic invoicing
(EDI), how can we do that without the infrastructure in place to carry out that goal? The IT infrastructure in this
case is the EDI software, the hardware (a server, database, and the Internet), the personnel, educational
services, management services, and so on.
How has the IT infrastructure evolved over time? Most of us have a sense of the scope’s answer to this
question. It is enormous! Just look at computers—the first ones were huge. Businesses used mainframes the
size of trucks, and now servers are the size of a desktop.
Simple applications of the past have now become suites, or bundles of applications that can work together.
Now, there are enterprise-level applications that help improve an organization’s productivity and efficiency via
a collection of programs with common business applications. They are designed to be customizable to solve
enterprise-wide problems rather than personal or departmental problems.
In addition, there are newly emerging enterprise-level tools such as enterprise database management
software. Again, this concept of enterprise level takes the already existing tools to a different level to answer
the need for more storage and enterprise-wide sharing.
Years ago, dialing into the Internet meant using a slow modem. Now, businesses can use fiber-optic and
wireless technologies. In the past, for small to medium-sized organizations, many of the emerging
UNIT III STUDY GUIDE
Infrastru ...
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxADDY50
IT 700 Final Project Guidelines and Rubric
Overview
As the final stop in your journey toward your Master of Science in Information Technology, you will complete a capstone project that integrates the knowledge and skills you have developed in previous coursework and over the duration of the term by working to solve an information technology problem. To do this, you will develop a project proposal that identifies the problem you plan to solve. You will then design your solution and report on the implementation of your solution. You will also reflect on your project and your journey through the Information Technology (IT) program as well as how you plan to position yourself professionally.
Evaluation of Capstone
This capstone will be assessed somewhat differently than other courses you have taken online at SNHU. There are three separate components which will be submitted at different times during the course; however, they all operate together to comprise the whole capstone experience and
are not
assessed separately. You will be evaluated on all three as a unit in determining whether you have demonstrated proficiency in each outcome. Your work is expected to meet the highest professional standards.
This assessment will evaluate your mastery with respect to the following outcomes:
·
Develop innovative and agile, computer-based solutions to business problems through a systems analysis approach and technology integration and application
·
Design a plan for implementing and monitoring solutions that incorporate core information technologies, concepts, and methods appropriate for secure information use across an enterprise
·
Collaborate and communicate effectively in a variety of environments through situational awareness and audience analysis
·
Develop an implementation plan for systematic information risk assessment for change management plans and processes within enterprise business and information technology environments
·
Using computational logic and critical analysis, construct ethically sound, technology-informed procedures to ensure legal compliance and maintain security within enterprise information technology environments
Prompt
To simulate a real work environment, your capstone project will progress from developing a project proposal, to reporting on the design and creation of a project solution, to reflecting on the capstone experience. As you can see, writing is an important part of this capstone experience. IT professionals are not typically known for being great writers; however, successful IT professionals employ quality communication skills. The proposal, report, and reflection are opportunities for you to exhibit your superior written communication skills.
Working individually and with feedback from peers and your instructor, you will analyze a real-world problem that can be solved with information technology. The problem needs to have significance to your chosen discipline (database design, software progra ...
This is a presentation for my final year project at the Unicaf university. it was a description more about a social networking site where users in a society get to communicate to each other online using their smartphones or laptops
IWMW 2004: Life After Email Strategies For Collaboration in the 21st CenturyIWMW
Slides for plenary talk on "Life After Email Strategies For Collaboration in the 21st Century" given at the IWMW 2004 event held at the University of Birmingham on 27-29 July 2004.
See http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2004/talks/kelly/
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxADDY50
IT 700 Final Project Guidelines and Rubric
Overview
As the final stop in your journey toward your Master of Science in Information Technology, you will complete a capstone project that integrates the knowledge and skills you have developed in previous coursework and over the duration of the term by working to solve an information technology problem. To do this, you will develop a project proposal that identifies the problem you plan to solve. You will then design your solution and report on the implementation of your solution. You will also reflect on your project and your journey through the Information Technology (IT) program as well as how you plan to position yourself professionally.
Evaluation of Capstone
This capstone will be assessed somewhat differently than other courses you have taken online at SNHU. There are three separate components which will be submitted at different times during the course; however, they all operate together to comprise the whole capstone experience and
are not
assessed separately. You will be evaluated on all three as a unit in determining whether you have demonstrated proficiency in each outcome. Your work is expected to meet the highest professional standards.
This assessment will evaluate your mastery with respect to the following outcomes:
·
Develop innovative and agile, computer-based solutions to business problems through a systems analysis approach and technology integration and application
·
Design a plan for implementing and monitoring solutions that incorporate core information technologies, concepts, and methods appropriate for secure information use across an enterprise
·
Collaborate and communicate effectively in a variety of environments through situational awareness and audience analysis
·
Develop an implementation plan for systematic information risk assessment for change management plans and processes within enterprise business and information technology environments
·
Using computational logic and critical analysis, construct ethically sound, technology-informed procedures to ensure legal compliance and maintain security within enterprise information technology environments
Prompt
To simulate a real work environment, your capstone project will progress from developing a project proposal, to reporting on the design and creation of a project solution, to reflecting on the capstone experience. As you can see, writing is an important part of this capstone experience. IT professionals are not typically known for being great writers; however, successful IT professionals employ quality communication skills. The proposal, report, and reflection are opportunities for you to exhibit your superior written communication skills.
Working individually and with feedback from peers and your instructor, you will analyze a real-world problem that can be solved with information technology. The problem needs to have significance to your chosen discipline (database design, software progra ...
This is a presentation for my final year project at the Unicaf university. it was a description more about a social networking site where users in a society get to communicate to each other online using their smartphones or laptops
IWMW 2004: Life After Email Strategies For Collaboration in the 21st CenturyIWMW
Slides for plenary talk on "Life After Email Strategies For Collaboration in the 21st Century" given at the IWMW 2004 event held at the University of Birmingham on 27-29 July 2004.
See http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2004/talks/kelly/
Similar to Chapter-6.1---Communication-Apps-(SAMPLE).pdf (20)
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Chapter-6.1---Communication-Apps-(SAMPLE).pdf
1. Starter – What am I?
You can use me to
create flyers,
brochures and
newsletters
You browse me at
least once a day
(probably!)
You can listen to me
through a speaker
or headphone
When you were
young, you watched
a lot of me
You use it to call
your friends
I am a small
rectangle card used
to promote
companies
DTP Software Websites Music Score
Cartoons Mobile Phone Business Card
Websites / Music Scores / Business Cards / Mobile Phone / DTP Software / Cartoons
3. • Identify a range of
communication applications
Must
• Describe the use of internet telephony,
including Voice over Internet Protocol
(VoIP)
Should
• Evaluate the use of applications for
public and corporate publications
Could
Learning Objectives 6.1 Communication applications
4. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
What is “Communication”?
Write a definition in your booklets now!
“the act of transferring information
from one place, person or group to
another.”
5. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Mind Map
Communication
methods
6. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Flyers, Posters, Brochures & Newsletters
•Flyers and posters can be
produced very easily using
various software packages
• Word processor
• DTP (Desktop Publishing)
•Images will be taken from the
internet to use in the flyer or
poster
7. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Steps in creating a poster…
1. Open a word processor, DTP application
2. Create frames, boxes and text boxes
3. Take photos using a camera
4. Upload the images, scan photos, or
download form the internet
5. Save photos to a file
6. Import or copy and paste into the
document
7. Edit the photos and type the text required
8. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Differences in each
• Using your course books, identify the differences between a
brochure, flyer and poster
9. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Websites
• Rather than producing flyers/posters
by printing them this method of
advertising requires the development
of a website
• Can develop themselves**
• Must have their own team of developers
• Need necessary hardware/software
• Ensure it’s safe from hackers
• EXPENSIVE!
• Pay another company to do it
10. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Task! Comparing Websites & Posters
•Compare and contrast Websites to Paper
advertising methods by listing 3 advantages
and 3 disadvantages of using a Website to
advertise
11. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Task! Comparing Websites & Posters
• Advantages
• Can add sound, video, links and animation
• Use of hotspots
• Buttons to navigate and move around the website
• Global audience
• Can’t be thrown away or defaced
• Easy to update rather than printing new versions
• Disadvantages
• Can be hacked / pharmed
• Need to maintain website to keep it up to date
• Necessary for the customer to have a computer and internet
• Harder to hit target audience. Advertising requires skills
12. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Task! Comparing Websites & Posters
•Continue research into 3 other methods of
advertising using ICT and make notes in
your booklet
13. • Identify a range of
communication applications
Must
• Describe the use of internet telephony,
including Voice over Internet Protocol
(VoIP)
Should
• Evaluate the use of applications for
public and corporate publications
Could
Checkpoint 1
14. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Internet Telephony (VoIP)
• Method used to talk with people using
the internet
• Voice over Internet Protocol
• Usually free (or cheaper) anywhere in
the world if both computers have
VoIP telephones
• Webcam also used to provide video
conferencing
15. • Identify a range of
communication applications
Must
• Describe the use of internet telephony,
including Voice over Internet Protocol
(VoIP)
Should
• Evaluate the use of applications for
public and corporate publications
Could
Checkpoint 2
16. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Business Cards and letterheads
• Business cards are used by companies for
many reasons:
• Professionalism
• A brand awareness (advertises the company)
• Legal reasons (if anyone takes legal action, they have
proof of communication in letterheads)
• Advertising their product/serivce
• Safety for the consumer (larger than it is?)
• More impact (company stands out)
17. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Extension Task
• Design your business card for Mr Jones
18. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Plenary: Matching Task
•Complete the matching activity in your
booklets to show me what you’ve
learned this lesson
19. • Identify a range of
communication applications
Must
• Describe the use of internet telephony,
including Voice over Internet Protocol
(VoIP)
Should
• Evaluate the use of applications for
public and corporate publications
Could
Let’s Review
20. 1. Identify a range of communication applications
2. Describe the use of internet telephony, including Voice over Internet Protocol (VoIP)
3. Evaluate the use of applications for public and corporate publications
L/A: To identify common hardware components in a computer system and how they function
My Learning Objectives
Homework
•None!