This document provides information for an Information Architecture for the Web course offered in the summer of 2006. It includes the course instructor's contact information, required and recommended textbooks, an introduction to the course content which will cover HTML, CSS, XHTML, and web design principles. The document also outlines assignments, grading policies, a course schedule, and additional resources. The course aims to teach students basic web development skills and an understanding of information architecture and usability.
This document provides information for students taking the Computer Applications - MIS 213 course at Alabama A&M University in Fall 2013. It outlines the course prerequisites, schedule, instructor contact information, technical support contacts, required and recommended course materials, teaching methods, expectations, policies, grading breakdown, and course outline/schedule. The course covers Microsoft Office 2010 applications including Word, PowerPoint, Excel, Access, and Outlook as well as the open-source LibreOffice suite. Students will complete weekly assignments, quizzes, a midterm exam, and a final exam.
This 3 sentence summary provides the essential information about the document:
This document outlines the course details for BA 131/CS 120, an introductory computer course offered at Treasure Valley Community College during winter 2012. The course will provide an overview of basic computer hardware, software, operating systems, email, internet and networks. Students will complete hands-on assignments, exams, and an e-portfolio to demonstrate their competency in Microsoft Word, Excel, PowerPoint and other technology topics. The instructor, Carol Billing, expects students to attend regularly, complete all assignments by the deadlines, and treat everyone in the class with courtesy and respect.
This document outlines the procedures and requirements for an online training course for early childhood program administrators. It details that students must complete 40 hours of coursework over 6 weeks, including assignments like writing a business plan. Students need basic computer skills and internet access. Assignments are submitted through the Edmodo platform. Students are assessed through practical assignments and essays. Academic integrity is expected, and plagiarism is not allowed. The instructor will provide feedback within 24 hours on weekdays.
Reaching All Learners: Differentiating with TechnologyOHIO ITSCO
1. The document discusses differentiating instruction using technology to meet the individual needs of students. It provides examples of how to use tools like webquests, blogs, videos, and graphic organizers to vary content, process, and products.
2. Formative and summative assessments are important aspects of differentiation discussed. Examples are given of using tools for pre-assessment, tracking assessment data, and student self-assessment.
3. Instructional strategies like tiered activities, learning contracts, choice boards, and RAFTs are provided to demonstrate how teachers can structure differentiated lessons.
Advising check in meeting group b winter 2013anestor2
The document summarizes the topics discussed during an advising check-in meeting for international students. It covers more grading options, registration deadlines, plagiarism, campus resources, activities, and planning for majors. It provides reminders about updating contact information, checking class schedules, and important grading and deadline dates. Communication methods like Facebook, email and the information boards are highlighted. Campus support services and intramural activities are also listed. The document concludes with a discussion of academic advising appointments and signing up for major planning groups.
Put yourself in the Student's Chair presentation on 2nd International Lean Six Sigma Conference for Higher Education in Arnhem, The Netherlands, organized by HAN University of Applied Sciences
This document provides information for students in Professor Bolton's class, including her contact details, office hours, and policies regarding communication, required materials, assignments, grading, and attendance. Students must take and pass a syllabus quiz, write 4 essays and drafting assignments, complete 2 group projects and reading responses, and take a midterm and final exam. Late penalties, academic honesty, and other policies are also outlined. The course outline details expectations for each class meeting.
TESTA, SIAST Universities of Regina & Saskathewan Webinar (November 2013)TESTA winch
This document provides an overview of a webinar on assessment and feedback given by Dr. Tansy Jessop. The webinar examined assessment at the program-level and discussed research conducted by TESTA (Transforming the Experience of Students through Assessment) which analyzed assessment patterns across multiple universities. Key findings from the research included a lack of formative assessment, issues with distributing student effort over time, problems with feedback, and student confusion about goals and standards. The webinar suggested changes to assessment practices such as incorporating more formative assessment, linking assessments across modules, and taking a program-wide approach to assessment design.
This document provides information for students taking the Computer Applications - MIS 213 course at Alabama A&M University in Fall 2013. It outlines the course prerequisites, schedule, instructor contact information, technical support contacts, required and recommended course materials, teaching methods, expectations, policies, grading breakdown, and course outline/schedule. The course covers Microsoft Office 2010 applications including Word, PowerPoint, Excel, Access, and Outlook as well as the open-source LibreOffice suite. Students will complete weekly assignments, quizzes, a midterm exam, and a final exam.
This 3 sentence summary provides the essential information about the document:
This document outlines the course details for BA 131/CS 120, an introductory computer course offered at Treasure Valley Community College during winter 2012. The course will provide an overview of basic computer hardware, software, operating systems, email, internet and networks. Students will complete hands-on assignments, exams, and an e-portfolio to demonstrate their competency in Microsoft Word, Excel, PowerPoint and other technology topics. The instructor, Carol Billing, expects students to attend regularly, complete all assignments by the deadlines, and treat everyone in the class with courtesy and respect.
This document outlines the procedures and requirements for an online training course for early childhood program administrators. It details that students must complete 40 hours of coursework over 6 weeks, including assignments like writing a business plan. Students need basic computer skills and internet access. Assignments are submitted through the Edmodo platform. Students are assessed through practical assignments and essays. Academic integrity is expected, and plagiarism is not allowed. The instructor will provide feedback within 24 hours on weekdays.
Reaching All Learners: Differentiating with TechnologyOHIO ITSCO
1. The document discusses differentiating instruction using technology to meet the individual needs of students. It provides examples of how to use tools like webquests, blogs, videos, and graphic organizers to vary content, process, and products.
2. Formative and summative assessments are important aspects of differentiation discussed. Examples are given of using tools for pre-assessment, tracking assessment data, and student self-assessment.
3. Instructional strategies like tiered activities, learning contracts, choice boards, and RAFTs are provided to demonstrate how teachers can structure differentiated lessons.
Advising check in meeting group b winter 2013anestor2
The document summarizes the topics discussed during an advising check-in meeting for international students. It covers more grading options, registration deadlines, plagiarism, campus resources, activities, and planning for majors. It provides reminders about updating contact information, checking class schedules, and important grading and deadline dates. Communication methods like Facebook, email and the information boards are highlighted. Campus support services and intramural activities are also listed. The document concludes with a discussion of academic advising appointments and signing up for major planning groups.
Put yourself in the Student's Chair presentation on 2nd International Lean Six Sigma Conference for Higher Education in Arnhem, The Netherlands, organized by HAN University of Applied Sciences
This document provides information for students in Professor Bolton's class, including her contact details, office hours, and policies regarding communication, required materials, assignments, grading, and attendance. Students must take and pass a syllabus quiz, write 4 essays and drafting assignments, complete 2 group projects and reading responses, and take a midterm and final exam. Late penalties, academic honesty, and other policies are also outlined. The course outline details expectations for each class meeting.
TESTA, SIAST Universities of Regina & Saskathewan Webinar (November 2013)TESTA winch
This document provides an overview of a webinar on assessment and feedback given by Dr. Tansy Jessop. The webinar examined assessment at the program-level and discussed research conducted by TESTA (Transforming the Experience of Students through Assessment) which analyzed assessment patterns across multiple universities. Key findings from the research included a lack of formative assessment, issues with distributing student effort over time, problems with feedback, and student confusion about goals and standards. The webinar suggested changes to assessment practices such as incorporating more formative assessment, linking assessments across modules, and taking a program-wide approach to assessment design.
The document evaluates an online MIT course on combinatorics. The course was designed for high school students and provided lecture notes, homework assignments, and videos of the instructor. While the course materials were clearly organized and covered the topics thoroughly, the evaluation found weaknesses in learning objectives, assessments, learner interaction, and accessibility. Specifically, objectives were not clearly stated, grading policies were unclear, opportunities for feedback and interaction between students were limited, and some videos lacked captions. Overall, the course seemed better suited to supplement rather than replace an in-person experience due to these weaknesses in online design.
RSCC - Setting Expectations for e-EducationBarry Dahl
This document discusses setting expectations for e-education. It provides examples of expectations that colleges commonly have for online students and faculty. For students, expectations often involve participation, technology access, and policies. For faculty, common expectations relate to interaction, feedback times, and course structure. The document stresses that expectations need to be clearly defined and communicated to students, faculty and staff. It also suggests topics that could be covered in defining expectations for both students and faculty regarding online learning.
B sc (hons)(arch) computer applications csc60503 mar 2015Anthony Chew
This document outlines a module on computer applications that will teach students how to use 3D modeling software like 3DS Max and Rhinoceros to design architectural visualizations, produce photorealistic renderings, and create animations of architectural designs. Students will complete three projects applying the software and be assessed based on modeling skills, rendering quality, and animation production, with the overall goal of developing technical skills in architectural visualization tools.
This document provides information about the MBA program at GLOBIS University, including an orientation for pre-MBA students. The orientation agenda introduces students to their classmates, explains how to maximize their learning experience, and reviews the pre-MBA system. It emphasizes thorough preparation for classes, active participation, and group work. Grading policies for essential and regular courses are outlined, with an emphasis on attendance, understanding concepts, contribution to classes, and submission of assignments and reports.
This document provides an introduction and overview of the "Intro to Design" module. It outlines the module objectives, which are to learn design principles and processes through lectures, tutorials, and self-directed study. Students will apply skills and principles to 2D and 3D design projects. The document details the module structure, learning outcomes, assessment components, attendance policy, and academic integrity guidelines. Key points covered include design investigations, applying design elements and principles, and developing visual and verbal communication skills.
This document outlines a lesson plan for 8th grade students to learn about the Fibonacci sequence, golden ratio, and golden spiral through exploring examples in architecture, art, nature, and the human body. Students will research these concepts over two class periods and then spend three days designing a project, such as a piece of artwork or building blueprints, that utilizes the golden ratio. They will be evaluated based on the creativity, understanding of concepts, and time management demonstrated in their projects.
This document outlines a workshop on assessment and feedback approaches. It discusses challenges with current assessment practices, such as an over-reliance on summative assessments and a lack of formative feedback. It then presents the TESTA (Transforming the Experience of Students Through Assessment) approach, which aims to address these issues by taking a whole-program approach to balancing summative and low-stakes formative assessments and improving feedback practices. The workshop involves examining assessment data, discussing challenges, and learning TESTA principles for improving assessment design and student experience.
Pre mba orientation handouts (april 2014)Yuko Nakamura
This document provides an overview of the MBA program at GLOBIS University. It summarizes the agenda and objectives for the pre-MBA orientation. The orientation helps new students get to know their classmates, understand how to maximize their learning experience, and learn about the pre-MBA system. The document reviews expectations for class preparation, participation, assignments, and the grading system. It provides guidance on policies regarding plagiarism, absences, and support resources available to students.
The document discusses key findings from neuroscience research and their implications for teaching and learning. It describes how the brain is structured in three parts and changes throughout life based on experiences. Emotions drive attention and memory formation. Brain-based learning techniques incorporate findings about how the brain naturally learns best through real-life experiences, social interaction, challenge, and avoiding stress. Teachers should connect new concepts to students' prior knowledge and use diverse teaching strategies and assessments.
This document outlines the course policies, schedule, assignments, and grading for CMAT 465 Communication and Technology taught by Dr. Vinita Agarwal in Spring 2015. The course will meet on Tuesdays and Thursdays from 9:30-10:45AM in room TETC 110B. There are six main assignments including daily tweets, a weekly blog, an in-class technology presentation with a partner, two exams, daily lab work and readings, and a final portfolio project. Grades are calculated on a percentage basis and are comprised of these six assignments. Important semester dates are also provided such as exam dates, add/drop dates, and the last day of class.
Learn about SBAC's definition for formative assessment and tech tools that can be used to gather student data, give feedback, and capture student thinking.
Course outline (fnbe 0155) dv - temporaryAnthony Chew
Mr. A
W5
L5. Drawing Conventions
[Tutorial] Project ONE B
[IDJ 02]
W6
L6. Drawing Conventions
[Tutorial] Project ONE B
W7
L7. Drawing Conventions
[Tutorial] Project ONE B
W8
L8. Drawing Conventions
[Tutorial] Project ONE B
W9
L9. Drawing Conventions
[Tutorial] Project ONE B
W10
L10. Drawing Conventions
[Tutorial] Project ONE B
[Project ONE A & B]
W11
L11. Site Analysis
The document discusses technology enhanced learning activities that can promote deep learning. It provides two models of learning - deep and surface. Deep learning focuses on understanding the meaning and significance of new information, relating it to existing knowledge from different areas. Surface learning focuses on memorization and treating tasks as external obligations. The document then lists potential online tools and activities that can support deep learning through reflection, collaboration, discovery, interaction, and expression. It emphasizes the importance of constructive alignment between learning outcomes, teaching methods, and assessments.
The document provides information for new students in the Faculty of Engineering & Information Sciences at UOW. It outlines the 6 schools within the faculty and their areas of focus. It then provides details on key contacts, how to book appointments, support services available, and policies and procedures at UOW. It gives an overview of degree structures and terminology used in ICT degrees. Finally, it provides an example of a first year programming subject's objectives and learning outcomes.
The power of persuasion unitplan day by dayHollie Nicole
This unit plan is for an 11th grade classroom over 5 days. It will teach students about persuasion techniques like pathos, ethos, and logos. Students will analyze advertisements and cults. They will learn to identify and resist persuasive messages. Each day focuses on a different topic and has objectives, materials, activities, and assessments. The unit culminates with students demonstrating they can apply persuasion concepts to real-world scenarios.
This document provides tips for creating a webquest using the Quest Garden website. It outlines the key sections to include such as a title, description, standards addressed, intended learners, the final task, and the process for completing the task. The process section should directly address students, incorporate relevant online resources, and provide scaffolding through techniques like assigning roles, checklists, and guiding questions.
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxmarilucorr
COURSE SYLLABUS
Data Analysis and Reporting
Spring 2019
I. Class
· Course Description: Students will gain practical experience in using advanceddatabase techniques and data visualization, data warehousing, reporting and other Business Intelligence (BI) tools. Contemporary BI tools and technologies will be used to create intelligent solutions to realistic problems.
· Course Objectives:
1. Effectively understand the evolution of business analytics needs and to develop an appreciation for issues in managing data/information/knowledge.
2. Apply in advanced database techniques in designing and executing complex queries in enterprise level database management information systems (Oracle,
SQL server, DB2 …).
3. Understand data warehousing administration and security issues.
4. Apply data extraction, transformation, and load (ETL) processes.
5. Administer and build reports
BI. Required Course Materials
· Free eBooks and other software resources will be posted on Blackboard.
· We use the Microsoft SQL Server 2017 in this class through a virtual machine that you can access from home or from campus.
· The on-campus computer lab in the business building located off the Atrium is available for student use and has the necessary computers and software. Computer lab hours can be found at: http://ualr.edu/cob/student-services/advising/advising-faq/
· Some of the assignments will require Microsoft Office software (e.g., MS Word, Excel, etc.). One way to get access to the MS Office software is get a free subscription to MS Office 365 ProPlus. Get the MS Office software here for free..
2
IV.
Course Grading
Course grading will be the combination of exams, term project, assignments, and quizzes. Grades are based on: A: 90~ 100%, B: 80~ 89%, C: 70~ 79%, D: 60~ 69%, F: 59 as described below. Graduate students will be evaluated using the same criteria as the undergraduate students. However, they will have to submit an additional assignments and/or extra project.
Grade Element
%
A.
Participation
10%
B.
Reading Quizzes
20%
C.
Assignments
30%
D.
Assignment Quizzes
10%
E.
Exams (three)
30%
Total
100%
A. Participation
You will be responsible for various in-class activities that will allow you to exercise your skills and knowledge, stimulate your critical thinking, and perform your assignments. You are expected to attend all the sessions, come to the class before it starts, stay in class for lectures and assignments, and participate with all class activities. Failure in any of these four areas will impact your participation grade.
Class attendance, measured as a percentage of classes attended where role is called, sets the baseline for the participation grade (e.g., 80% means you attended 8 out of 10 classes and did not leave those classes early). Additional points may be removed for non-participation in classroom activities or discussions.
· Class attendances will be verified at the beginning of each class. Students will be count.
This document provides the course syllabus for an online college success strategies course. The syllabus outlines the instructor contact information, course description and competencies, student learning outcomes, required materials, assignments and activities, technology needs, academic integrity policy, attendance policy, grading scale, and tentative course calendar. The course aims to help students develop strategies for academic and career success through assignments such as creating a Starfish profile, completing library and campus activities, participating in online discussions, and meeting with an advisor. Students will earn points toward their final grade by completing pre-tests, weekly attendance checks, assignments related to time management, test anxiety, and diversity awareness.
This document provides a course syllabus for an online college success strategies course. It outlines the instructor contact information, course description and competencies, learning outcomes, required activities and assignments, technology needs, academic integrity policy, attendance policy, grading scale, and tentative weekly schedule. The course introduces students to strategies for self-management, use of campus resources, and academic success. Students are required to complete various assignments each week related to topics like time management, test anxiety, learning styles, and careers. They must also participate in at least 5 approved campus activities.
This document provides an overview of an online college success course including information about the instructor, required texts, course competencies, student learning outcomes, assignments, policies, and grading. The key details are: the instructor's contact information is provided; there are no required texts; students will develop strategies for academic and career success using campus resources; assignments include weekly discussions, tests, profiles, activities, and meeting with an advisor; and the course is graded based on completion of various assignments worth a total of 1000 points.
rate the core knowledge and skills of project management (P.docxtemplestewart19
rate the core knowledge and skills of project management (PM). Rubric-based assignment s
, projects, and/or exams . Apply common and current t ools to project management t
asks. Rubric-based assignments, projects, and/or ex ams. Employ pl a
nning, organization, and management skills to complet e project de l
iverable s . Rubric-base d assignments, projects, and/or ex a ms. Demonstrate profession a l -level writin g sk ills in the writing of project r
e p
orts. Rubric-based assignments, p r ojects, and/or exams. Evaluate teamwork skills in th e con t ext of project implementat ion. Rubric-based assignments, projects, and/or exams. Construct an effective oral pr esentation summarizing the project. Rubric-based assignments, projects, and/or exams.
TEXTBOOK
: Informa t ion Technology Pro ject Management, 8th edition, by Kathy Schwalbe . Published by C ours e Technology Cen gage Learning.
SOFTWARE AND SYSTEM REQUIREMENTS:
A fully functioning version of Microsoft Project 2
013/2016 is required for this course. Students must have access to
this so ft w a re by the first day
of the quarter and the program must be available until the last day of the q uarter. MS Pr o
j
ect runs on a W indows OS, on a B o ot -Camp p a
Windows. You can download the software for free under the ITAM Department’s Microsoft Imagine account.
Important Not e:
In past quarters, some students have encountered problems accessing Imagine which has prevented those students from downloading MS Project 2016 in the first module of the course. Each student must put a backup plan into place if this problem is experienced. Two different solutions to the problem are available to each student:
1. Make use of the CWU computer labs that have Project 2016 . There are labs at the Main CWU Campus and the Satellite Campuses that run Project 2016 . Please use the labs to stay current in the class while the details of your Imagine account is being addressed.
2. Download the 30 - day trial version of Project 2016 from Microsoft to your home computer while the details of your Imagine account is being addressed. After you have gained access to Imagine , you should be able to use the software key to unlock your trial version or you can simply re - download the software follow ing the instructions on the Imagine website. Extensions will not be granted for assignments missed in the first module of the course because of difficulty with the Imagine account subscription.
Grading
Grading scale:
A = 93% A - = 90% B+ = 87% B = 83% B - = 80%
C+ = 77% C = 73% C - = 70% D+ =67% D = 63%
D - = 60%
Individual Assig n m
ents 30% In-Class Activities 20% Team Project 35% In-Class Quizzes 15% Total 100%
Co urse Policies: I reserve the right to make changes to this document, the syllabus, clas.
The document evaluates an online MIT course on combinatorics. The course was designed for high school students and provided lecture notes, homework assignments, and videos of the instructor. While the course materials were clearly organized and covered the topics thoroughly, the evaluation found weaknesses in learning objectives, assessments, learner interaction, and accessibility. Specifically, objectives were not clearly stated, grading policies were unclear, opportunities for feedback and interaction between students were limited, and some videos lacked captions. Overall, the course seemed better suited to supplement rather than replace an in-person experience due to these weaknesses in online design.
RSCC - Setting Expectations for e-EducationBarry Dahl
This document discusses setting expectations for e-education. It provides examples of expectations that colleges commonly have for online students and faculty. For students, expectations often involve participation, technology access, and policies. For faculty, common expectations relate to interaction, feedback times, and course structure. The document stresses that expectations need to be clearly defined and communicated to students, faculty and staff. It also suggests topics that could be covered in defining expectations for both students and faculty regarding online learning.
B sc (hons)(arch) computer applications csc60503 mar 2015Anthony Chew
This document outlines a module on computer applications that will teach students how to use 3D modeling software like 3DS Max and Rhinoceros to design architectural visualizations, produce photorealistic renderings, and create animations of architectural designs. Students will complete three projects applying the software and be assessed based on modeling skills, rendering quality, and animation production, with the overall goal of developing technical skills in architectural visualization tools.
This document provides information about the MBA program at GLOBIS University, including an orientation for pre-MBA students. The orientation agenda introduces students to their classmates, explains how to maximize their learning experience, and reviews the pre-MBA system. It emphasizes thorough preparation for classes, active participation, and group work. Grading policies for essential and regular courses are outlined, with an emphasis on attendance, understanding concepts, contribution to classes, and submission of assignments and reports.
This document provides an introduction and overview of the "Intro to Design" module. It outlines the module objectives, which are to learn design principles and processes through lectures, tutorials, and self-directed study. Students will apply skills and principles to 2D and 3D design projects. The document details the module structure, learning outcomes, assessment components, attendance policy, and academic integrity guidelines. Key points covered include design investigations, applying design elements and principles, and developing visual and verbal communication skills.
This document outlines a lesson plan for 8th grade students to learn about the Fibonacci sequence, golden ratio, and golden spiral through exploring examples in architecture, art, nature, and the human body. Students will research these concepts over two class periods and then spend three days designing a project, such as a piece of artwork or building blueprints, that utilizes the golden ratio. They will be evaluated based on the creativity, understanding of concepts, and time management demonstrated in their projects.
This document outlines a workshop on assessment and feedback approaches. It discusses challenges with current assessment practices, such as an over-reliance on summative assessments and a lack of formative feedback. It then presents the TESTA (Transforming the Experience of Students Through Assessment) approach, which aims to address these issues by taking a whole-program approach to balancing summative and low-stakes formative assessments and improving feedback practices. The workshop involves examining assessment data, discussing challenges, and learning TESTA principles for improving assessment design and student experience.
Pre mba orientation handouts (april 2014)Yuko Nakamura
This document provides an overview of the MBA program at GLOBIS University. It summarizes the agenda and objectives for the pre-MBA orientation. The orientation helps new students get to know their classmates, understand how to maximize their learning experience, and learn about the pre-MBA system. The document reviews expectations for class preparation, participation, assignments, and the grading system. It provides guidance on policies regarding plagiarism, absences, and support resources available to students.
The document discusses key findings from neuroscience research and their implications for teaching and learning. It describes how the brain is structured in three parts and changes throughout life based on experiences. Emotions drive attention and memory formation. Brain-based learning techniques incorporate findings about how the brain naturally learns best through real-life experiences, social interaction, challenge, and avoiding stress. Teachers should connect new concepts to students' prior knowledge and use diverse teaching strategies and assessments.
This document outlines the course policies, schedule, assignments, and grading for CMAT 465 Communication and Technology taught by Dr. Vinita Agarwal in Spring 2015. The course will meet on Tuesdays and Thursdays from 9:30-10:45AM in room TETC 110B. There are six main assignments including daily tweets, a weekly blog, an in-class technology presentation with a partner, two exams, daily lab work and readings, and a final portfolio project. Grades are calculated on a percentage basis and are comprised of these six assignments. Important semester dates are also provided such as exam dates, add/drop dates, and the last day of class.
Learn about SBAC's definition for formative assessment and tech tools that can be used to gather student data, give feedback, and capture student thinking.
Course outline (fnbe 0155) dv - temporaryAnthony Chew
Mr. A
W5
L5. Drawing Conventions
[Tutorial] Project ONE B
[IDJ 02]
W6
L6. Drawing Conventions
[Tutorial] Project ONE B
W7
L7. Drawing Conventions
[Tutorial] Project ONE B
W8
L8. Drawing Conventions
[Tutorial] Project ONE B
W9
L9. Drawing Conventions
[Tutorial] Project ONE B
W10
L10. Drawing Conventions
[Tutorial] Project ONE B
[Project ONE A & B]
W11
L11. Site Analysis
The document discusses technology enhanced learning activities that can promote deep learning. It provides two models of learning - deep and surface. Deep learning focuses on understanding the meaning and significance of new information, relating it to existing knowledge from different areas. Surface learning focuses on memorization and treating tasks as external obligations. The document then lists potential online tools and activities that can support deep learning through reflection, collaboration, discovery, interaction, and expression. It emphasizes the importance of constructive alignment between learning outcomes, teaching methods, and assessments.
The document provides information for new students in the Faculty of Engineering & Information Sciences at UOW. It outlines the 6 schools within the faculty and their areas of focus. It then provides details on key contacts, how to book appointments, support services available, and policies and procedures at UOW. It gives an overview of degree structures and terminology used in ICT degrees. Finally, it provides an example of a first year programming subject's objectives and learning outcomes.
The power of persuasion unitplan day by dayHollie Nicole
This unit plan is for an 11th grade classroom over 5 days. It will teach students about persuasion techniques like pathos, ethos, and logos. Students will analyze advertisements and cults. They will learn to identify and resist persuasive messages. Each day focuses on a different topic and has objectives, materials, activities, and assessments. The unit culminates with students demonstrating they can apply persuasion concepts to real-world scenarios.
This document provides tips for creating a webquest using the Quest Garden website. It outlines the key sections to include such as a title, description, standards addressed, intended learners, the final task, and the process for completing the task. The process section should directly address students, incorporate relevant online resources, and provide scaffolding through techniques like assigning roles, checklists, and guiding questions.
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxmarilucorr
COURSE SYLLABUS
Data Analysis and Reporting
Spring 2019
I. Class
· Course Description: Students will gain practical experience in using advanceddatabase techniques and data visualization, data warehousing, reporting and other Business Intelligence (BI) tools. Contemporary BI tools and technologies will be used to create intelligent solutions to realistic problems.
· Course Objectives:
1. Effectively understand the evolution of business analytics needs and to develop an appreciation for issues in managing data/information/knowledge.
2. Apply in advanced database techniques in designing and executing complex queries in enterprise level database management information systems (Oracle,
SQL server, DB2 …).
3. Understand data warehousing administration and security issues.
4. Apply data extraction, transformation, and load (ETL) processes.
5. Administer and build reports
BI. Required Course Materials
· Free eBooks and other software resources will be posted on Blackboard.
· We use the Microsoft SQL Server 2017 in this class through a virtual machine that you can access from home or from campus.
· The on-campus computer lab in the business building located off the Atrium is available for student use and has the necessary computers and software. Computer lab hours can be found at: http://ualr.edu/cob/student-services/advising/advising-faq/
· Some of the assignments will require Microsoft Office software (e.g., MS Word, Excel, etc.). One way to get access to the MS Office software is get a free subscription to MS Office 365 ProPlus. Get the MS Office software here for free..
2
IV.
Course Grading
Course grading will be the combination of exams, term project, assignments, and quizzes. Grades are based on: A: 90~ 100%, B: 80~ 89%, C: 70~ 79%, D: 60~ 69%, F: 59 as described below. Graduate students will be evaluated using the same criteria as the undergraduate students. However, they will have to submit an additional assignments and/or extra project.
Grade Element
%
A.
Participation
10%
B.
Reading Quizzes
20%
C.
Assignments
30%
D.
Assignment Quizzes
10%
E.
Exams (three)
30%
Total
100%
A. Participation
You will be responsible for various in-class activities that will allow you to exercise your skills and knowledge, stimulate your critical thinking, and perform your assignments. You are expected to attend all the sessions, come to the class before it starts, stay in class for lectures and assignments, and participate with all class activities. Failure in any of these four areas will impact your participation grade.
Class attendance, measured as a percentage of classes attended where role is called, sets the baseline for the participation grade (e.g., 80% means you attended 8 out of 10 classes and did not leave those classes early). Additional points may be removed for non-participation in classroom activities or discussions.
· Class attendances will be verified at the beginning of each class. Students will be count.
This document provides the course syllabus for an online college success strategies course. The syllabus outlines the instructor contact information, course description and competencies, student learning outcomes, required materials, assignments and activities, technology needs, academic integrity policy, attendance policy, grading scale, and tentative course calendar. The course aims to help students develop strategies for academic and career success through assignments such as creating a Starfish profile, completing library and campus activities, participating in online discussions, and meeting with an advisor. Students will earn points toward their final grade by completing pre-tests, weekly attendance checks, assignments related to time management, test anxiety, and diversity awareness.
This document provides a course syllabus for an online college success strategies course. It outlines the instructor contact information, course description and competencies, learning outcomes, required activities and assignments, technology needs, academic integrity policy, attendance policy, grading scale, and tentative weekly schedule. The course introduces students to strategies for self-management, use of campus resources, and academic success. Students are required to complete various assignments each week related to topics like time management, test anxiety, learning styles, and careers. They must also participate in at least 5 approved campus activities.
This document provides an overview of an online college success course including information about the instructor, required texts, course competencies, student learning outcomes, assignments, policies, and grading. The key details are: the instructor's contact information is provided; there are no required texts; students will develop strategies for academic and career success using campus resources; assignments include weekly discussions, tests, profiles, activities, and meeting with an advisor; and the course is graded based on completion of various assignments worth a total of 1000 points.
rate the core knowledge and skills of project management (P.docxtemplestewart19
rate the core knowledge and skills of project management (PM). Rubric-based assignment s
, projects, and/or exams . Apply common and current t ools to project management t
asks. Rubric-based assignments, projects, and/or ex ams. Employ pl a
nning, organization, and management skills to complet e project de l
iverable s . Rubric-base d assignments, projects, and/or ex a ms. Demonstrate profession a l -level writin g sk ills in the writing of project r
e p
orts. Rubric-based assignments, p r ojects, and/or exams. Evaluate teamwork skills in th e con t ext of project implementat ion. Rubric-based assignments, projects, and/or exams. Construct an effective oral pr esentation summarizing the project. Rubric-based assignments, projects, and/or exams.
TEXTBOOK
: Informa t ion Technology Pro ject Management, 8th edition, by Kathy Schwalbe . Published by C ours e Technology Cen gage Learning.
SOFTWARE AND SYSTEM REQUIREMENTS:
A fully functioning version of Microsoft Project 2
013/2016 is required for this course. Students must have access to
this so ft w a re by the first day
of the quarter and the program must be available until the last day of the q uarter. MS Pr o
j
ect runs on a W indows OS, on a B o ot -Camp p a
Windows. You can download the software for free under the ITAM Department’s Microsoft Imagine account.
Important Not e:
In past quarters, some students have encountered problems accessing Imagine which has prevented those students from downloading MS Project 2016 in the first module of the course. Each student must put a backup plan into place if this problem is experienced. Two different solutions to the problem are available to each student:
1. Make use of the CWU computer labs that have Project 2016 . There are labs at the Main CWU Campus and the Satellite Campuses that run Project 2016 . Please use the labs to stay current in the class while the details of your Imagine account is being addressed.
2. Download the 30 - day trial version of Project 2016 from Microsoft to your home computer while the details of your Imagine account is being addressed. After you have gained access to Imagine , you should be able to use the software key to unlock your trial version or you can simply re - download the software follow ing the instructions on the Imagine website. Extensions will not be granted for assignments missed in the first module of the course because of difficulty with the Imagine account subscription.
Grading
Grading scale:
A = 93% A - = 90% B+ = 87% B = 83% B - = 80%
C+ = 77% C = 73% C - = 70% D+ =67% D = 63%
D - = 60%
Individual Assig n m
ents 30% In-Class Activities 20% Team Project 35% In-Class Quizzes 15% Total 100%
Co urse Policies: I reserve the right to make changes to this document, the syllabus, clas.
Advanced Web Design and Development - Spring 2005.docbutest
This document is a course syllabus for an Advanced Web Design & Development course. It provides information on the instructor, course details, goals and objectives, topics to be covered, assignments and schedule, textbooks and materials, and policies. The course will cover advanced concepts in web design, development, and multimedia using software like Dreamweaver, Photoshop, Flash, and programming languages like HTML, CSS, JavaScript. Students will learn to design websites, create graphics and animations, incorporate multimedia, and develop dynamic content. Evaluation will be based on projects, quizzes, exams, and participation covering the outlined topics.
This document provides information on the Introduction to Business module offered at Taylor's University. The 4-credit, 18-week module is designed to provide students with an understanding of basic business concepts. It will cover topics such as different types of businesses, starting and managing a business, and the social responsibilities of businesses. The module will be delivered through lectures, tutorials, and self-directed learning. Students will be assessed through assignments, a class test, a final project, and an e-portfolio. The intended learning outcomes are for students to understand various business concepts and analyze ethical and social issues in business.
This document provides information on the Introduction to Business module offered at Taylor's University. The 4-credit, 18-week module is designed to give students an understanding of basic business concepts including different types of businesses and how internal and external factors affect operations. Modes of delivery include lectures, tutorials, and self-directed study. Assessment involves formative and summative components to evaluate students' understanding of topics like the goals and functions of businesses.
1 School of Computer & Information Scien.docxadkinspaige22
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1 School of Computer & Information Sciendrennanmicah
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste ...
This document provides information on the Construction Technology 1 module offered at Taylor's University, including the module synopsis, teaching objectives, learning outcomes, assessment plan, and schedule. The 4-credit module aims to provide understanding of building components and their functions. It will be delivered over 14 weeks through lectures, tutorials, and self-directed study. Students will be assessed through a mid-term test, group assignment, TGC portfolio, and final exam. The assessments are designed to evaluate students' mastery of construction principles and technologies for residential buildings.
This document provides information about a Master's level course on strategic communications taught by Craig Rothenberg at New York University. The course aims to enhance students' communication skills and strategic thinking abilities. It will cover topics like aligning communication strategies to stakeholders, media relations, reputation management, and integrating partners. The class meets weekly and will include guest lectures, assignments, classroom discussion, and a midterm and final exam. Students will be graded based on their exam performance, assignments, and class participation. Academic integrity and timely submission of work are expected.
Syllabus Access Control, Authentication, and Public Key Infrast.docxmabelf3
Syllabus: Access Control, Authentication, and Public Key Infrastructure
University of the Cumberlands
School of Computer and Information Sciences
ITS 630 – Organization Leadership and Decision Making
Course Summary
Course Number and Name
ITS 630 – Organization Leadership and Decision Making
Course Term and Delivery
Fall IG, 2018
Asynchronous Online Course
Course Instructor
Dr. Greg Gleghorn
Email: [email protected]
Catalog Course Description
One of the most important skills a business leader needs to have concerning technology involves effective decision making and governance. This class will consist of a case study approach presenting different scenarios that require decisions to be made on technology issues that are relevant to today’s business environment. Students will develop the skills for understanding the components and elements of these technology decisions, and assess associated risks. This course will draw upon a cross section of technology, finance, security, project management, leadership, and other aspects of effective decision making.
Course Objectives
Course Competencies/ Learning Objectives
Course Learning Objectives
Major Instructional Areas
Assessment Method
Develop IT strategy for business value.
DB Posts, assignments, quizzes, exams
Understand business metrics.
DB Posts, assignments, quizzes, exams
Understand how to communicate with business managers.
DB Posts, assignments, quizzes, exams
Understand the management of IT-based risk.
DB Posts, assignments, quizzes, exams
Create and evolve a technology roadmap.
DB Posts, assignments, quizzes, exams
SCANS Objectives
SCANS is an acronym for Secretary’s Commission on Achieving Necessary Skills. The committee, appointed by the National Secretary of Labor in 1990, created a list of skills and competencies that continue to be a valuable resource for individuals developing their careers in a high-tech job market. For more information on the SCANS objectives, visit The U.S. Department of Labor Employment and Training Administration: www.doleta.gov.
Course Structure
· Watch weekly lecture
· Participate in class discussion via iLearn forums
· Reading assigned texts
· Complete quizzes based on assigned reading and lecture
· Complete cases based upon a given scenario
· Complete homework assignments from the text and other sources
Learning Materials and References
Required Resources
Textbook(s) Required:
· McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson.
Recommended Materials/Resources
Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.
· Aaron K. Olson, B. Keith Simerson
Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results
· Alfred A. Marcus
The Future of Technology Management and the Business Environment: Lessons on Innovation, Disruption, .
This document provides the syllabus for a 3-week social media course for employee onboarding. The course will be delivered online through a learning management system and require students to create social media accounts using guidelines. Students will learn how to generate business pages, develop marketing campaigns, create engaging posts, and analyze demographics. Assessment includes participation, a social media calendar, discussion posts, and a group project. Students must complete all work with an 85% or higher to pass, and employment will be terminated if the retest is not passed. The course aims to teach social media use for business communication, marketing, sales, and navigating today's business environment using key platforms. Academic integrity policies are also outlined.
This document provides information about a Financial Accounting course for an MBA program. It outlines the instructor contact information, meeting times both live and virtual, course description and overview, learning outcomes, required materials, assessment criteria including exams and classroom contribution, attendance policy, estimated workload, homework assignments, academic integrity policies, disability services information, and a tentative schedule of topics and assignments. The course introduces basic financial accounting principles and prepares students to analyze financial statements and assess a company's performance.
This document is the syllabus for an Honors English 102 course. It outlines the course objectives, which include demonstrating rhetorical strategies, research skills, critical thinking, understanding writing as a process, and composing academic arguments. Major assignments include a rhetorical analysis, annotated bibliography, critical conversation essay with a multimodal response, and a grit reflection project. Students will complete scaffolding assignments and peer reviews to support the major assignments. The syllabus provides policies on health and safety, participation grading, communication with the instructor, and file formats for multimedia projects.
This document provides information on the Introduction to Business module offered at Taylor's University. The 4-credit, 18-week module is designed to provide students with an understanding of basic business concepts. It will cover topics such as different types of businesses, starting and managing a business, and the social responsibilities of businesses. Students will be assessed through group and individual projects, tests, and an e-portfolio. The module will be delivered through lectures, tutorials, and self-directed learning.
This document provides information on the Introduction to Business module offered at Taylor's University. The 4-credit, 18-week module is designed to provide students with an understanding of basic business concepts. It will cover topics such as different types of businesses, starting and managing a business, and the social responsibilities of businesses. Students will be assessed through group and individual projects, tests, and an e-portfolio. The module will be delivered through lectures, tutorials, and self-directed learning.
Bus30104 new course outline january 2015 semester (2)Ong Shi Hui
This document provides information on the Introduction to Business module offered at Taylor's University. The 4-credit, 18-week module is designed to provide students with an understanding of basic business concepts. It will cover topics such as different types of businesses, starting and managing businesses, and the social responsibilities of businesses. Students will be assessed through group and individual projects, tests, and an e-portfolio. The module will be delivered through lectures, tutorials, and self-directed learning.
This document provides a help and tutorial for TopStyle Pro version 3.11. It covers getting started with TopStyle, editing style sheets and HTML/XHTML, working with colors, previews, validation, site management, reports, mappings, customization, and third-party integration. It also includes appendices on CSS basics and tips, TopStyle tips and tricks, style sheet resources, keyboard shortcuts, and regular expressions.
TopStyle Help & <b>Tutorial</b>tutorialsruby
This document provides a table of contents for the TopStyle Pro Help & Tutorial, which teaches how to use the TopStyle software for editing style sheets and HTML/XHTML documents. It lists over 50 sections that provide explanations and instructions for features like creating and opening files, editing styles, working with colors, previews, validation, site management, reports and customizing the software. The document was created by Giampaolo Bellavite from the online help provided with TopStyle version 3.11.
The Art Institute of Atlanta IMD 210 Fundamentals of Scripting <b>...</b>tutorialsruby
This document provides the course outline for IMD 210 Fundamentals of Scripting Languages at The Art Institute of Atlanta during the Spring 2005 quarter. The course focuses on integrating programming concepts with interface design using scripting languages like JavaScript and CSS. It will cover topics like DOM, CSS layout, JavaScript variables, conditionals, and events. Students will complete 4 assignments including redesigning existing websites, and there will be weekly quizzes, a midterm, and final exam. The course is worth 4 credits and meets once a week for class and lab.
This document provides the course outline for IMD 210 Fundamentals of Scripting Languages at The Art Institute of Atlanta during the Spring 2005 quarter. The course focuses on integrating programming concepts with interface design using scripting languages like JavaScript and CSS. It will cover topics like DOM, CSS layout, JavaScript variables, conditionals, and events. Students will complete 4 assignments including redesigning existing websites, and there will be weekly quizzes, a midterm, and final exam. The course is worth 4 credits and meets once a week for class and lab.
The group aims to bridge gaps between peer-to-peer database architectures and scaling multimedia information retrieval. They develop a probabilistic multimedia database system with abstraction layers for applications and researchers. They also research challenges of peer-to-peer networks for distributed data management. Both lines are supported by the MonetDB platform to exploit custom hardware and adaptive query optimization. The goal is a modular solution linking theoretical optimal solutions to application demands under resource limitations.
Standardization and Knowledge Transfer – INS0tutorialsruby
The group aims to bridge gaps between peer-to-peer database architectures and scaling multimedia information retrieval. They develop a probabilistic multimedia database system with abstraction layers and a flexible model. They also research challenges of peer-to-peer networks for distributed data management. Both lines are supported by the MonetDB platform to exploit custom hardware and adaptive query optimization. The goal is a modular solution linking theoretical optimal solutions to application demands under resource limitations.
This document provides an introduction to converting HTML documents to XHTML, including the basic syntax changes needed like making all tags lowercase and closing all tags. It provides examples of correct XHTML markup for different tags. It also explains the new DOCTYPE declaration and shows a sample well-formed XHTML document incorporating all the discussed changes. Resources for learning more about XHTML are listed at the end.
This document provides an introduction to converting HTML documents to XHTML, including the basic syntax changes needed like making all tags lowercase and closing all tags. It provides examples of correct XHTML markup for different tags. It also explains the new DOCTYPE declaration and shows a sample well-formed XHTML document incorporating all the discussed changes. Resources for learning more about XHTML are listed at the end.
XHTML is a markup language that provides structure and semantics to web pages. It is based on XML and is more strict than HTML. XHTML pages must have a document type definition, html and head tags, and a body where the visible content goes. Common XHTML tags include paragraphs, lists, links, images, and divisions to logically separate content. While XHTML provides structure, CSS is used to style pages and control visual presentation by defining rules for tags. CSS rules are defined in external style sheets to keep presentation separate from structure and content.
XHTML is a markup language that provides structure and semantics to web pages. It is based on XML and is more strict than HTML. XHTML pages must have a document type definition, html and head tags, and a body where the visible content goes. Common XHTML tags include paragraphs, lists, links, images, and divisions to logically separate content. While XHTML provides structure, CSS is used to style pages and control visual presentation through rules that target specific XHTML elements.
This document discusses how to create and use external cascading style sheets (CSS) in Dreamweaver. It provides steps to:
1. Open the CSS Styles tab in Dreamweaver and create a new external CSS stylesheet using a sample text style.
2. Save the stylesheet and link it to a new HTML page to style elements like headings, text sizes, and boxes.
3. Edit existing styles by selecting a tag in the CSS Styles panel and modifying properties directly, or by clicking the tag and using the pencil icon to edit in a window. This allows customizing styles globally across all linked pages.
This document provides an overview of how to create and use cascading style sheets (CSS) in Dreamweaver. It describes the different types of style sheets, including external and internal style sheets. It outlines the steps to create an external style sheet in Dreamweaver using the CSS Styles panel and provides instructions for linking the external style sheet to an HTML page. The document demonstrates how to experiment with predefined styles and how to edit, add, and delete styles in the CSS stylesheet.
This document appears to be a weekly update from an intro to computer science course. It includes summaries of classmates' demographics, comfort levels, and prior experience. It also discusses time spent on problem sets and recommends upcoming courses in CS51 and CS61. Finally, it recommends reading on TCP/IP, HTTP, XHTML, CSS, PHP, SQL and using the bulletin board for questions.
This document appears to be a weekly update from an intro to computer science course. It includes summaries of classmates' demographics, comfort levels, and prior experience. It also discusses time spent on problem sets and recommends upcoming courses in CS51 and CS61. Finally, it recommends reading on topics like TCP/IP, HTTP, XHTML, CSS, PHP, SQL and using bulletin boards, and includes images related to these topics.
The document discusses how to use Cascading Style Sheets (CSS) with Corvid Servlet Runtime templates to control formatting and layout. CSS allows separating design from content, making templates simpler and easier to maintain. It also enables adapting appearance for different devices. The document provides examples of using CSS classes to style template elements and explains how to set up a demo system using the included CSS and templates.
The document discusses how to use Cascading Style Sheets (CSS) with Corvid Servlet Runtime templates to control formatting and layout. CSS allows separating design from content, making templates simpler and easier to maintain. It also enables customization of appearance for different devices. The document provides examples of how to apply CSS classes and rules to Corvid template elements to control fonts, colors, positioning and more.
The document provides an introduction to CSS and how it works with HTML to control the presentation and styling of web page content. It explains basic CSS concepts like selectors, properties and values, and how CSS rules are used to target specific HTML elements and style them. Examples are given of common CSS properties and selectors and how they can be used to style elements and format the layout of web pages.
The document introduces CSS and how it works with HTML to separate content from presentation, allowing the styling of web pages through rules that target HTML elements. It explains CSS syntax and various selectors like type, class, ID, and descendant selectors. Examples are provided of how CSS can be used to style properties like color, font, padding, and layout of elements on a page.
Cascading Style Sheets (CSS) allow users to define how HTML elements are presented on a page. CSS enables changing the appearance and layout of an entire website by editing just one CSS file. CSS uses selectors to apply styles to HTML elements via properties and values. Styles can be defined internally in HTML or externally in CSS files. CSS can control text formatting, colors, spacing, positioning and more to achieve visual consistency across web pages.
Cascading Style Sheets (CSS) allow users to define how HTML elements are presented on a page. CSS enables changing the appearance and layout of an entire website by editing just one CSS file. CSS uses selectors to apply styles to HTML elements via properties and values. Styles can be defined internally in HTML or externally in CSS files. CSS can control text formatting, colors, spacing, positioning and more to achieve visual consistency across web pages.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
L571_su06_helling
1. L571:
Information Architecture for the Web
Summer 2006 (ES 2116)
Wednesday: 5:30p-8:15p
Bill Helling [web@cdpl.lib.in.us ] and [whelling@indiana.edu]
765-362-2242 ext. 100
765-362-4788
[Introduction]
[Grading policy]
[Assignments]
[Course outline]
[Additional resources]
Required class text:
Rosenfeld, Louis and Peter Morville. (2002). Information architecture for the
world wide web, 2nd edition. O'Reilly & Associates.
Suggested class text:
I provide handouts and links to several sites that offer all you need to know about
our level of HTML and CSS. However, if you wish to have a book or reference
guide, consider any text that covers HTML 4.01 as well as CSS 2.0 (Note: One
book does not need to cover both topics). For example:
Castro, ELizabeth. (2002) HTML for the World Wide Web with XHTML and CSS:
Visual QuickStart Guide, Fifth Edition.
Introduction
The Internet is unlike anything that humankind has seen before. It is global in its
reach: With the proper equipment, the Internet can extend into any corner of our
world. It is robust in its architecture: Because it has no central control, the
Internet can't be totally stopped without every single connection being reached. It
is enabling: Any person or machine has the capability to communicate almost
instantaneously with another person or machine. It fosters free speech: Except
on very local levels, the Internet can't be completely censored or filtered. It
2. continues to grow: The Internet is growing and expanding at such a rate that the
keeping of statistics on this movement often seems to be based on conjecture.
This course emphasizes the development of certain basic skills that will allow you
to create web documents. This course also explores design, organization,
navigation, and interactivity aspects of web site creation. The study of these
aspects will allow you to appreciate the way that the Internet is changing the
nature of communication. You will then be able to understand better and perhaps
manage more efficiently this impact. You will do the following this semester:
• review current HTML markup
• develop proficiency in Cascading Stylesheets (CSS)
• explore the basics of DHTML (HTML+CSS+JavaScript)
• explore XHTML and prepare yourself for future directions in web authoring
• gain a better understanding of web page layout, design, labeling, and
navigation
• gain a better appreciation of what it takes to make a web site usable and
accessible
• understand how to organize a nd present digital information on the web
Through your grasp of technical skills and your understanding of the Internet as
an organizational challenge, you will be in a better position to recognize the role
that you or your organization can play in an info rmation network.
Grading Policy
To receive a passing grade in this course, you must turn in all the assignments
and the term project and do your presentation. You cannot pass this course
without doing all the assigned work. Note: Turning in all the work is not a
guarantee that you will pass the course.
Grades of I (Incomplete) may be assigned in this course only after discussion
with the instructor.
All assignments must be submitted on the dates specified in this syllabus. If you
cannot submit an assignment or cannot deliver a presentation on the date it is
due, it is your responsibility to discuss your situation with the instructor,
preferably in advance. Arrangements for the completion of the outstanding work
can be made only at the discretion of the instructor. Work turned in after the
assigned date will reflect a penalty, of course, applied at the discretion of the
instructor.
Criteria for evaluation
3. To receive a passing grade in this course, you must turn in all the assignments.
You cannot pass this course without doing all the assigned work. Note: Turning
in all the work is not a guarantee that you will pass the course. Grades of I
(Incomplete) may be assigned in this course only after discussion with the
instructor.
All assignments must be submitted o n the dates specified in this syllabus. If you
cannot submit an item on the date it is due, it is your responsibility to discuss
your situation with the instructor, preferably in advance. Arrangements for the
completion of the outstanding work can be made only at the discretion of the
instructor. Work turned in after the assigned date will reflect a penalty, of course,
applied at the discretion of the instructor.
Indiana University and School of Library and Information Science policies on
academic dishonesty will be followed. Students found to be engaging in
plagiarism, cheating, and other types of dishonesty will receive a failing grade for
the course.
Grade Computation:
A (4.0) Outstanding achievement
Student performance demonstrates full command of he course materials and
evinces a high level of originality and/or creativity that far surpasses course
expectations.
A- (3.7) Excellent achievement
Student performance demonstrates thorough knowledge of the course materials
and exceeds course expectations by completing all requirements in a superior
manner.
B+ (3.3) Very good work
Student performance demonstrates above-average comprehension of the course
materials and exceeds course expectations on all tasks as defined in the course
syllabus.
B (3.0) Good work
Student performance meets designated course expectations, demonstrates
understanding of the course materials and is at an acceptable level.
B- (2.7) Marginal work
Student performance demonstrates incomplete understanding of course
materials.
C+ (2.3) Unsatisfactory work
Student performance demonstrates incomplete and inadequate understanding of
course materials.
C (2.0) Unsatisfactory work
Student performance demonstrates incomplete and inadequate understanding of
course materials.
C- (1.7) Unacceptable work
Coursework performed at this level will not count toward the MLS or MIS degree.
4. For the course to count towards the degree, the student must repeat the course
with a passing grade.
D+ (1.3) Unacceptable work
Coursework performed at this level will not count toward the MLS or MIS degree.
For the course to count towards the degree, the student must repeat the course
with a passing grade.
D (1.0) Unacceptable work
Coursework performed at this level will not count toward the MLS or MIS degree.
For the course to count towards the degree, the student must repeat the course
with a passing grade.
D- (1.7) Unacceptable work
Coursework performed at this level will not count toward the MLS or MIS degree.
For the course to count towards the degree, the student must repeat the course
with a passing grade.
F (0.0) Failing
Student may continue in program only with permission of the Dean.
Note: If you are a student with a special need, please feel free to discuss it with
me.
Academic Misconduct
(Taken from Academic Handbook, 2001and the Code of Student Rights,
Responsibilities, and Conduct)
http://www.indiana.edu/~deanfac/acadhbk/acad_handbk_2001.pdf
1. Cheating
A student must not use or attempt to use unauthorized assistance, materials,
information, or study aids in any academic exercise, including, but not limited to,
the following:
• A student must not use external assistance on any "in-class" or "take-
home" examination, unless the instructor specifically has authorized
external assistance. This prohibition includes, but is not limited to, the use
of tutors, books, notes, and calculators.
• A student must not use another person as a substitute in the taking of an
examination or quiz.
• A student must not steal examinations or other course materials.
• A student must not allow others to conduct research or to prepare work for
him or her without advance authorization from the instructor to whom the
work is being submitted. Under this prohibition, a student must not make
any unauthorized use of materials obtained from commercial term paper
companies or from files of papers prepared by other persons.
• A student must not collaborate with other persons on a particular project
and submit a copy of a written report which is represented explicitly or
implicitly as the student's individual work.
5. • A student must not use any unauthorized assistance in a laboratory, at a
computer terminal, or on field work.
• A student must not submit substantial portions of the same academic work
for credit or honors more than once without permission of the instructor to
whom the work is being submitted.
• A student must not alter a grade or score in any way.
2. Fabrication
A student must not falsify or invent any information or data in an academic
exercise including, but not limited to, records or reports, laboratory results, and
citations to the sources of information.
3. Plagiarism
A student must not adopt or reproduce ideas, words, or statements of another
person without appropriate acknowledgment. A student must give credit to the
originality of others and acknowledge an indebtedness whenever he or she does
any of the following:
• Quotes another person's actual words, either oral or written;
• Paraphrases another person's words, either oral or written;
• Uses another person's idea, opinion, or theory; or
• Borrows facts, statistics, or other illustrative material, unless the
information is common knowledge.
4. Interference
• A student must not steal, change, destroy, or impede another student's
work. Impeding another student's work includes, but is not limited to, the
theft, defacement, or mutilation of resources so as to deprive others of the
information they contain.
• A student must not give or offer a bribe, promise favo rs, or make threats
with the intention of affecting a grade or the evaluation of academic
performance.
Assignments
Your web-based work must be clearly marked up. All assignments are to be
posted on the Web by class time on the date indicated. All markup must conform
to the HTML 4.01 standard excluding all deprecated HTML.
HTML/CSS markup
6. Due: May 31
Weight: 20%
You will design a mini web site for a library, business, an any other organization
of your choice. Start by creating a "home page" for this organization. On this
home page you must have:
• links to at least five external pages/documents that you do not own
• links to at least five other pages you have created for this site (these
pages can have "dummy" content)
• at least two images (not including a background image)
Within the site you must also have:
• at least two tables for information presentation
Link your site to at least one cascading stylesheet. Do not use any deprecated
HTML.
Accessibility assignment
Due: June 28
Weight: 15%
You will create a mini web site based on the topic of your choice. You must use a
stylesheet (internal or external). This home page must meet the standards for
accessibility as determined by the W3C discussed during the semester. Use the
WebXACT validator (http://webxact.watchfire.com/) to check your site's
accessibility to meet the Web Content Accessibility Guidelines 1.0.
You will have at minimum:
• at least three external links to documents you do not own
• at least three links to other "dummy" pages you have created
• at least two tables for information presentation
• at least five images (not including a background image)
You can, of course, include any of the preceding requirements on the less-
developed dummy pages, if you wish, instead of trying to put them all on your
home page. Be sure, however, to make your home page an attractive starting
point.
XHMTL markup
Due: July 12
Weight: 20%
7. You will be given text to mark up using basic XHTML. You choose how you want
to tag the document as long as you conform to the XHTML 1.0 strict DTD. You
must use an external stylesheet. Your XHTML must . . .
• be valid and well formed
• use the proper syntax for all non-empty and empty elements
• contain properly formatted attributes and values
You must use a minimum amount of styles as categorized on the CSS Reference
Chart (css-quickref.doc)
• three from the FONT section
• three from the TEXT section
• three from the COLOR and BACKGROUND section
• three from the BOX section
Choose one of the following documents to mark up (these are .txt files):
• La Fontaine
• Blake
• Houseman
• Lear
• Villon
• Mother Goose selection
Final project
Due: August 2
Weight: 30%
Develop a web site for some organization: a business, a museum, a school, a
library, etc. You will consider developing a site for a real client, if possible. The
site should be useful, contain significant content, be attractive, and be targeted at
a specific audience. This site will thus combine your grasp of information
architecture (layout, design, navigation, branding, labeling, usability, accessibility,
etc.) with your markup abilities. Ideas for projects will be discussed in class
throughout the semester. Although no predetermined list of clients for this project
exists, you must clear your topic with the instructor.
Samples from previous classes (.txt file)
Grading Breakdown
Basic HTML markup = 20%
Accessibility assignment = 15%
XHTML markup = 20%
8. Final project = 30%
Participation = 15%
GRADE CALCULATOR (.xls file)
Course Outline
NOTE: read the assigned chapters before working on any assignment
Information for the world wide web (Rosenfeld & Morville) notes: Chapters
1-16 (.doc)
May 10
Introduction to Information Architecture
Introduction to the browser medium: Browser information
Introduction to publishing on the web: At IU, how can I publish personal pages on
Mypage?
HTML 4.01: HTML Review (.doc)
Minimal HTML: Minimal HTML
Introduction to HTML tables: tables
May 17
HTML review (cont.):
<head> section: Basic <head> Possibilities (.doc)
DOCTYPE: DOCTYPE list (.doc)
HTML entities: ASCII Entities for HTML (.doc)
Image formats: Common image formats for the Web (.doc)
Introduction to HTML forms: forms
Basic HTML forms: Basic HTML Forms (.doc)
9. Basic HTML page for review and practice: jefferson.html
Introduction to CSS: CSS Quick Reference Chart (.doc)
How to call a style: Calli ng CSS (.doc)
May 24
Information Architecture for the World Wide Web (Part I): Chapters 1-3
Introduction to CSS (cont.)
CSS Syntax: CSS Syntax: internal and external (.doc) and CSS Syntax: inline
(.doc)
May 31
Information Architecture for the World Wide Web (Part II): Chapters 4 -7
CSS Review: CSS samples
CSS Box Model: CSS Box Model (.doc)
June 7
no class
June 14
Information Architecture for the World Wide Web (Part II): Chapters 8 -9
CSS Review (cont.): CSS samples
June 21
Information Architecture for the World Wide Web (Part III): Chapters 10-12
Introduction to web accessibility
Making Your Web Site Accessible in Ten Easy Steps: PowerPoint presentation
Accessibility readings and exercises: accessibility.html
Accessibility basics: Introduction to Accessibility (.doc)
10. June 28
XHMTL: (W3Schools XHTML Tutorial: http://www.w3schools.com/xhtml/)
XHTML review: xhtml-intro.html
July 5
Information Architecture for the World Wide Web (Part IV): Chapters 13-16
Final project discussions
July 12
Introduction to JavaScript
JavaScript notes and samples: javascript-intro.html
Final project discussions
July 19
Introduction to DHTML
DHTML samples: dom-intro.html
DHTML Basics:
• DHTML and the DOM (.doc)
• DOM Event Handlers (.doc)
• Anatomy of a DHTML Event (.doc)
Special problems in IA:
• Web Usability (.doc)
• Web Page Layout and Design (.doc)
• Navigation (.doc)
July 26
Review of JavaScript and DHTML
Introduction to XML and future web trends
XML Samples and Exercises: XML Samples (.doc)
11. Review of IA principles
Special problems in IA
August 2
Final project presentations
Additional Resources
Information Architecture
IAwiki
http://www.iawiki.net/IAwiki
Wyllys, R.E. (2000). Information Architecture
http://www.gslis.utexas.edu/~l38613dw/readings/InfoArchitecture.html
HTML
W3Schools HTML Tutorial
http://www.w3schools.com/html/
CSS
Design Detector: CSS2 Test Suite Failures (Christopher Hester, 2003)
http://www.designdetector.com/articles/results.html
Eric Meyer's CSS2 Test Suite
http://www.meyerweb.com/eric/css/tests/css2/
Page Layout, Design, and Usability
Anybrowser.org. (2004). Viewable With Any Browser Campaign for a Non-
Browser Specific WWW
http://www.anybrowser.org/campaign/
Flanders, V. (2004). Web pages that suck.
http://www.webpagesthatsuck.com/
Gillespie, G. (2004). Web page design for designers
http://www.wpdfd.com/wpdhome.htm
12. Nielsen, J. (2004). The Alertbox: Current Issues in Web Usability
http://www.useit.com/alertbox/
Spiderpro (2001) Styleguide: 100 Do's and Don'ts in Web Design
http://www.spiderpro.com/pr/prstgm001.html
JavaScript
W3Schools. (2004). JavaScript Tutorial:
http://www.w3schools.com/js/
XHTML
Claben, M. (2001). XHTML 1.0: Where XML and HTML meet.
Webreference.com.
http://www.webreference.com/xml/column6/
Richmond, A. (2000). Introduction to XHTML, with eXamples. Web Developer's
Virtual Library.
http://www.wdvl.com/Authoring/Languages/XML/XHTML/
DHTML
Brattli, T. (2004). DHTMLcentral.com: Home page
http://www.dhtmlcentral.com/
W3Schools. (2004). DHTML Tutorial
http://www.w3schools.com/dhtml/
Web Site Content and Navigation
Morris, C. (2004). Basic Principles of Web Site Navigation. Web Developer's
Journal
http://www.webdevelopersjournal.com/articles/navigation.html
Zaphiris, P. and Mtei, L. Depth vs Breadth in the Arrangement of Web Links
http://www.otal.umd.edu/SHORE/bs04/
Web Site Accessibility
Webreference: Accessibility and the Web
http://www.webreference.com/authoring/design/usability/accessibility/
Web Site Accessibility (2004)
http://www.lgta.org/accessibility/
13. WebABLE (2004)
http://www.webable.com/
State of Connecticut Universal Website Accessibility Policy (2002)
http://www.cmac.state.ct.us/access/policies/accesspolicy40.html
Website Accessibility - Access Washington (2001)
http://www.aasa.dshs.wa.gov/access/default.htm
Validators
W3C HTML/XHTML Validator
http://validator.w3.org/
W3C CSS Validation Service
http://jigsaw.w3.org/css-validator/validator-uri.html
You can also install a software program on your computer to perform
HTML validation. Here are some examples:
TidyGUI
http://perso.wanadoo.fr/ablavier/TidyGUI/
CSE HTML Validator Lite
http://www.htmlvalidator.com/lite/
_