Kristie Vitulli CSC-100-8N. Showrooming is when a customer goes to a store to look at a product, then purchases the item online, usually for a lower price.

Slides:



Advertisements
Similar presentations
Chapter 3: Software Basics Section I: Preparing to Use Technology.
Advertisements

Intellectual Property Patents Designs Copyright Trademarks.
Technology Guide 2 Software
Taylor Neubauer CSC N Spring 2013 January 17,2013.
Digital Content Solutions Digital content management technology has transformed the way to manage content and knowledge, in this knowledge era. Research.
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Kellie Musco CSC N Societal Topics. Showrooming  Showrooming is when a customer will browse for specific products in a store, and then later buy.
Societal Topics Alyssa Glasow CSC101. Show rooming  Show rooming consists of going to the physical store and browsing for a product, without making a.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Copyright 2004 Monash University IMS5401 Web-based Systems Development Topic 2: Elements of the Web (g) Interactivity.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Discovering Computers: Chapter 1
Databases Chapter Distinguish between the physical and logical view of data Describe how data is organized: characters, fields, records, tables,
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Developing a Basic Web Page with HTML
Chapter 3 Software Two major types of software
POWERPOINT SHA’KAYA DOUGLAS. SHOWROOMING Showrooming is the practice of examining merchandise in a traditional brick and mortar retail store without purchasing.
Creating Web Page Forms
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Web Design Basic Concepts.
+ Connecting to the Web Week 7, Lecture A. + Midterm Basics Thursday February 28 during Class The lab Tuesday, February 26 is optional review Class on.
A2 Technology Product Design Systems and Control Notes DT4 - Exam.
1 Chapter 6 Understanding Computers, 11 th Edition Software Ownership Rights Software license: agreement, either included in a software package or displayed.
Societal Topics Andrew McCauley CSC N Spring 2013.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Section 2.1 Compare the Internet and the Web Identify Web browser components Compare Web sites and Web pages Describe types of Web sites Section 2.2 Identify.
Teaching and Learning with Technology  Allyn and Bacon 2002 Administrative Software Chapter 5 Teaching and Learning with Technology.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
For more notes and topics visit:
STEPHANIE SILVA CSC N. SHOW ROOMING Show rooming refers to window shopping at certain stores looking at prices and then going home and searching.
Computer Concepts 2014 Chapter 7 The Web and .
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 6 Academic Software START This multimedia product and its contents are protected under copyright.
Tiffany Robledo CSC N. Showrooming O Showrooming is when a customer walks into a store to check out a look and feel for the product then buys it.
CONNECTING LEARNERS USING WEB 2.0 TOOLS GERARDO A. SCHOELLER INSTRUCTIONAL TECHNOLOGY Dr. Nicolas Diogo 10/24/2013.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
Discovering Computers 2010 Chapter 2 The Internet and World Wide Web.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
Introduction To Computer System
1 Web Basics Section 1.1 Compare the Internet and the Web Compare Web sites and Web pages Identify Web browser components Describe types of Web sites Section.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Sonja Campbell CSC 104. Index  Week 1  Topic 1 Topic 1  Topic 2 Topic 2  Week 2  Topic 1 Topic 1  Topic 2 Topic 2  Week 3  Topic 1 Topic 1  Topic.
 The ability to develop step by step procedures for solving problems  She uses algorithmic thinking by setting up her charts.
Shanikwa Williams CSC N. Show rooming  Show rooming is the practice of examining merchandise in retail stores. This practice allows people to.
SOCIETAL TOPICS Created by: Kelly Mitchell. WEEK 1 - WHAT IS SHOWROOMING?  Showrooming is when a shopper visits a store to look for a product but then.
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
Software and Hardware Interaction
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
Web Engineering we define Web Engineering as follows: 1) Web Engineering is the application of systematic and proven approaches (concepts, methods, techniques,
Jessica Lavoie CSC 101 November 27, Societal Topics Weeks 7 and 8 Internet Regulation Internet regulation is restricting or controlling access to.
Setting Project Requirements. Step One The first step in creating a website is to define the Purpose.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
Protecting Students on the School Computer Network Enfield High School.
LECTURE – I e-COMMERCE İstanbul Commerce University Vocational School.
Intellectual Property What’s legal?. Discuss Terms  intellectual property, plagiarism, copyright-patent-trademark, public domain, fair use  piracy,
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
Phone Apps and Their Uses By: Deividas Vavilovas.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
UML - Development Process 1 Software Development Process Using UML.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
introductionwhyexamples What is a Web site? A web site is: a presentation tool; a way to communicate; a learning tool; a teaching tool; a marketing important.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Database Driven Websites
Presentation transcript:

Kristie Vitulli CSC-100-8N

Showrooming is when a customer goes to a store to look at a product, then purchases the item online, usually for a lower price. 50% percent of online sales are driven by showrooming and luxury items. Consumer electronics are the most commonly showroomed products. WEEK 1-SHOWROOMING

Hands on activities are how I learn best. I am a visual learner, so I retain information better when I am given something to look at, rather than listening to a concept. WEEK 1- HOW I LEARN BEST

Social media can rapidly spread information that is either intentionally or unintentionally misleading or provocative. What could be done to protect against the risk of digital wildfires? Many jurisdictions already have laws that limit freedom of speech in the real world for reasons such as incitement of violence or panic, and are grappling with how to apply those laws to online activities. Build internet firewalls to prevent digital wildfires from occurring. Only the users of the internet users can do this! WEEK 2- HOW CAN YOU PREVENT DIGITAL WILDFIRES?

MOOC or“Massive Open Online Course” that anyone with an Internet connection can attend for free. MOOCs typically do not offer credits awarded to paying students at schools. However, assessment of learning may be done for certification. Participants do not need to be a registered student in a school to "take" a MOOC, and are not required to pay a fee. MOOCs can also serve as a potential networking hub for people interested in the topic of the courses being taught. WEEK 2- MOOC

The process of translating an idea or invention into a good or service that creates value or for which customers will pay. To be called an innovation, an idea must be replicable at an economicalcost and must satisfy a specific need. involves deliberate application of information, imagination and initiative in deriving greater or different values from resources, and includes all processes by which new ideas are generated and converted into useful products. WEEK 3- INNOVATION

Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. IP is divided into two categories: Industrial property, which includes inventions, trademarks, industrial designs, and geographic indications of source; and Copyright, works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs WEEK 3- INTELLECTUAL PROPERTY

WEEK 4- COPYRIGHT, OPEN SOURCE SOFTWARE, EPIC YNHC Societal Topics Week 4 Double Tweet

An open textbook is a textbook licensed under an open copyright license, and made available online to be freely used by students, teachers and members of the public. Many open textbooks are distributed in other printed, e-book, or audio formats that m Overall, open textbooks have been found by the Student PIRGs to offer 80% or more savings to higher education students over traditional textbook publishers. WEEK5-OPEN SOURCE TEXTBOOKS

Microsoft Access is the database application from the Microsoft Office Suite of applications. It is a powerful personal database and data manipulation tool that is also widely used in many small businesses. A communications program from Microsoft, meant to compete with ProComm and other programs. It sucked and was dropped. Years later they reused the name for their database. Access tables support a variety of standard field types, indices, and referential integrity WEEK5-ACCESS

Microsoft recognizes that as a leading technology provider with global operations, our business can help to promote human rights. Our approach to human rights is aligned with the UN Guiding Principles for Business and Human Rights. We accept the important responsibility we have to respect human rights and we aid to bring the power of technology to bear to promote respect for human rights throughout the world. WEEK6-HUMAN RIGHTS

A unified, HTML5-based user interface system for all popular mobile device platforms, built on the rock-solid jQuery and jQuery UI foundation. Its lightweight code is built with progressive enhancement, and has a flexible, easy design. Some examples are listed below WEEK6-JQUERY MOBILE

Internet governance is the development and application of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet. WEEK7-INTERNET GOVERNANCE

Google Apps is a suite of Google applications that brings together essential services to help your business. This is a hosted service that lets businesses, schools, and institutions use a variety of Google products includes , Google Docs, Google Calendar, and Google Talk -- on a unique domain WEEK7-GOOGLE APPLICATIONS

Geolocation is the identification of the real-world geographic location of an object, such as a radar, mobile phone or an internet- connected computer terminal. Geolocation may refer to the practice of assessing the location, or to the actual assessed location rather than geographic coordinates. WEEK8-GEOLOCATION

When we log onto the Internet, we take lots of things for granted. We assume that we'll be able to access whatever Web site we want, whenever we want to go there. What makes all these assumptions possible is "Network Neutrality," the guiding principle that preserves the free and open Internet. Net Neutrality means that Internet service providers may not discriminate between different kinds of content and applications online. It guarantees a level playing field for all Web sites and Internet technologies. WEEK8-NET NEUTRALITY

Spam is the use of electronic messaging systems to send bulk messages, mostly advertising, indiscriminately. While the most widely recognized form of spam is spam, the term is applied to similar abuses in other media. WEEK9-SPAM

Microsoft Office Live is a discontinued web-based service providing document sharing and website creation tools for consumers and small businesses. Office Live consisted of two services, Office Live Workspace, which was superseded by SkyDrive, and Office Live Small Business, which was superseded by Office 365. WEEK9-OFFICE LIVE

Many web developers consider security a low priority. Security is frequently relegated to the end of the software development life cycle, as little more than an afterthought. Sometimes, software security is neglected entirely, resulting in applications rife with common vulnerabilities. Because such bugs might manifest only under conditions present during an attack, they can be hard to detect prior to such events without knowledge of how the exploitation process works. Using a web application built with jQuery Mobile, PHP, and MySQL, this tutorial shows how many types of vulnerabilities occur along with common methods of exploitation and, most importantly, their respective countermeasures WEEK10-SECURITY

In jQuery Mobile, you can use existing and new HTML5 input types such as password, , tel, number, and more. Some type values are rendered differently across browsers — for example, Chrome displays the range input renders as a slider — so we standardize their appearance by dynamically changing their type to text (currently, this applies to range and search). You can configure which input types are degraded to text with the page plugin's options. One major advantage of using these more specific input types if that on mobile devices, specialized keyboards that speed data entry are offered in place of the standard text keyboard. Try the following inputs on a mobile device to see which display custom keyboards on various platforms. WEEK10-STANDARDIZATION

Zillow is an online real estate database that was founded in 2005 by Rich Barton and Lloyd Frink, former Microsoft executives and founders of Microsoft spin-off Expedia. WEEK12-ZILLOW.COM

Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail either Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to typically identify a specific person. WEEK12-PRIVACY

is a touchscreen-based smartphone developed by Apple Inc. It is the sixth generation of the iPhone and succeeds the iPhone 4S. WEEK13-IPHONE 5S

Online research and learning tool that allows users to search for educational content and visualize relationships with materials of related topics WEEK13-INSTAGROK.COM

This software will take a 100 of the professors already graded essay’s and compare the rest using a new software. The grading is based on technique, grammar, spelling, and plagiarism. Although proven useful, most professors do not trust it because language is an interpretation of thought and emotion, and a machine is not capable of either thought nor emotion. WEEK14-ESSAY GRADING SOFTWARE

Ushahidi is an open source project which allows users to crowd source crisis information to be sent via mobile. It is intended for sending information for collection, interaction, and visualization purposes and makes communication easier. WEEK 14-USHAHIDI