Reference no: EM131390912
Discussion Questions
Discussion 1
"Troubleshooting Web Forms" Please respond to the following:
• Imagine that a local college hired you to look at a lengthy form on the university's office of admissions Website. Prospective students have been calling the office to request information instead of utilizing the university's Website. The form contains 32 fields, which must be filled in by the user. At the bottom of the form there are send and reset form buttons. Identify aspects of the form that could be frustrating users. Provide at least three recommendations that will encourage the students to utilize the university's Website.
• From the first e-Activity, describe three techniques for optimizing Web form submission usability. Select the technique that you prefer to use and explain why.
• E-ACTIVITY- Use the Internet to research current design techniques to optimize user completion / submission of a Web form. Be prepared to discuss.
Discussion 2
"Forms" Please respond to the following:
• From the second e-Activity, identify a company (bank, car wash, travel agency, nonprofit, restaurant, etc.) and describe how it could benefit from the use of a Web database. Provide examples of the data that it could collect and how it could leverage it to gain a competitive advantage.
• From the third e-Activity, identify a company (bank, car wash, travel agency, nonprofit, restaurant, etc.) and suggest whether you think it should choose to use Open Source or Proprietary Web Server software and explain why. Support your opinion with at least three reasons.
Discussion 3
"File and Folder Protection" Please respond to the following:
• Compare and contrast the role of share and New Technology File System (NTFS) permissions, and the manner in which an administrator uses them in order to secure resources (i.e., files, folders) on a computer. Provide at least one example of when each should be used.
• Imagine that you have restricted access to files and folders using NTFS and share permissions. You would like to further enhance the security of these resources just in case you have improperly configured NTFS permissions or someone accesses the computer physically. Explain at least one approach you could use to provide an additional level of security for your personal files and folders. Provide a rationale for your response.
Discuss maintaining plasma osmolarity within normal limit
: Discuss why maintaining plasma osmolarity within normal limits is important.What could happen to things like blood pressure and cell function if plasma osmolarity is not maintained?
|
What are the rights of the parties
: A contends that inasmuch as his five thousand bushels of corn were placed in the bin first, the remaining five thousand bushels belong to him. What are the rights of the parties?
|
Characteristics of a cancer cell
: Introduction to cancers. Describe to the audience the characteristics of a cancer cell. Indicate which cancer is the focus of your presentation.
|
Is super fur company liable to mary for value of her coat
: Would your answer be the same if Mary's coat had been safely delivered to Fur Storage Company and had been stolen from the company's storage vaults without negligence on its part? Why?
|
Compare the role of share and ntfs permissions
: "magz64"- Compare and contrast the role of share and New Technology File System (NTFS) permissions, and the manner in which an administrator uses them in order to secure resources (i.e., files, folders) on a computer.
|
Claims against bogan for their losses
: The club members concerned each made claims against Bogan for their losses. Can (a) Rich, (b) Smith, and (c) the other members compel Bogan to make good their respective losses?
|
Describe the economic system known as the american system
: Secession gets a bad rap because of its association with slavery and the Civil War. Secession was not, however, all that uncommon of an idea prior to the Civil War. What were some of the other instances that led people to discuss the possibility..
|
What do we mean by a linearregression model
: Does the negative value of Xtmake economic sense? What is the underlying economic theory?
|
Discuss whether terry is liable for conversion of automobile
: One week later, Molly appeared and proved that the automobile was hers, that it had been stolen from her, and that neither Donna nor Carla had any rights in it. Discuss whether Terry is liable for conversion of the automobile.
|