1
1
1
2008
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Table of Contents
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 1
Information Technology
Security Standards
Introduction
To implement the Information Technology (IT) Security Policy, to protect IT
resources, and to enable security audits of those resources, it is required that agencies
adhere to common IT security standards. Common standards will help ensure that all
agencies have an effective and secure environment for IT processing.
The protection of computer systems and related data in the State of Washington
requires an approach that results in implementation of a balanced, cost-effective
application of security disciplines and techniques required by these standards.
Security standards define the processes, procedures, and practices necessary for
implementing an agency-specific IT security program. These standards apply to all IT
activities, whether they are operated by or for an agency. They include specific steps
that shall be taken to ensure that a secure IT environment is maintained and all agency
systems provide for privacy and security of confidential information.
At the core of these standards is the concept of a shared, trusted environment for
interaction between agencies as well as agency to customer transactions. This shared,
trusted environment is defined as the Washington State Digital Government
Framework. This framework includes the State Government Network (SGN).
These standards are based on a set of key principles intended to protect this trusted
environment, which include:
Sound risk assessment that results in an adequate level of security.
Security levels that are commensurate with the shared risk to the state enterprise.
Implementation of security with a customer-centric focus.
Security programs that support industry standards where applicable.
Focus on a least-privilege approach to access control.
Agencies that operate some or all of their information systems outside of this
environment shall still adhere to the security principles contained in these standards
by creating equivalent environments.
This document contains the following IT security standards:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Interim Addendum
The requirements contained in the Information Technology Security Standards
Interim Addendum, located at the end of this document, also apply to all IT activities.
The addendum contains interim standards adopted in conjunction with the revision of
Policy No. 400-P1 Securing Information Technology Assets effective January 10,
2008. These items, which had previously been included in the policy revision dated
April 2002, will be reviewed in full and incorporated as appropriate into the body of
these standards during the next revision.
Statutory Authority
The provisions of RCW 43.105.041 detail the powers and duties of the Information
Services Board (ISB), including the authority to develop statewide or interagency
information services and technical policies, standards, and procedures.
Scope
These standards apply to all executive and judicial branch agencies and educational
institutions, as provided by law, that operate, manage, or use IT services or equipment
to support critical state business functions.
Exemptions
These standards apply to Institutions of Higher Education, except, pursuant to RCW
43.105.200, when they develop security standards in lieu of the standards below that
are: a) appropriate to their respective environments, and b) consistent with the intent
of the ISB. Such higher education security standards shall address:
Appropriate levels of security and integrity for data exchange and business
transactions;
Effective authentication processes, security architecture(s), and trust fabric(s);
and
Compliance, testing, and audit provisions.
Standards
Standards for Agency IT Security Program Development and Maintenance
These standards provide instructions to facilitate the development and
maintenance of an agency IT security program needed to protect the integrity,
availability, and confidentiality of agency data and safeguard agency IT resources.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Agencies shall have an audit performed once every three years for compliance with IT
Security Policy and Standards. This audit shall be performed by parties independent
of the agency's IT organization. Each agency will be required to maintain
documentation showing the results of its audit and plans for correcting material
deficiencies that the audit identifies.
All IT security program documentation shall be written in a clear, compelling, non-
technical manner.
Some IT security program documentation may contain sensitive information
about the agency's business, communications, and computing operations or
employees. Such information is to be shared only with personnel who have a need
to know. Security program documentation, as prescribed in RCW
42.17.310(1)(ww) and (ddd), should be clearly labeled as “Computer Security
Information”.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Vulnerability Analysis
A vulnerability analysis is used to identify vulnerabilities associated with information
assets. The vulnerability analysis shall identify specific vulnerabilities related to
information assets identified in the information asset review, as well as where those
vulnerabilities exist.
Threat Analysis
A threat analysis shall be conducted to identify threats that could result in the
intentional or accidental destruction, modification or release of data, computer, or
telecommunication resources.
Risk Analysis
A risk analysis is a collective review of the vulnerabilities and threats to all identified
assets to determine the likelihood and impact. This analysis forms the foundation for
security program planning.
While no specific format is required for the risk analysis, instructions and suggested
formats, as well as links to risk analysis resources, can be found in the Information
Technology Security Guidelines. Organizations may also consider leveraging disaster
recovery reviews, specifically relating to critical assets and business impact, when
completing IT security risk assessments.
i. Standards for Agency IT Security Program Components
Agency security programs shall document policies and procedures for the
functional areas outlined below.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Ensure system security requirements assessment and testing during the development
life cycle.
When sharing data with an external entity (whether data sharing is covered as
part of a larger contract, a service level agreement (SLA), or as a dedicated data
sharing agreement), the following shall be addressed:
The data that is to be shared.
The classification of the data (reference ISB IT Security Guidelines).
How the data will be accessed or shared.
Who will have access to the data.
How the data will be protected.
What will be done with the data when it is no longer needed for the contract.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Secure exchange of information from one application or user to another requires that:
All manipulations of data during the exchange are secure.
If intercepted during transmission, data cannot be understood.
The intended recipient is the only one who can understand the transmitted
information.
Confirmation is received that the intended recipient received the data.
Confidential information subject to exposure shall be encrypted.
It is assumed that the exchange of information occurs only between secure endpoints.
Secure E-mail
Secure delivery of a message from a sender to a receiver requires that:
E-mail, and any attachments, containing confidential information shall be encrypted
from the sending device to the receiving device.
Chain-of-custody shall be preserved from sending device to receiving device.
Ability to un-encrypt sender's message through authorized process; sending
organization must be able to un-encrypt and retrieve originating version of sent
message.
All manipulations of data during the transfer from sending device to receiving device
are secure.
If intercepted between sending device and receiving device, data cannot be
understood.
Only the selected receiver can view the data in its original, unencrypted state.
If technically feasible, confirmation shall be issued to indicate that the intended
receiver received the data.
The sending organization shall determine what information requires the need for
secure e-mail and ensure that the encrypted e-mail message is retrievable within a pre-
defined archival period.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Agencies shall develop, document, and implement policies and procedures that
require any remotely attached device, either employee owned, or agency owned, to
have current patches. Agencies may choose to disable or block access for any
device that is not in compliance with this requirement.
Agencies shall develop, document, and implement policies and procedures that
require devices attached to agency networks (either on agency local area networks,
or wireless networks) to have current patches.
Agencies shall develop, document, and implement policies and procedures for
Anti-Virus Protection.
Agencies shall develop, document, and implement policies and procedures that
address virus prevention, detection and removal processes, including signature
currency. Agencies shall ensure that all file transfers, e-mail of all types, and web
browser based traffic are examined for known viruses. File transfer, e-mail or
web browser-based traffic that cannot be examined for viruses should be
disallowed.
Agencies shall develop, document, and implement virus incident response
procedures that are integrated with the WACIRC incident reporting processes.
Agencies with devices connected to the SGN shall ensure:
The devices are not connected to external networks either directly or through an
extranet/VPN connection. External networks are defined as any networks not part
of the SGN and not protected by the DIS-managed security layer, OR;
The devices are connected to external networks only through a DIS-managed or
approved security layer. The DIS-managed security layer is defined as firewalls,
proxy servers and security gateways, OR;
The agency network is only connected to the SGN through a DIS managed or
approved security layer.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Agencies shall develop, document, and implement policies and procedures for
Web Browser and E-mail Client security.
All software used to access or transmit through the Internet shall be approved by
an authorized agency authority and shall incorporate all provided security patches
that are appropriate to the environment in which it is operating in accordance with
the patch management standards.
Agencies shall ensure that all files received from the Internet are checked for
viruses in accordance with the virus prevention standards.
Agencies shall develop, document, and implement clear acceptable use policies
for the use of web browsers and e-mail.
Agencies shall develop, document, and implement policies and procedures for
Web server security.
Information placed on a Web site is subject to the same privacy restrictions as
non-electronic information. Accordingly, before information is placed on the
Internet, it shall be reviewed and approved for release in the same manner as other
official memos, reports, or other official non-electronic information. Agencies
shall conform to the ISB Public Records Privacy Protection Policy that implements
Executive Order 00-03, Public Records Privacy Protections, for its Web site
information.
Web server software shall not be downloaded, installed, or run without prior
approval by an agency-authorized system administrator.
Remote control of Web servers (i.e. administrator operations, including
supervisor-level logon) shall be done from the console or via properly secured
sessions. The authentication processes and mechanisms used shall be
commensurate with the level of risk associated with the nature of the remote
environment (i.e. within the SGN or externally over the Internet).
Patches for Web server software and underlying operating system software shall
be installed in accordance with the patch management standards found in section
II. D. 3 of this document.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Shall not contain the user’s name or any part of their full name.
Passwords shall be changed a minimum of every 120 days.
After a maximum of five incorrect login attempts, accounts will be locked for a
specified period of time, or until administrator reset.
Password administration rules shall be systematically enforced. Any exception shall
be documented in the agency’s security program.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Remote Access
Agencies shall develop, document, and implement policies and procedures for
remote access that mitigate the threat or risk posed by all users or devices
authorized to connect remotely to or through the SGN. Mitigation must not be
susceptible to end user modification. Technologies include, but are not limited to,
dial-up, wireless, and Virtual Private Networks (VPN).
Agencies shall control the use of dial-up lines.
i. Dial-in ports may be used only if there is no other way to
satisfy a business need.
If dial-in is used, all security features (dial back, etc.) appropriate to the
operating environment shall be used.
Agencies shall maintain and review a log of remote connections.
Agencies shall monitor remote access by vendors.
Agencies that use VPN services shall develop, document, and implement
policies and procedures and that, at a minimum, address the following:
i. VPN solutions shall use industry standard protocols.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Internet Access
The use of the Internet as an access alternative to applications and data imposes
new risks regarding the verification of an end user's identity. The standards set
forth in this section respond to the issues that shall be addressed by agencies
concerned with authentication and access of Internet-based systems.
Internet-based applications shall involve the use of authentication processes and
mechanisms that provide a level of identity confidence (level of confidence) that is
commensurate with the risk associated with unintended access and/or disclosure of
data. “Level of Confidence" can be determined by assessing the processes,
controls, mechanisms and technologies used in the authentication process to
provide the following:
Identification and Authentication: To initially establish and confirm the identity
of an individual or entity and ensure that an authentication mechanism (e.g. digital
certificate, password, etc.) used to authenticate an individual or entity has been
securely issued.
Authentication Integrity: To ensure that the authentication mechanism used to
authenticate an individual or entity is responsibly managed and properly protected
to prevent unintended use or compromise.
Authentication Validation: To confirm and validate the identity of an individual
or entity upon presentment of the authentication mechanism to an Internet-based
system.
Application Security: To ensure that an Internet-based application is properly
insulated from direct access from the Internet, and that only individuals or entities
whose identities have been positively validated are eligible to access the
application.
ii. Standards for Digital Government (Internet) Application
Submittal
General Requirements
This section describes the IT security related content that shall be included in the
submittals for Internet-based application design packets. The agency's DIS Senior
Technology Management Consultant will use available internal and external
resources to review design features relating to Internet security. The Consultant
will provide developers pro-active access to the security infrastructure and provide
development teams (particularly those agencies with no Internet-based application
security personnel) with suggestions or advice on how to best utilize the security
infrastructure and existing capabilities of the Washington State Digital
Government Framework.
Internet-based applications that are designed to provide anonymous access to
public information (no specific application level security requirements) are not
subject to this submittal requirement.
If a new application or data source is to be integrated into a previously submitted
and approved environment, no subsequent submittal is required.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
The agency's security program shall address how the agency will ensure all new
Internet-based applications will be reviewed with the agency's DIS Senior
Technology Management Consultant.
The security program shall address how submitted information will include, at a
minimum, the following IT security related information:
Application description.
Provide a general description of the purpose of the application and the nature of
the information involved.
Application services.
Describe the nature of the services to be provided to the user of the application
(static data, interactive queries, data entry, electronic payments).
Authentication requirements (high, medium, low level of confidence).
Describe the level of confidence required for user authentication and provide a
summary of the analysis completed to determine this level.
Certificate Authority integration (if required).
If the proposed authentication mechanism involves the use of digital certificates,
describe any known application integration issues.
Application access control mechanisms.
i. If the project involves providing access to an existing
application, describe the nature of the application's access
control mechanisms (user ID, password, etc.).
Maintenance
Technological advances and changes in the business requirements of agencies will
necessitate periodic revisions to policies, standards, and guidelines. The Department
of Information Services is responsible for routine maintenance of these to keep them
current. Major policy changes will require the approval of the ISB.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Table 1
Policy Relevant Standard Section
Standards for IT Security Program
1. Each agency must operate in a manner consistent
Development and Maintenance (Section I)
with the maintenance of a shared, trusted
environment.
Network Security Standards (Section II, D.)
4. Each agency must address the effect of using the Network Security Standards (Section II, D)
Internet to conduct transactions for state business
with other public entities, citizens, and businesses Access Security Standards (Section II, E.)
5. Each agency must ensure staff is appropriately Personnel Security Standards (Section II,
trained in IT security procedures A.)
9. The State Auditor may audit agency IT security Standards for IT Security Program
processes, procedures, and practices Development and Maintenance (Section I)
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Information Technology
Security Standards
Interim Addendum
This addendum contains interim standards adopted in conjunction with the revision of
Policy No. 400-P1 Securing Information Technology Assets effective January 10,
2008. These items, which had previously been included in the policy revision dated
April 2002, will be reviewed in full and incorporated as appropriate into the body of
the standards during the next revision.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Examples of changes that require review and appropriate updates to the agency
security program include modifications to physical facility, computer hardware or
software, telecommunications hardware or software, telecommunications
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Each agency must maintain documentation showing the results of its review or
audit and the plan for correcting material deficiencies revealed by the review or
audit.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 2
An Introduction to Project Management
Project management in the modern sense began in the early 1960s, although it has its
roots much further back in the latter years of the 19th century. The need for project
management was driven by businesses that realized the benefits of organizing work
around projects and the critical need to communicate and co-ordinate work across
departments and professions. One of the first major uses of project management as we
know it today was to manage the United States space programmed. The government,
military and corporate world have now adopted this practice. Here is the main
definition of what project management is:
1. Project management is no small task.
2. Project management has a definite beginning and end. It is not a continuous
process.
3. Project management uses various tools to measure accomplishments and track
project tasks. These include Work Breakdown Structures, Gantt charts and
PERT charts.
4. Projects frequently need resources on an ad-hoc basis as opposed to
organizations that have only dedicated full-time positions.
5. Project management reduces risk and increases the chance of success.
Project management is often summarized in a triangle. The three most important
factors are time, cost and scope, commonly called the triple constraint. These form the
vertices with quality as a central theme.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
More recently, this has given way to a project management diamond, with time, cost,
scope and quality the four vertices and customer expectations as a central theme. No
two customers' expectations are the same so you must ask what their expectations are.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
• Conflict Management
• Planning
• Contract management
• Estimating
• Problem solving
• Creative thinking
• Time Management
"Project managers bear ultimate responsibility for making things happen.
Traditionally, they have carried out this role as mere implementers. To do their jobs
they needed to have basic administrative and technical competencies. Today they play
a far broader role. In addition to the traditional skills, they need to have business
skills, customer relations skills, and political skills. Psychologically, they must be
results-oriented self-starters with a high tolerance for ambiguity, because little is
clear-cut in today's tumultuous business environment. Shortcomings in any of these
areas can lead to project failure." - J. Davidson Frame
Many things can go wrong in project management. These things are often called
barriers. Here are some possible barriers:
1. Poor communication
2. Disagreement
3. Misunderstandings
4. Bad weather
5. Union strikes
6. Personality conflicts
7. Poor management
8. Poorly defined goals and objectives
A good project management discipline will not eliminate all risks, issues and
surprises, but will provide standard processes and procedures to deal with them and
help prevent the following:
1. Projects finishing late, exceeding budget or not meeting customer
expectations.
2. Inconsistency between the processes and procedures used by projects
managers, leading to some being favored more than others.
3. Successful projects, despite a lack of planning, achieved through high stress
levels, goodwill and significant amounts of overtime.
4. Project management seen as not adding value and as a waste of time and
money.
5. Unforeseen internal and/or external events impacting the project.
Project management is about creating an environment and conditions in which a
defined goal or objective can be achieved in a controlled manner by a team of people.
Structure 1
A. Contextual reference
Transitional markers are words used to link ideas together so that the text is smoother
to read. When pronouns such as it, they, them, I, he, she, which, who, whose, that,
such, one and demonstrative adjectives such as this, that, these and those, are used as
transitional markers. They refer to a word, or words, mentioned earlier in the sentence
or paragraph. Their function is to take your thoughts back to something that has
already been mentioned. Thus they serve as synonyms or substitutes. Other words
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
which are often used to refer backwards are the former, the latter, the first, second,
etc. and the last.
Sample paragraph
A computer(1) like any other machine, is used because, it(1) does certain jobs better
and more efficiently than humans. It(1) can receive more information(2) and process
it(2) faster than any human. The speed at which a computer works can replace weeks
or even months of pencil-and-paper work. Therefore, computers(3) are used when the
time saved offsets their(3) cost which is one of the many reasons they(3) are used so
much in business, industry and research.
Exercise 1
Using the sample paragraph as a model, draw a rectangle around the word/ words and
a circle around the word/words that the circled words refer to. Then join the and
the with arrows:
Computers are electronic machine that process information. They are capable of
communicating with the user, of doing different kinds of arithmetic operations and of
making three kinds of decisions. However, they are incapable of thinking. They
accept data and instructions as input and after processing it, they output the results.
B. Making Comparisons
1. Formation
There are several ways of showing that similarities or differences exist between or
amongst things. The regular comparative and superlative of descriptive words,
whether these are adjectives or adverbs is formed as follows:
1. By adding the ending -er and -est to words of one syllable examples:
ABSOLUTE COMPARATIVE SUPERLATIVE
new newer newest
Adjectives old older oldest
big bigger biggest
soon sooner soonest
Adverbs
late later latest
2. By placing the words more and most in front of words with three or more
syllables:
ABSOLUTE COMPARATIVE SUPERLATIVE
interesting more interesting most interesting
Adjectives convenient more convenient most convenient
beautiful more beautiful most beautiful
easily more easily most easily
Adverbs
carefully more carefully most carefully
3. Words with two syllables may be like 1 or 2 above in that they will add the ending
-er and -est if they end in -y or -ly, -ow, -le and -er. Most of the remaining words
take more and most in front of them:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
commoner commonest
common
more common most common
handsomer handsomest
handsome
more handsome most handsome
politer politest
polite
more polite most polite
quieter quietest
quiet
more quiet most quiet
5. There are a small number of adjectives and adverbs that form The comparative and
superlative using a different stem. These irregular comparisons are as follows:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
2. Use in sentences
There are many reasons for using comparisons in discourse, they may be used to
show: a. equivalence; b. non-equivalence; c. one item compared with others; and d.
parallel increase.
Equivalence
The following words or constructions are used to show equivalence (i.e. the same).
as ... as are similar each
as many … as equal to either
as much … as is like all
the same … as similar/ly both
similar to equal/ly alike
the same compare to/with
Examples
1. Third-generation computers can do a thousand times as many calculations as first-
generation computers.
2. Microcomputers are as efficient as minicomputers.
3. The term processor is the same as central processing unit.
4. The digital computer is like a huge cash register.
5. An analog computer and a car speedometer are similar in that they continuously
work out calculations.
6. A microcomputer can sometimes cost as much as a minicomputer.
7. Both minicomputers and microcomputers can have a memory of 32K bytes.
8. A digital computer can be compared to a large cash register.
9. All computers have the same basic characteristics.
10. The time it takes a computer to solve a problem can equal months of work for
man.
Non-equivalence
The following words and/or constructions are used to show non-equivalence (i.e. not
the same).
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Examples
1. Learning a computer language is not as difficult as it seems.
2. A mainframe is bigger and more expensive than a microcomputer.
3. For less than $10,000, you could have a very good microcomputer.
4. Ten years ago, there were fewer computers in use than today.
5. Neither minicomputers nor microcomputers could be as complex as large
mainframes.
6. Unlike minicomputers, microcomputers are not very flexible.
7. An analog computer is not the same as a digital computer.
8. Not all businesses have computerized their accounting departments.
The superlative
The following words and/or constructions are used to show one item compared with
others (i.e. the superlative).
the word + est …
the most …
the least …
Examples
1. Computer technology is the fastest growing technology in the world today.
2. Digital computer programming is the one most commonly used in data processing
for business.
3. BASIC is probably the least difficult computer language to learn.
Parallel increase
The following words and/or constructions are used to show parallel increase (i.e. two
comparatives).
the (word + er) the … the more ...
the (word + er) the … the less …
Examples
1. The bigger the computer, the more complex the operations it can do.
2. The smaller the problem, the less challenging it is to the computer programmer.
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
arbitrary adj. an action or decision made with little thought,
n. arbitrariness order or reason
syn. haphazard
Her choice of clothing seemed arbitrary.
The teacher arbitrarily decided to give the class a test.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
relational database – (1) A database in which the data are organized and accessed
according to relations (2) A collection of data that is organized into related tables.
Relationships are established between and among data in the tables. Data can be
queried and retrieved from a relational database through the use of SQL (Structured
Query Language).
replication service – a service that propagates data and transactions that occur in a
central source database to each participating remote database. Replication uses a
database that has been identified as a central source and reproduces the data to
distributed target databases.
repository – contains metadata, or information about data or components (e.g.,
federated data definitions, data aliases, where OLTP and OLAP data can be found,
information about reusable and shareable components, etc.). The repository serves as
a primary data warehouse administration tool and helps promote data and component
reusability, reliability, and sharing across the enterprise. In information technology, a
repository is a central place in which an aggregation of data is kept and maintained in
an organized way, usually in computer storage.
Depending on how the term is used, a repository may be directly accessible to users or
may be a place from which specific databases, files, or documents are obtained for
further relocation or distribution in a network. A repository may be just the
aggregation of data itself into some accessible place of storage or it may also imply
some ability to selectively extract data. Related terms are data warehouse and data
mining.
reusable component – an executable service that incorporates the logic for a single
business rule or function. A component can be reused and shared between application
systems.
reuse administration – a service that provides technical support for the inventory and
the catalog of federated data, ensuring that the contents are sound, the systems run
smoothly, necessary maintenance is performed when needed, and desirable
enhancements are planned and implemented
W3C (The World Wide Web Consortium) – The W3C is an industry consortium
that seeks to promote standards for the evolution of the Web and interoperability
between WWW products by producing specifications and reference software.
Although W3C is funded by industrial members, it is vendor-neutral and its products
are freely available to all. The Consortium is international; jointly hosted by the MIT
Laboratory for Computer Science in the United States and in Europe by INRIA, who
provide both local support and performing core development. The W3C was initially
established in collaboration with CERN, where the Web originated, and with support
from DARPA and the European Commission.
WAN (wide area network) – a network that provides communication services to a
geographic area larger than that served by a local area network or a metropolitan area
network and that may use or provide public communication facilities. A WAN
typically consists of multiple LANs that are linked together.
WAP (Wireless Application Protocol) – The WAP is a specification for a set of
communication protocols to standardize the way that wireless devices, such as cellular
telephones and radio transceivers, can be used for Internet access, including e-mail,
the World Wide Web,
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 3
Project Management
With the excitement and sense of urgency and momentum of a new project, the
natural tendency is to dive right in. Your enthusiasm and imagination will be essential
to meeting project objectives, but they are not enough alone. Successful projects
require effective management.
In the application process for OLT funding, you have already done much of the
groundwork for sound project management and your hard work will pay dividends
now. With a relatively small amount of additional planning before you begin your
pilot project, you can help ensure a successful outcome.
The purpose of this learning module is to introduce you to the rudiments of project
management. The module is divided into subsections which introduce some basic
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
What is a Project?
According to the Project Management Institute (PMI), a project is any work that
happens only once, has a clear beginning and end, and is intended to create a unique
product or knowledge. It may involve only one person, or thousands. It may last
several days, or many years. It may be undertaken by a single organization, or by an
alliance of several stakeholders. A project may be as simple as organizing a one-day
event or as complex as constructing a dam on a river.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
How many of these characteristics does your project have? How can you improve it?
The tools and techniques provided throughout this module are all designed to help
you meet these five characteristics.
The techniques in this module will help you with the fourth phase, conducting your
community learning pilot project. In formulating your project and applying for
funding, you have already done substantial project planning: identifying partners and
project team members, assigning responsibility for tasks, developing an action plan,
budgeting resources and preparing a marketing strategy and evaluation plan. These
elements form the basis of a project plan.
A project plan sets the ground rules and states them in a clear fashion. This is
especially important since OLT projects typically include multiple partners and
stakeholders with differing interests and perspectives.
Many problems experienced on projects could have been avoided or lessened by
developing a detailed project plan at the outset.
Why Plan?
First, it is vital that everyone understands and agrees to the "ground rules" that will
govern the project from here on in. You need to ensure that the objectives are clearly
stated so that there is no disagreement later on.
Second, the project plan helps you to control and measure your progress. Now that
your team members and financing are finalized, you should revisit your action plan
and add the specific details that will allow you to manage successfully.
Third, the project plan will help you deal with any changes that may occur (and they
inevitably do occur!). For example, what if a stakeholder wants to add a new objective
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
to the project? A clear project plan will help you deal with this situation in keeping
with the overall project objectives.
Finally, the project plan will help to cement stakeholder support over the coming
months and years of the project. This is important because you will need the support
of people from different organizations, and you will not have direct authority over
them.
The project manager, sponsor, every partner, and all key project staff should have a
copy of the project plan. It is a valuable tool that can help to avoid confusion about
the project’s scope and misunderstandings about responsibilities, timeframes or
resource management.
The amount of detail in your project plan will depend on your needs. It
may be quite brief or very detailed. It is up to you to develop an
appropriate project plan based on the nature of your project.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
The project charter should be distributed widely - to anyone with an interest in the
project. This will help build momentum, reinforce the project manager's authority,
and possibly draw other interested and valuable team members into the project.
Designing a Calendar of Activities requires some effort, and you may think that your
project is too small to warrant the effort. However, with the action plan you developed
when applying for funding, you already have the information you need to get started.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
The bulleted items are the units of work that will be assigned to one or more
individuals. Each task should begin with a verb that specifies the work to be done. Be
sure to estimate the time required for each task, since tasks left open-ended are an
invitation to procrastination.
The last task within each category should always be to approve the work of that
phase, a good management practice. When all the work units are done, you will mark
the Calendar of Activities to show the summary task as being complete. In the
meantime, you will know exactly what steps remain to be done. Organize your
Calendar of Activities on a quarterly basis. This will help you to prepare the quarterly
progress reports you will be submitting to OLT.
Time Schedule
Hours per week
Task
Week 1 Week 2 Week 3 Week 4 Total
Conduct learner evaluation of skills development content
Create interview guide 4 - - - 4
Interview learners - 16 4 - 20
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Collate responses - - 4 - 4
Write report - - 8 - 8
Discuss report at weekly
- - 4 - 4
meeting
Revise learning material
- - 8 24 32
content
Approve evaluation - - - 4 4
Subtotal 4 16 28 28 76
The duration of a task depends on the number of people you assign to it and their
productivity. For simple, labour-intensive tasks, you can shorten the duration by
recruiting additional resources (perhaps from a local community group). For more
complex tasks, such as advanced research, adding more resources may not help
because only highly skilled people can be productive on these tasks. Adding more
resources may simply increase your cost, with no improvement in quality or time
requirement.
As the project progresses, there may be tasks that were not foreseeable in the original
plan, or you may wish to undertake additional tasks to enhance the overall project
outcome. If so, you will need to consider the impact on both the Time Schedule and
resources. If your organization and your partners decide that changes to the Schedule
are warranted and feasible, the project manager should get a written agreement for the
revised plan from all the key stakeholders in the project.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Responsibility Matrix
Task Tech
Project Instructional nical
Evaluator Teacher
manager designer supp
ort
Conduct learner evaluation of skills development content
Create
S A I - -
interview guide
Interview
- A - - -
learners
Collate
- A - - -
responses
Write report S A - - -
Discuss report
at weekly P P P P P
meeting
Revise learning
material S I P A I
content
Approve
S - - - -
evaluation
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Project Budget
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
• Make sure each individual has the recognized authority and access to resources
needed to complete tasks they are accountable for in the Responsibility Matrix.
• Allow sufficient time for training for all team members to perform effectively.
• Meet with team members individually to discuss the expected outcomes of the
project and the tasks they are assigned, as well as to point out any difficulties they
may face and answer any questions they may have.
• Recognise your project team’s success when they meet milestones and target dates.
Identifying Risks
The first step in creating a risk response plan is to identify risks which might affect
your project. The project manager, key staff and project partners should “brainstorm”
referring to the project charter, calendar of activities schedule and budget to identify
potential risks. Those involved in the project can often identify risks on the basis of
experience. Published information resources are also available that identify risks for
many application areas.
Common sources of risk in community learning initiatives include:
• Technical risks – such as unproven technology
• Project management risks – such as a poor allocation of time or resources
• Organizational risks – such as resource conflicts with other activities
• External risks – such as changing priorities in partner organizations
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
• Avoidance – changing the project plan to eliminate the risk or protect the objectives
from its impact. An example of avoidance is using a familiar technology instead of an
innovative one.
• Transference – shifting the management and consequence of the risk to a third party.
Risk transfer almost always involves payment of a premium to the party taking on the
risk. An example of transference is using a fixed-price contract for a consultant’s
services.
• Mitigation – reducing the probability and/or consequences of an adverse risk event
to an acceptable threshold. Taking early action is more effective than trying to repair
the consequences after it has occurred. An example of mitigation is seeking additional
project partners to increase the financial resources of the project.
• Acceptance – deciding not to change the project plan to deal with a risk. Passive
acceptance requires no action. Active acceptance may include developing contingency
plans for action should the risk occur. An example of active acceptance is creating a
list of eligible instructors that can be called upon if last minute replacements are
needed for your project.
Since not all risks will be evident at the outset of the project, periodic risk reviews
should be scheduled at project team meetings. Risks that do occur should be
documented, along with their responses. Your lessons learned may be useful to others
or on future projects.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
and the causes for failure are usually lack of strong leadership, lack of team skills, and
lack of stakeholder engagement. These more subtle skills can have a huge effect on
successful outcomes.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
companies, launch new products, or build buildings. While the scale changes for
different kinds of projects, and complexity changes as more people are affected and
involved; at the core there are questions you can answer to help get any project off to
a better start.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
It's been a tough climb to your project management position. How do you establish
your authority and inspire respect? What must be done to influence project results and
growth and make your stay long and productive?
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Structure ۱
AFFIXES
An English word can be divided into three parts: a prefix, a stem and a suffix. Pre-
means ‘before’; a prefix, therefore, is what comes before the stem. Consider as an example,
the prefix de- (meaning ‘reduce’ or ‘reverse’) in a word like demagnetize (meaning ‘to
deprive of magnetism’). A suffix is what is attached to the end of the stem. Consider as an
example the suffix -er (meaning ‘someone who’) in programmer (‘the person who
programs’). Both prefixes and suffixes are referred to as affixes.
Prefixes usually change the meaning of the word; for example, un-changes a word
to the negative. Unmagnetizable means ‘not capable of being magnetized’. Suffixes,
on the other hand, change the word from one part of speech to another. For example, -
ly added to the adjective quick gives the adverb quickly. Let us now consider some
suffixes and their usual meanings.
SUFFIXES
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Exercise 1
Study the following tables and try to find additional examples. Use your dictionary if
necessary.
Noun-forming suffixes
SUFFIX MEANING EXAMPLES
-ance state performance
-ence quality of independence
-er, -or a person who, programmer, operator,
a thing which compiler, accumulator
-ation, -tion the act of execution
-ist, -yst a person who analyst, typist
-ness condition of cleanliness
-ion action/state conversion
-ing activity multiplexing
-ment state, action measurement
-ity state, quality electricity
-ian pertaining to electrician
-ism condition/state magnetism
-dom domain/condition freedom
-ship condition/state relationship, partnership,
friendship
-ary binary
Verb-forming suffixes
SUFFIX MEANING EXAMPLES
-ize computerize
-ate automate, activate, calculate
to make
-ify simplify
-en harden, widen, lengthen
Adverb-forming suffix
SUFFIX MEANING EXAMPLES
electronically, logically,
-ly in the manner of
comparably, helpfully
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Adjective-forming suffixes
SUFFIX MEANING EXAMPLES
-al, -ar, have the quality computational, logical, circular
-ic, -ical magnetic, automatic, electrical,
-able, -ible capable of being comparable, divisible
-ous, -ious like, full of dangerous, religious
-ful characterized by helpful
-less without careless
-ish like yellowish
-ed having computed, punched
-ive quality of interactive
-ing to make or do programming, coding,
processing, multiplexing
Exercise 2
Read the following sentences and underline all the suffixes. Then try to find out what
parts of speech the words are.
1. The systems analyst provides the programmer with the details of the data
processing problems.
2. CRT terminals are very useful interactive devices for use in offices because of their
speed and quietness.
3. The new microcomputer we purchased does not have a Fortran compiler. It is
programmable Basic only.
4. A computer is a machine with an intricate network of electronic circuits that
operate switches or tiny metal cores.
5. In very large and modern installations, the computer operator sits in front of a
screen that shows an up-to-date summary of the computer jobs as they are being
processed.
6. The introduction of terminals and screens has partly replaced the use of punched
cards.
7. Binary arithmetic is based on two digits: 0 and 1.
8. Multiplexing is when many electrical signals are combined and carried on only one
optical link.
9. Computers are machines designed to process electronically specially prepared
pieces of information.
10.The computed results were printed in tables.
Exercise 3
Word forms: First choose the appropriate form of the words to complete the
sentences. Then check the differences of meaning in your dictionary.
1. operation, operate, operator, operational, operationally, operating a. A computer
can perform mathematical ……………. very quickly.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
b. One of the first persons to note that the computer is malfunctioning is the
computer …………..
c. The job of a computer operator is to ………….. the various machines in a
computer installation.
d. The new machines in the computer installation are not yet …………. .
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
appealing adj. attractive or interesting, able to move feelings
v. appeal syn. alluring
n. appeal
Working abroad is appealing to many people.
Through his speeches, the candidate appealed to the voters.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Will the storm alter its course and miss the coast?
Gloria hasn’t made any alterations to her plans.
access protocol – transfers e-mail from the message transfer agent (MTA) to the mail
user
agent (MUA)
ACD (automatic call distribution) – the routing of an incoming call to the next
available operator
ad hoc queries – a method used by end users and applications to access a database in
an
interactive mode. Ad hoc queries usually require the end user to have knowledge of
Structured Query Language (SQL).
adaptive system – a computer application system that can easily be modified to
support unforeseen changes in the business process that the application supports.
ADSL (Asymmetrical Data Subscriber Line) – ADSL is a technology for
transmitting digital information at high bandwidths on existing phone lines to homes
and businesses. Unlike regular dialup phone service, ADSL provides a continuously
available ("always on") connection. ADSL is asymmetric in that it uses most of the
channel to transmit downstream to the user and only a small part to receive
information from the user. ADSL simultaneously accommodates analog (voice)
information on the same line. ADSL is generally offered at downstream data rates
from 512 Kbps to about 6 Mbps. A form of ADSL, known as Universal ADSL or
G.Lite, has been initially approved as a standard by the ITU.
agents – intelligent programs, essentially macros, that facilitate movement across
applications to execute user-defined tasks.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 4
The Evolution of Project Management
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
are met. Whilst the motivation and objectives to apply project management in
organizations is commendable, they do not assure project success.
However, before discussing the meaning and achievement of project success it is
appropriate at this stage to provide a brief history of project management.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Conclusion
Project management should be viewed as a tool that helps organizations to execute
designated projects effectively and efficiently. The use of this tool does not
automatically guarantee project success. (project success will be discussed in a
subsequent issue). However, in preparation for the next issue, I would like you to
think about the distinction between project success and project management success.
This distinction will provide further insight to the questions: Why are some projects
perceived as failures when they have met all the traditional standards of success,
namely, completed on time, completed within budget, and meeting all the technical
specifications? Why are some projects perceived to be successful when they have
failed to meet two important criteria that are traditionally associated with success,
namely, not completed on time and not completed within budget?
Exercises
Word forms
First choose the appropriate form of the words to complete the sentences. Then check
the differences of meaning in your dictionary.
1. integration integrate, integrated, integrating
a. Some computer manufacturers have …………… both input and output
devices into one terminal.
b. The success of any computer system depends on the………….…all its parts
to form a useful whole
c. …………… input and output devices into one peripheral has reduced the
area needed for a computer installation.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Structure1
Word formation - Prefixes
We have already seen how suffixes change the part of speech of a word. Let us now
consider some prefixes, their usual meanings and how the change the meanings of
English words.
PREFIXES
NEGATIVE
SIZE LOCATION TIME AND NUMBER
AND
POSITIVE
ORDER mono-
semi- inter- pre- bi-
un-
mini- super- ante- hex-
non-
micro- trans- fore- oct-
in-
ex- post- multi-
dis-
re- extra-
mid-
Exercise 1
Study these tables and try to find additional examples. Use your dictionary if necessary.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Prefixes of size
PREFIX MEANING EXAMPLES
Prefixes of location
PREFIX MEANING EXAMPLES
ante-, pre- before antecedent, prefix
prime- first primary, primitive
post- after postdated
retro- backward retroactive
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Other prefixes
PREFIX MEANING EXAMPLES
pro- for program
auto- self automatic
co- together coordinate
neo- new neoclassical
pan- all Pan-American
Exercises 2
Fill in the blanks with the correct prefix from the following list. Use the glossary at the end of
the book to help you.
multi- deci- sub- inter-
semi- mono- mega- auto
mini- de- inter- prim-
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
9. The small ferrite rings called cores have two states: they can be either magnetized or
………magnetized.
10. The introduction of chips or ……….conductor memories made it possible to reduce the
size of the computer.
Exercises 3
For each prefixes in structure 3 find out at least 4 words with it in the dictionary.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
acclaim n. enthusiastic approval, applause
adj. acclaimed syn. praise
n. acclamation
Issac Stern has won acclaim abroad.
Acclaimed authors often win Pulitzer Prizes.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
In programming, a wrapper is a program or script that sets the stage and makes
possible the running of another, more important program. In data transmission, a
wrapper is the data that is put in front of or around a transmission that provides
information about it and may also encapsulate it from view to anyone other than the
intended recipient. A wrapper often consists of a header that precedes the
encapsulated data and the trailer that follows it. In database technology, a wrapper can
be used to determine who has access to look at or change the data that is wrapped.
WWW (World Wide Web) – the integrated worldwide network of computers based
on the Hypertext Transfer Protocol (HTTP) and Transmission Control
Protocol/Internet Protocol (TCP/IP), commonly used to bring information to computer
users via a client browser program
WYSIWYG (what you see is what you get) – refers to a screen image that presents
exactly that which will appear when the system is run or when the document or screen
is printed.
X.25 – The CCITT protocol standard for connecting to packet-switched networks,
typically used to connect wide area networks (WANs), packet switching breaks
network data into smaller packets and sends the packets from point to point through
interconnected switches. The X.25 protocol, adopted as a standard by the Consultative
Committee for International Telegraph and Telephone (CCITT), is a commonly used
network protocol. The X.25 protocol allows computers on different public networks
(such as CompuServe, Tymnet, or a TCP/IP network) to communicate through an
intermediary computer at the network layer level. X.25's protocols correspond closely
to the data-link and physical-layer protocols defined in the Open Systems
Interconnection (OSI) communication model.
X.400 – The ISO/CCITT mail transfer protocol standard. X.400 is the messaging
(notably e-mail) standard specified by the ITU-TS (International Telecommunications
Union – Telecommunication Standard Sector). It's an alternative to the more prevalent
e-mail protocol, SMTP. X.400 is common in Europe and Canada. It's actually a set of
standards, each in the 400-number range. Because X.400 stipulates a number of
possible address characteristics that SMTP does not, an X.400 address can be long
and cumbersome. On the other hand, X.400 adherents note that it is an official
standard whereas SMTP is a "de facto" standard. Thus, products with X.400
implementations can be tested more rigorously than products with SMTP
implementations can. X.400 offers more capabilities than SMTP does. However,
many of these capabilities are seldom used.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 5
What is E-Learning?
About Online Learning
The information you'll here find will be helpful as you:
• research online learning
• decide upon a course of study
• choose a learning provider
• or are just curious about e-Learning!
What is e-Learning?
e-Learning is an umbrella term that describes learning done at a computer, usually
connected to a network, giving us the opportunity to learn almost anytime, anywhere.
e-Learning is not unlike any other form of education - and it is widely accepted that e-
Learning can be as rich and as valuable as the classroom experience or even more so.
With its unique features e-Learning is an experience that leads to comprehension and
mastery of new skills and knowledge, just like its traditional counterpart.
Instructional Design for e-Learning has been perfected and refined over many years
using established teaching principles, with many benefits to students. As a result
colleges, universities, businesses, and organizations worldwide now offer their
students fully accredited online degree, vocational, and continuing education
programs in abundance.
Some other terms frequently interchanged with e-Learning include:
• online learning
• online education
• distance education
• distance learning
• technology-based training
• web-based training
• computer-based training (generally thought of as learning from a CD-ROM)
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Delivery Methods
e-Learning is done over the WORLD WIDE WEB or by CD-ROM, and some
variations (distance learning) incorporate traditional media. Here are common
delivery methods used in e-Learning:
Print • e-text
• textbooks
• e-zines
Communication Asynchronous
• email
• listservs
• threaded discussion, web logs
• forums
Synchronous
• chat
• videoconferencing
• teleconferencing
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Features of E-Learning
• Learning is self-paced and gives students a chance to speed up or slow down as
necessary
• Learning is self-directed, allowing students to choose content and tools
appropriate to their differing interests, needs, and skill levels
• Accommodates multiple learning styles using a variety of delivery methods
geared to different learners; more effective for certain learners
• Designed around the learner
• Geographical barriers are eliminated, opening up broader education options
• 24/7 accessibility makes scheduling easy and allows a greater number of
people to attend classes
• On-demand access means learning can happen precisely when needed
• Travel time and associated costs (parking, fuel, vehicle maintenance) are
reduced or eliminated
• Overall student costs are frequently less (tuition, residence, food, child care)
• Potentially lower costs for companies needing training, and for the providers
• Fosters greater student interaction and collaboration
• Fosters greater student/instructor contact
• Enhances computer and Internet skills
• Draws upon hundreds of years of established pedagogical principles
• Has the attention of every major university in the world, most with their own
online degrees, certificates, and individual courses
Benefits of e-Learning
There are many significant advantages for the student who learns online. Here are just
a few to consider:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Flexibility
• Online learning accommodates your preferences and needs - it's student-
centered
• Choose instructor-led or self-study courses
• Skip over material you already know and focus on topics you'd like to learn
• Use the tools best suited to your learning styles
Higher Retention
• Online learning will draw you to topics you like and enjoy. Studies show that
because of this and the variety of delivery methods used to reach different
types of learners, retention is frequently better than in a traditional classroom.
Greater Collaboration
• Technology tools make collaboration among students much easier. Since many
projects involve collaborative learning, the online environment is far easier
(and often more comfortable) to work in since learners don't have to be face-to-
face.
Global Opportunities
• The global learning community is at your fingertips with online learning. The
technologies used give online instructional designers the ability to build in
tools that take you to resources you may never see in a traditional classroom.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Seeing how things are done graphical demonstrations that illustrate new ideas
Are you looking for short, personal enrichment classes or longer, more
comprehensive courses for professional development or study toward a degree?
You can narrow your options by deciding in advance how in-depth you want to go
and how much time you want to spend. Courses associated with degrees are generally
more complete in their treatment of a topic, although personal enrichment and
professional development courses can be quite thorough too. Online education covers
the spectrum from short tutorials to semester-length academic classes and the time
you'll spend is directly proportionate to the type of course you select.
Do you want a self-directed or instructor-led course?
Some of us need structure and deadlines. Others prefer to study at our convenience.
Self-directed courses generally allow more time for completion and the flexibility to
jump around the curriculum at your own pace (although they may still have final
deadlines). Instructor-led courses are more structured and deliver the material in a
progressive or suggested sequence, guiding the learner to the finish. Also, self-
directed courses normally don't have a human point of contact for help or feedback,
but some may offer subject matter experts.
Open Enrollment vs. Traditional scheduling (following the timing of the school)
With open enrollment, you can learn on your time, starting whenever you want to.
Other scheduling takes away that control, especially if it follows a quarter or semester
schedule in conjunction with a traditional school.
Are credits or CEU's important to you?
Academic credit or CEU's (continuing education units) may be a requirement in your
selection process. If so, read about the school or program's accreditation status and
check with them regarding CEU's or credits for the particular course you're looking at.
If credits or CEU's don't matter to you, your options are wide open.
What type of support is available?
Some online classes come with other student services like tutoring, reference links,
library access, mentoring, writing/math labs, technical assistance, and other resources
to help the learning process, while others are void of this.
How much do you want to spend?
The more in-depth the course, the more you can expect to pay. There are a wide range
of choices to fit your budget. Personal/professional development courses cost $10-
$300 or more, and comprehensive courses linked to degrees a few hundred to a
thousand dollars or more. Short tutorials may be free or low cost. Cost is last on the
list of questions for good reason: the other factors to consider in choosing an online
course are equally, if not more important.
Once you've used these questions to narrow your field of choices, you'll find that
many course providers offer a free demo that can help you decide and compare
content and presentation.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
A|B|C|D|E|F|G|H|I|K|L|M|N|O|P|R|S|T|U|V|W|Z
A
Accreditation
the recognition or certification of an institution that has been reviewed and meets specific
measures of quality.
Analog
a fluctuating electronic signal used for storing and transferring data. The continuous nature of
analog signals makes it relatively difficult to store, manipulate, and transfer data. Analog
signals are transmitted slower than digital signals.
Applet
a small program or application that runs on a browser and enables additional features like
animation.
Application
a software program that allows a user to perform specific tasks like word processing, email,
accounting, database management.
Asynchronous Learning
learning where people are not online at the same time and interaction does not occur without
a time delay, allowing people to participate on their schedules. Examples are email,
discussion groups, and self-paced courses delivered via Internet or CD-ROM.
Audio Conferencing
voice-only connection between three or more locations.
B
Bandwidth
the capacity of a communication channel to carry information. The greater the bandwidth, the
faster the data transfer. The amount of data sent or received over any given time is limited by
bandwidth.
Blended Learning
an increasing popular combination of online and in-person learning activities.
Blog (Weblog)
a public web site where users post informal journals of their thoughts, comments, and
philosophies, updated frequently and normally reflecting the views of the blog's creator.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Broadband
a transmission channel able to simultaneously carry multiple signals.
Browser
software for interacting with , accessing, and viewing information on the Internet or created in
HTML. Internet Explorer and Netscape Navigator are the two most widely used browsers.
Byte
one character that can be a letter, number, or symbol.
C
Cable Modem
a device that uses coaxial cables to transmit data faster than telephone line modems and
roughly equivalent to modems using DSL telephone service.
Certification
a valued credential awarded in several fields that proves competency upon satisfactory
demonstration of particular knowledge and skills.
Chat
An online, real-time interactive communication method using text to send and receive instant
messages.
Cookie
a small text file placed on your hard by a web site to record information about you. When you
return, your computer serves up the "cookie" to the web site and previously recorded
information such as your name, site login/password, preferences, shopping cart info, and
more are passed along. The web page is then customized based on that information.
Courseware
educational software that delivers course material and instruction via computer.
D
Delivery
the method of getting information to the user via Internet, CD-ROM, books, instructors, and
other mediums.
Dial-up
an Internet connection achieved through telephone lines using a modem.
Digital
A discrete electronic signal used for storing and transferring data. The non-continuous nature
of digital signals makes it relatively easy to store, manipulate, and transfer data. Digital
signals are transmitted faster than analog signals.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Discussion Forums
a place where people can exchange messages of common interest.
Distance Education
education designed for delivery where students and instructors not in the same location.
Distance Learning
often used synonymously with Distance Education; distinct as an outcome of Distance
Education.
Distributed Learning
often used synonymously with Distance Learning; distinct in that it is the outcome of
education that combines a blend of online and traditional delivery methods.
Download
a file transfer from one computer to yours.
Back to Top
E
E-Learning
learning that is accomplished over the Internet, a computer network, via CD-ROM, interactive
TV, or satellite broadcast.
Email
short for electronic mail; primarily text messages sent between two computers.
End User
the person or persons who will be using a particular technology and for whom it is designed.
F
Facilitator
an instructor who assists, directs, and stimulates the learning during an online course.
File Server
a computer that stores and manages files and software on a computer network, giving users
the capability of sharing information and other resources.
Firewall
specialized hardware or software designed to secure a computer or network from
unauthorized access.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
G
GB (gigabyte)
a gigabyte is 1000 megabytes, or 1,073,741,824 characters and is roughly equivalent to a
thousand novels.
H
Home page
the opening page or main document that appears when you visit a web site, usually contains
links to other web pages.
Host
a computer system on a network that distributes and receives information from other
computers.
Hypertext
highlighted text in a web page that links the user to additional related information.
I
ILT (Instructor-led Training)
delivery of a course in a traditional classroom setting wherein an instructor guides a group of
learners.
Instructional Designer
the person who develops the methodology and delivery systems for presenting course
content.
Interactive multimedia
allows two-way interaction with multimedia course material, another computer, or another
user with direct response to the input, as opposed to one-way communication from TV, video,
and other non-responsive media. Interactive attributes commonly include data or text entry,
mouse input, touch screens, voice commands, video capture, and real-time interaction.
Internet
the global network of regional and local computer networks.
Intranet
an internal computer network owned by a company or organization and accessible only to
designated staff.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
K
KB (kilobyte)
a kilobyte is 1042 characters (bytes), roughly equivalent to one page of double-spaced text.
Knowledge Management
the collection, organization, analysis, and sharing of information held by workers and groups
within an organization.
L
LAN (local area network)
a group of networked computers in relative proximity to one another that allows users to
communicate and share information and other devices such as file servers, printers, and
modems.
Link
hypertext that is usually underlined to indicate a pointer to additional related information.
Listserv
an automatic email service that users subscribe to in order to receive future mailings. Users
must be a member of the list to receive mail, and can choose to unsubscribe at any time.
Log in/on
the act of providing a user name and password to gain access to another computer,
application, web site, or file.
Log off/out
the act of disconnecting from another computer, application, web site, or file.
M
MB (megabyte)
one megabyte is 1,048,576 bytes and is roughly equivalent to one novel. A floppy disk stores
1.44MB, CDs over 600MB, and DVDs are capable of holding up to 17GBs (or 17,000MBs) of
information!
Metatag
an HTML code line that identifies the contents of the web page to search engine indexes.
Modem
MOdulator/DEModulator, a device that converts digital signals to analog for transmission, and
analog signals back to digital upon reception.
Multicasting
an audio, video, email, or application broadcast over the web, from one computer to many.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Multimedia
the combination of text, graphics, audio, colors to create used to present information in an
engaging and dynamic way.
N
Netiquette
etiquette on the Internet, best used when sending email, chatting, posting messages, and
using limited resources.
Network
a group of computers and peripheral devices (like printers and modems) connected to allow
users to communicate and share information and resources.
Newsgroup
an information exchange forum where notes about a particular topic are posted and shared.
O
Onground
a traditional classroom instructional setting.
Online
connected to the Internet or another computer.
Online learning
an umbrella term used to describe any education or training that occurs online.
P
Plug-in
software programs that enhance your browser and allow it to perform additional tasks such as
playing audio, displaying video, and viewing documents as an integrated function of the
browser.
Portal
web site that is a major starting point or gateway to additional information on the Internet,
sometimes general (like Yahoo!) and sometimes specific (like World Wide Learn).
Post
used as a noun for messages "posted" to BBSs, newsgroups, blogs, etc.
R
Real-time communication
communication with little or no delay; synchronous interaction.
Rich content
high quality course or web page material, often presented using advanced or sophisticated
design techniques employed to emphasize the message or learning.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Self-paced learning
learning that is done asynchronously, such as from CD-ROM or over the Internet without an
instructor, where the user controls the flow of course material.
Server
a computer with large storage capacity that serves out files, applications, and other
resources.
Simulations
interactive multimedia presentations designed to model real scenarios and which allow the
user to participate and experience without risk.
Software
computer programming code that provides a computer with instructions to perform specific
tasks; a program or application.
Spam
unsolicited email.
Streaming
a technique where media (audio, video, or both) are downloaded to the user's computer in a
continuous stream and played upon arrival.
Synchronous learning
Learning where people are online at the same time and interaction occurs without a time
delay (real-time) and which requires them to attend at specific times.
T
Teleconferencing
video or audio conferences conducted over telecommunications channels such as telephone
lines, local area networks, and the Internet.
24/7
24 hours per day, seven days a week. Refers to availability of a service, product, person, or
information.
U
Upload
a file transfer from your computer to another.
User interface
the components of a computer system that the operator uses to interact with the computer -
the screen display, keyboard, mouse, touch controls, etc.
V
Video Conferencing
live video and audio communication between three or more locations.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Virtual
not physical.
Virtual classroom
the area where students and instructors interact online.
Virtual community
a community on the Internet where people share common interests; an online community.
W
W3C
the World Wide Web consortium, whose mission it is to create standards and specifications
for the World Wide Web.
Web page
an HTML file or document; part of a web site.
Web site
a group of related web pages that includes a home page.
Z
Zip file
a file that has been reduced in size to allow faster transferring between computers, or to save
storage space. Originated with PKWARE, the technique is widely used and the term is used
frequently to describe any compressed file. Some compressed files have the .EXE extension,
indicating the file is self-extracting.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 6
E-Banking
This booklet, one of several comprising the FFIEC Information Technology
Examination Handbook (IT Handbook), provides guidance to examiners and financial
institutions on identifying and controlling the risks associated with electronic banking
(e-banking) activities. The booklet primarily discusses e-banking risks from the
perspective of the services or products provided to customers. This approach differs
from other booklets that discuss risks from the perspective of the technology and
systems that support automated information processing. To avoid duplication of
material, this booklet refers the reader to other IT Handbook booklets for detailed
explanations of technology-specific issues or controls.
Examiners may use the examination procedures and request letter items included in
this booklet in appendix A to review risks in the electronic delivery of financial
products and services. These procedures address services and products of varied
complexity. Examiners should adjust the procedures, as appropriate, for the scope of
the examination and the risk profile of the institution. The procedures may be used
independently or in combination with procedures from other IT Handbook booklets or
from agency handbooks covering non-IT areas.
DEFINITION OF E-BANKING
For this booklet, e-banking is defined as the automated delivery of new and traditional
banking products and services directly to customers through electronic, interactive
communication channels. E-banking includes the systems that enable financial
institution customers, individuals or businesses, to access accounts, transact business,
or obtain information on financial products and services through a public or private
network, including the Internet. Customers access e-banking services using an
intelligent electronic device, such as a personal computer (PC), personal digital
assistant (PDA), automated teller machine (ATM), kiosk, or Touch Tone telephone.
While the risks and controls are similar for the various e-banking access channels, this
booklet focuses specifically on Internet-based services due to the Internet’s widely
accessible public network. Accordingly, this booklet begins with a discussion of the
two primary types of Internet websites: informational and transactional.
INFORMATIONAL WEBSITES
Informational websites provide customers access to general information about the
financial institution and its products or services. Risk issues examiners should
consider when reviewing informational websites include:
Potential liability and consumer violations for inaccurate or incomplete information about
products, services, and pricing presented on the website;
Potential access to confidential financial institution or customer information if the website is
not properly isolated from the financial institution’s internal network;
Potential liability for spreading viruses and other malicious code to computers
communicating with the institution’s website; and
Negative public perception if the institution’s on-line services are disrupted or if its website
is defaced or otherwise presents inappropriate or offensive material.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
TRANSACTIONAL WEBSITES
Transactional websites provide customers with the ability to conduct transactions
through the financial institution’s website by initiating banking transactions or buying
products and services. Banking transactions can range from something as basic as a
retail account balance inquiry to a large business-to-business funds transfer. E-
banking services, like those delivered through other delivery channels, are typically
classified based on the type of customer they support. The following table lists some
of the common retail and wholesale e-banking services offered by financial
institutions.
Investment/Brokerage
Commercial wire transfers
services
Loan application and
Business-to-business payments
approval
Employee benefits/pension
Account aggregation
administration
Since transactional websites typically enable the electronic exchange of confidential
customer information and the transfer of funds, services provided through these
websites expose a financial institution to higher risk than basic informational
websites. Wholesale e-banking systems typically expose financial institutions to the
highest risk per transaction, since commercial transactions usually involve larger
dollar amounts. In addition to the risk issues associated with informational websites,
examiners reviewing transactional e-banking services should consider the following
issues:
Security controls for safeguarding customer information;
Authentication processes necessary to initially verify the identity of new customers and
authenticate existing customers who access e-banking services;
Liability for unauthorized transactions;
Losses from fraud if the institution fails to verify the identity of individuals or businesses
applying for new accounts or credit on-line;
Possible violations of laws or regulations pertaining to consumer privacy, anti-money
laundering, anti-terrorism, or the content, timing, or delivery of required consumer
disclosures; and
Negative public perception, customer dissatisfaction, and potential liability resulting from
failure to process third-party payments as directed or within specified time frames, lack of
availability of on-line services, or unauthorized access to confidential customer information
during transmission or storage.
E-BANKING
COMPONENTS
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Network IDS software may reside at different points within the network to analyze
the message for potential attack characteristics that suggest an intrusion attempt.
The Internet banking application processes the transaction against account balance
data through a real time connection to the core banking system or a database of
account balance data, which is updated periodically from the core banking system.
The Internet banking server has a firewall filtering Internet traffic from its internal
network.
Second, the institution can host all or a large portion of its e-banking systems
internally. A typical configuration for in-house hosted, e-banking services is
illustrated below. In this case, a provider is not between the Internet access and the
financial institution’s core processing system. Thus, the institution has day-to-day
responsibility for system administration.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
The bank typically has several Internet application servers that could include a
website server, e-mail server, proxy server, and domain name server (DNS) in
addition to the Internet banking application server.
The router will typically send the transaction around the other application servers
directly to the Internet banking server unless it is a non-banking transaction.
The website server and Internet banking server may have host-based intrusion
detection system (IDS) software monitoring the server and its files to provide alerts of
potential unauthorized modifications.
Network IDS software may reside at different points within the network to analyze
the message for potential attack characteristics that suggest an unauthorized intrusion
attempt.
The Internet banking application processes the transaction against account balance
data through a real time connection to the core banking system or a database of
account balance data, which is updated periodically from the core banking system.
The Internet banking server has a firewall filtering Internet traffic from the bank's
internal network
WEBLINKING
A large number of financial institutions maintain sites on the World Wide Web. Some
websites are strictly informational, while others also offer customers the ability to
perform financial transactions, such as paying bills or transferring funds between
accounts.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
ACCOUNT AGGREGATION
ELECTRONIC AUTHENTICATION
Verifying the identities of customers and authorizing e-banking activities are integral
parts of e-banking financial services. Since traditional paper-based and in-person
identity authentication methods reduce the speed and efficiency of electronic
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
WEBSITE HOSTING
Some financial institutions host websites for both themselves as well as for other
businesses. Financial institutions that host a business customer’s website usually
store, or arrange for the storage of, the electronic files that make up the website. These
files are stored on one or more servers that may be located on the hosting financial
institution’s premises. Website hosting services require strong skills in networking,
security, and programming. The technology and software change rapidly. Institutions
developing websites should monitor the need to adopt new interoperability standards
and protocols such as Extensible Mark-Up Language (XML) to facilitate data
exchange among the diverse population of Internet users.
Risk issues examiners should consider when reviewing website hosting services
include damage to reputation, loss of customers, or potential liability resulting from:
Downtime (i.e., times when website is not available) or inability to meet service levels
specified in the contract,
Inaccurate website content (e.g., products, pricing) resulting from actions of the institution’s
staff or unauthorized changes by third parties (e.g., hackers),
Unauthorized disclosure of confidential information stemming from security breaches, and
Damage to computer systems of website visitors due to malicious code (e.g., virus, worm,
active content) spread through institution-hosted sites.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Many businesses accept various forms of electronic payments for their products and
services. Financial institutions play an important role in electronic payment systems
by creating and distributing a variety of electronic payment instruments, accepting a
similar variety of instruments, processing those payments, and participating in
clearing and settlement systems. However, increasingly, financial institutions are
competing with third parties to provide support services for e-commerce payment
systems. Among the electronic payments mechanisms that financial institutions
provide for e-commerce are automated clearing house (ACH) debits and credits
through the Internet, electronic bill payment and presentment, electronic checks, e-
mail money, and electronic credit card payments. Additional information on payments
systems can be found in other sections of the IT Handbook.
Most financial institutions permit intrabank transfers between a customer’s accounts
as part of their basic transactional e-banking services. However, third-party transfers –
with their heightened risk for fraud – often require additional security safeguards in
the form of additional authentication and payment confirmation.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Caution customers regarding security and privacy issues through the use of on-line
disclosures or, more conservatively, e-banking agreements.
Financial institutions that rely on a third-party bill payment provider including Internet
banking providers that subcontract to third parties.
Set dollar and volume thresholds and review bill payment transactions for suspicious
activity.
Gain independent audit assurance over the bill payment provider’s processing controls.
Restrict employees’ administrative access to ensure that the internal controls limiting
their capabilities to originate, modify, or delete bill payment transactions are at least as
strong as those applicable to the underlying retail payment system ultimately transmitting
the transaction.
Restrict by vendor contract and identify the use of any subcontractors associated with
the bill payment application to ensure adequate oversight of underlying bill payment
system performance and availability.
Evaluate the adequacy of authentication methods given the higher risk associated with
funds transfer capabilities rather than with basic account access.
Consider the additional guidance contained in the IT Handbook’s “Information Security,”
“Retail Payment Systems,” and “Outsourcing Technology Services” booklets.
Financial institutions that use third-party software to host a bill payment application
internally.
Determine the extent of any independent assessments or certification of the security of
application source code.
Ensure software is adequately tested prior to installation on the live system.
Ensure vendor access for software maintenance is controlled and monitored.
Financial institutions that develop, maintain, and host their own bill payment system.
Consider additional guidance in the IT Handbook’s “Development and Acquisition
Booklet.”
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
WIRELESS E-BANKING
Wireless banking is a delivery channel that can extend the reach and enhance the
convenience of Internet banking products and services. Wireless banking occurs when
customers access a financial institution's network(s) using cellular phones, pagers, and
personal digital assistants (or similar devices) through telecommunication companies’
wireless networks. Wireless banking services in the United States typically
supplement a financial institution's e-banking products and services.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Wireless devices have limitations that increase the security risks of wireless-based
transactions and that may adversely affect customer acceptance rates. Device
limitations include reduced processing speeds, limited battery life, smaller screen
sizes, different data entry formats, and limited capabilities to transfer stored records.
These limitations combine to make the most recognized Internet language, Hypertext
Markup Language (HTML), ineffective for delivering content to wireless devices.
Wireless Markup Language (WML) has emerged as one of a few common language
standards for developing wireless device content. Wireless Application Protocol
(WAP) has emerged as a data transmission standard to deliver WML content.
Manufacturers of wireless devices are working to improve device usability and to take
advantage of enhanced “third-generation” (3G) services. Device improvements are
anticipated to include bigger screens, color displays, voice recognition applications,
location identification technology (e.g., Federal Communications Commission (FCC)
Enhanced 911), and increased battery capacity. These improvements are geared
towards increasing customer acceptance and usage. Increased communication speeds
and improvements in devices during the next few years should lead to continued
increases in wireless subscriptions.
Structure
Phrasal verbs
A phrasal verb is a verb + preposition combination. For example, look up, take down and turn
over. Phrasal verbs are common in informal, spoken English. Sometimes they have a more
formal one word equivalent, for example, work out = determine.
Often phrasal verbs have two meanings.
One we can work out from the meaning of the two words separately:
She looked up at the roof.
A special meaning which does not easily relate to the separate meanings of the words:
She looked up a word in the dictionary.
Exercises
1. Study these phrasal verbs:
break into keep at
get into throw away
hack into shut down
go about log on
set about log out
keep ahead find out
grow up track down
phone up hand over
run up
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Now complete each blank with the appropriate phrasal verb in the correct form. In
some cases, more than one answer is possible.
1. Hackers try to …….…….... passwords so they can penetrate a system.
2. Don’t ……………… your password to anyone who asks for it.
3. The police ……..…. Ralph ……..….by talking to his friends and acquaintances.
4. Some hackers………….…. systems to get commercially valuable information.
5. When you ……….….…. to a network, you have to provide an ID.
6. How do you …….…….…. hacking into a system?
7. Hackers may ………….….., pretending to be from your company and ask for your
password.
8. Never ……..……. your credit card receipts where someone can find them.
9. Ralph was a hacker as a teenager but he’s ……………. now and become more
responsible.
10. ……….…… a system is strictly illegal nowadays.
11. It’s a constant race to ……….…….. of the hackers.
2. Replace the verb in italics with a phrasal verb of similar meaning.
1. I don’t discard your credit card receipts; they could help fraudsters.
2. Trying to penetrate computer systems is against the law.
3. The typical hacker is a young person who has not matured yet.
4. The best way to begin hacking into a system is to try to get hold of a password.
5. If someone telephones you and asks for your password, don’t provide it.
6. Hackers closed Hotmail for five hours.
7. Hackers accumulated a telephone bill of $1m for Scotland Yard.
8. The difficult thing was to determine how the website would rook.
9. So you won’t forget, record the ID number the support technician gives you.
10. Examine the manufacturers’ websites before you phone for help.
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
sacrifice n. the act of giving up something of value for the
adj. sacrificial common good
v. sacrifice syn. concession
He sacrificed his day off to help clean up the neighborhood.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
their Internet (IP and VoIP) customer management and billing software and other
tools.
infrastructure – refers to the entire spectrum of information processing technologies
and services. This includes data processing, telecommunications, office automation
equipment and related goods and services, technical and user personnel, computer
operating systems, and licensed programs. Information infrastructure includes, but is
not limited to: computer hardware, firmware, and peripherals software management,
support, and applications; telecommunications networks (wired and wireless) and
their management systems; facilities (static, mobile, and portable) and supporting
environmental utilities infrastructure (electricity, air conditioning, and more);
personnel and user issues.
integration – the process of integrating new client/server, adaptive, and distributed
systems with existing systems while still optimizing performance, minimizing
maintenance and utilizing existing platforms
LEC (local exchange carrier) – a local telephone company, such as Southern Bell,
GTE, and Carolina Sprint. There are a number of independent LECs. LEC companies
are also sometimes referred to as "telcos." A "local exchange" is the local "central
office" of an LEC. Lines from homes and businesses terminate at a local exchange.
Local exchanges connect to other local exchanges within a local access and transport
area (LATA) or to interexchange carriers (IXCs), such as long-distance carriers
AT&T, MCI, and Sprint.
legacy application – In information technology, legacy applications and data are
those that have been inherited from languages, platforms, and techniques earlier than
current technology. Most enterprises that use computers have legacy applications and
databases that serve critical business needs. Typically, the challenge is to keep the
legacy application running while converting it to newer, more efficient code that
makes use of new technology and programmer skills. In the past, much programming
has been written for specific manufacturers' operating systems. Currently, many
companies are migrating their legacy applications to new programming languages and
operating systems that follow open or standard programming interfaces.
Theoretically, this will make it easier in the future to update applications without
having to rewrite them entirely and will allow a company to use its applications on
any manufacturer's operating system.
In addition to moving to new languages, enterprises are redistributing the locations of
Application and data. In general, legacy applications have to continue to run on the
platforms they were developed for. Typically, new development environments
account for the need to continue to support legacy applications and data.
legacy system – in-place system that uses older, often outdated, technology
Level 1 Support – a help desk function tier. Level 1 client support should have end
to-end
responsibility for each client request. The help desk analyst should be empowered to
resolve as many requests as possible. Level 1 support provides the client contact point
or call ownership, which is the single point of contact for the end user to request a
service. Organizations should retain control of tier 1 help desk to ensure the quality of
the customer relationship.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 7
E-Government
Rapid and revolutionary changes in technology have created an increasingly
information-centric
global economy, where knowledge has become a key factor in competitiveness. The
challenge for
many governments today is to provide opportunities for citizens and businesses to
actively
participate in the global knowledge-based economy. E-Government is believed to
play a fundamental role towards this end.
Although the demand for e-government arose through the need to achieve greater
operational
efficiency and respond better to citizen demands for improved public services,
increasingly, e-Government has as much to do with economic reform as with
administrative reform
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
e-Government is, above all, a process of change in the way government shares
information and delivers services to achieve greater transparency and convenience in
transacting with citizens and businesses.
e-Government uses ICT to diversify delivery channels and make back-office work
more efficient. The Internet is the most powerful and popular means of delivering
e-Government. However, services may also be delivered through:
• Conventional telephone - call centers, automated voice responses, FAX on
demand of forms and information;
• Personal Computers and the Internet - from simple display of information to highly
sophisticated interactive services with credit card payment;
• In an assisted mode through integrated service delivery centers in convenient
locations, rural Internet kiosks and cyber cafes.
• Mobile digital telephony and messaging technology
• By any combination of ICT and manual procedures, for example providing
information on the web, ordering and paying by mobile telephone, and delivery at a
community center. Diversifying delivery channels extends the services to as many
citizens as possible and creates competition between channels, improving the quality
of delivery. Access can also be expanded creatively; for example, where individual
personal computer ownership is low, access to computers may be made available
through a post office, or cyber cafes. Use of existing telephone and FAX technology
can be combined with access to Internet through an intermediary for a small fee.
Yes. Countries such as India, Sri Lanka, Brazil, Chile, Romania and South Korea are
only a few best practice examples.
Two illustrative case studies follow:
Andhra Pradesh, India. It is the State Government policy to use information
technologies to foster “Simple, Moral, Accountable, Responsive, and Transparent
Government”.
The following state-wide applications deliver a host of on-line services to citizens,
businesses and internal employees.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Benefits include:
• Aligning ICT-investments with international technical and business standards
• Simplifying and integrating government services;
• Drastically reducing the time the citizens and businesses spend obtaining/submitting
information from/to the government;
• Increasing government transparency and anti-corruption;
• Improving government finances through enhanced revenue collection and cost
reduction
• Improving the business environment in the country for private sector development
and to attract foreign direct investment.
• Upgrading of government staff skills
• Facilitating ICT awareness and skills-training within the larger populace.
.................and potential risks?
Just like any other ICT project in the private or public sector, e-Government projects
also carry a risk of implementation failure. Overly ambitious project scale and scope,
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
The costs of implementing e-Government can vary greatly with the scope of the
project/program.
The cost components are: networking infrastructure; IT hardware and software;
application design, development and implementation; training; and maintenance of
equipment. E-Government necessitates the re-engineering of business processes in
order to realize efficiency goals – the management of change is, therefore, an
important element requiring effort and expenditure. While online service delivery can
be more efficient and less costly than other channels , cost savings and service
improvements are not automatic . Most e-Government activities will need to be made
available offline as well as online. While there can be savings even in this mode (for
instance in implementing a front-office/back-office approach, streamlining business
processes within government, etc.) the necessity for parallel offline and online
operations in the initial phase will mean some additional-costs.
Social costs must also be considered as e-Government may affect jobs, work
relationships and the relationships the government has with its citizens. While taking
advantage of technology, care must be taken not to deteriorate access for special
groups.
e-Government must ensure that information systems are appropriately protected and
individual rights are respected. Almost every successful e-government project is a
case example in building trust, involving two issues of special concern to any online
service:
• Privacy—Privacy is one of the most important issues facing the use of online
services, and Governments must be responsible custodians of the enormous amounts
of personal information they hold. Privacy must be addressed in the planning and
design of e-government systems since it is much harder to interject privacy
protections after a system is built.
• Security—protecting e-government sites from attack and misuse is costly, but must
be addressed in the design phase, as security breaches can shatter public trust in e-
government.
In some countries e-Government applications have been built bottom up through the
initiatives of political leadership or civil servants. Centrally coordinated programs are
then set up to scale up such applications and work towards interoperability and
integration of electronic service delivery.
Other countries have had a more planned and coordinated approach to the
development of e- Government, starting with a vision, strategy and an implementation
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
The World Bank can help client countries initiate, design, and implement e-
Government projects.
Its role can include:
• Financing e-Government projects and components;
• Supporting e-Government approaches through policy advice, strategy formulation,
and operational support;
• Establishing a forum for knowledge sharing on e-Government including via
videoconferencing;
• Helping clients to create the necessary infrastructure for e-Government;
• Providing technical assistance;
• Promoting the use of information technology in public sector reforms.
e-Government planning can start at any level of development, but it is important to
align ICT investments with e-Government best practices and standards, thereby
avoiding future complications that may arise due to incompatible technologies.
Exercises
APPLICATION SERVICE PROVIDERS
If your hard disk is packed to bursting point, the IT department is far too busy to fix
your email problems and your business can’t afford to buy the tools that you’d like to
develop the company website, then its time to think about using an application service
provider (ASP). Rather than installing software on each machine or server within your
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
organization, you rent applications from the ASP, which provides remote access to the
software and manages the hardware required to run the applications.
There are a lot of advantages to this approach. The havoc caused by viruses
makes the idea of outsourcing your email and office suite services an attractive
option. It also gives you more flexibility - you pay for applications as and when you
need them, rather than investing in a lot of costly software which you’re then tied to
for years. Not having to worry about upgrading to the latest version of your office
suite or about battling with the complexities of managing an email system, leaves
businesses with mere time. Time to focus on what they do best.
However, there are some potential pitfalls. To use applications remotely requires
a lot of bandwidth, which is only really available from a broadband connection or a
leased line to the ASP itself. It is also important to ensure that the ASP will be able to
provide a secure, reliable service which will be available whenever you need it.
Providing applications and storage space for vast numbers of users requires
some powerful technology on the port of the ASP, This includes security controls and
data storage as well as providing the physical links to customers. For the most part,
ASPs don’t own the data centers that store the information. Instead, they lease space
from data storage specialists. In this way, they can be confident of meeting customers’
increasing storage requirements by buying more space as it’s needed.
There’s a wide variety of applications available for use via ASPs. Office suite
applications and email services are two of the most generic applications available
through ASPs. Large, complex business applications such as enterprise resource
planning tools like SAP are another popular candidate for delivery through an ASP.
Other business services, such as payroll and accounting systems are also available.
This is particularly beneficial to small businesses which are likely to grow quickly
and don’t want to deal with the problems caused by outgrowing their existing system
and having to move to a high-end package. ASPs also offer a means of using
specialist tools that would otherwise prove prohibitively expensive. Small businesses
have the opportunity to use such tools for short periods of time as and when they need
them, rather than having to buy the software as a permanent investment.
One of the major barriers for small businesses which want to make a start in e-
commerce is ensuring that they have sufficient resources to cope with sudden large
increases in customers. This means not only having adequate storage for all your
customers’ details, but ensuring that you have the technology in place to handle stock
levels, efficient delivery and large volumes of traffic. It’s very rare for an e-commerce
business to handle all of these elements by itself, making this one of the best-established
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
areas of ASP use. Being able to respond rapidly to changes in the size of your customer
base and the type of product that they want to order from your business, demands more
flexibility than traditional software can provide.
1. Using information from the text, mark the following as True or False:
a. Software from an ASP must be installed locally on a user’s computer.
b. You need a high bandwidth connection to use an ASP service.
c. ASPs usually use their own storage space for customers.
d. Using an ASP gives you more flexibility.
e. An e-commerce business usually provides all of the required technology itself.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
4. Read the next page text (Understanding MP3) to find the answers to these
questions.
1. What does MP3 stand for?
2. What is the difference between MP3 and WAV files?
3. What kind of sound does MP3 strip out?
4. What kind of information is included in the tag?
Understanding MP3
The name comes from MPEG (pronounced EM-peg), which stands for the Motion Picture
Experts Group. MPEG develops standards for audio and video compression. MP3 is actually
MPEG Audio Layer 3.
MP3 competes with another audio file format called WAV. The key difference is that
MP3 files are much smaller than WAV files. An MP3 file can store a minute of sound per
megabyte, while a WAV file needs 11 or 12 megabytes to hold the same amount. How does
MP3 achieve this compression? CDs and audio files don’t reproduce every sound of a
performance. Instead, they sample the performance and store a discrete code for each sampled
note. A CD or WAV file may sample a song 44,000 times a second, creating a huge mass of
information.
By stripping out sounds most people can’t hear, MP3 significantly reduces the
information stored. For instance, most people can’t hear notes above a frequency of 16kHz, so
it eliminates them from the mix. Similarly, it eliminates quiet sounds masked by noise at the
same frequency. The result is a file that sounds very similar to a CD, but which is much
smaller. An MP3 file can contain spoken word performances, such as radio shows or audio
books, as well as music. It can provide information about itself in a coded block called a tag.
The tag may include the performer’s name, a graphic such as an album cover, the song’s
lyrics, the musical genre and a URL for more details.
5. Read the rest of next page text (Play MP3 Files) to find the answers to these
questions:
1. How do you play MP3 files?
2. What does the Windows Media Player file do with an MP3 file?
3. What is a standalone player?
4. What special features can players offer?
5. What information can you obtain by clicking on the track info button?
6. What does a skin enable you to do?
7. How do you play music from a CD-ROM on an MP3 player?
8. What hardware and software do you need to make your own audio CDs?
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Exercise
1. Match each cause and effect. Then link them with an -ing clause.
Cause
1. Computers with MIDI interface boards can be connected to MIDI instruments.
2. Each side of a DVD can have two layers.
3. MP3 removes sounds we can’t hear.
4. You can download single tracks.
5. Each MP3 file has a tag.
6. MP3 players contain several devices.
7. You can download a skin program.
8. You can legally download some music.
Effect
a. This permits extra information to be stored on the performer and other track details.
b. You can create your own compilation.
c. This allows you to sample a new group before buying their CD.
d. This gives an enormous storage capacity.
e. This allows the music being played to be stored by the computer and displayed on the
monitor.
f. This enables you to change the appearance of your player.
g. These allow you to control the way the music sounds.
h. This produces much smaller files.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
dramatic adj. something that captures the imagination; exciting
v. dramatize syn. emotional
n. drama
The dramatic finish to the game left us speechless.
The hurricane dramatically changed the coastline.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
them in one large index. A user can then query Archie, which checks the query
against its index.
architecture – In information technology, architecture is a term applied to the process
and the outcome of planning and specifying the overall structure, logical components,
and logical interrelationships of a computer, its operating system, a network, or other
conception. An architecture can be a reference model, such as the Open Systems
Interconnection (OSI) reference model, intended as a model for specific product
architectures, or it can be a specific product architecture, such as that for an Intel
Pentium microprocessor or for IBM's OS/390 operating system.
Computer architecture can be divided into five fundamental components:
input/output, storage, communication, control, and processing. In practice, each of
these components (also called subsystems) is sometimes said to have an architecture.
archive – to move seldom-used files from your hard drive to tape cartridges or floppy
disks. Archiving old files frees up space on your hard drive. If you ever need a file
you stored, you can retrieve it from the tape cartridge or floppy disk.
ARP (Address Resolution Protocol) – a protocol within TCP/IP that is used for
routing data packets in a distributed network
BGP (Border Gateway Protocol) – used for exchanging routing information
between gateway hosts (each with its own router) in a network of autonomous
systems. It is often the protocol used between gateway hosts on the Internet.
BI (business intelligence) – a broad category of application programs and
technologies for gathering, storing, analyzing, and providing access to data to help
enterprise users make better business decisions. BI applications include the activities
of decision support, query and reporting, online analytical processing (OLAP),
statistical analysis, forecasting, and data mining. Business Intelligence applications
can be mission-critical and integral to an enterprise's operations or occasional to meet
a special requirement; enterprise-wide or local to one division, department, or project;
or centrally initiated or driven by user demand.
Binary Executable Format – a computer readable format of an executable program.
An executable program is compiled into machine-readable code.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
e-mail front end – the interface for composing and reading e-mail messages; it can
appear in three different formats: e-mail viewer front-end, e-mail enabled front-end,
and non-user interface
e-mail gateways – a software service that is responsible for transferring messages
between incompatible e-mail systems
e-mail server – a server that provides a set of services to one or multiple clients in an
e-mail environment. The services may include: distribute files, temporarily hold new
messages, or store messages that have already been read. It may be located on the
desktop PC or on a combination of servers accessed on a LAN.
e-mail system – software that manages the transmission of e-mail and manages
mailboxes
encapsulation – a technology where data and logic are protected from uncontrolled
external access. Data is considered encapsulated if it can only be accessed via the
software programs that manage it.
encryption – the conversion of data into a form, called a cipher, that cannot be easily
understood by unauthorized people
end user – the final link in the customer service request or computer program usage
chain
enterprise – any agency, department, division, or service provider that is a part of the
North Carolina state government system. In the computer industry, an enterprise is an
organization that uses computers. A word was needed that would encompass
corporations, small businesses, nonprofit institutions, government bodies, and
possibly other kinds of organizations. The term enterprise seemed to do the job. In
practice, the term is applied much more often to larger organizations than smaller
ones.
enterprise application service provider – a third-party entity that manages and
distributes high-end business applications to customers across a wide area network
(WAN) from a central data center.
enterprise management – as defined in North Carolina SB 222, “IT enterprise
management” refers to distributed IT assets. IT enterprise management is an approach
that uses policies, procedures, and technical infrastructure to manage the state’s
tremendous investment in distributed IT assets, such as workstations, servers, routers,
etc., to minimize total life-cycle costs while maximizing benefits for transacting the
state’s business and delivering services to its citizens.
enterprise portal – Portal is a new term, generally synonymous with gateway, for a
World Wide Web site that is or proposes to be a major starting site for users when
they get connected to the Web or that users tend to visit as an anchor site. Typical
services offered by portal sites include a directory of Web sites, a facility to search for
other sites, news, weather information, e-mail, stock quotes, phone and map
information, and sometimes a community forum. The primary goal of an enterprise
portal is to decrease the effort required to move pertinent, contextually relevant
information to those that require it.
IDL (Interface Definition Language) – a method for component developers to
describe a component's API enabling applications to pass parameters and receive
results during component execution
IETF (Internet Engineering Task Force) – a large, open, international community
of network designers, operators, vendors, and researchers concerned with the
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
evolution of the Internet architecture and the smooth operation of the Internet. IETF is
generally recognized as the standards organization for the Internet.
IIOP (Internet Inter-ORB Protocol) – a protocol developed by the Object
Management Group (OMG) implementing CORBA solutions over the World Wide
Web. IIOP enables browsers and servers to exchange integers, arrays, and other
complex objects.
imaging – the processes and technologies associated with incorporating photographic
renderings into systems
IMAP (Internet Message Access Protocol) – a standard protocol for accessing e-
mail from your local server. IMAP (the latest version is IMAP4) is a client/server
protocol in which e-mail is received and held for you by your Internet server. You (or
your e-mail client) can view just the heading and the sender of the letter and then
decide whether to download the mail. You can also create and manipulate folders or
mailboxes on the server, delete messages, or search for certain parts or an entire note.
IMAP requires continual access to the server during the time that you are working
with your mail.
index – a method used to catalog particular fields within a database to improve the
performance of queries against the data. Database indexes are comparable to how a
dictionary has tabs for the letters of the alphabet so that it is easier to look up a word,
or a reference book has an index to quickly find information needed.
industry standard – a defined standard for a particular industry (i.e., a particular
solution or product base)
information – a compilation of operational data from across the organization.
Information is used for reporting and analysis to support the decision-making process.
information design – the detailed planning of specific information that is to be
provided to a particular audience to meet specific objectives. The output of an
information design is sometimes expressed in written instructions, plans, sketches,
drawings, or formal specifications. However, on very small projects, information
design is likely to be much less formal.
information model – used by application or data architects to build a data warehouse.
Before a data warehouse can become a reality, a model must be built to assist in the
design. The information model is stored in a repository.
MIPS (millions of instructions per second) – The number of MIPS is a general
measure of computing performance and, by implication, the amount of work a larger
computer can do. For large servers or mainframes, it is also a way to measure the cost
of computing: the more MIPS delivered for the money, the better the value.
mirror site – a Web site or set of files on a computer server that has been copied to
another computer server to reduce network traffic, ensure better availability of the
Web site or files, or make the site or downloaded files arrive more quickly for users
close to the mirror site. A mirror site is an exact replica of the original site and is
usually updated frequently to ensure that it reflects the content of the original site.
Mirror sites are used to make access faster when the original site may be
geographically distant.
MOM (message oriented middleware) – application communication middleware
that sends messages between software components. Some MOM permits time-
independent communication between applications. Communication, in the form of
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
POTS (plain old telephone service) – POTS is a term sometimes used in discussion
of new telephone technologies in which the question of whether and how existing
voice transmission for ordinary phone communication can be accommodated. For
example, ADSL and ISDN provide some part of their channels for "plain old
telephone service" while providing most of their bandwidth for digital data
transmission.
print server – hardware and software that manages shared printers on a network
private key – In cryptography, a private or secret key is an encryption/decryption key
known only to the party or parties that exchange secret messages. In traditional secret
key cryptography, communicators share a key so that each could encrypt and decrypt
messages. The risk in this system is that if either party loses the key or it is stolen, the
system is broken. A more recent alternative is to use a combination of public and
private keys. In this system, a public key is used together with a private key.
UNIT 8
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
PURPOSE
Over the last thirty years, information technology use at Whatcom County has
evolved from manual typewriters to fully automated mobile data collection devices.
As we enter the 21st century, the pace of technology growth has become ever more
rapid. It is important for the County to shift to a more proactive approach to its use of
information technology. Whatcom County is committed to being a government leader
in the positive use of information technology to deliver effective services to its staff,
partners and citizens. Especially in these times of constrained resources, the most
important thing we can do is to invest in the tools and processes of automation to
support limited staff across the organization in serving our community.
The purpose of this Countywide Information Technology Strategic Plan is to provide
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Goals are broad statements to guide information technology over the next four years.
Objectives are general statements of what Whatcom County hopes to achieve.
Strategies are the approaches to be used to meet the objectives. Activities are
suggested tasks with measurable actions to achieve desired outcomes.
The goals, objectives, strategies and activities of the plan were developed with the
following beliefs:
• Technology planning and delivery is best when based on a comprehensive
organization model;
• It is essential to have a strong partnership and positive communications
between departments and the central Division of Information Technology;
• Migrating data and applications from desktop to enterprise (countywide)
systems will be implemented with the aim of increasing ease of work without
impeding local user flexibility;
• Clarity and visibility of technology responsibilities and processes is vital;
• Technology investment funding needs to be built into long-range capital
planning; and
• Governance and security audit findings of 2003 will be addressed.
PLAN OVERVIEW
This Countywide Technology Strategic Plan presents six general goals along with the
objectives, strategies and activities to achieve each goal.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
x. Technology Goals
These goals are essential in providing technology services to staff, partners and
citizens. The following diagram depicts how these goals collectively provide
customers with access to electronic information.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
GOAL 1:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
A. Deploy mobile and front counter digital collection and access devices
• Equip field teams with mobile devices
(e.g. Personal Digital Assistants, Tablet PCs, etc.)
• Provide staff collecting location-based data with Global Positioning
System (GPS) enabled devices
• Deploy a common “Desktop Kiosk” for self-service access to and update of
countywide information
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
systems
(e.g. MyWhatcom)
• Increase electronic transactions with partners
(e.g. City of Bellingham access to County property information system)
GOAL 2:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
GOAL 3:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
GOAL 4:
DEPLOY SECURE AND RELIABLE INFORMATION SYSTEMS
xxix. Objective 4.1:
Establish and monitor system availability and performance targets
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
GOAL 5:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
• Build internal and external technology consulting capacity to meet the growing
department needs to improve business processes with technology (e.g.
Technology project management, application development, etc.)
• Consider separating consulting from operations to promote both service areas as a
priority
xlii. Objective 5.5:
xliii. Reduce desktop support costs
GOAL 6:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
l. Objective 6.4:
li. Govern for effective information technology
TERMS
Best Practice: A superior method or innovative practice that contributes to the
improved
performance of an organization, usually recognized as "best" by other peer
organizations.
(Source: American Society for Quality Dictionary)
Business Case: A structured proposal for business improvement providing a decision
package for organizational decision makers. A business case includes an analysis of
business process performance and associated needs or problems, proposed alternative
solutions, assumptions, constraints, and risk-adjusted cost/benefit analysis. (Source:
U.S.
General Accounting Office Business Process Reengineering Assessment Guide)
Client-side: Occurring on a local client computer in a client-server system. For
example,
on the World Wide Web, some programming scripts are considered client-side
because they
are executed by your local computer’s Web browser. In contrast, other programming
scripts
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
are considered server-side because they run on the Web server. (Source: Modified
Webopedia)
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
patterns, and trends; and find solutions to problems. The system is designed to
capture, store, update,
manipulate, analyze, and display the geographic information. A GIS is typically used
to represent maps
as data layers for study and analysis. (Source: Environmental Systems Research
Institute GIS
Dictionary)
Global Positioning System (GPS): A constellation of 24 radio-emitting satellites
deployed by the U.S. Department of Defense and used to determine location on the
earth's
surface. The orbiting satellites transmit signals that allow a GPS receiver anywhere on
earth
to calculate its own location through triangulation. The system is used in navigation,
mapping,
surveying, and other applications in which precise positioning is necessary. (Source:
Environmental Systems Research Institute GIS Dictionary)
Help Desk Ticket System: Software which assists in tracking and prioritizing computer
support requests.
Infrastructure: The computer and communication hardware, software, databases,
people,
and policies supporting the organization’s information management functions.
Information Technology (IT) Contact: A person designated by the Contact's
department head to relay PC/Network problems to DoIT staff. This allows for a single
point of
contact to DoIT. (Source: Whatcom Internal Resource Exchange WIRE)
Listserv: An automatic mailing list server. When e-mail is addressed to a LISTSERV
mailing list, it is automatically broadcast to everyone on the list. (Source: Modified
Webopedia)
Large system: A critical business technology serving one or more departments.
Whatcom
County examples include e-mail (Novell GroupWise), document management
(Laserfiche)
and election system (EIMS).
Portal: A main “point of entry.” In technology terms, a portal typically refers to a
Web site
serving as gateway to a large amount of information and services.
Remote computing: Using computer devices away from an organization’s primary
location(s).
Server-side: Occurring on a central computer server in a client-server system. For
example, on the World Wide Web, some programming scripts are considered server-
side
because they run on the Web server. In contrast, other programming scripts are
considered
client-side because they are executed by your local computer’s Web browser.
(Source:
Modified Webopedia)
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Service Level Agreement: Abbreviated SLA, a contract between a service provider and
the end user that stipulates and commits the provider to a required level of service. An
SLA
should contain a specified level of service, support options, enforcement or penalty
provisions
for services not provided, a guaranteed level of system performance as relates to
downtime
or uptime, a specified level of customer support and what software or hardware will
be
provided. (Source: Modified Webopedia)
Technology Replacement & Revolving (TR&R) Fund: The Whatcom County fund used to
replace existing hardware, software, fax machines and computer peripherals. (Source:
Whatcom
County Policy AD132101Z)
Technologists: Whatcom County staff with technology responsibilities. This includes
staff
in the Information Services Division as well as staff in other departments with roles
such as
Information Services Contacts, GIS specialists, data administrators and Web contacts.
Thin Client: In client/server applications, a client designed to be especially small so
that
the bulk of the data processing occurs on the server. Although the term thin client
usually
refers to software, it is increasingly used for computers, such as network computers
that are
designed to serve as the clients for client/server architectures. A thin client is a
network
computer without a hard disk drive, whereas a fat client includes a disk drive.
(Source:
Modified Webopedia)
Virtual: Not real. The term virtual is popular among computer scientists and is used in
a
wide variety of situations. In general, it distinguishes something that is merely
conceptual
from something that has physical reality. A virtual front counter is a front counter that
is
simulated using computer technologies such as electronic documents and forms, on-
line
payment, etc. (Source: Modified Webopedia)
Virtual private network (VPN): A network technology allowing a public network such
as
the Internet to establish a secure connection between two remote locations. (Source:
Modified Webopedia)
Web: A computer network with a collection of informational sites with text, graphics,
sound
and animation resources viewable by desktop “Web” browsers. The Web typically
refers to
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
the World Wide Web on the Internet, but it may also refer to an internal intranet.
Wiki: A collaborative Web site comprised of the perpetual collective work of many
authors.
(Source: Modified Webopedia)
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
• Training/Event Support
• Distribute Electronically to all employees
• More flexible/versatile HRMS
• Ability to send receive large documents
19. Track Manpower and Materials – Computerized Maintenance Management
(4 green, 4 yellow)
(Production management extends life of assets.)
20. Life of Systems (4 green, 3 yellow)
• Vendors – evaluate relationships
• Aging equipment
• Adequate reserves
• Updates/replacements of major infrastructure
21. Process Speed of AS400 (4 green, 1 yellow)
(Capacity and availability) (DASD)
22. Voice Recognition Software – Voice to Text (3 green, 8 yellow)
• Reduce Carpal Tunnel Syndrome
• Save transcription time
23. Barcode Capabilities (3 green, 3 yellow)
24. Videoconferencing (2 green, 18 yellow)
• Saves travel costs
• Training
• Conferences
• Interviewing
25. IS Upgrades (2 green, 3 yellow)
• Reroute IGN traffic through firewall
• Improved incident tracking
• Intrusion detection
• Improve backup and restore
• Revamp IS department contact system
26. Telephone System (2 green, 3 yellow)
• Assess business needs
• Instant Voice Recognition (IVR)
• Call center management
• Explore Voice Over Internet Protocol (VOIP)
27. Fax from Desktop (2 green, 2 yellow)
• Saves phone lines
• Reduces long distance
• Distribution capability
28. Improved Communications (2 green, 1 yellow)
• Public access kiosks
29. Electronic Library (1 green, 8 yellow)
• Laws
• Reports
• Convert physical one to computer
30. Track Service Requests (1 green, 3 yellow)
31. Juvenile Remote Education Access (1 green, 2 yellow)
32. Special District Access (1 green, 1 yellow)
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
33. Prevent Unauthorized Access to County Records and Work Areas ((1 green, 1
yellow)
34. Track Workflow (1 green)
• Details from each desk (internal, external)
35. Video Training (4 yellow)
• Internet
• In-house
• On-demand
36. Business Continuity Planning (2 yellow)
• Redundancy
• Data protection
• Disaster recovery
37. Back-up/Duplication (1 yellow)
• Knowledge bases (cross-train, data bases)
• Computer back-ups
38. Expand Emergency Communication for Public Safety/Health (1 yellow)
• Power outage
• Cell phones
• Land lines
39. Customized Database
• Storage
• Retrieval
• Email address collection
40. Individual Departmental Needs
41. Technologically Prepared and Cross-trained Staff
42. User Friendly Information for the Public
43. Single Location/Site for Public to Go (One Stop Web)
44. Use Technology to Schedule Across Departments
• Vehicles
• Laptops
• Projectors
• Space
• Shared equipment
• Regular maintenance
• Replacement of parts
• Allows accountability and audit trail
• Less staff time
45. ID of Potential Users of Users
46. Single Point of Access (Appol, Internet, WIRE)
47. Groupwise Training
48. Work Management Tools
49. Capitalize on Tools departments Can Use Directly
50. System Integrity Centralized
51. Departments and Groups of Departments as Data Custodians
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
accurate adj. careful and exact
c. accuracy syn. precise
She was able to make accurate observations with the new telescope.
Experiments must be conducted with accuracy.
Reaching the Moon was a gigantic step in space exploration for mankind.
New methods of farming offer gigantic advantages over the old methods.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
The volcano had been dormant for hundreds of years before the eruption last
month.
The seniors live in the new dormitory.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
center has the ability to handle a considerable volume of calls at the same time, to
screen calls and forward them to someone qualified to handle them, and to log calls.
Call centers are used by mail-order catalog organizations, telemarketing companies,
computer product help desks, and any large organization that uses the telephone to
sell or service products and services.
CIC (customer interaction center) – The call center is evolving into a “new age”
contact center.
The CIC accommodates multiple channels for customer interaction and critical
functions, including customer service/support, field service dispatch, quality
management, intelligent routing, case-based reasoning, and knowledge repositories.
CICS (Customer Information and Control System) – (1) A general–purpose licensed
program that controls online communication between terminal users and a database
(2) A mainframe multi-user single address space subsystem from IBM that supports
mainframe transaction processing programs
Over the past several decades CICS, together with the COBOL programming
language, has formed the most common set of tools for building customer transaction
applications in the world of large enterprise mainframe computing. A great number of
the legacy applications still in use are COBOL/CICS applications. Using the
programming interfaces provided by CICS, a programmer can write programs that
communicate with online users and read from or write to customer and other records
(orders, inventory figures, customer data, and so forth) in a database (usually referred
to as "data sets") using CICS facilities rather than IBM's access methods directly. Like
other transaction managers, CICS can ensure that transactions are completed and,
if not, undo partly completed transactions so that the integrity of data records is
maintained.
fiber optic cable – a network cabling technology. Fiber optic cable uses light
impulses instead of electrical impulses to transmit data from point A to point B. Due
to the high cost and high capacity of fiber optic cabling, it is typically used as a
backbone solution.
file server – (1) A high-capacity disk storage device or a computer that each
computer on a network can use to access and retrieve files that can be shared among
attached computers.
Note: Access to a file is usually controlled by the file server's software rather than by
the operating system of the computer that accesses the file. (2) Hardware and software
that manage files and shared disk space on a network
filter – a program or section of code that is designed to examine each input or output
request for certain qualifying criteria and then process or forward it accordingly. This
term was used in UNIX systems and is now used in other operating systems. A filter
is "pass-through" code that takes input data, makes some specific decision about it
and possible transformation of it, and passes it on to another program in a kind of
pipeline. Usually, a filter does no input/output operation on its own. Filters are
sometimes used to remove or insert headers or control characters in data.
firewall – (1) One or more computer systems placed between trusted and non-trusted
networks to prevent unauthorized access to networks and systems (2) A combination
of hardware and software that separates a LAN into two or more parts for security
purposes.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
consistency, promote resource sharing, reduce duplication of effort, and improve the
state's ability to benefit from the economies of scale.
technical architecture standards – the national, international, and industry standards
that support the architecture, in addition to the standards necessary for current
operations
telecommunications – (1) The transmission of control signals and information
between two or more locations, such as by telegraph, radio, or television (2) The
transmission of data between two computer systems over telecommunication lines and
between a computer system and remote devices
traffic filtering – the ability to reduce the amount of data flowing across a network
by identifying common data patterns and programmatically preventing data
containing those patterns from traveling across the network
transaction – a process that performs a single automated function, for example, a
renew vehicle registration transaction
transformation engine – software designed to prepare data from multiple operational
databases for a data warehouse. A transformation engine provides an alternative to
developing, maintaining, and running data extraction and transformation processing
on production application systems. The data preparation occurs asynchronously.
TS (Telecommunications Services) – a section within ITS which provides and
maintains all state telephone products and services and oversees the NC Integration
Network (NCIIN). Specifically, TS provides computer network services (WAN,
SNA), voice services (telephone, cellular, VRU), transport network services (digital
backbone, long distance, credit cards, and video and advanced network services (two-
way interactive, high speed data).
TSR (terminate and stay resident) – DOS program that is loaded into memory to
extend the functionality to the operating system
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 9
Fact-finding techniques
System Flowcharts
Data Flow Diagrams
Systems Investigation
The first stage in a Systems Life Cycle is the Problem Definition, followed by a
Feasibility Study to
determine whether a proposed solution is feasible, or achievable, given the
organisation’s resources
and constraints.
Once the decision has been made to go ahead, a much more detailed investigation can
take place.
One of the most difficult tasks of the analyst is to define the specific information
requirements that
must be met by the new system. The aim is to gain a complete understanding of the
existing system,
and how it will change in the future. It will cover:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Methods of Fact-Finding
There are a number of ways of finding out about existing procedures and problems.
These include:
⇒ Observation ~ spending some time in the department concerned, seeing at
first hand the
procedures used, workloads and bottlenecks;
⇒ Reading the documents associated with the system;
⇒ Asking clerical staff to keep special counts during a trial period to establish
where problems
might lie;
⇒ Questionnaires ~ these can be used when a lot of people will be affected
by a new system;
⇒ Interviews ~ the most common and useful way of fact-finding. Interviews
must be well planned
and consideration given to such factors as:
• whom to interview;
• When to interview;
• What to ask;
• Where to hold the interview;
Reporting Techniques
The analyst may use different diagrammatic ways of reporting on the findings of the
analysis. Data
Flow Diagrams (DFDs) are a useful tool for showing:
⇒ Where the data originates;
⇒ What processing is performed on it and by whom;
⇒ Who uses the data;
⇒ What data is stored and where;
⇒ What output is received and who uses it.
References:
Heathcote, P. M. (2000) ‘A’ Level Computing, 4th Edition
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Levelled DFDs
It is often impossible to represent a complete business system in a single diagram, so
two or three
levels of data flow diagrams may be used. Each showing more detail.
Example 1
The payroll system in a certain company may be described as follows:
At the end of each week, time sheets are collected and sent to the computer centre.
There, the pay
roll data is entered via a key-to-disk system, verified and validated, producing a new
file of valid
transactions on disk and an error report. The file is used to update the employee
master file,
payslips are printed and funds are electronically transferred to employees’ bank
accounts.
Complete the Top Level Diagram using the terms found in the answer box:
lii. Data Prep Process Payroll Employees Accounts Cheque
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Data flow diagrams are a network representation of a system. They are the
cornerstone for
structured systems analysis and design. The diagrams use four symbols to represent
any system at
any level of detail. The four entities that must be represented are:
• data flows - movement of data in the system
• data stores - data repositories for data that is not moving
• processes - transforms of incoming data flow's to outgoing data flow's
• external entities - sources or destinations outside the specified system boundary
Data flow diagrams do not show decisions or timing of events. Their function is to
illustrate data
sources, destinations, flows, stores, and transformations. The capabilities of data flow
diagramming
align directly with general definitions of systems. Data flow diagrams are an
implementation of a
method for representing systems concepts including boundaries, input/outputs,
processes/subprocesses, etc.
The data flow diagram is analogous to a road map. It is a network model of all
possibilities with
different detail shown on different hierarchical levels. The process of representing
different detail
levels is called "levelling" or "partitioning" by some data flow diagram advocates.
Data
Flow
Exercises
OBJECT-ORIENTED PROGRAMMING
One of the principal motivations for using OOP is to handle multimedia applications in which
such diverse data types as sound and video can be packaged together into executable modules.
Another is writing program code that’s more intuitive and reusable; in other words, code that
shortens program-development time.
Perhaps the key feature of OOP is encapsulation - bundling data and program
instructions into modules called ‘objects’. Here’s an example of how objects work. Art icon
on a display screen might be called ‘Triangles’. When the user selects the Triangles icon -
which is an object composed of the properties of triangles and other data and instructions - a
menu might appear on the screen offering several choices. The choices may be (1) create a
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
new triangle and (2) fetch a triangle already in storage. The menu, too, is an object, as are the
choices on it. Each time a user selects an object, instructions inside the object are executed
with whatever properties or data the object holds, to get to the next step. Triangle, the
application might execute a set of instructions that displays several types of triangles-right,
equilateral, isosceles and so on.
Many industry observers feel that the encapsulation feature of OUP is the natural tool
for complex applications in which speech and moving images are integrated with text and
graphics. With moving images and voice built into the objects themselves, program
developers avoid the sticky problem of deciding how each separate type of data is to be
integrated and synchronized into a working whole.
A second key feature of OOP is inheritance. This allows OOP developers to define one
class of objects, say ‘Rectangles’ and a specific instance of this class, say ‘Squares’ (a
rectangle with equal sides). Thus, all properties of rectangles - ‘Has 4 sides’ and ‘Contains 4
right angles’ are the two shown here are automatically inherited by Squares. Inheritance is a
useful property in rapidly processing business data. For instance, consider a business that has
a class called ‘Employees at the Dearborn Plant’ and a specific instance of this class,
‘Welders’. If employees at the Dearborn plant are eligible for a specific benefits package,
welders automatically qualify for the package. If a welder named John Smith is later relocated
from Dearborn to Birmingham. Alabama, where a different benefits package is available,
revision is simple. An icon representing John Smith - such as John Smith’s face - can be
selected on the screen and dragged with a mouse to an icon representing the Birmingham
plant. He then automatically ‘inherits’ the Birmingham benefit package.
A third principle behind OOP is polymorphism. This means that different objects can
receive the same instructions but deal with them in different ways. For instance, consider
again the triangles example. If the user right clicks the mouse on ‘Right triangle’, a voice clip
might explain the properties of right triangles. However, if the mouse is right clicked on
‘Equilateral triangle’ the voice instead explains properties of equilateral triangles.
The combination of encapsulation, inheritance and polymorphism leads to code
reusability. ‘Reusable code’ means that new programs can easily be copied and pasted
together from old programs. All one has to do is access a library of objects and stitch them
into a working whole. This eliminates the need to write code from scratch and then debug it.
Code reusability makes both program development and program maintenance faster.
1. Find the answers to these questions in the following text.
1. What advantages of using object-oriented programming are mentioned in the text?
2. What are the three key features of OOP?
3. What multimedia data types are referred to in the text?
4. List the different types of triangle mentioned in the text.
5. What feature avoids the problem of deciding how each separate type of data is
integrated and synchronized into a working whole?
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
big projects, rolled out major solutions and are well known. Maybe then it’s time to make the
leap and run your own life.
C. How to become an IT manager
IT managers manage projects, technology and people. Any large organization will have at
least one IT manager responsible for ensuring that everyone who actually needs a PC has one
and that it works properly. This means taking responsibility for the maintenance of servers
and the installation of new software and for staffing a help-desk and a support group.
Medium to large companies are also likely to have an IT systems manager. They are
responsible for developing and implementing computer software that supports the operations
of the business. They’re responsible for multiple development projects and oversee the
implementation and support of the systems. Companies will have two or three major systems
that are probably bought off the shelf and then tailored by an in-house development team.
Apart from basic hardware and software expertise, an IT manager will typically have
over five years’ experience in the industry. Most are between 30 and 45. Since it managers
have to take responsibility for budgets and for staff, employers look for both of these factors
in any potential recruit.
Nearly all IT managers have at least a first degree if not a second one as well.
Interestingly, many of them don’t have degrees in computing science. In any case, the best
qualification for becoming a manager is experience. If your personality is such that you’re
unlikely to be asked to take responsibility for a small team or a project, then you can forget
being an IT manager. You need to be bright, communicative and be able to earn the trust of
your teams. Most of this can’t be taught, so if you don’t have these skills then divert your
career elsewhere.
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
plentiful adj. more than sufficient
n. plenty syn. abundant
Examples of Miro’s art are plentiful.
A balanced diet normally provides plenty of the necessary vitamins.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
She has led a sheltered life since her parents have done everything for her.
Everyone looked for shelter from the blazing sun.
account n. a report of an event; money kept in a bank; a
adj. accountable statement of something used or received, usually a
v. account financial report
n. accounting syn. story
n. accountant
His account of the incident varied from that of the other witnesses.
We need an accounting of all the money spent.
hue n. color
syn. color
The hue of the sunset was beautiful.
The hue of the room gave it a warm feeling.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
v. poll
The poll indicated that conservation of the environment was the number one
issue with college students.
The pollster asked the questions in a nonpartisan manner.
authorization – the process of giving someone permission to do or have something.
In multi-user
computer systems, a system administrator defines for the system which users are
allowed access
to the system and what privileges of use (such as access to which file directories,
hours of
access, amount of allocated storage space, and so forth). Assuming that someone has
logged on
to a computer operating system or application program, the system or application may
want to
identify what resources the user can be given during this session.
Authorization is sometimes seen as both the preliminary setting up of permissions and
the actual
checking of the permission values that have been set up when a user is getting access.
Logically,
authorization is preceded by authentication.
AVI (Audio/Video Interleaved) – a popular file format that combines video and
audio. To play
AVI files, you need Video for Windows. Windows' CD-ROMs contain AVI files that
the computer
uses to display video images.
backbone – (1) A set of nodes and their interconnecting links providing the primary
data path
across a network (2) In a LAN multiple-bridge ring configuration, a high-speed link to
which the
rings are connected by means of bridges. A backbone may be configured as a bus or a
ring. (3)
In a WAN, a high-speed link to which nodes or data switching exchanges (DSEs) are
connected
(4) A high-speed computer network designed to interconnect lower-speed networks or
clusters of
dispersed user devices
bandwidth – (1) The speed or capacity of a network connection. The more bandwidth
a particular
medium has, the faster data can be transmitted. (2) The carrying capacity of a circuit,
usually
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
measured in bits per second (bps) for digital circuits or hertz (Hz) for analog circuits.
The greater
the bandwidth, the greater the information-carrying capacity. Bandwidth is
comparable to the
number of cars per hour a highway can support: a four-lane interstate highway has a
higher
bandwidth than a two-lane road.
best practices – methodologies that provide beneficial results. Some best practices
are general
in nature and can be applied to almost every industry; other best practices are
industry-specific.
broadband – (1) A frequency band broad enough to be divided into several narrower
bands,
each of which can be used for different purposes or be made available to different
users (2) A
high-speed, high-capacity transmission channel. Broadband channels are carried on
coaxial or
fiber-optic cables that have a wider bandwidth than conventional telephone lines,
giving them the
ability to carry video, voice, and data simultaneously. Cable modems and digital
subscriber line
(DSL) technologies are examples of broadband connectivity.
broadcast – the capability to send a single message from one device and be received
by all
other connected devices on a network
CIO (Chief Information Officer) – CIO is a job title commonly given to the person
in an
enterprise responsible for the information technology and computer systems that
support
enterprise goals. As information technology and systems have become more
important, the CIO
has come to be viewed in many organizations as a key contributor in formulating
strategic goals.
In many companies, the CIO reports directly to the Chief Executive Officer (CEO). In
some
companies, the CIO sits on the executive board.
In a large enterprise the CIO normally will delegate technical decisions to employees
more
familiar with details. The CIO proposes the information technology an enterprise will
need to
achieve its goals, and then works within a budget to implement as much as possible of
the plan.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
manages data storage, structure, access, and security; can either be relational or non-
relational
DCE (Distributed Computing Environment) – Open Software Foundation’s
standard, offering
distributed file, remote procedure call, security, naming, and X.500 directory services
to
participating computers
DCS (Distributed Computing Services) – a business unit within ITS’ Computing
Services that
provides LAN Assistance, Internet and Web Development Services, Managed
Platform Services
(MaPS), Statewide Computer and Network Security (SCANS), Novell Directory
Services, and
Domain Name Services
decryption – the process of converting encrypted data back into its original form so it
can be
understood
de facto standard – a standard that has emerged due to extensive use of a particular
product or
solution
deployment – the implementation of a software program or component on a
particular platform
desktop publishing – the process of composing copy, including graphics and images,
on an
end-user workstation. Output can be sent directly to high-resolution reproduction
equipment (e.g.,
phototypesetters, laser printers)
DHTML (Dynamic Hypertext Markup Language) – a collective term for a
combination of new
HTML tags and options, style sheets, and programming that will let you create Web
pages more
animated and more responsive to user interaction than previous versions of HTML.
Much of
dynamic HTML is specified in HTML 4.0. Simple examples of dynamic HTML
pages would
include (1) having the color of a text heading change when a user passes a mouse over
it or (2)
allowing a user to "drag and drop" an image to another place on a Web page.
Dynamic HTML
can allow Web documents to look and act like desktop applications or multimedia
productions.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
digital cash – Digital cash is a system of purchasing cash credits in relatively small
amounts,
storing the credits in your computer, and then spending them when making electronic
purchases
over the Internet. Theoretically, digital cash could be spent in very small increments,
such as
tenths of a cent (U.S.) or less. Most merchants accepting digital cash so far, however,
use it as
an alternative to other forms of payment for somewhat higher price purchases. There
are several
commercial approaches to digital cash on the Web. Digital cash can also be stored on
an
electronically sensitive card (smart card).
digital certificate – an electronic document issued by a certificate authority that is
used to
establish a company’s identity by verifying its public key
digital government – electronic government; government services available online to
citizens,
employees, and businesses
digital innovation – the merger of business drivers and emerging technology in the
digital
economy
digital network – a network or line in which the information is encoded as a series of
ones and
zeros rather than as a continuously varying wave— as in traditional analog networks.
Digital
networks have several major pluses over analog ones. First, they're "cleaner." They
have far less
noise, static, etc. Second, they are easier to monitor because you can measure them
more easily.
Third, you can typically pump more digital information down a communications line
than you can
analog information.
digital signature – a digital signature (not to be confused with a digital certificate) is
an electronic
rather than a written signature that can be used by someone to authenticate the identity
of the
sender of a message or the signer of a document. It can also be used to ensure that the
original
content of the message or document that has been conveyed is unchanged. Additional
benefits to
the use of a digital signature are that it is easily transportable, cannot be easily
repudiated,
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
function even if parts of it were destroyed in the event of a military attack or other
disaster.
InterNIC (Internet Network Information Center) – a cooperative activity between the
U.S.
Government and Network Solutions, Inc. Until recently, InterNIC was the
organization responsible
for registering and maintaining the com, net, and org top-level domain names on the
World Wide
Web. The actual registration was performed by Network Solutions, Inc.
As a result of a new U. S. Government Statement of Policy (known as "the white
paper") in
October, 1998, competition will be introduced in domain name registration for these
top-level
domains and a new, non-profit global organization, the Internet Corporation of
Assigned Names
and Numbers (ICANN), has been designated to conduct the registrar accreditation
process.
ICANN has initially designated five new registrar companies— in addition to
Network Solutions—
for a two-month test period. After that period, additional registrars are expected to be
accredited.
interoperability – the capability for software services or components to easily
exchange logic,
data, and information
inter-query parallelism – a parallel processing method where multiple queries from
multiple
concurrent users can be processed at the same time
intra-application middleware – communication within the tiers of an application
system
intranet – information made available to a limited set of users, usually within a
corporation,
government entity, or educational institution that is often coded with HTML and
viewed with a
browser
intra-query parallelism – a parallel processing method where a single query can be
broken
down into multiple processes and all can be processed in parallel
IOTP (Internet Open Trading Protocol) a set of standards that makes all electronic
purchase
transactions consistent for customers, merchants, and other involved parties,
regardless of
payment system. IOTP accommodates a wide range of payment systems such as SET,
DigiCash, e-checks, and debit cards. Payment system data is encapsulated within
IOTP
messages. IOTP is designed to handle a transaction that involves a number of
different parties:
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
the customer, merchant, credit checker and certifier, bank, and delivery handler. IOTP
uses the
Extensible Markup Language (XML) to define data that encompasses everything that
may be
needed in a transaction.
IP (Internet Protocol) – a communication protocol that routes packets of data from
one node on
the Internet to another. IP routes each packet based on a four-byte destination address
(the IP
number, e.g., 123.456.789.1). Ranges of numbers are assigned to different
organizations. The
organizations then assign groups of their numbers to sections or departments.
IP operates on gateway machines that move data from department to organization to
region and
then around the world. Each computer (known as a host) on the Internet has at least
one address
that uniquely identifies it from all other computers on the Internet. When you send or
receive data
(for example, an e-mail note or a Web page), the message gets divided into little
chunks called
packets. Each of these packets contains both the sender's Internet address and the
receiver's
address. Any packet is sent first to a gateway computer that understands a small part
of the
Internet. The gateway computer reads the destination address and forwards the packet
to an
adjacent gateway that in turn reads the destination address and so forth across the
Internet until
one gateway recognizes the packet as belonging to a computer within its immediate
neighborhood or domain. That gateway then forwards the packet directly to the
computer whose
address is specified. Because a message is divided into a number of packets, each
packet can
be sent by a different route across the Internet. Packets can arrive in a different order
than the
order they were sent in. The Internet Protocol just delivers them. It's up to another
protocol, the
Transmission Control Protocol (TCP) to put them back in the right order.
IP address – This definition is based on Internet Protocol Version 4. Note that the
system of IP
address classes described here, while forming the basis for IP address assignment, is
generally
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
powers and duties assigned by N.C.G.S. 143B-472.41 ratified by the 1997 session of
the General
Assembly.
ISDN (Integrated Services Digital Network) – a network technology implemented
through a
digital telephone service providing high-speed integration of voice and data over
special
telephone lines. ISDN uses asynchronous transfer mode (ATM).
ISO (International Organization for Standardization) – an international organization
composed
of national standards bodies from over 75 countries. ISO has defined a number of
important
computer standards, the most significant of which is perhaps the Open Systems
Interconnection
(OSI), a standardized architecture for designing networks.
ISP (Internet service provider) – a company that provides individuals and other
companies
access to the Internet and other related services, such as Web site building and
hosting. An ISP
has the equipment and the telecommunication line access required to provide points-
of-presence
on the Internet for the geographic area served. The larger ISPs have their own high-
speed leased
lines so that they are less dependent on the telecommunication providers and can
provide better
service to their customers.
IT (information technology) – the technology surrounding information systems. IT
is a term that
encompasses all forms of technology used to create, store, exchange, and use
information in its
various forms (business data, voice conversations, still images, motion pictures,
multimedia
presentations, and other forms, including those not yet conceived). It's a convenient
term for
including both telephony and computer technology in the same word. It is the
technology that is
driving what has often been called "the information revolution."
IT enterprise management – As defined in North Carolina SB 222, “IT enterprise
management”
refers to distributed IT assets. IT enterprise management is an approach that uses
policies,
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 10
HOW TCP/IP LINKS DISSIMILAR MACHINES
At the heart of the Internet Protocol (IP) portion of TCP/IP is a concept called the Internet
address. This 32-bit coding system assigns a number to every node on the network. There are
various types of addresses designed for networks of different sizes, but you can write every
address with a series of numbers that identify the major network and the sub-networks to
which a node is attached. Besides identifying a node, the address provides a path that
gateways can use to route information from one machine to another.
Although data-delivery systems like Ethernet or X.25 bring their packets to any
machine electrically attached to the cable, the IP modules must know each other’s Internet
addresses if they are to communicate. A machine acting as a gateway connecting different
TCP/IP networks will have a different Internet address on each network. Internal look-up
tables and software based on another standard-called Resolution Protocol-are used to route
the data through a gateway between networks.
Another piece of software works with the IP-layer programs to move information to the
right application on the receiving system. This software follows a standard called the User
Datagram Protocol (UDP).You can think of the UDP software as creating a data address in
the TCP/IP message that states exactly what application the data block is supposed to contact
at the address the IP software has described. The UDP software provides the final routing for
the data within the receiving system.
The Transmission Control Protocol (TCP) part of TCP/IP comes into operation once the
packet is delivered to the correct Internet address and application port. Software packages that
follow the TCP standard run on each machine, establish a connection to each other and
manage the communication exchanges. A data-delivery system like Ethernet doesn’t promise
to deliver a packet successfully. Neither IP nor UDP knows anything about recovering
packets that aren’t successfully delivered, but TCP structures and buffers the data flow, looks
for responses and takes action to replace missing data blocks. This concept of data
management is called reliable stream service.
After TCP brings the data packet into a computer, other high-level programs handle it.
Some are enshrined in official US government standards, like the File Transfer Protocol
(FTP) and the Simple Mail Transfer Protocol (SMTP). If you use these standard protocols on
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
different kinds of computers, you will at least have ways of easily transferring files and other
kinds of data.
Conceptually, software that supports the TCP protocol stands alone. It can work with
data received through a serial port, over a packet-switched network, or from a network system
like Ethernet. TCP software doesn’t need to use IP or UDP, it doesn’t even have to know they
exist. But in practice, TCP is an integral part of the TCP/IP picture and it is most frequently
used with those two protocols.
Exercises
1. Mark the following statements as True or False:
a. Internet addresses are an integral part of the IP protocol.
b. Internet addresses can be written as a series of numbers.
c. UDP software provides the final routing for data within the receiving system.
d. UDP recovers packets that aren’t successfully delivered.
e. TCP only works with packet switched networks.
f. TCP only works when it is combined with IP.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
iii. Standard used by software that manages communication exchanges between computers
on the Internet
iv. A 32-bit number identifying a node on an IP network
v. Stored information used to route data through a gateway
vi. A device for connecting dissimilar networks
BECOMING CERTIFIED
Suppose you’re a support engineer. You’re stuck in a job you don’t like and you want to
make a change. One way of making that change is to improve your marketability to potential
employers by upgrading your skill-set. If you’re going to train yourself up however, whose
training should you undertake? If you need certificates, whose certificates should they be?
Even if you get those certificates, how certain can you be that your salary will rise as a result?
One solution is the range of certifications on offer from Microsoft.
Microsoft offers a large array of certification programmers aimed at anyone from the
user of a single program such as Microsoft Word, to someone who wants to become a
certified support engineer. There are a myriad of certificates to study for too, If you’re the
proud holder of any of those qualifications, then you’re entitled to call yourself a Microsoft
Certified Professional (MCP).
Once you’ve decided which track you want to take, you should consider just how
qualified you already are in terms of experience and knowledge. Will you need to go and take
some courses with a training company, or are you the type who can make good use of self-
study materials? How much time do you genuinely have to devote towards this? Will your
employer pay for your course? Will it grant you leave to go and do the course - assuming you
can find one - on either a full-time or part-time basis?
The key question here is experience. This will not only influence the amount of work
you’ll have to do to get up to speed for the exams, it could also mean the difference between
passing or failing the exam.
While you’re busy learning all you need to know for your certification, the practice
exams are an absolute godsend. They show you the type of questions you’ll encounter and
they familiarize you with the structure of the exam. This is essential if you want to pass: the
exams have time limits and you need to get used to answering the requisite number of
questions within the allotted time. It’s as simple as that.
If you decide a training course will help you out, don’t let the title of a course alone
convince you that it will be suitable or cost effective. Find out exactly what the course offers
and whether there are prerequisites for attendants. You should also find out what the training
company is prepared to do if attendants don’t have the minimum knowledge necessary to be
on the course.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
As exams are replaced by ‘updated’ ones, you need to upgrade your certification to stay
current.
Ultimately it’s your responsibility to make sure you stay up to date. If you don’t, you
lose your certification until you take an update.
As a support engineer, you get the satisfaction of knowing that you passed a tough test
and the happy knowledge that your network manager is sweating a bit over the fact that you
could be head-hunted at any time.
Exercises
1. Mark the following statements as True or False:
a. Microsoft offers a large range of certification programmers to study.
b. You must get an advanced certificate before you can call yourself a Microsoft
Certified Professional.
c. All Microsoft training courses involve a period of full-time study.
d. Practice exams allow you to become familiar with the structure of the exams.
e. You can decide on the suitability of a course by its title.
f. It is your responsibility to make sure that your certification is kept up to date.
g. Gaining a certificate is likely to make you more attractive to other employers.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Self information. Completing a background and experience list will give you the self
information required to prepare your resume.
If you’ve worked before, list your jobs. Next, write down the work duties for the jobs
you’ve listed. Now, think about the skills or talents it took to do each work duty. Write them
down.
List your hobbies, clubs you belong to, sports you’ve been involved in, school activities,
and things that interest you. Look at the first item on your list.
Think about the skills or talents. Resume must be very easy to read so that an employer
can see at a glance, who you are, where you can be reached, what kind of work you can do,
and why you’re qualified for that kind of work. A resume should be short, preferable one
page typewritten. It must be error free. It includes honest, positive information that is related
to your job goal.
A good resume will open the door for an interview. it takes to do that item. Write them
all down. Look at the abilities (talents) identified on your background and experience list.
You have talents that you use everyday.
Resumes are required for some jobs, and are sometimes required for other jobs. An
employer may have you complete an application form instead of submitting a resume. On
some occasions, an employer may ask you to complete an application in addition to your
resume.
When you fill out an application form, make sure you fill it out completely and follow
all instructions. Do not omit any requested information and make sure that the information
you provide is correct.
A good resume is concise and is written in one page or more but at most, three pages is
enough. In the following, you will see a sample resume in one page:
Educational Background
• 1995-1999 B.Sc. in Computer Engineering in Michigan University, USA,
GPA=16.5
B.Sc. Project: Design and Implementation of MIS system for one hospital
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Career Background
• 2004-present Apple Company in Tehran, .net Programmer
• 2002-2004 SQL Server Trainer in X13 Company in Tehran and Training
ICDL and Microsoft Office
• 2001 Network manager of IBM Branch in Tehran
• 2003 Translating a book about Computer Maintenance System
Skills
• Programming Languages: .net, VB, C# and, C++, Pascal
• Databases: Oracle, SQL Sever, Access
• Operating Systems: Windows 2000, XP
• System Analysis and Design: UML and RUP
• Good in English Reading and Writing
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
erratic adj. no regular pattern in thinking or movement;
changeable without reason
Syn. inconsistent
The artist’s paintings have an erratic quality, some being excellent and
others mediocre.
The unstable chemical reacted erratically.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
client contact point – instance where a client makes contact with the help desk
organization
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
when requesting support. This is usually a Level 1 area of a service desk organization.
coaxial cable – a network cabling technology. Coaxial cabling is generally used in
small bus
topology networks because it requires less cabling. Due to its slow speed, coaxial
cable cannot
support any of the high-speed network technologies.
COBOL (Common Business Oriented Language) – the second-oldest high-level
computer
programming language; a procedural, structured programming language
COLD (computer output to laser disk) – archival storage of computer-generated
data within an
optical storage system
common business service – a service that incorporates the logic for commonly used
business
rules or functions. A service can be reused and shared between application systems.
component – an executable service that incorporates the logic for a single business
rule or
function. A component can be reused and shared between application systems.
component testing suite – software that contains special programs needed for testing
a
component. It provides services for calling a component, entering sample input, and
capturing
sample output data in order to verify the results.
componentware – software designed to be a component in an N–tier application
conferencing and meeting – a technology that provides a means for geographically
diverse
individuals and groups to participate, in real time, in conferences and meetings
configuration management – the process of maintaining workstation and server
configurations
in a large enterprise
connectivity – the ability to send and receive information between locations, devices,
and
business services
content providers – While content provisioning is also outside the core competencies
of portal
product vendors, many enterprises want content relevant to their industry. Portal
product vendors
have partnered with content providers for this service.
contention – two or more users or programs vying for the same computing resource
at the same
time (e.g., memory, storage, bus)
cookie – a small file of information held on a client device, provided by an Internet
host,
containing information on the client and enabling the host to identify the user directly
on
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
subsequent visits
CSC (Customer Support Center) – The Customer Support Center Level 1 is
designed to assist
clients with problems and/or questions related to the client's needs for all ITS
services.
CSS (Cascading Style Sheets) – a Web page style sheet derived from multiple
sources with a
defined order of precedence where the definitions of any style element conflict. The
Cascading
Style Sheet, Level 1 (CSS1) recommendation from the World Wide Web Consortium
(W3C),
which is implemented in the latest versions of the Netscape and Microsoft Web
browsers,
specifies the possible style sheets or statements that may determine how a given
element is
presented in a Web page. CSS gives more control over the appearance of a Web page
to the
page creator than to the browser designer or the viewer.
CSS (Customer Support System) – an electronic incident and change management
system
used to track and resolve customer calls, internal incidents, and software and
hardware system
changes. The system uses the Vantive Help Desk software package. ITS shares this
system with
other agencies that volunteer to participate and set up their own business definitions
and rules.
data model – specifies the data formats and the relationships of fields and tables in an
application system. It drives basic database design.
data processing – the systematic performance of operations upon data, for example,
arithmetic
or logic operations on data, merging or sorting of data, assembling or compiling of
programs
data repository – a database that contains metadata, or information about data that is
stored in
a database (e.g., federated data definitions, data aliases, where OLTP and OLAP data
can be
found)
data review board – a committee consisting of key business users from across the
enterprise.
The data review board provides and maintains federated data definitions and promotes
the reuse
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
a new term, "e-business," are often used interchangeably. When talking about
Internet-based
transactions for the state of North Carolina, e-government should be used instead of
ecommerce.
EDI (electronic data interchange) – a data exchange technology that facilitates the
rapid,
accurate exchange of standard commercial transactions by creating, transferring, and
processing
transactions electronically. EDI is the transmission between two trading partners of
the data
comprising common business transactions, in a mutually agreed-upon format.
e-form (electronic form) – a computer program version of a paper form. Aside from
eliminating
the cost of printing, storing, and distributing pre-printed forms, and the wastage of
obsolete forms,
e-forms can be filled out faster because the programming associated with them can
automatically
format, calculate, look up, and validate information for the user. With digital
signatures and
routing via e-mail, approval cycle times can be significantly reduced. With electronic
submission
of completed forms, you can eliminate the cost of rekeying data and the associated
errors.
EFT (electronic funds transfer) – a system of transferring money from one bank
account
directly to another without any paper money changing hands. One of the most widely-
used EFT
programs is Direct Deposit, in which payroll is deposited straight into an employee’s
bank
account, although EFT refers to any transfer of funds initiated through an electronic
terminal,
including credit card, ATM, Fedwire and point-of-sale (POS) transactions. It is used
for both credit
transfers, such as payroll payments, and for debit transfers, such as mortgage
payments.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
steering committee composed of management from all lines of business and the CIO.
e-procurement – the business-to-business purchase and sale of supplies and services
over the
Internet. An important part of many business-to-business sites, e-procurement is also
sometimes
referred to by other terms, such as supplier exchange. Typically, e-procurement Web
sites allow
qualified and registered users to look for buyers or sellers of goods and services.
Depending on
the approach, buyers or sellers may specify prices or invite bids. Transactions can be
initiated
and completed. Ongoing purchases may qualify customers for volume discounts or
special offers.
E-Rate – The Schools and Libraries Program, commonly called the "E-Rate," is
administered by
the Schools and Libraries Division (SLD) of the Universal Services Administrative
Company
(USAC). USAC oversees the administration of all universal service support, which
includes the
High Cost Program, the Low-Income Program, the Rural Health Care Program, and
the Schools
and Libraries Program. The Schools and Libraries Universal Service Program was
established as
part of the Telecommunications Act of 1996 with the express purpose of providing
affordable
access to telecommunications services for all eligible schools and libraries,
particularly those in
rural and inner-city areas. Funded at up to $2.25 billion annually, the Program
provides discounts
of 20% to 90% on telecommunications services, Internet access and internal
connections.
Funding for the universal service discounts comes from the telecommunications
industry, in an
Information Age update to the time-honored concept of universal service. The level of
discounts
schools and libraries are eligible to receive depends on economic need and location,
rural or
urban; once approved, they apply their discounts to telecommunications services,
Internet access
and internal connections, then pay the difference out of their own budgets.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
ERP (enterprise resource planning) – an industry term for the broad set of activities
supported
by multi-module application software that help a manufacturer or other business
manage the
important parts of its business, including product planning, parts purchasing,
maintaining
inventories, interacting with suppliers, providing customer service, and tracking
orders. ERP can
also include application modules for the finance and human resources aspects of a
business.
Typically, an ERP system uses or is integrated with a relational database system. The
deployment of an ERP system can involve considerable business process analysis,
employee
retraining, and new work procedures.
fat client – a two-tier client/server model for application design in which the business
rules are
tightly integrated and deployed with the code that implements the graphical user
interface. A fat
client is usually deployed on a workstation.
JAD (joint application development) – a methodology introduced by IBM to
facilitate end-user
and developer participation in the application development process
Java – a high-level programming language from Sun Microsystems designed for use
on the
World Wide Web
JPEG (Joint Photographic Experts Group) – a file format for color images and one
of two
graphics file formats supported on the World Wide Web. (The other format is GIF.)
JPEG files
usually end with a .jpg extension.
Kbps (kilobits per second) – a measure of bandwidth (the amount of data that can
flow in a
given time) on a data transmission medium. Higher bandwidths are more conveniently
expressed
in megabits per second (Mbps, or millions of bits per second) and in gigabits per
second (Gbps,
or billions of bits per second).
Kerberos – a private key encryption-based authentication mechanism for network
security,
developed by MIT’s Project Athena
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
LAN (local area network) – a computer network that links multiple workstations and
other
devices in a limited area, typically with a local geographic area. Typically, this might
be within the
area of a small office building. However, Fiber Distributed Data Interface (FDDI)
extends a local
area network over a much wider area. Usually, the server has applications and data
storage that
are shared in common by multiple workstation users. A local area network may serve
as few as
four or five users or, in the case of FDDI, may serve several thousand. The main LAN
technologies are Ethernet, token ring, ARCNET, and FDDI.
laser printer – a non-impact printer that creates, by means of a laser beam directed
on a
photosensitive surface, a latent image which is then made visible by a toner and
transferred and
fixed on paper
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
mail (e-mail) and the World Wide Web (WWW), help public agencies streamline
information
access and conduct business. These tools are used with the NCIIN to facilitate inter-
agency
communication and information processing. These same tools are used for
communications
between public agencies and entities on the Internet, such as other government
organizations,
educational institutions, private businesses, and citizens.
network – (1) A configuration of data processing devices and software connected for
information
interchange (2) A group of nodes and the links interconnecting them (3) The physical
hardware
and software connections between computers. A network allows information to be
shared and
electronic communication to occur (4) A group of two or more computer systems
linked together
network computing – computing performed on geographically dispersed platforms
connected
via a network; also referred to as distributed computing
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
gateway server that separates the enterprise network from the outside network and a
firewall
server that protects the enterprise network from outside intrusion.
public access – the method by which the public accesses data. Web-based application
systems
are frequently used to provide information to the public. In this case, an Internet
application with a
Web front end is developed and a search engine is used to query the data. Also, voice
response
units (VRUs) are implemented to support public information provided through a
phone interface
using a touch-tone phone.
Public Directory Service Protocol – a protocol that governs the setup and
organization of
directories
public key – a value provided by some designated authority as a key that, combined
with a
private key derived from the public key, can be used to effectively encrypt and
decrypt messages
and digital signatures. The use of combined public and private keys is known as
asymmetric
cryptography. A system for using public keys is called a public key infrastructure
(PKI).
publish and subscribe – a messaging technique where one application service
publishes
information. Another application that needs the information subscribes to the
published
information (i.e., a "push" model). Messages containing the new information are
placed in a
queue for each subscriber by the publishing application. When a subscriber is ready to
receive
the new information, it checks for new messages in the message queue.
push technology – the practice or technology of having information brought to you
by an
intelligent agent
PVC (permanent virtual circuit) – a channel through an ATM network provisioned
by a carrier
between two end points, used for dedicated long-term information transport between
locations
QA (quality assurance) – procedures taken to ensure that a company delivers
products that
conform to standards
QOS (Quality of Service) – On the Internet and in other networks, Quality of Service
(QoS) is
the idea that transmission rates, error rates, and other characteristics can be measured,
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
position, phone number, fax number, e-mail address, and the address of your Web site
if you
have one. Many people also include a favorite quote, company motto, or short
personal
statement.
Most e-mail and Usenet news facilities make it possible for you to either create the
signature file
as part of the application or to specify another file you've created with a word
processor. Then,
you tell the facility (usually in an "Options" menu) the name of your signature file and
it
automatically adds it to the note or message template it provides you.
SLA (service-level agreement) – (1) An agreement among two or more parties that
establishes
measurable levels of service and expectations for that service (2) An agreement
between end
users and the help desk defining the boundaries of acceptable service and details the
associated
fees for help desk services rendered. The SLA defines users’ expectations and serves
as a
guidepost for establishing and measuring performance goals.
smart card – in computer security, a credit card-sized device containing an
embedded
microprocessor that stores information. The smart card can be loaded with data, used
for
telephone calling, electronic cash payments, and other applications, and then
periodically
"recharged" for additional use.
SMTP (Simple Mail Transfer Protocol) – the standard transport protocol for
sending messages
from one mail transfer agent (MTA) to another MTA over the Internet. Using MIME
encoding, it
enables the transfer of text, video, multimedia, images, and audio attachments through
e-mail
messages.
SNA (System Network Architecture) – The framework, designed by IBM, which
defines the
structuring of data-communications functions and protocols of the mainframe,
including
networking protocols, administration software, and hardware devices that provide
physical
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
delivery of those protocols. It enables reliable transfer of data among end users and
provides
protocols for controlling the resources of various network configurations. The SNA
network
consists of network accessible units (NAUs), boundary function, gateway function,
and
intermediate session routing function components; and the transport network.
SNADS (Systems Network Architecture Distribution Services) – the SNADS gateway
is an email
gateway that moves and translates messages between an IBM SNADS environment
and the
state's standard Simple Mail Transfer Protocol (SMTP) mail backbone
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
UNIT 11
TEST
Passage 1:
Computer Graphics: Graphics technology has changed vastly in the nearly three
decades since research-educators first started passing their knowledge on to students.
Introductory computer graphics courses are changing their focus and learning
environments. Improvements in hardware and software technology coupled with
changes in preparation, interest and abilities of incoming students are driving the need
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
for curriculum change. Past courses focused on low and intermediate, level rendering
principles, algorithms and software development tools. many of these algorithms have
migrated into hardware. Though important knowledge for advanced graphics
programmers, most graphics applications programmers have no need to study at this
level, much as application programmers have no need to study hardware systems of
assembly level programming. Courses need to focus on intermediate and 3D graphics
Application Programmer Interface (API) into the instruction. This article presents
experiences teaching this focus with both low and high level graphics programming
API's. The experiences were gained in courses at an undergraduate university,
university in multi-day industrial causes for experienced professional programmers.
1. Which one of the following reasons is not the driving force behind the
necessity for the computer graphics curriculum's change?
1) changes in abilities of incoming students.
2) changes in preparation and interest of incoming student.
3) dramatic changes in the principles of the computer graphics.
4)improvement in computer graphics related hardware and software technologies.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Passage 2:
E-Banking and Internet: Westerners are increasingly skipping lines at teller
windows to take care of their banking needs over the internet, according to figures
released Wednesday, November 27, 2002. The nonprofit pew internet and American
life project found online banking is rapidly catching on in the west, as an estimated
thirty seven million Americans now pay bills and transfer funds on the web, more
than twice the number that did so two years ago. on any given day, Internet user are
nearly as likely to check their balance as use instant-messaging software, the survey
found. Thirty-two percent of those surveyed said they did their banking online,
compared with seventeen percent in 2000. while other activities like booking travel
reservations and making purchases remained more popular, the Pew project found
them growing at slower rate. Those surveyed were most likely to cite convenience and
time saved as reasons they banked online.
7. What was the number of Americans who pay bills and transfer funds on
the web two years before the composition of this article?
1) the estimated number could not be determined at all.
2) more than thirty seven millions.
3) less than half of thirty seven millions.
4) about twenty millions.
10. According to this article, which one of the following is not correct?
1) online banking grows fast on the west.
2) pew internet is a nonprofit organization.
3) 32% of those surveyed said they did their banking on the web.
4) more people are using teller windows to take care of their banking needs.
11. According to those who were surveyed, what are the most important
reasons for doing online banking?
1) it is convenient and save their time.
2) internet is available at their workplace.
3) it is less expensive to do their banking on the web.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Passage 3:
China's shift from technological nationalism to a more pragmatic strategy of
developing national capabilities in conjunction with multinational corporations has
transformed its economy. consistent with this transformation, China has revamped its
industrial and technology policies, moving from an isolationist approach aimed at
achieving technological independence to become a major producer of computer
hardware and a major market for information technology products.
In 1990, China had only 500,000 PCs in a country of more than 1.2 billion people.
By 2000, mainland Chinese purchased more than seven million PCs in a year. During
the same time, China's production of computer hardware grew from less than US$ 1
billion to US$ 23 billion.
China's policies clearly drew on the developmental approach of other Asian Pacific
economies such as Japan, Korea, Taiwan and Singapore. Each of these became
Leaders in different segments of the global computer industry through the strong
support of government industrial and technology policies.
11. In what way has China undergone a transformation of it's economy? It
........................
1) has transformed it's corporations.
2) has transformed it's market by globalization.
3) has transformed it's purchase capabilities.
4) moved to more pragmatic strategy of developing it's national capabilities.
12. By reading the above passage, what could you say about china's
technological development in the past decade'? It ………........
1) isn't dependent to change of its policies.
2) has had a rapid growth.
3) has a technological nationalism.
4) has had an isolationist approach.
13. If you were to choose a title for the above passage, which of the following
would best fit with the context of the passage? China's ................
1) computer technology 2) transformation
3) corporations 4) development
Passage 4:
IBM is beginning a large scale autonomic-computing initiative designed to develop
computer systems that run with little or no human involvement. IBM is already
working on several autonomic computing projects, some involving artificial
intelligence; adaptive algorithms; and self-healing technology, which lets systems
keep running even if certain components fail.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Far too much, computer systems work has involved making things faster, larger, et
cetera, without considering reliability, maintainability, availability etcetera.
Autonomic computing would eventually reduce system support costs and would be
most useful in remote areas where human oversight isn't practical, such as in space. In
fact, autonomic systems are years away, although in the nearer term, autonomic
functionality will appear in servers and software.
14. What is meant by autonomic-computing systems? Systems that ...............
1) are revolutionary
2) have and oversight
3) run faster and on a larger scale.
4) have the capability to run with little or no human involvement
16. What is meant by the last sentence of the passage where it says ‘In fact,
autonomic systems are’.
1) for the future
2) nearer in functionality
3) in reach of servers and software
4) operating in the computer technology
Passage 5:
Although Linux has yet to achieve wide popularity in the computer game world, it is
making rapid progress toward becoming the dominant operating system in the other
major entertainment arena: motion pictures. The Linux operating system initially
found a niche for use in computer generated image rendering for film. With the
success of films such as Toy Story and Titanic, most major motion picture studios
now employ CGI and strive to reduce the costs of using this expensive technology.
Given the many systems that run it and the numerous applications that support it,
filmmakers can now use Linux for an animated features entire production process,
including modeling, animation and rendering. Thus, when we see the entire film
industry adopting Linux to remain cost and performance competitive, how can we
help but wonder what new realms Linux may conquer next?
17. According to the passage, which of the following statements can best
describe the role of Linux in today's motion pictures industry? Linux
..............in this arena.
1) must achieve cost and performance competitiveness
2) has become the dominant operating system
3) should strive to reduce the costs
4) has yet to achieve popularity
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Passage 6:
Go-To surveys the history of modern software, from the creation of the first
successful high level language, FORTRAN and its compiler in the 1950s, through to
the open source movement of today. The development of Unix and C, the rise of the
graphical user interface and the creation of the spreadsheet are included among the
events that shaped modern computing. Although some will argue with choices of
topics covered for example, an entire chapter is devoted to Java, while no mention is
made of the development of the internet protocol Go-To is full of fascinating details
about an intangible creation that has had a very tangible impact on the modern world.
20. By reading the above passage, what do you think Go-To is ?
1) a book 2) a survey
3) a journal 4) an article
21. What topic is missing in Go-To?
1) Java 2) fascinating details
3) development of internet protocol 4) development of modern computing
Passage 7:
For intelligent systems research in e-business to have real impact, we need to cross
the existing borders computer science and economic and management sciences. Truly
interdisciplinary progress in science appears difficult to achieve because of the
traditional decomposition into disciplines, which can turn different academic fields
into almost separate cultures. Nevertheless, the contributors to this special issue on
intelligent e-business hope to show how interdisciplinary thinking has helped to
advance e-business. E-business implies that information technology must prove itself
in an interactive and distributed context of economic value creation. Technology push
and market pull both play their role in driving e-business forward.
22. The first paragraph can best summarized as:
1) despite the fact interdisciplinary progress in science seems difficult to
achieve-business scholar try to prove it helpful in this respect.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Passage 8:
Traditional methods of teaching no longer suffice in this technological world.
Currently there are more than 1,000,000 computers in schoolrooms in the United
States. Students, mediocre and bright alike, from the first grade through high school,
not only are not intimidated by computers, but have become avid participants in the
computer epoch.
Kids operating computers implement their curriculum with great versatility. A
music student can program musical notes so that the computer will play Beethoven or
the Beatles. For a biology class, the computer can produce a picture of the intricate
biology in a profound way. A nuclear reactor is no longer an enigma to students who
can see its workings in minute detail on a computer. In Wisconsin, the Chippewa
Indians are studying their ancient and almost forgotten language with the aid of a
computer. More commonly, the computer is used for drilling math and language
concepts so that youngsters may learn at their own speed without trying the patience
of their human teachers. The simplest computers aid the handicapped, who learn more
rapidly from the computer than from humans. Once irksome, remedial drills and
exercises now on computer are conducive to learning because the machine responds
to correct answers with praise and to incorrect answers with frowns and even an
occasional tear.
Adolescents have become so exhilarated by computers that they have developed
their own jargon, easily understood by their peers but leaving their disconcerted
parents in the dark. They have shown so much fervor for computers that they have
formed computer clubs, beguile their leisure hours in computer stores and even attend
computer camps. A Boy Scout can get a computer merit badge. One ingenious young
student devised a computer game for Atari that will earn him $100,000 in royalties.
This definitely the computer age. It is expected that in 2-3 years there will be
between 3,000,000 and 6,500,000 computers in American schools. Manufactures of
computers are presently getting tax write-offs for donating equipment to colleges and
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
universities and are pushing for legislation to obtain further deductions for
contributions to elementary and high schools. Furthermore, the price of computers has
steadily fallen to the point where a small computer for home or office is being sold for
less than $100. At that price every class in the country will soon have computer kids.
24. The expression traditional methods of teaching in the first sentence
refers to ...............
1) technological methods of teaching
2) teachers, textbooks and class drills
3) teachers who punish students for not learning
4) teaching the students with the aid of computers
27. According to the passage, one exceedingly clever student has ...............
1) overcome a handicap 2) invented a video game
3) learned an Indian language 4) played music on a computer
30. In next 2-3 years it is estimated that the number of computers in schools
will ......................
1) triple at least
2) continue as it is today
3) be at least twice that of today
4) be considerably lower than the number today
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
1) rising
2) too high for most schools
3) affordable for most school
4) preventing schools from buying computers
Determine the meaning of the underlined word from the context of above passage
(8) from 32 to 35.
32. He devised a computer game and sold it to Atari.
1) bought 2) played
3) invented 4) divided
Passage 9:
Human memory formerly believed to be rather inefficient, is really more sophisticated
than that of a computer. Researchers approaching the problem from a variety of points
of view have all concluded that there is a great deal more stored in our minds than has
been generally supposed. Dr. Wilder Penfield. A Canadian neurosurgeon, proved that
by stimulating their brains electrically, he could elicit the events supposedly forgotten
for many years suddenly emerged in detail.
The memory trace is the term for whatever is the internal representation of the
specific information about the event stored in the memory. Assumed to have been
made by structural changes in the brain, the memory trace is not subject to direct
observation but is rather a theoretical construct that we use to speculate about how
information presented at a particular time can cause performance at a later time. Most
theories include the strength of the memory trace as a variable in the degree of
learning, retention and retrieval possible for a memory. One theory is that the fantastic
capacity for storage in the brain is the result of an almost unlimited combination of
interconnections between brain cells, stimulated by patterns of activity. Repeated
references to the same information supports recall. Or, to say that another way,
improved performance is the result of strengthening the chemical bonds in the
memory.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
39. How did Penfield stimulate dreams and other minor events from the
past?
1) By surgery 2) By repetition
3) By electric stimulation 4) By chemical stimulation
40. According to the passage, the capacity for storage in the brain ................
1) is not influenced by repetition
2) is stimulated by patterns of activity
3) has a limited combination of relationships
4) can be understood by examining the physiology
41. All of the following are true of a memory trace EXCEPT that .................
1) it is able to be observed
2) it is a theoretical construct
3) it is related to the degree of recall
4) it is probably made by structural changes in the brain
Passage 10:
Electronic technology has produced significant changes in the way that humans
interact. Before telephones, computers and digital pagers, people communicated
primarily by writing. We had to sit down, compose our thoughts and then spend some
time writing them down on paper. There was also a delay between the expression of
our ideas and their reception on the other end, but folks were patient enough to wait.
With technology, however, communication happens in "real time". We don't take time
before had to consider what we want to say and how to say it best. We express
ourselves directly and bluntly. Now we are irritated when no one answers the phone,
or get overly anxious if we don’t receive an immediate response to anew mail or page.
We want all of our communication to happen instantaneously.
42. According to the passage, which of the following changes in human's
interactions is not a product of electronic Technology?
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
44. The author of this passage probably believes that the effects of
technology on human communication are:
1) mostly negative 2) almost negligible
3) not very important 4) not well understood
Passage 11:
While film used in cinema contains pigments that create an infinitely large number of
color variations, TV sets combine discrete amounts of red, green and blue light to
create a much more limited color range. To produce more colors, TV sets would have
to combine purer, or more saturated, red, green and blue by using narrowband light
filters that select colors more precisely but diminish brightness at the same time.
Genoa Color Technologies Ltd. has developed the software and hardware necessary
to close this gap and make TV images more cinema-like without the unwanted
dimming side effect. The trick is to extra primaries, the basic colors that, combined,
form all others. By adding Yellow and Cyan (a light blue) to standard red, green and
blue, a display that could normally generate about 16.7 million colors would now be
able to show more than one trillion.
Genoa developed a color conversion algorithm that runs in a special microchip to
be added to a television's imaging circuit. The algorithm gets a color value -from a
DVD, for example, that the television would originally exhibit as a combination of
three primaries -and finds how to best represent it as a combination of five primaries.
45. According to the passage, the Genoa Technologies Ltd. is a company ...........
1) producing more colors for its TV sets.
2) manufacturing TV sets with better resolution.
3) that has developed a combination of five primaries.
4) that has tried to bring close the quality of a TV image to that of the cinema.
46. By adding the two extra colors, the ratio of the colors that can he
generated to those of the old standard is .................
1) 10 to 1. 2) 40 to 1.
3) 60 to 1. 4) 90 to 1.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
49. According to the passage, Genoa Color Technologies Ltd. has managed
to .................of the images.
1) close the gap between the TV image and the film image.
2) increase the gap between the TV image and the film image.
3) increase the brightness and the unwanted dimming side effect.
4) diminish the brightness and the unwanted dimming side effect.
Passage 12:
The MP3 audio-compression format is a technical standard-turned-fashion fold MP3:
players have become ubiquitous on city streets in many parts of the world. It's
probably no surprise that, as television followed radio, the next standard-turned-fad
will likely be a video-compressible format: MPEG-4.
MPEG-4 became an internationally recognized standard in 2000. The visual
equivalent to MP3, it was developed by the same organization, the Moving Picture
Experts Group, an international working group operating under the auspices of the
International. Organization for Standardization and the International Electrotecnical
Commission. Like MP3, MPEG-4 offers very compact file compression at selectable
data r:1tes. This allows losers to make 11 tradeoff between quality and required
storage space. MPEG-4 can produce images superior to those produced \with MPEG-
2 (the DVD recording format), with only one-third to three-eighths the data.
With the new availability of high-quality digital video in manageable file sizes,
pocket widco players and camcorders \with no moving parts are starting to appear, as
well as hard drive-based video jukeboxes holily dozens offuil-length movies. Soon,
people will carry their movies, along with their music, in their shirt pockets.
Some of these new players and camcorders store wideo files in flash memory, such
as the Secure Digital (SD) memory cards used in digital cameras and PDAs.
50. According to the above passage, what is/are the ever present technical
standard(s) in a number of places in the world at present?
1) MP3 2) MPEG-2
3) MPEG-4 4) MPEG-4 and MP3
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
52. If you were asked to identify the most conspicuous quality for MP3 and
MPEG-4 standards, which of the following would you choose?
1) Secure Digital memory. 2) High quality digital video.
3) Compact file compression. 4) Video-compression format.
Passage 13:
XML, the extensible mark-up language, structure as well as good looks to a
document. While HTML can format things like things like headlines and tables and is
considered as the current language, XML can define things like dates. invoice
numbers and prices and is assumed to able to replace the HTML in a few years.
This means you can build data, files, Web pages, or documents that can he probed
with simple questions by relying on semantics and logic instead of key words that this
in turn speeds up any search you need to make.
To make this kind of smart searching possible, one further concept comes into play:
the resource description format (RDF), a way of specifying the relationship between
entities. It defines how pieces of data are represented in a series of documents, acting
like a dictionary of definitions. For example: is "spectrum" a scientific term defining a
range of electromagnetic frequencies, a slice of opinions of viewpoints is sociology or
politics, or a well-known magazine? The builder of the database gets to decide, or .
adopt a definition suggested in some other already defined RDF. This allows you to
define an ontology, or the relationships among RGF statements, linking various data
elements in documents and allowing logical inferences to be made. An ontology is a
"family tree" or a cluster of related concepts; for example, to medical database, all
words ending in -oma are types of cancer.
53. According to the passage, what is the principal feature of the XML'?
1) Building data files. 2) Formatting the text.
3) Relying on semantics. 4) Having the ability to infer.
54. What does the passage reveal to the reader about the two languages?
1) XML is the customary language that has replaced the HTML.
2) HTML and XML are both used but each for different purposes.
3) XML is more popular than HTML as it is capable to serve more purposes.
4) That HTML is the customary language for the present that may be shortly replaced
by XML.
55. What is meant by an RDF (the Resource Description Format) statement?
1) A dictionary.
2) A smart search.
3) A list of data represented in a series of documents.
4) A linking of different data elements in documents that allows logical inferences to
be made
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Passage 14:
It turns out that your kids are right once again. According to a recent report in Nature,
playing video games of the kill-or-killed variety is good for their brain-power.
Not only that: if they are playing these games on the Sony Play station 2 toy got
them last Christmas and get bored with Tony Hawk's ProSkater 4, your kid and his or
her closest 99 buddies can bundle their PS2s together and do their quantum chromo
dynamics homework.
This second bit of news-using Sony Play stations to build a specialized
supercomputer was announced by researchers at the National Center for
Supercomputing Applications and the computer science department at the University
of Illinois in Urbana. These tinkerers paid about $50,000 and got computing power
that would otherwise cost at least five times as much. They wanted to learn if the
sophisticated graphics processor used in the Sony Play station to run slick games
could also be used to solve big problems in particle physics.
While hardly a threat to supercomputing giants like IBN, the achievement illustrates
the point that consumer electronics has now become a leading edge of the computer
industry. Advances are no longer trickling down to these devices from grand
government projects but surging up from this innovation hot spot. Although some
manufacturers have gone to great lengths to prevent unusual uses of their consumer
equipment, it is hoped that most would adopt Sony's tinkerer-friendly attitude,
allowing this hot spot to percolate Upward as fast as possible.
56. According to the passage, what is the first bit of news about Sony play
stations?
1) Kide like to play the kill-or-be-killed video games.
2) Kide get bored soon from games played on the Sony Play station.
3) Kide like to play kill-or-be-killed games on the Sony Play station 2.
4) Unlike the popular opinion, the kill-or-be-killed video games can be good for
children's brain power.
57. What have the researchers at the National Center for Supercomputing
Applications and the computer science department at the University of Illinois
at Urbana accomplished with the help of Sony Play stations?
1) To become Sony's tinkerers hot spot.
2) To build a specialized supercomputer.
3) To become a leading edge of computer industry.
4) To pay one fifth of the actual cost for the computer science.
58. By reading the passage, which of the following can best reveal who a
tinkerer may be ?
1) Children playing with Play stations.
2) Researchers working at scientific centers.
3) Manufacturers producing consumer electronics.
4) People who try to repair or improve something in a casual way
Passage 15:
Within the next several years, we'll be awash in powerful, cheap sensor radio-
frequency ID (RFID) tags that track objects (and the people who to be wear riding, or
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
chatting into them); biometric sensors that will identify us by our unit irises,
fingerprints, voices, walking patterns, or other physical quirks; Glo Positioning
System receivers, embedded into all manner of things, able to track u: within a meter;
and tiny, high-resolution digital still and video cameras, also built everything from
cell phones to wallpaper.
The resulting torrent of data will cascade into government and corporate systems,
the Internet. Facts and information that are largely incoherent overwhelming in
volume and detail will accumulate in databases too scattered numerous-and valuable
-to be shut off completely from the rest of cyberspace.
59. What is meant by cyberspace as given on the last line of the passage?
1) Databases. 2) The Internet.
3) The information world. 4) The cascading torrent of data.
60. If you were asked to choose the best title for the above passage which oj
followings would it be?
1) The Cheap Sensors. 2) The Tracking Sensors.
3) The Ubiquitous Sensors. 4) The Omnipotent Sensors.
Exercises
Read the next page texts: A, B and C then: complete table.
A B C
1. Area of IT
2. Predictions
3. Comments
Text A.
Telecoms applications will soon be bundled together in much the same way as office
application suites are today. A major example is the electronic marketplace, which will bring
customers and suppliers together in smart databases and virtual environments, with ID
verification, encryption and translation. It will then implement the billing, taxation and
electronic funds transfer, while automatically producing accounts and auditing. The whole
suite of services will be based on voice processing, allowing a natural voice interface to talk
to the computer, all the AI to carry out the request and voice synthesis and visualization
technology to get the answer out.
Electronic money will be very secure but much more versatile than physical
alternatives. E-cash can be completely global and could be used as a de facto standard. It does
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
not have to be linked to any national currency, so can be independent of local currency
fluctuations. Its growing use on the Net will lead to its acceptance on the street and we may
hold a large proportion of our total funds in this global electronic cash. People will
increasingly buy direct from customized manufacturers. Shops will be places where people
try on clothes, not buy them. Their exact measurements can be sent instantly to the
manufacturer as soon as they have chosen an outfit. The shops may be paid by the
manufacturer instead.
Text B.
Employment patterns will change, as many jobs are automated and new jobs come into
existence to serve new technologies. Some organizations will follow the virtual company
model, where a small core of key employees is supported by contractors on a project by
project basis, bringing together the right people regardless of where they live. The desks they
will use will have multiple flat screens, voice interfaces, computer programs with human-like
faces and personalities, full-screen videoconferencing and 3D sound positioning. All this will
be without any communication cables since the whole system uses high capacity infrared
links. The many short-term contractors may not have enough space in their homes for an
office and may go instead to a new breed of local telework centre.
Of course, workers can be fully mobile and we could see some people abandon offices
completely, roaming the world and staying in touch via satellite systems. Even in trains and
planes there may be infrared distribution to each seat to guarantee high bandwidth
communication. One tool they may have in a few years is effectively a communicator badge.
This will give them a voice link to computers across the network, perhaps on their office
desk. Using this voice link, they can access their files and email and carry out most computer-
based work. Their earphones will allow voice synthesizers to read out their mail and glasses
with a projection system built into the arms and reflectors on the lenses will allow a head-up
display of visual information. Perhaps by 2010, these glasses could be replaced by an active
contact lens that writes pictures directly onto the retina using tiny lasers.
Text C.
Finally to the very long term, by around 2030, we may have the technology to directly link
our brain to the ultra-smart computers that will be around then, giving us so much extra
brainpower that we deserve a new name, Homo Cybernetics. In much the same time frame,
geneticists may have created the first biologically optimized humans, Homo Optimus. It
would make sense to combine this expertise with information technology wizardry to make
something like the Borg, Homo Hybridus, with the body of an Olympic athlete and a brain
literally the size of the planet, the whole global superhighway and every machine connected
to it. Over time, this new form may converge with the machine world, as more and more of
his thoughts occur in cyberspace. With a complete backup on the network, Homo Hybridus
would be completely immortal. Ordinary biological humans would eventually accept the
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
transition and plain old Homo Sapiens could become voluntarily extinct, perhaps as early as
2200.
5. Complete the gaps in this text on operating systems using these linking words and
phrases:
although in addition
because such as
but therefore
The user is aware of the effects of different applications programs ……….……
operating systems are invisible to most users. They lie between applications programs,
………………. word-processing and the hardware. The supervisor program is the most
important. It remains in memory, ……………… it is referred to as resident. Others are called
non-resident ………. they are loaded into memory only when needed. Operating systems
manage the computer’s resources, ……….…….. the central processing unit,
………………….. they establish a user interface and execute and provide services for
applications software, ………..…….. input and output operations are invoked by applications
programs, they are carried out by the operating system.
6. Some verbs beginning or ending with -en- have a causative meaning. Replace the
words in italics in these sentences with the appropriate form of -en- verb from this
list.
enable encrypt ensure encourage
encode enhance enlarge
heighten widen brighten fasten
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
1. A MIDI message makes sound into code as 8-bit bytes of digital information.
2. The teacher is using a new program to give courage to children to write stories.
3. The new version of SimCity has been made better in many ways.
4. A gateway makes it possible for dissimilar networks to communicate.
5. You can convert data to secret code to make it secure.
6. Make sure the machine is disconnected before you remove the case.
7. Designers can offer good ideas for making your website brighter.
8. Electronic readers allow you to make the print size larger.
9. Programmers write software which makes the computer able to carry particular tasks.
10. You can make the picture on your monitor wider.
7. Read the following passage (A) and then explain how some drivers solve this
problem for themselves.
Passage A:
In the last ten years, police have installed speed trap units on many busy roads. These contain
a radar set, a microprocessor and a camera equipped with a flash. The radar sends out a beam
of radio waves at a frequency of 24 gigahertz. This is equivalent to a wavelength of 1.25 cms.
If a car is moving towards the radar, the reflected signal will bounce back with a slightly
smaller wavelength. If away from the radar, the waves will reflect with a slightly longer
wavelength. The microprocessor within the unit measures the difference in wavelength
between outgoing and returning signals and calculates the speed of each vehicle. If it is above
the speed pre-set by the police, the camera takes a picture of the vehicle. The information is
stored on a smart card for transfer to the police computer. The owner of the vehicle can then
be traced using the Driver and Vehicle Licensing Center database.
Now compare your answer with the following passage (B):
Passage B:
Some drivers have now got used to these traps. They slow down when they approach one to
ensure that the camera is not triggered. They speed up again as soon as they have passed. This
is known as ‘surfing’. One way of outwitting such motorists is a new computerized system.
This consists of two units equipped with digital cameras positioned at a measured distance
apart. The first unit records the time each vehicle passes it and identifies each vehicle by its
number plates using Optical Character Recognition (OCR) software. This information is
relayed to the second unit which repeats the exercise. The microprocessor within the second
unit then calculates the time taken by each vehicle to travel between the units. The
registration numbers of those vehicles exceeding the speed limit are relayed to police
headquarters where a computer matches each vehicle with the DVLC database. Using mail-
merge a standard letter is then printed off addressed to the vehicle owner.
Structure
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
The -ing form is also used after prepositions. This includes to when it is a preposition and not
part of the infinitive. For example:
4. Without the user being aware of the details, the operating system manages the
computer’s resources.
5. We begin by focusing on the interaction between a user and a PC operating system.
6. We look forward to having cheaper and faster computers.
Exercises
1. Rewrite each of these sentences like this:
An important function of the operating system is to manage the computer’s resources.
Managing the computer’s resources is an important function of the operating system.
1. One task of the supervisor program is to load into memory non resident programs as
required.
2. The role of the operating system is to communicate directly with the hardware.
3. One of the key functions of the operating system is to establish a user interface.
4. An additional role is to provide services for applications software.
5. Part of the work of mainframe operating systems is to support multiple programs
and users.
6. The task in most cases is to facilitate interaction between a single user and a PC.
7. One of the most important functions of a computer is to process large amounts of
data quickly.
8. The main reason for installing more memory is to allow the computer to process
data faster.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Vocabulary section
This part contains entries for some keywords like flash-cards. In order to study vocabulary
efficiently, you must have a study plan and follow it carefully.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
In these flash-cards, direct under the word, you will find other forms of the same word.
These words have the same general meaning; they represent the different parts of speech of
the word. For each of the forms, the part of speech is given. Also you can observe two
examples of using the keywords and other parts.
The keyword is then, defined in clear, easy to understand English.
aggravating adj. making worse; annoying
n. aggravation syn. irritating
v. aggravate
The aggravating delay was caused by road repairs.
The shortage of work aggravated the crisis in the small town.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
cables or to many other circuits (4) A circuit that sends small electronic signals to a
device (5)
Software that interacts with the operating system to control communications
equipment and
facilitate the transfer of information to and from the network. Examples include
software needed
to support printers, a pointer device, and other hardware.
fat server – a two-tier client/server model for application design in which the
business rules are
tightly integrated and deployed with the code that performs data access. A fat server is
usually
deployed on a server.
FDDI (Fiber Distributed Data Interface) – a WAN technology for wiring and
access control.
FDDI offers operating speeds of 100 megabits per second (Mbps) and is a good
choice for a
backbone network solution. FDDI is a standard for data transmission on fiber optic
lines in a local
area network that can extend in range up to 200 km (124 miles). The FDDI protocol is
based on
the token ring protocol.
In addition to being large geographically, an FDDI local area network can support
thousands of
users. An FDDI network contains two token rings, one for possible backup in case the
primary
ring fails. The primary ring offers up to 100 Mbps capacity. If the secondary ring is
not needed for
backup, it can also carry data, extending capacity to 200 Mbps. The single ring can
extend the
maximum distance; a dual ring can extend 100 km (62 miles).
federated data – common data elements that are defined consistently across the
enterprise,
even if located in multiple places. It is stored and maintained once whenever possible,
accessed
by each system that needs it, and collection, verification, storage, and maintenance are
typically
all in one place.
FTP (File Transfer Protocol) – in TCP/IP, an application protocol used for
transferring files to
and from host computers. FTP, a standard Internet protocol, is the simplest way to
exchange files
between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP),
which transfers
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
displayable Web pages and related files, and the Simple Mail Transfer Protocol
(SMTP), which
transfers e-mail, FTP is an application protocol that uses the Internet's TCP/IP
protocols.
FTP is commonly used to transfer Web page files from their creator to the computer
that acts as
their server for everyone on the Internet. It's also commonly used to download
programs and
other files to your computer from other servers. As a user, you can use FTP with a
simple
command line interface (for example, from the Windows MS-DOS Prompt window)
or with a
commercial program that offers a graphical user interface (GUI). Your Web browser
can also
make FTP requests to download programs you select from a Web page.
gateway – (1) A functional unit that interconnects two computer networks with
different network
architectures. A bridge interconnects networks or systems with the same or similar
architectures.
(2) In TCP/IP, a device used to connect two systems that use either the same or
different
communications protocols (3) The combination of machines and programs that
provide address
translation, name translation, and systems services control point rerouting between
independent
SNA networks to allow those networks to communicate (4) Hardware or software that
handles
communication between two dissimilar protocols. In the network for an enterprise, a
computer
server acting as a gateway node is often also acting as a proxy server and a firewall
server.
Gateways also involve the use of routers and switches.
Gbps – billions of bits per second; a measure of bandwidth on a digital data
transmission medium
such as optical fiber. With slower media and protocols, bandwidth may be in the
Mbps (millions of
bits or megabits per second) or the Kbps (thousands of bits or kilobits per second)
range.
GIF (Graphics Interchange Format) – a file format for images. GIF is commonly
used on the
World Wide Web.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
electronic form
home page – the set of files containing related information coded in Hypertext
Markup Language
(HTML) and placed on a computer linked to the Internet and available to users on the
Internet via
a Universal Resource Locator (URL) address.
(1) For a Web user, the home page is the first Web page that is displayed after starting
a Web
browser like Netscape's Navigator or Microsoft's Internet Explorer. The browser is
usually
preset so that the home page is the first page of the browser manufacturer. However,
you
can set it to open to any Web site.
(2) For a Web site developer, a home page is the first page presented when a user
selects a site
or presence on the World Wide Web. The usual address for a Web site is the home
page
address, although you can enter the address (URL) of any page and have that page
sent to
you.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
or look for other events and analyst agents that not only gather but also organize and
interpret
information for you. The practice or technology of having information brought to you
by an agent
is sometimes referred to as push technology.
last-mile technology – any telecommunications technology, such as wireless radio,
that carries
signals from the broad telecommunication infrastructure along the relatively short
distance
(hence, the "last mile") to and from the home or business. Or to put it another way:
the
infrastructure at the neighborhood level. In many communities, last-mile technology
represents a
major remaining challenge to high-bandwidth applications such as on-demand
television, fast
Internet access, and Web pages full of multimedia effects. Today, in addition to "plain
old
telephone (dial-up) service," last-mile technologies that deliver voice, data, and TV
can include:
ISDN, DSL over existing telephone twisted-pair lines, cable and the cable modem for
data (using
the same installed coaxial cable that already is used for television), and wireless,
including
services such as DirecTV.
LATA (local access transport area) – a term in the U.S. for a geographic area
covered by one
or more local telephone companies, which are legally referred to as local exchange
carriers
(LECs). A connection between two local exchanges within the LATA is referred to as
intraLATA.
A connection between a carrier in one LATA to a carrier in another LATA is referred
to as
interLATA. InterLATA is long-distance service. The current rules for permitting a
company to
provide intraLATA or interLATA service (or both) are based on the
Telecommunications Act of
1996.
Level 2 Support – a help desk function tier. Level 2 client support provides advanced
technical
expertise to the Level 1 client contact points. Their responsibility is to analyze the
requests routed
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
to them and resolve the problems. Resources at this level can be composed of staff
specialists
and/or third-party providers/vendors.
Level 3 Support – a help desk function tier. Level 3 client support is composed of
highly
specialized technical experts. Calls that cannot be solved at Levels 1 and 2 are routed
to this
level. Resources at this level can be composed of staff specialists and/or third-party
providers/vendors.
leveraged management of IT – the practice of constructing and coordinating
operational and
business functions across organizational and geographic boundaries to provide service
and
support for the comprehensive IT environment
list server – a program that handles subscription requests for a mailing list and
distributes new
messages, newsletters, or other postings from the list's members to the entire list of
subscribers
as they occur or are scheduled. (A list server should not be confused with a mail
server, which
handles incoming and outgoing e-mail for Internet users.) Two commonly used list
servers are
listserv and Majordomo. Lyris is a list server that is free for users maintaining very
small mailing
lists and scales up in price for those managing thousands of mailing list subscribers.
LOB (line of business) – an individual business unit within a larger organization
logical application boundary – a boundary that exists between related application
systems
look and feel – the appearance and behavior of a graphical user interface (GUI) to the
end user,
determined by the tools and style guide provided by the vendor
loosely coupled – the method of n-tier application development where services and
components
are implemented as separate tiers. If a tier changes, it is easy to deploy the change
since it does
not affect other tiers.
LPAR (logical partition) – (1) Physical partition that is divided into a greater
number of partitions
using software. The number of logical partitions within a logical volume is variable.
(2) In the IBM
mainframe operating environment, this is the concept where one physical computer
system can
be divided up into multiple mainframe operating environments utilizing software
partitioning. This
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
allows ITS to partition a single physical computer into several different "virtual"
computers, which
can be started and stopped separately while sharing the same hardware resources.
machine language – the language that a computer uses to process commands.
Machine
languages are built from numbers only and are specific to each computer platform.
mailbox – an electronic storage area that manages e-mail for a particular end user
mainframe – (1) A computer, usually in a computer center, with extensive
capabilities and
resources to which other computers may be connected so that they can share facilities
Note: the
term usually refers to the hardware only: main storage, execution circuitry, and
peripheral units.
(2) A large and powerful computer that is capable of supporting thousands of
simultaneous users
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
system under actual but limited operating conditions and which will then be
used to test the
definitive version of the system
PIO (Public Information Officer) – The person in this position handles press
releases as well as
any external communication that staff of the agency creates. The PIO is also
responsible for
internal communications.
PIM (personal information manager) – software application akin to an
appointment book that
enables the user to organize personal information
PKI (public key infrastructure) – enables users of a basically unsecure
public network— such as
the Internet— to securely and privately exchange data and money through the
use of a public and
a private cryptographic key pair that is obtained and shared through a trusted
authority. The
public key infrastructure provides for digital certificates that can identify
individuals or
organizations and directory services that can store and, when necessary,
revoke them.
A public key infrastructure consists of: a certificate authority (CA) that issues
and verifies digital
certificates; a registration authority (RA) that acts as the verifier for the
certificate authority before
a digital certificate is issued to a requestor; one or more directories where the
certificates (with
their public keys) are held (usually in an ITU X.500 standard directory); and a
certificate
management system.
platform – a combination of computer hardware and operating system
software
platform-independent languages – high-level computer programming
languages that can
compile and execute programs that can be deployed on multiple platforms
PPTP (Point-to-Point Tunneling Protocol) – a protocol (set of
communication rules) that allows
corporations to extend their own corporate network through private "tunnels"
over the public
Internet. Effectively, a corporation uses a wide-area network (WAN) as a
single large local area
network. A company no longer needs to lease its own lines for wide-area
communication but can
securely use the public networks. This kind of interconnection is known as a
virtual private
network (VPN).
point-to-point – pertaining to data transmission between two locations
without the use of any
intermediate display station or computer
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
higher volume of transactions or data than the application was originally deployed to
support (2)
The ability to quickly meet demands for increased performance: processing power,
network
connectivity, or data storage. In information technology, scalability seems to have two
uses.
(A) It is the ability of a computer application or product (hardware or software) to
continue to
function well as it (or its context) is changed in size or volume in order to meet a user
need.
Typically, the rescaling is to a larger size or volume. The rescaling can be of the
product itself
(for example, a line of computer systems of different sizes in terms of storage, RAM,
and so
forth) or in the scalable object's movement to a new context (for example, a new
operating
system).
(B) It is the ability not only to function well in the rescaled situation, but also to
actually take full
advantage of it. For example, an application program would be scalable if it could be
moved
from a smaller to a larger operating system and take full advantage of the larger
operating
system in terms of performance (user response time and so forth) and the larger
number of
users that could be handled. It is usually easier to have scalability upward rather than
downward since developers often must make full use of a system's resources (for
example,
the amount of disk storage available) when an application is initially coded. Scaling a
product
downward may mean having to achieve the same results in a more constrained
environment.
scheduling and calendaring – a technology that provides, by combining with an
organization's
overall groupware system(s), a methodology for coordination and communications of
individual
and group activities and plans
security – protection of the physical, intellectual, and electronic assets of an
enterprise, including
its security policies, network access controls, virus protection, network
administration, and
workstation security
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
security services – risk assessment and protection of the physical, intellectual, and
electronic
assets of an enterprise, including security policies, network access, virus protection,
firewalls,
NOS administration and workstation security
SEI (Software Engineering Institute) – founded by the U.S. Department of Defense
to advance
the practice of software engineering
server – (1) A functional unit that provides shared services to workstations over a
network, for
example, a file server, a print server, a mail server (2) In TCP/IP, a system in a
network that
handles the requests of a system at another site, called a client/server (3) Software that
provides
functionality that can be requested by other software (4) A platform on which
software executes.
Server hardware is often referred to by the type of software that executes on it, such
as
"application server" or "database server," or by the operating system that it executes,
such as
"HP server" or "Novell Server."
service – (1) Functionality that can be requested by a software component (2) A
software
component that provides functionality that can be requested by other software
service broker – a generic middleware interface for application communication.
Common
middleware services are combined together and a single API is provided to meet
inter-application
communication needs.
service-oriented – an adjective describing software or services that are adapted to
provide a
service
SGML (Standard Generalized Markup Language) – international standard way of
identifying
the basic structural elements of a text document. SGML addresses only the structure
of a
document, not its format or presentation.
storage management – a set of policies and operational procedures required to
maintain disk,
tape, and optical storage media
store and forward – a messaging technique where messages are stored in a message
queue
and forwarded to a software service as needed. Store and forward messaging is similar
to doing
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
business through voice mail. The voice mailbox is the queue. Incoming calls are
retrieved when it
is convenient, they are prioritized, and calls are returned at a convenient time.
stovepiped – generally refers to components that have poor integration capabilities
summary data – high-level data representing a summary of detailed data, such as
totals, yearto-
date information, etc.
support services – a classification for the operating system components of a service-
oriented
architecture, such as printing, faxing, and imaging
synchronous processing – a method of communication that requires an immediate
response
before the requester can continue processing
tunneling – Relative to the Internet, tunneling is using the Internet as part of a private
secure
network. The "tunnel" is the particular path that a given message or file might travel
through the
Internet. A protocol or set of communication rules called Point-to-Point Tunneling
Protocol (PPTP)
has been proposed that would make it possible to create a virtual private network
(VPN) through
"tunnels" over the Internet. This would mean that companies would no longer need
their own
leased lines for wide-area communication but could securely use the public networks.
two-tier – a client/server application in which the code that implements the business
rules is
monolithic and is tightly coupled to either the code that implements the user interface
or to the
code that implements data access
UI (user interface) – a manner of presentation allowing applications to communicate
with people.
User interfaces include graphical user interfaces (GUIs), terminal or character-based
interfaces,
VRUs, and credit card readers.
UPS (uninterruptible power supply) – a device that allows your computer to keep
running for at
least a short time when the primary power source is lost. It also provides protection
from power
surges. A UPS contains a battery that "kicks in" when the device senses a loss of
power from the
primary source. If you are using the computer when the UPS notifies you of the power
loss, you
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
have time to save any data you are working on and exit gracefully before the
secondary power
source (the battery) runs out. When all power runs out, any data in your computer's
random
access memory (RAM) is erased. When power surges occur, a UPS intercepts the
surge so that
it doesn't damage your computer. Software is available that automatically backs up
(saves) any
data that is being worked on when nthe UPS becomes activated.
URL (Uniform Resource Locator) – a URL is the address of a file (resource)
accessible on the
Internet. The type of resource depends on the Internet application protocol. Using the
World Wide
Web's protocol, the Hypertext Transfer Protocol (HTTP), the resource can be an
HTML page, an
image file, a program such as a CGI application or Java applet, or any other file
supported by
HTTP. The URL contains the name of the protocol required to access the resource, a
domain
name that identifies a specific computer on the Internet, and a hierarchical description
of a file
location on the computer. An example of an URL is: http://www.its.state.nc.us.
user – an active participant, person, or thing using a computer, computer program, or
services of
an enterprise
user authentication – application security code that requires both a user name and
password to
ensure that a user requesting access to a secured system or application is an authorized
user
user authorization – a security feature that identifies specific end users, by user ID,
as having
the authority to use or access an application or system
user interface – a manner of presentation allowing applications to communicate with
people.
User interfaces include graphical user interfaces (GUIs), terminal or character-based
interfaces,
voice recognition units (VRUs), and credit card readers
VAN (virtual area network) – a network on which users are enabled to share a more
visual
sense of community through high bandwidth connections. As conceived by PennWell
Media
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Online, a virtual area network is something like a metropolitan area network (MAN)
or extended
local area network (LAN) in which all users can meet over high-bandwidth
connections, enabling
"face-to-face" online "coffeehouses," remote medical diagnosis and legal
consultation, and online
corporate or extra-corporate workgroups, focus groups, and conferences.
A VAN requires multi-megabyte data flow and can be implemented through the use
of ADSL but
more likely through the installation of cable modems. Since the high-bandwidth
connections imply
a common infrastructure, the first VANs are likely to be local or regional. However, a
VAN can
also be national or international in geographic scope, assuming all users share similar
capabilities.
Vantive – the customer support system software used by ITS
vCalendar – an industry standard format for exchanging scheduling and activity-
recording
information electronically. If someone sends you their week's schedule in a vCalendar
attachment
to an e-mail note, you can drag-and drop it (or otherwise move it) to a personal
information
manager (PIM) type of application program and integrate with or relate it to your own
schedule.
vCalendar was developed along with the vCard electronic business card specification.
vCard – an electronic business (or personal) card and also the name of an industry
specification
for the kind of communication exchange that is done on business or personal cards.
You may
have seen a vCard attached to an e-mail note someone has sent you. Because vCard is
a
published industry specification, software application developers can create programs
that
process vCards by letting you view them, or drag-and-drop them to an address book
or some
other application. vCards can include images and sound as well as text.
VDC (virtual data center) – a concept encouraging the development of standard
network
configurations that are deployed locally but managed centrally. A VDC allows central
management of multiple instances of network configurations at remote sites and
behaves as if
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
intranets.
VRU (voice response units) – an interface that allows users to communicate with an
application
via a telephone
Web browser – a software application used to locate and display Web pages from
Web sites on
the Internet
Web hosting – also known as Web site hosting; the business of housing, serving, and
maintaining files for one or more Web sites
Web page – an electronic document stored in HTML format that is accessible
through a Web site
Web site – an electronic collection of Web pages accessible through an intranet in an
organization or through the Internet on the World Wide Web. The initial connection
to a Web site
is through a home page. The Web site may contain links to other Web pages or sites.
white paper – an article that states an organization's position or philosophy about a
social,
political, or other subject, or a not-too-detailed technical explanation of an
architecture,
framework, or product technology. Typically, a white paper explains the results,
conclusions, or
construction resulting from some organized committee or research collaboration or
design and
development effort.
In information technology, a white paper is often a paper written by a lead product
designer to
explain the philosophy and operation of a product in a marketplace or technology
context. Many,
if not most, Web sites for software products include a white paper in addition to a
frequently
asked questions (FAQ) page and more detailed product specifications.
In government, a white paper is often a policy or position paper. The U.S.
Government's June
1998 policy statement on the Management of Internet Names and Addresses (known
generally
as "The White Paper") is an example of great interest to many Internet users.
wireless – Wireless refers to a communications, monitoring, or control system in
which
electromagnetic or acoustic waves carry a signal through atmospheric space rather
than along a
wire. In most wireless systems, radio frequency (RF) or infrared (IR) waves are used.
Some
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
HTML is the set of codes (that's the "markup language") that a writer puts into a
document to
make it displayable on the World Wide Web. HTML 4 is the current version of it.
XML is a structured set of rules for how one might define any kind of data to be
shared on the
Web. It's called an "extensible" markup language because anyone can invent a
particular set of
markup for a particular purpose. As long as everyone uses it (the writer and an
application
program at the receiver's end), it can be adapted and used for many purposes—
including
describing the appearance of a Web page. That being the case, it seemed desirable to
reframe
HTML in terms of XML. The result is XHTML, a particular application of XML for
"expressing"
Web pages.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
APPENDIX I
TEXTS
liv. Text 1:
The difference between the Linux philosophy to server setup and administration vs.
the Windows philosophy to setup and administration is, as stated earlier, perhaps the
most critical differentiating factor between the two operating systems.
Windows encourages you to use the familiar interface, which means administering
Windows Server 2003 at the server itself. Linux does not rely on or encourage local
use of a graphical interface, in part because it is an unnecessary waste of resources to
run a graphical desktop at the server, and in part because it increases security risks at
the server. For example, any server that encourages you to use the graphical interface
at the server machine also invites you to perform similar operations, such as use the
browser at the server. This exposes that server to any browser security holes. Any
server that encourages you to administer it remotely removes this risk.
If you administer a Linux server remotely from a desktop user account, a browser
flaw exposes only the remote desktop user account to security holes, not the server.
This is why a browser security hole in Windows Server 2003 is potentially more
serious than a browser security hole in Red Hat Enterprise Server AS.
lv. Text 2:
Many of economists, experts & futurists believe that an evolution similar to industrial
evolution has been occurred recently which has entered the world to the information
age and has exposed or has come over many aspects of economic, social & cultural of
man's life to profound changes. One of dimensions of this change is the profound
changes that have been occurred in the economic relationship between people,
companies & government.
Commercial exchanges between people with each other, companies with each other
and people with companies and government have been exited rapidly from their
conventional forms which are mainly on the base of paper documents and are moving
to exchanges through enjoyment from systems on the base of electronic information.
Electronic learning contains all learning which is accomplished through Internet or
computer and are related to the use of computer & technologies related to network
with the aim of presentation management & support of learning which usually are
performed independent of particular time and place.
E-learning apply to presentation of complete lessons which in that all aspects of
learning from student participation to teacher activities are accomplished online.
Universities which presented hosted learning services in fact present a particular
system for electronic learning.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Some companies which are doing on the base of electronic learning are reckoned as
new type of institution which hopes to create a learning atmosphere based on present
e-commerce.
lvi. Text 3:
In modern world is base in life to use high-speed resources and cheep education has
been very involvements of human being from many years ago so cooperation in this
case has caused advancement in different sciences. In that days publication of books
and distribution of it was very difficult and slow movement and it caused to slow
development of sciences after simplification of this term growing of science got very
high tend in last two/tree decades human's life made fast way to exchange information
and if was background to development science and knowledge.
With globalizing this information via internet nowadays, every person can get every
kind of info by paying low money. With this background and infrastructure in modern
world, education has been simple affair, and by considering that info resources has
very effective role in this way, matter of digital library has got special importance. In
this article has been discussed about main and sub-base need to create a digital
library.
lvii. Text 4:
Technologist Bill Joy recommended that we think not of one worldwide web, but of
six different webs, developing at different rates and offering distinct capabilities. To
gauge the potential impact of the digital nervous system of computers,
communications and sensors, let’s consider how it influences each of these six webs.
The Near Web, according to Joy, is the traditional web we experience when sitting in
front of a computer monitor and taping on the keyboard. The Here Web is the mobile
web that we carry with us wherever we go in the form of mobile phones, pagers or
Personal Digital Assistants. The wealth of sensory data flowing in from the digital
nervous system will be available in real-time to users of the Near and Here Webs.
This will have profound impacts not only for scientific and industrial research but also
for consumer applications.
The Far Web is the entertainment web that we access from afar using the remote
control from the comfort of the couch. At the moment, the lack of infrastructure for
broadband transmission to the home limits the Far Web to various kinds of
audio/video entertainment and information. Joy, however, believes that the Far Web
will expand to include virtual worlds with a high degree of interactivity and user
participation enabled by new sensory and actuarial devices. In other words, users will
soon be plugging themselves into some aspect of the digital nervous system in order
to enjoy new forms of entertainment and simulated adventure.
The Voice Web is the realm of speech recognition and voice activation. It consists
of all those devices that we can control with verbal commands or that can
communicate with us via the spoken word. As devices become more and more
capable of sensing and interacting with the environment via built-in digital nervous
systems, the voice commands we can give them and the messages they send us will
become more diverse and sophisticated.
lviii. Text 5:
Like a human being a company needs an internal communication system, a “nervous
system” to organize its actions. All businesses concentrate on a few basic things,
customers, products and services, costs, competitors, delivery and employees. A
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
company has to carry out the business processes in each area and make sure that they
are working together, especially activities that cross departments.
An organization nervous system has parallels with our human nervous system.
Every business has some processes that must continue for the company to survive,
just as human heart must keep beating. A digital nervous system serves two primary
purposes in developing business understandings. It extends the individual’s capacity
for analysis the way machines extend physical capacities, and it combines the abilities
of individuals to create an company intelligence and act as one. To put it all together:
a digital nervous system seeks to create company excellence out of individual
excellence to serve the customer.
A digital nervous system gives is users an understanding and an ability to learn
things that they would not otherwise have. To begin creating a digital nervous system,
you should fist develop an ideal picture of the information you need to run your
business and to understand your markets and your competitors. Think hard about the
facts you need to know. Develop a list of the most important questions for your
business. Then demand that your information systems provide the answers. If your
current system won’t do this, you need to develop one that will. If you don’t, one or
more of your competitors will.
Text 6:
Like a living creature, an organization will have the most output if it has a nervous
system which can send the information very quickly to the parts that need. A digital
nervous system can create a unity among the systems and processes of an
organization by making flowers of information and letting the trading and business
parts promote quickly in being more efficient and profitable. The information flow is
the most vital part of your company, for enables you to get the most output of your
employees and learn your customers something.
A digital nervous system provides the opportunity for ideas and innovations to
move quickly come to the surface. Businesses should perform another sort of
activities informative activities. This sort of activity was first proposed by Michael
Erotizes. What we call information usually is a letter, picture or an economic report
which is fixed and does not change. But Erotizes believes another kind of information
is active. Informative activity actually is information processing by human brain or
computer programs. We should put aside with idea that gaining and transferring
information is difficult and expensive.
You should make your companies’ information available for those who can use.
Providing accurate, precise and useful information for the company directors is one of
the characteristics of a good digital nervous system. They need accurate and useful
data for those are the ones who are in charge to lead the company and they should not
wait for higher authorities to receive information. Up to these days there was no direct
path for McDonald Company to receive the selling data. Nowadays McDonald use an
information system which can immediately process selling information in all its’
restaurant. The restaurant manager is aware of whatever is sold, so he faces facts to
investigate his selling’s not supposed information.
Another characteristic of a good digital nervous system is the number of the useful
ideas and suggestions which are offered by it’s mid directors and counselors. When
people analyze accurate and real data, they can suggest ideas in detail of how to do
the works better and this makes them excited.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Text 7:
Today's universities are faced with a main transformation: From one side, budget
deficiency and increasing number of students causes the university a fundamental
change, to adopt themselves to the newly conditions. From the other side, there is a
possibility that the advanced technology be replaced with the job of some of the
teachers and change the universities to institutes which have the virtual nature.
Universities are the organizations which show the most resistance against changes.
These changes which usually occur unwanted result in formation of new facts.
Computer communication technology has the ability of providing the possibility of
learning without time limitation proportional to the student's time, abilities, and needs.
This method, compare to the current usual teaching method which ignores the
student’s needs and places a group in a specific time and place, is a fundamental way.
From the other side, there is a possibility that computer communication technology
affects the social structure in educational organizations and minimizes physical
attendance.
Text 8:
This technology connects many users at the same time and requires further research
and adaptations. Issues such as: advancing internet and using World Wide Web in all
aspects of every day life, is the most important success in these years. One of its uses
is to transfer information and educate from a distance and introducing virtual
university. Possible examinations and evaluations of students is one of the essential
elements in the education system. In recent years, there are different possible ways to
examine through internet. These ways include from post electronic to auto evaluating
exams and grading.
More about these kinds of evaluation through internet will be explored by Y
University's project. In this project, student can connect to World Wide Web in his or
her free time and after entering the student ID and password, take his or her exam. In
this project, cumulative questions can be written by the professors. Also, there is time
limit for exams and professors can set the maximum allowed time to answer
questions. This project is written in visual basic environment and used CGI
programming. To store student's information and question banks, SQL is being used.
Text 9:
XML builders are companies like IBM and Microsoft that designed it to build
business software. For example the Gartner group, that product XML software, could
give %70 of online business and dealing in 2001. XML with wireless application
protocol (WAP) could represent advance ways to wireless tools expansion and usage
in e-commerce connection in world.
Most of companies that with this way seal business information, write this data with
XSI that wireless tools can use them. Most of companies try to use voice to work with
this data form different ways. Motorola is one of big company in voice diagnosis
language technology.
This technology is called VoXML and let user to search in web site with usage of
voice processor in network and can receive information via saying or saying-writing.
The saying-writing technology is access via Bevocal and Quack. com and lets to
business site use limited from this way to represent their product. Usage of voice
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Text 10:
HTML success is become of simplicity, easily usage and height capacity for ignore
errors. In this language upper and lower cases are same. Usage of end tags is not
important and briefly, simplicity of this language makes it universality, but simplicity
of HTML limits its powers. Because HTML’s tags are formatted, they don’t present
so much information about web page’s contain. For this reason renewed usage from
information in other case is difficult Because HTML is not severe about lower and
upper cases and dotting. To represent data, Browsers must been worked double.
Whereas HTML limits to dynamic and formatting concepts, affixes and suffixes are
use to increasing its efficient. But, unfortunately, some Browsers don’t support this
suffixes and therefore pages that use this suffixes can be only observed by some user
that have special Browsers.
XML is convenience reply to easy, but limited HTML. In the first look, XML is
similar to HTML with the same tags and specialty and values.
But XML isn’t only for web pages design, it is more over than it, it is a language to
create others. You can use XML to create your special Markup Language and for
forming and formatting your documents. A special Markup Language that in term
called an application XML program, contain tags that explain its data. Now look at
the XML power, if a tag defines a data, other works would possible to use that.
Software with XML can design such only work with its information.
Instead of have been astringe in a HTML web page, the label information can be
used times in necessary, but for every point, must be paid cost. XML is not as easy as
HTML. And to work easy we need to XML compiler (program that read and translate
independent or in a Browser) for a complete notice to upper and lower cases, (“”), end
tags and other details that HTML user easily ignore them. However, this severely and
pernickety characteristic maybe make to be imagined that it prevent XML be general
to design personal web pages. But the special power of it lets web page designer
managed data in large scale.
Text 11:
One of the primary missions of the MIT Center for e-Business is to conduct research
on all aspects of e-Business. The unique core of our program is the custom matching
of sponsor companies with MIT faculty to form research teams that address issues
that are relevant to both industry and academia. This approach to applying rigorous
research methodologies to solve some of industry's most relevant questions creates
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
generalizable knowledge that is valuable not only to the specific company involved,
but to all our understandings of how to use digital technologies most effectively.
The result is a dedicated project mutually agreed to between a particular Founding
or Research Sponsor and one or more members of the MIT Faculty. These projects
involve active participation from the Sponsor. For example, British Telecom's senior
management is working directly with MIT Faculty to select the best strategy for their
e-Business organizational transformation. Other projects are addressing key issues at
companies such as UPS, General Motors, Amazon and Intel Corporation.
The knowledge created through this research process is then disseminated through a
variety of means, including daylong workshops; a 2-day annual sponsors conference,
bi-weekly lunch seminars, site visits, and working papers, research briefs, newsletters
and other publications.
Text 12:
The Communications Futures Program (CFP) is a partnership between university and
industry at the forefront of defining the roadmap for communications and its impact
on adjacent industries. CFP’s mission is to help our industry partners recognize the
opportunities and threats from these changes by understanding the drivers and pace of
change, building technologies that create discontinuous innovation and building the
enablers for such innovation to be meaningful to our partners.
The Communications industry is witnessing emerging and destabilizing events
where an industry structure built around centralized intelligence and control is being
challenged with intelligence and control in many instances shifting to end users and
vice versa. Just as the Internet, the PC wave and Digitization of Multi-media were
transforming events, this trend in communications is likely to have an even greater
impact on industry. An example of this trend is VoIP, where control over a centralized
switching application is moving to the edge of the network. In what ways will shifting
control between the edge of the network and vice versa, play out?
CFP believes that while the role of technology in industry transformation is
important, equally important business drivers in the communications industry can
accelerate or slow this process. Drivers include widespread availability of broadband
infrastructure, role of regulation, role for enabling capabilities such as privacy and
security, and effective business models and rights management for companies to
profit from. Other drivers include alignment across the communications value chain
for speedy rollout of new services.
Text 13:
Businesses have become increasingly global and interdependent - the traditional
enterprise has become the "extended enterprise." Disruptions anywhere in this
"extended enterprise" can have dramatic and often unexpected impacts upon all the
organizations involved. In recent years, acts of terrorism have introduced new and
dangerous disruptions to business and society. Although we often think of national
security from a governmental and military perspective, businesses play an extremely
important role since much of a nation's infrastructure is run by the private sector.
This SIG will perform research, develop courseware (including case study
materials), and facilitate discussions amongst academia, governments, and business
on these important topics. Several current sponsors have provided seed funds for this
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
new area of research, and we seek relationships with other organizations to further
develop both thought leadership and practical strategies around security of the
extended enterprise.
Text 14:
While the term e-commerce refers to all online transactions, B2C stands for
"business-to-consumer" and applies to any business or organization that sells its
products or services to consumers over the Internet for its own use. When most people
think of B2C e-commerce, they think of Amazon.com, the online bookseller that
launched its site in 1995 and quickly took on the nation's major retailers. In addition
to online retailers, B2C has grown to include services such as online banking, travel
services, online auctions, health information and real estate sites. Peer-to-peer sites
such as Craig list also fall under the B2C category.
B2C e-commerce went through some tough times, particularly after the technology-
heavy NASDAQ crumbled in 2000. In the ensuing dotcom carnage, hundreds of e-
commerce sites shut their virtual doors and some experts predicted years of struggle
for online retail ventures. Since then, however, shoppers have continued to flock to
the web in increasing numbers.
In fact, North American consumers love e-commerce so much that despite growing
fears about identity theft, they spent $172 billion shopping online in 2005, up from
$38.8 billion in 2000. And the future looks rosy for e-commerce. By 2010,
consumers are expected to spend $329 billion each year online, according to Forrester
Research. What’s more, the percentage of U.S. households shopping online is
expected to grow from 39 percent this year to 48 percent in 2010.
For a long time, however, companies have had a hard time making their websites
dynamic and engaging enough for consumers to want to spend time on the site and
actually spend their money there. That’s getting easier as more and more Americans
are connecting to the Internet via broadband. With more customers using broadband,
companies can take greater advantage of newer, flashier technologies that were not
possible with dialup connections.
In short, although online commerce still represents less than six percent of all retail
sales, its growth and future prospects show that it has finally become as established
and mainstream as a trip to the local mall.
Text 15:
Mainly because the stock prices of some of the early pure plays went through the roof.
In the late 90s, dotcoms like Amazon.com and eBay - which were quickly gaining in
size and market capitalization - posed a threat to traditional brick and mortar
businesses. In many ways, these dotcoms seemed to be rewriting the rules of business
- they had the customers without the expenses of maintaining physical stores, little
inventory, unlimited access to capital and little concern about actual earnings. The
idea was to get big fast and worry about profits later. By late 1999, Amazon had a
market capitalization of close to $25 billion, eclipsing some of the largest and most
established companies in America.
Retail giants such as Kmart and Wal-Mart - hoping to cash in on the dotcom frenzy
- spun off separate companies to run their e-commerce operations. But many never
made it to the initial public offering after the Nasdaq started to tumble in the spring of
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
2000. Almost as quickly as the dotcom phenomenon took over, the hype over B2C e-
commerce dissipated along with the crumbling Nasdaq. Funding for Internet ventures
started to dry up and major companies started to reel in their spinoffs, bringing
e-commerce initiatives back under the corporate fold.
Companies that spun off their e-commerce operations as separate businesses were
at a disadvantage when “multi-channel” commerce became popular in 2002. Those
that kept their web operations in house, such as Sears, Office Depot and Circuit City,
had a much easier time integrating their web sites with the rest of their brick and
mortar operations and systems.
These companies were able, for example, to check local-store inventory via the web
and could allow their customers to buy online and pick up and return at a store. Multi-
channel commerce continues to be an important initiative today.
Amazon and eBay still dominate online retailing. But the fastest growing sites are
now traditional merchants that have become more serious about their Internet
operations. According to the research firm ComScore networks, traditional retailers
had a surprisingly strong showing over the 2005 holiday season. In fact, Wal-Mart
was the third most popular site, trailing Amazon and eBay, COM Score said. Target,
Best Buy and Circuit City were close behind.
Text 16:
The world's leading expert on the global software industry and coauthor of the
bestseller Microsoft Secrets reveals the inner workings of software giants like IBM,
Microsoft, and Netscape and shows what it takes to create, develop, and manage a
successful company - in good times and bad—in the most fiercely competitive
business in the world.
In the $600 billion software industry it is the business, not the technology, that
determines success or failure. This fact - one that thousands of once glamorous start-
ups have unhappily discovered for themselves - is the well-documented conclusion of
this enormously readable and revealing new book by Michael Cushman, based on
nearly twenty years of research and consulting with software producers around the
world.
Cushman builds on dozens of personal experiences and case studies to show how
issues of strategy and organization are irrevocably linked with those of managing the
technology and demonstrates that a thorough understanding of these issues is vital to
success. At the heart of the book Cushman poses seven questions that underpin a
three-pronged management framework. He argues that companies must adopt one of
three basic business models: become a products company at one end of the strategic
spectrum, a services company at the other end, or a hybrid solutions company in
between.
The author describes the characteristics of the different models, evaluates their
strengths and weaknesses, and shows how each is more or less appropriate for
different stages in the evolution of a business as well as in good versus bad economic
times. Readers will also find invaluable Cushman’s treatment of software
development issues ranging from architecture and teams to project management and
testing, as well as two chapters devoted to what it takes to create a successful software
start-up. Highlights include eight fundamental guidelines for evaluating potential
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Text 17:
Public exchanges are owned by industry consortia or independent investors and have
their own boards of directors. Though each exchange sets its own rules, they are
generally open, for a fee, to any company that wants to use them. Private exchanges
are run by a single company for doing business exclusively with established suppliers
and customers (although the systems that support it may be outsourced).
Which one your company uses depends on what you want to do. If you are buying
and selling commodity products, public exchanges can be a good venue in which to
find low prices or identify new customers. They're also becoming a popular way for a
company to unload excess inventory. In some industries, however, suppliers have
been reluctant to use public exchanges because they fear buyers will aggregate their
purchases and force prices too low, squeezing their profit margins. Common types of
transactions on public exchanges include purchasing through requests for quotations,
buying through catalogs and auctions.
Companies that use private exchanges prefer them for the closer online
relationships they can have with preferred customers and suppliers. They also think
private exchanges are more secure, because data about their trades are at less risk of
being exposed to competitors if there's a security breach. Companies use private
exchanges to trade proprietary information like supplier performance metrics and
sales forecasts in addition to orders and invoices. Companies also use private
exchanges to establish central control over purchasing through contracts with
established suppliers.
Text 18:
Start with buying so-called indirect supplies like pencils, chairs and copy paper. Most
companies start here because it's easier to set up an online catalog of approved office
supplies than it is to automate procurement of specially engineered parts and
materials. Plus, you're not affecting day-to-day operations while you get your feet
wet. While the payoff won't be as big as for more mission-critical purchases (so-
called direct materials used to produce the goods or services you sell), it can be
significant. The Burlington Northern Santa Fe railroad company lopped an estimated
3 percent to 28 percent off its indirect purchases and saved money internally by
automating a manual process for approving purchase orders.
On the sales side, take your cues from your customers. Start with a project that
makes it easier for them to do business with you or one that reduces your cost of sales
and service. Greensboro, N.C.-based clothing manufacturer Vanity Fair and Delray
Beach, Fla.-based office supply vendor Office Depot each built their online
purchasing sites because customers asked for them.
Text 19:
It's marketing speak for integrating your supply chain, and it's a vision of e-commerce
nirvana. You're not just sharing blueprints or your latest sales forecasts; you and your
trading partners are giving each other real-time access to your ERP, product design,
inventory and other systems. Companies that are doing it say it helps them get new
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
products to market faster, reduce manufacturing time, keep inventory low and adjust
more quickly to changes in customer demand.
To collaborate successfully, you and your partners each need up-to-date,
functioning systems to serve up whatever data you plan to share, and a way to deliver
that information electronically. That can be a big hurdle when many companies still
do a lot of business by phone and fax. The Goldman Industrial Group, a Boston-based
manufacturer of machine tools for the automobile industry, has found it tough to
convince its partners to invest in system upgrades needed for collaboration. There's
cultural resistance as well.
Not every company sees the value of sharing what has been confidential
information or trusts its partners with it. Some also fear online collaboration might
result in layoffs.
Text 20:
Definitely the units that do purchasing, B2B e-commerce can drastically change how
buyers do their jobs, especially if your company is one that still places orders the old
fashioned way. Sales and customer service departments will need to be involved with
projects that affect how you receive and process orders from customers. And don't
forget the folks who manage your inventory. You may need to get other departments
involved, too, depending on the functionality you're building.
Also involve your suppliers, distributors and customers, and make sure there's
something in the project for them. B2B e-commerce doesn't only change how you do
business internally, your partners have to change too. And unless you're the 900-
pound gorilla in your industry-and sometimes even if you are-you can't force
everyone to do things your way.
Text 21:
Exactly what you need depends on whether you're a buyer or seller, whether you're
dealing in indirect or direct materials and the extent to which you're integrating your
supply chain. Elements of a B2B system may include software for generating
purchase orders or requests for quotations (RFQs), processing invoices, building and
managing catalogs, responding to RFQs and processing orders. Depending on what
you're trading and how, you'll want to look for specific features that support your
needs. Some of these are online negotiation capabilities, dynamic pricing software,
support for international transactions and the ability to generate and process bills of
materials. To get the full benefits of B2B e-commerce, you'll need integration tools to
connect these systems with forecasting and planning systems, inventory management,
CRM, ERP, logistics and other applications you use for supply chain management and
customer service.
Cost is also relative. In general, the more elements of your business you want to
integrate with trading partners, the more you have to spend. Office Depot, with $11.6
billion in sales in 2000, put its catalog on the Web for $500,000, and pays $5 million a
year to maintain the system. A March 2001 Forrester Research report pegged the cost
for buyers to join an online marketplace at between $5.6 million and $22.9 million,
including operating costs.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Text 22:
For many people, strategic technology planning is just another name for long-term
financial planning. While this is a somewhat parochial view, it nonetheless
underscores the central role of funding issues in technology planning. Traditionally,
strategic funding requests and allocations involve many layers of authority and a
substantial amount of justificatory detail, regardless of whether an institution is large
or small, public or private. The amount of time it takes to analyze funding needs, gain
approvals, and locate or create resources, is often out of sync with the windows of
opportunity for technological innovation. Anecdotal evidence of this is plentiful. By
the time an institution has dotted the last "i" and crossed the last "t" on capital funding
for a campuswide network, the envisioned technology may have changed sufficiently
to render the plan obsolete.
One way to address this problem is to earmark a significant amount of fungible
capital resources for technology and allow it to be allocated as required. While it may
not be possible to justify future technology needs in detail, good planning should
permit an institution to estimate the level of financial resources that it can and should
devote to technology for a period of several years. A further refinement of this
approach is to create a "rapid reaction fund" as part of the annual technology
operating budget. By allowing unused funds to carry forward across fiscal years, an
institution can establish the type of budgetary flexibility that will allow it to maintain
technical stability despite the peaks and valleys in user demand, infrastructure
modification, and technology innovations.
Fungibility can also be increased with respect to staffing. Typically, institutions
struggle with the choice of either outsourcing or providing internal support for
technical operations. The problem of recruiting and retaining qualified staff—along
with rapid changes in required skill-sets—impels many colleges and universities
toward selective outsourcing despite their apprehensions about having staff members
whose primary loyalties lie outside of the institution. There is a third alternative:
closed-end contracts. Recognizing that it is becoming increasingly difficult to keep
high-quality technical employees for more than three years, some institutions are
designating certain positions as multi-year contract positions. While the turnover rate
remains high, it occurs with greater predictability, hence with less disruption. More
importantly, it enables the institution to modify position requirements as changes
occur in technology and the needs of users. It is, in some sense, a way of introducing
fungibility into staffing, a concept that is largely alien to the traditions of higher
education and that makes sense only in the context of a job market as competitive as
that of high technology.
Text 23:
Every year around this time, Americans lament our low voter turnout rate-44.9
percent in 1998, putting us 138th in a list of 170 voting nations. This explains the
growing interest in Internet voting, which promises to do for democracy what
Amazon.com did for books. Aside from making voting vastly more convenient, say
its supporters, click 'n' pick elections could theoretically eliminate fraud, allow instant
recounts, and save pots of money.
Buoyed by these hopes, election boards across the country have begun to take
tentative steps toward wired elections (many private organizations-most notably
universities and unions—already conduct internal elections online).
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Text 24:
Organizational performance is largely dependent upon the decision making processes
that a particular organization uses. In every organization, decisions have to be made
on a daily basis. These decisions range from small to large-scale in scope both in
terms of the resources involved in making them and the impact that the decisions can
have. For instance, a small-scale decision would be determining the type of copy
machine to purchase for a company department. This decision involves resources (i.e.,
in the form of time and energy) of the users of this machine to clarify their needs as
well as the purchasing representatives who research and acquire the copier. The
ability of this copier to meet employees' needs decides the impact of this decision.
An example of a large-scale decision would be determining what product or service
a company's customers need. This decision involves the time and energy of the
individuals who research the consumer market, as well as the individuals who try to
successfully develop and launch the product or service. This decision has the potential
to make or break a company depending on the size of the organization.
As the preceding examples illustrate, the decisions and the processes involved in
making them are not limited to the individual level. Moreover, the decision-making
process is also performed at the group level, and it will be done so with increasing
frequency given the need for high performance organizations in a competitive, global
market. Group decision making is defined as the process of arriving at a judgment
based upon the input of multiple individuals. This paper focuses on the group level of
decision making.
Since the resources involved in the group decision-making process as well as the
impact of these decisions affect organizational performance, it is crucial to make the
group decision-making process as efficient and effective as possible. Utilizing a
decision-making model is a systematic way of establishing group decision making
proficiency. This statement is not intended to mean that the use of a group decision-
making model is a panacea for group and organizational processes. This statement is
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Text 25:
The first model is the rational model. This model is based upon an economic view of
decision making. It is grounded on goals/objectives, alternatives, consequences and
optimality. The model assumes that complete information regarding the decision to be
made is available and one correct conception of a problem, or decision to be made can
be determined. The model further assumes that the decision-makers consistently
assess the advantages and disadvantages of any alternatives with goals and objectives
in mind. They then evaluate the consequences of selecting or not selecting each
alternative.
The alternative that provides the maximum utility (i.e., the optimal choice) will be
selected. The rational model is the baseline against which other models are compared
(Allison, 1971; Cheshire & Feroz, 1989; Lyles & Thomas, 1988).
An example of a scenario using a rational model is an executive group of a
company trying to determine which consulting firm to hire in order to implement a
business process reengineering (BPR) effort. The executive group's goal or objective
is to become a leader in its industry, and it determines that the best way to accomplish
this objective is through re-engineering. Numerous management consulting firms
offer BPR services. Each firm's BPR approach has advantages and disadvantages. The
executive group must evaluate each firm's approach by considering how the firm will
enable the company to meet its objective. Based upon this evaluation, the group
selects the consulting firm that provides the best means for the company to become a
leader in its industry.
The most salient advantage of the rational model is that it utilizes a logical,
sequential approach. Decisions are made deductively by determining the goals or
objectives to be obtained, evaluating the potential alternatives based on the
information at hand and choosing the optimal alternative. In other words, the model is
simple and intuitive in nature.
The rational model does possess a salient disadvantage. The model assumes that
there are no intrinsic biases to the decision-making process (Lyles & Thomas, 1988).
This optimism may not be totally realistic, since individuals involved in the process
bring their own perceptions and mental models into such a situation. Therefore, it
seems that intrinsic biases are inevitable and something that should be addressed.
Text 26:
The second basic decision-making model considers the preconceived notions that
decision-makers bring to the table in the decision process. This model is the political
model. In contrast to the preceding model, the individuals involved do not accomplish
the decision task through rational choice in regard to objectives. The decision makers
are motivated by and act on their own needs and perceptions. This process involves a
cycle of bargaining among the decision makers in order for each one to try to get his
or her perspective to be the one of choice. More specifically, this process involves
each decision-maker trying to sway powerful people within the situation to adopt his
or her viewpoint and influence the remaining decision-makers (Allison, 1971;
Cheshire & Feroz, 1989; Lyles & Thomas, 1988; Schneider, Shawver & Martin,
1993).
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Furthermore, the political model does not involve making full information available
or a focus on the optimal viewpoint like that of the rational model (Lyles & Thomas,
1988). Full information is highly unlikely, since the political model operates based
upon negotiation that is often influenced by power and favors. In fact, information is
often withheld in order to better maneuver a given perspective. Since information is
often withheld and subsequently incomplete, the optimal viewpoint is not a key aspect
of this model.
An illustration of the political model in action is a decision to hire a new manager
for the Purchasing Department of a company. A group composed of the Human
Resources (HR) Manager, staff members of the Purchasing Department, and the
Director of Operations (i.e., whose division oversees the Purchasing Department)
must make the decision among three candidates for the position. Each member has his
or her own needs and reasons for endorsing certain job candidates.
The HR Manager is trying to fit the best person to the job, but would not mind if
this individual has an innate liking for and understanding of human resources. This
appreciation of HR would help decrease the cycle time of placing and receiving
orders for necessities. The HR Manager would like to hire the first candidate. The
Purchasing staff is also trying to find the best person for the position, but would prefer
someone who does not micro-manage like their previous boss. The Purchasing staff
would like to hire the second candidate. The Director of Operations also desires to
find the best person for the job, but the Director would prefer an individual who
unlike the previous Purchasing Manager is not overbearing and skeptical of the
Director's decisions. The Director would like to hire the third candidate.
Since the group members have different agendas, they need to negotiate with each
other and present their cases to the Director of Operations who has the final say in the
decision. In the end, the Director understands the argument of the Purchasing staff
and decides that the second candidate's hands-off approach would meet his needs as
well. Therefore, the second candidate is hired.
The advantages of the political model remains that it provides a representation of
the subjective manner in which the real world often operates, and it can minimize
conflict. Individuals will always have their personal biases and agendas that influence
their behavior. By identifying or acknowledging this fact in the decision-making
process, potential problems and conflict can be foreseen and minimized. Conflict is
also minimized by the swaying of powerful people to support a particular viewpoint.
Once the powerful people support this perspective, other group members usually fall
in line behind them.
While the political model has the advantage of emulating the way the real world
operates (i.e., a cycle of bargaining related to personal agendas), this fact is also a
disadvantage, because the best solution or decision may not be selected. Furthermore,
the nature of bargaining and maneuvering (e.g., withholding information and social
pressure) can produce effects that are long-lasting and detrimental. Once they
discover it, the individuals involved in the decision may not appreciate the duplicity
inherent in the process.
Text 27:
In contrast to the political model, the third basic model of decision making is more
structured. This model is the process model. With the process model, decisions are
made based upon standard operating procedures, or pre-established guidelines within
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
the organization. Actions and behaviors occur in accordance with these procedures or
guidelines (Cheshire & Feroz, 1989; Allison, 1971).
Additionally, the organization of past, present, and future events, as well as
conformity, are integral parts to this model (Cheshire & Feroz, 1989; Allison, 1971).
The organization of the past, present and future events are important, because they
can be used as a consistent foundation for decision making. Considering these time
events provides further refinement of the guidelines that help to determine outcomes.
Conformity is an integral part of the process model since it is the means by which
doubt, or incertitude is dealt with during the decision task. If decision makers are
uncertain as to the potential effectiveness or the results of a decision, they conform to
the pre-established standard. This conformity should not be construed to mean that the
decision will not have a solid foundation. In this case, conformity merely relates to the
fact that the reasoning for the decision is based upon pre-determined guidelines
(Cheshire & Feroz, 1989).
An example of a scenario involving the process model of decision making is
promoting a Marketing Representative of a company to a higher level. A group
comprised of the Marketing Manager, HR Manager, and Compensation and Benefits
Manager meet to discuss the promotion. Since the Marketing Manager has seen
exemplary work from the representative, the Marketing Manager adamantly wants to
promote the individual from a Marketing Representative I to a Marketing
Representative III. In their negotiation, the HR Manager and Compensation and
Benefits Manager point out to the Marketing Manager that company policy mandates
that an employee can only be promoted one level at a time. Additionally, no precedent
has been set to justify deviation from this policy. Therefore, the Marketing
Representative is promoted to Marketing Representative II.
Text 28:
The fourth model of decision making is the garbage can model. This model is most
appropriate for judgment tasks in organizations where the technologies are not clear,
the involvement of participants fluctuates in the amount of time and effort given, and
choices are inconsistent and not well defined (Cohen, March & Olsen, 1972; Lovata,
1987; Schmid, Dodd & Tropman, 1987).
In such an organization, an opportunity to make a decision is described as a garbage
can into which many types of problems and solutions are dropped independently of
each other by decision-makers as these problems and solutions are generated. The
problems, solutions and decision makers are not necessarily related to each other.
They move from one decision opportunity to another in such a manner that the
solutions, the time needed and the problems seem to rely on a chance alignment of
components to complete the decision. These components are the combination of
options available at a given time, the combination of problems, the combination of
solutions needing problems, and the external demands on the decision makers (Cohen,
March & Olsen, 1972; Lovata, 1987; Schmid, Dodd & Tropman, 1987).
An example of the garbage can model is a company department trying to deplete its
budget before the end of the fiscal year. This department, consisting of five
employees, has additional money in its budget to use up by the end of the fiscal year.
The employees do not want to lose the money. So, they create a bogus allocation in
order to protect it, but really have no use for it. Two weeks after the end of the fiscal
year, the department's computer system goes down. Fortunately, the solution (the
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
money from the budget to replace the computer system), the problem (inoperable
computer system) and the individuals involved ( the employees) are in alignment. In
other words, the timing is perfect for the combination of components to solve this
problem: The employees protected budget money which could be used at a later time,
the computer system went down, and the protected money could be used to buy a new
computer system.
The notable advantage of the garbage can model is that it provides a real-world
representation of the non-rational manner in which decisions are often made within an
organization. Not all decisions are made in a logical, political, or even standard
fashion. Occasionally, decisions are made on an ad hoc basis or by "flying by the seat
of the pants" when the solutions, problems and individuals involved in the task
happen to align.
Despite its representation of the non-rational, real-world manner in which decisions
are often made, the garbage can model does have an important disadvantage. It is not
the most efficient means of making a decision. Decision making is considered a
procedure for finding solutions to problems. Unfortunately, this often does not happen
if the garbage can model represents the manner in which decisions are made within an
organization. Problems are worked on in given situations, but choices are made only
when the combination of problems, solutions and individuals allow the decision to
happen (i.e., are in alignment). Consequently, the alignment of the problems,
solutions, and individuals often occurs after the opportunity to make a decision
regarding a problem has passed or occurs even before the problem has been
discovered (Cohen, March & Olsen, 1972).
In discussing the four general models, the issue is not necessarily which model is
the best one, because they all have advantages and disadvantages which may work or
be appropriate for certain groups and situations. The purpose of using models to
assess group decision making is to provide a base for comparison. A model is a
starting point for evaluating a process, and group decision making is a process.
One way of evaluating this process is to determine which model, if any, a group is
using to make decisions. Once the model is determined, the decision procedure can be
analyzed in order to facilitate the improvement of the procedure. The procedure can
be improved by anticipating potential problems and acting accordingly.
For instance, time wasted due to a lack of direction and organization can be
eliminated. Knowing that a group makes decisions by following a rational model
enables the decision makers to expedite the decision process. These individuals can
expedite the process by preparing themselves for group meetings by becoming
familiar with any goals or objectives, possible alternatives and consequences of these
alternatives as well as potential optimal choices as they relate to a decision.
The knowledge that a group follows a political model in making decisions is also
helpful. This knowledge can assist group members in preparing the supporting
information for their perspective. This preparation can assist the individuals in
presenting their viewpoint more persuasively. Consequently, their viewpoint has a
better chance of being adopted as the one of choice.
Knowing that a group utilizes a process model for making decisions can also
increase the effectiveness of the decision procedure. Being aware that judgments are
made relative to standard operating procedures enables individuals to anticipate
potential obstacles to a decision. Consequently, these individuals can research the pre-
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
established guidelines that may pose these problems and adjust their argument or
point of view accordingly.
If group members are aware that decisions are made by using a garbage can model,
they at least have the comfort of knowing that these decisions follow some sort of
method. Granted the method is somewhat random and chaotic, but it is a method
nonetheless.
Moreover, identifying the model when the decision process does not function
effectively is of value, because the decision makers then know the method to avoid.
They should avoid the current model that produced the ineffective results. This
avoidance can be accomplished by agreeing as a group to try to adopt a different
approach (i.e., a new model).
It should be pointed out that even if the group decision-making procedure does not
fit one of the aforementioned general models, the process of analyzing the decision
task in and of itself in order to identify a model is beneficial. This analysis provides
valuable insight into the dynamics of how decisions are made within the group
whether or not one of the four models is actually discovered. The cognitive flow of
the group is important to note, because it enables an understanding of the other group
members' rationale for judgment. Furthermore, this cognitive flow may spawn the
creation of a novel group decision-making model.
In conclusion, models of group decision making can be helpful. They are not cure-
alls for faulty decision procedures. They are merely a starting point for potential
improvement. Models aid in assessing the interaction of group members regarding a
judgment procedure. Group decision making models provide form to an intangible
and abstract concept. Models promote the discovery and resolution of problems that
can occur during the decision-making process.
Text 29:
In a sense, dialogue is not complicated. It is just good conversation, over the back
fences of our lives. It is continued, thoughtful exchange about the things that most
matter. It is a time to sit. In a sense, dialogue is not complicated. It is just good
conversation, over the back fences of our homes, a time to get together and talk, as the
ideas and thoughts come to us, without agenda, without time pressures. It is the kind
of conversation that we have forgotten in the pace of western, modern life, a kind of
easy exchange. It is learning what we have forgotten. Or, in the language of Maya
Angelou and Paula Underwood Spencer, from cultures that practiced dialogue, it is
reminding us of "that which we have forgotten to remember."
In his seminal book on systems thinking, The Fifth Discipline, Peter Senge talks
about the important difference between "dialogue," which comes from the Greek
dialogos, which means "to draw meaning through," and "discussion," which has the
same root meaning as percussion and concussion and which suggests the banging
together of ideas and points of view, and, I would add, heads. Senge notes that the
dominant mode of communication in the contemporary organization is that of the
crashing together of ideas and observations and different understandings, rather than
drawing those ideas and observations and different understandings through a process
which clarifies and deepens our personal and collective understanding.
But such a deepening of understanding is not automatic. We generally seem to
prefer our more familiar model of sparring with ideas. Perhaps it is the nature of our
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
extroverted culture that in any gathering we spend most of our time waiting to race
out of the starting gate with our own thinking. A friend of mine often describes
extroverts as those who see communication as having only two stages: talking, and
waiting to talk. She has not only defined the extrovert, but our extroverted culture as
well. In such a competitively extroverted culture, real listening, that is listening to
understand or listening as an ally, is indeed counter-cultural.
For most of us, the pattern of dialogue requires new ways of thinking about and
evaluating communication. Understood in light of our dominant patterns of debate,
disagreement, discussion and decision, dialogue seems like pointless meandering, and
is most marked by the deficiency of not "arriving" at any conclusions, of not
producing identifiable closure. Dialogue seems to have no structure, no point, and no
direction. Even talking about it generates a mild sense of panic, particularly among
those who haven't had a chance to settle into it.
If we see the goal of communication as to decide something or do something, we
are unable to discern the way in which dialogue, without a seeming focus on decision
or action, somehow enables individuals to focus their personal energies almost
unconsciously so that once the dialogue has ended people go forth and act in a
remarkable level of concert, without the need for action plans or coordination or
checking. Such patterns have been noted in the modes of communicating of Asian and
Native American cultures.
Dialogue should contribute to the development and deepening of a genuine interest
in, curiosity about and concern for the thinking and observations of other people
around the table. It is a collective process in which wisdom emerges not from our
finding the appropriate path of thinking like the wise one at the head of the table, but
where through a dialogue, we come to a deeper understanding than any one of us had
to begin with.
We should note that dialogue is a different and often unfamiliar way of being together
in communication, and we should acknowledge that and be prepared for it. If we
overlook the unfamiliarity of this mode of communicating, we will also make it
unlikely that others can evaluate accurately its value-added in our organizational lives.
Instead we will mistakenly evaluate it in traditional modes (of decisions taken by
meetings' end and measure of closure) and judge it within the time bounds of the
meeting, rather than in the longer and more important time frames of future action and
alignment.
I am reminded of the many stories of North Americans negotiating with Asians and
considering the process of talking and silence without any seeming progress, as
pointless and unproductive. The same North Americans have found the level of
accord and speed of implementation quite astonishing, in comparison with the level of
struggle over implementation in Western cultures. And seldom do they realize the
relationship between the slowness of speaking and the ease of acting.
Text 30:
Finding a scholarship that suits your requirements and for which you are eligible can
be a time-consuming and difficult process. Unfortunately, many students spend hours
and hours finding a scholarship yet fail to put an equal amount of effort into their
application. The application is by far the most important part of your scholarship
search, make sure you spend as much time on it as is necessary to get it right.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Following are a list of simple tips to help you ensure you submit the best
application possible and thereby maximize your chances of being awarded the
scholarship.
1) Make sure you get as much information about the scholarship as possible.
Write, call or e-mail the provider of the scholarship to ensure you have full details
of application procedures and what will be expected of the successful applicant. If
the scholarship entails a particular project, find out the full objectives and intended
methodology of the project. If the scholarship is being funded by a private
enterprise, gather as much information as you can about the company, its
philosophy and its goals. You can never have too much information.
2) Check thoroughly to ensure that you are actually eligible for the scholarship
before you embark on the application process. It is pointless to submit an
application, no matter how perfect it may be, for a scholarship for which you are
ineligible. Check for any gender, age, nationality, indigenous or other special
group restrictions on applications and only apply if you definitely match the
eligibility criteria.
3) Once you have confirmed your eligibility for a particular scholarship and received
full application guidelines from the provider, make sure you follow the
guidelines to the letter. Common complaints from scholarship providers are:-
• both sides of application forms are not filled in or the form is not filled in
properly;
• all of the requested documents are not attached;
4) Application presentation is very important. If a list of documents is requested,
supply the documents in the order in which they are requested. Use the same style
of writing and pen throughout the application. Use neat, legible handwriting and
type your application if this is not possible.
5) Ensure that your referees are the appropriate people to provide the kind of
information about you that the selection committee will need to know. For
example, if they need to know about your research capabilities, ensure the referee
you provide has supervised your research work before or has some other
knowledge of your capacities.
Always make sure that your referees know of each and every scholarship you have
applied for in which they are listed as a referee. If they are aware of the particular
requirements of each scholarship, they will be more able to provide the appropriate
information to each scholarship selection committee.
6) Apply for each scholarship separately. Do not use the same application to apply
for two separate scholarships. Each scholarship will have its own particular
requirements and if you use a previous application you will almost certainly miss
addressing vital and particular criteria of the new scholarship. Each scholarship
application should be approached as a separate undertaking in order to ensure you
submit a valid application for each.
7) Make a checklist for each scholarship application and check and double check
it before you submit the completed application. Ensure that you have completed
all the necessary forms, supplied all the requested supporting documents in the
form required, submitted all statements, names of referees and any and all other
information requested by the provider.
Don’t lose out on a scholarship because your application is incorrect or messy!
Work hard on it and ensure yourself the best possible chance of winning a
scholarship in today’s competitive environment.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Text 31:
How can you narrow the list of possibilities before contracting for services? How can
you ensure that your organization’s business needs will be met? One solution is to
write and distribute a Request for Proposal (RFP) in the marketplace.
An RFP is a written document that outlines specific information about your
organization, the services and products you need, and the specific requirements
suppliers must meet in order to win your business.
A written RFP increases market awareness of your organization’s needs, thereby
increasing the competition to serve those needs and increasing the formality of the
relationship between you and the supplier. In short, an RFP places you - the buyer - in
control of the desired service levels and related requirements and lets potential
vendors know up front that your most important concern is the level of customer
service you will receive.
Reasons to Write a Formal Request for Proposal:
To increase competition for your organization’s money, which will increase the
options and potentially could drive down the cost;
• To ensure a fair and equal opportunity for providing services;
• To identify and select qualified organizations capable of supporting high levels of
service in the most cost-effective and administratively efficient manner possible;
• To select stable, organized and efficient organizations interested in developing
long-term relationships;
• To award opportunities to the most capable and qualified organization — whose
capabilities and experience can support demands and can grow as needs evolve;
• To outline the terms of a formal working agreement that holds both the buyer and
the supplier liable to certain terms and conditions — the legalities of the
opportunity.
RFPs are a lot of work, but they’re worth it. If you were planning on purchasing a
learning management system that you hoped to use for five years, it obviously makes
sense to find the vendor whose product matches your needs as closely as possible.
It’s certainly easy to take shortcuts. Industry gossip, anecdotal stories and
conversations over lunch might provide you with a few tips, but let’s face it,
thousands or even millions of dollars might be changing hands. It’s much different
than using Consumer Reports to choose a lawnmower. You need to be educated, and
there should be no guessing involved.
Text 32:
An RFP is a written document that represents an enormous amount of time, resources,
and money in order to communicate an understanding of the business needs of a
company to a group of suppliers. The resulting proposals represent an interpretation
of those needs and involve the expenditure of a commensurate amount of time and
resources on the supplier's part. Properly developed and written, RFPs are powerful
tools for selecting the most appropriate solution and developing straightforward
relationships with suppliers.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
This is a nuts and bolts guide to writing an RFP. The purpose of this guide is to
provide you with practical information about writing and organizing RFPs by
focusing on their underlying mechanical aspects and processes. Whether you are a
novice or senior RFP writer, you will find tips and techniques that will be beneficial
to you.
Text 33:
The next generation of distributed computing has arrived. Over the past few years,
XML has enabled heterogeneous computing environments to share information over
the World-Wide Web. It now offers a simplified means by which to share process as
well. From a technical perspective, the advent of web services is not a revolution in
distributed computing. It is instead a natural evolution of XML application from
structured representation of information to structured representation of inter-
application messaging. The revolution is in the opportunities this evolution affords.
Businesses have been offering products and services on the World-Wide Web for
the past few years. Have they not then been offering web services? In what way are
web services actually new? In an article entitled The Web Services ®evolution -
Applying Web Services to Applications" Graham Glass, the CEO and Chief Architect
of The Mind Electric defines a web service as:
A collection of functions that are packaged as a single entity and published to the
network for use by other programs. Web services are building blocks for creating
open distributed systems, and allow companies and individuals to quickly and cheaply
make their digital assets available worldwide."
Prior to the advent of web services, enterprise application integration was very
difficult due to differences in programming languages and middleware used within
organizations. The chances of any two business systems using the same programming
language and the same middleware was slim to none, since there has not been a de-
facto winner. These 'component wars' spelled headaches for integration efforts, and
resulted in a plethora of custom adapters, one-off integrations, and integration
'middlemen'. In short, interoperability was cumbersome and painful.
With web services, any application can be integrated so long as it is Internet-
enabled. The foundation of web services is XML messaging over standard web
protocols such as HTTP. This is a very lightweight communication mechanism that
any programming language, middleware, or platform can participate in, easing
interoperability greatly. These industry standards enjoy widespread industry
acceptance, making them very low-risk technologies for corporations to adopt. With
web services, you can integrate two businesses, departments, or applications quickly
and cost-effectively.
The vision for web services predicts that services will register themselves in public or
private business registries. Those web services will fully describe themselves,
including interface structure, business requirements, business processes, and terms
and conditions for use. Consumers of those services read these descriptions to
understand the abilities of those web services. Web services will be smart, in that once
a service has been invoked, it will spontaneously invoke other services to accomplish
the task and to give users a completely personal, customized experience. In order for
these services to dynamically interact, they need to share information about the user's
identity, or context information. That context information should only need to be
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
typed in once, and then made available at the user's discretion to selected web
services.
Text 34:
A key difference between J2EE and .NET is that J2EE is platform-agnostic, running
on a variety of hardware and operating systems, such as Win32, UNIX, and
Mainframe systems. This portability is an absolute reality today because the Java
Runtime Environment (JRE), on which J2EE is based, is available on any platform.
There is a second, more debatable aspect of portability as well. J2EE is a standard,
and so it supports a variety of implementations, such as BEA, IBM, and Sun. The
danger in an open standard such as J2EE is that if vendors are not held strictly to the
standard, application portability is sacrificed. CORBA, for example, did not have any
way to enforce that CORBA middleware did indeed comply with the standard, and
thus there were numerous problems with portability. In the early days of J2EE there
were the same problems.
To help with the situation, Sun has built a J2EE compatibility test suite, which ensures
that J2EE platforms comply with the standards. This test suite is critical because it
ensures portability of applications. At the time of this writing, there were 18
application server vendors certified as J2EE-compatible. There are a myriad of other
vendors as well that are not certified10.
Our opinion is that in reality, J2EE portability will never be completely free. It is
ridiculous to think that complex enterprise applications can be deployed from one
environment to the next without any effort, because in practice, organizations must
occasionally take advantage of vendor-specific features to achieve real-world systems.
However—and this is important—portability is exponentially cheaper and easier with
J2EE and the compatibility test suite than with proprietary solutions, and that is a fact
we stand behind through years of consulting with customers using a variety of J2EE
solutions. Over time, as the J2EE compatibility test suite becomes more and more
robust, portability will become even easier.
By way of comparison, .NET only runs on Windows, its supported hardware, and
the .NET environment. There is no portability at all. It should be noted that there have
been hints that additional implementations of .NET will be available for other
platforms. However, a question remains - how much of the complete .NET framework
will be (or even can be) supplied on other platforms? History has taught us to be
skeptical of Microsoft's claims of multiple platform support. Microsoft ported COM
to other platforms, but never ported the additional services associated with COM that
were necessary to make COM useful. We find it hard to believe that .NET portability
will ever become a reality given Microsoft's historically monopolistic stance.
Text 35:
A software development process defines a set of activities necessary to deliver a
software system. All activities culminate in an artifact (or refinement of an existing
artifact). The artifacts represent the result of working on the activities. The goal of a
software development process is to facilitate people in their quest to effectively
produce a software system.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Crystal
Crystal is a lightweight process that contains 20 artifacts. This might sound like a
heavier process than XP but most of the artifacts are informal and can take the form of
“chalk talks” (working problems out on a chalk board), conversations, and e-mails. Of
these 20 artifacts, only the final system, the test cases, and the documentation are
formal. Crystal divides its artifacts into levels of precision (20,000-foot view, 5,000-
foot view, 10-foot view) to allow developers to focus on their objectives.
Feature-Driven Development
Feature-Driven Development is an incremental approach that uses as few as four
artifacts (feature list, class diagram, sequence charts, and code). The FDD process
focuses development using two-week iterations to show quick tangible results.
Among the contributions this process provides is a semantic-based class diagram
template—called the domain neutral component, which differentiates types of classes
by color—to aid class designers in developing a domain model.
Text 36:
An open distance learning information system (ODLIS) can be used in order to
provide virtual lectures, virtual conferences and collaborative work on projects which
are shared among institutions, exchange of useful material, experiences among
teachers, research results and conclusions as well as versatile and more attractive
presentations of the subjects taught. In addition, such a system should manage the
educational material and its users as well as the information that is useful for the
educational procedure. The above requirements create two problems for the system:
The first problem is the management of data in web-based applications, which have
different characteristics and complexity. The management of information has many
limitations of the file-oriented hypertext protocol. The second problem is the
integration of different technologies and tools that support educational activities.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
Text 37:
The user and lesson database issues had also an important role and needed special
attention especially as far as the educational part is concerned. The database system
had to take into consideration all the educational aspects that were imposed by the
academic view of the project. The bureaucratic process had to pass into an electronic
system of invitations, submission forms and responds that the database system had to
keep track of. The elements of user registration requests had to be handled with an
open-minded way because they involved comparisons and logging of two language
words and phrases. Transformations had to be made in a formalized way so that
everybody has an ASCII-based login name for the web access better compatibility.
User database had to keep wait state status when registering a student for the cross-
certification with the secretariat of the department involved.
Moreover, the database had to be ready for annual rebuilding – reutilization
prepared for the next academic year. That means exhaustive packing and disengaging
of all data of the past year from the main database.
At that time all outdated data had to be moved to the back up database keeping in
mind all issues that may be needed in the following year for better indexing and
quicker access and retrieval. In the new academic year, everything has to be ready to
accept all the new data recording without, though, losing the capabilities to search and
link to older elements especially records of grades, statistics and answers to sets of
tests and exercises. The system had to be designed to keep alive the most
educationally significant parts of data - the academic partners of the project insisted
on that - so that would be easy to access them in the following years for several
reasons. It is important that the database system provided easy and consistent access
to every annual database because it is consisted of both scientific and other
educationally vital information for the better designing and organizing of the
academic year to come.
Text 38:
Learners are busy. They are working at their primary task and have little time for
learning even if the need is urgent. For this reason, make the lesson as easily
accessible as possible. If you simply send an e-mail message telling the learners to go
the internal Sales website and check out the lesson that was just released, you will
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
have a low hit rate. To make it as easy as possible for the learner to access the e-
learning lesson, use these approaches:
• Provide a link in the body of the e-mail invitation.
• Describe why taking this course immediately is important to both the learner
and the corporation.
• Provide a complete-by date. Many people are motivated when confronted with
a date rather than a vague time period like “complete within two weeks.”
• Develop a system for identifying lessons that need to be taken immediately
versus lessons that can be taken when convenient. This could be a key word in
the subject line of the e-mail message or a color-coding system.
Text 39:
Problem of network connectivity in the systems that use process migration as solution
to problems such as load sharing has existed from the early advent of process
migration. Solutions typically consist of modifications to operating systems or
applications. Because of complexity of adding transparent migration to systems
originally designed to run stand-alone, since designing new systems with migration in
mind from the beginning is not a realistic option anymore at one hand and need to
developing new applications because of impossibility of use of existing applications,
has made process migration an unpopular approach.
Because of the increasing costs of operating system development and the lack of
standard solutions for distributed systems and heterogeneity, middleware level
solutions have be-come of more interest.
Our approach is to create a process called twin for each remote process. The twin is
responsible for redirecting communications of the remote process. Every remote
process has logically its own twin. But in practice there is not a one to one mapping
between remote processes and twins. A twin can be responsible for more than one
remote process. This approach works with existing operating systems and
applications.
Text 40:
We are concerned with the study of autonomy as an essential prerequisite for the
design and implementation of artificial intelligent systems. Collectivities of
autonomous mobile robots are the focus of the present research. An autonomous
mobile robot denotes for us a mechanism which is able to know its environment,
navigate, avoid obstacles and recharge its battery. That is to say, an artifact capable to
ensure its survival by itself, with the minimal human intervention.
This study deals with location (position and orientation) identification of mobile
robots equipped with ultrasonic (sonar) sensors. Due to slippage, uneven floors, etc.,
location calculated from odometer readings deviate from the actual location of the
robot. The situation becomes more severe especially when the robot makes many
turns or the length of the path traveled increases. The task of identifying the location
of a mobile vehicle using information from external sensors with respect to a global
reference frame is referred to as sensor based localization. The objective of this study
is to use solely sonar based information to identify the location of a mobile robot in a
given nontrivial environment.
www.pupuol.com
ﭘﻮﭘﻮﻝ ﻣﺮﺟﻊ ﺩﺍﻧﺸﮕﺎﻩ ﻭ ﻣﺪﺭﺳﻪ
www.pupuol.com