CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 190 Weeks Ago, 4 Days Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > Information Systems Posted 24 Aug 2017 My Price 10.00

use vocabulary to create little essay

i need some little essay each about 200 words. the essay just like make a story use some vocabulary 

First story with 9 Vocabulary Words

1.     More and more, however, especially for the info systems related to this class, there's abackchannel. They talk to you, you talk back to them. Sometimes there is no “them” for you to talk to; you don't talk to Facebook, you talk to your friends, your social network.

2.     In a dyadic conversation, two people speak, listen, and respond. It's what we naturally think of when we think of a conversation. This is perhaps the most powerful form of conversation; active listening and responding between two people is fundamental to human communication.

3.     Before writing, this kind of conversation could only happen synchronously (face-to-face and in real-time). Today, we have lots of ways to do remote real-time dyadic conversations (live chat by text, audio, or video).

4.     In a broadcast conversation someone speaks, many people listen, and a few might respond (like our videos).

5.     Broadcast conversations can be synchronous or asynchronous.

6.     A conversation can now be narrowcast, meaning that one person speaks, but the message they give is customized to different audiences. Personalization is where the message is customized to each individual (in other words, each audience has only one member).

7.     On Twitter, a retweet is a conversational repeat where a user passes your message (tweet) into another conversation.

8.     EvgenyMorozov uses the term Net Delusion to argues that we are naive to think that the internet is only good. We should expect that repressive government will at some point get the upper hand again over activists. the .

9.     The dictator's dilemma states that countries need their people to have phones and other electronics to make economic vitality possible; but by so doing they also hand people the ability to plot more effectively against them.

Seconf story with 17 Vocabulary Words

1.     So what happens in between fame and riches? Investors! People who believe in a company pour money into it in hopes that it will prove to be a good investment, and make them money in return.

2.     Much money has passed hands as Facebook's Mark Zuckerberg gives portions of the company's equity (stock) to constituents such as Facebook staff.

3.     A company may launch a product several times before it actually works well. This tactic of trial and error is called the version 3 phenomenon. Microsoft is famous for it.

4.     The Web business model we call Ads means making money from promoting other people's products on your site.

5.     The Web business model we call "selling stuff" means making money the way it has been made forever, exchanging physical products for money.

6.     the Web business model we call Infomediation means making money by being in between the people who have info and those who need it.

7.     The Web business model we call "selling data" means making money by selling what you know about your users.

8.     When data is anonymous it is unlinked from anyone's identity. But is it more or less valuable when it is not linked to you? Would you pay more for linked data?

9.     The Web business model we call Subscriptions means charging people by the month for your service.

10.   The Web business model we call "selling to businesses" means making money not from individuals but from organizations who will pay for what ordinary people may not.

11.   Users don't want to pay for software, but businesses do. For example, Google charges companies who want to use their products on intranets (internal sites). The same could happen with Facebook.

12.   The Web business model we call "getting underneath" other businesses means making sure even your competitors need your product to succeed.

13.   Facebook is angling to be the single sign-in on the Web. For now Facebook sign-in is free for other companies to use, but once everyone is using it, will Facebook try to monetize it? Why wouldn't they? When users expect to use only the Facebook sign-in, other companies would be forced to pay Facebook so their users can have what they want.

14.   The business model for mobile is evolving: the most common strategies are to sell many units for a very low price each, or the “freemium” model in which they give away the product, then sell virtual goods and extras.

15.   It's hard to get discovered in the virtual market; giving things away for free helps earn eyeballs and buzz. If you establish a large base, you can then upsell users (that is, get them to buy more after they have the basic product).

16.   Farmville's method consists of: 1. Frustrating you; 2. Rewarding you (you can pay more to “unlock” systems); and 3. Creating a gift economy (which is really viral marketing. They get users to advertise for them, in this case by giving and getting gifts among friends).

17.   Facebook is dogfooding the intranet capabilities of the site. That means Facebook teams themselves are using the capability first to prove that others might want it as well.

Third story with 3 Vocabulary Words

1.     Google argues that their ads are driven by the “moment of relevance,” or that place and time when the user really wants the information the ad supplies.

2.     The idea of targeting is making precise calculations about who sees what ad.

3.     An operating system is like Windows or Mac OS. It is the software that allows all other software on your computer to run.

Forth story with 11 Vocabulary Words

1.     The term authority is based on trust. It is the trusted, definitive, beyond-question source of some sort of information.

2.     In the pre-online era (before the Web), we used publication processes for vetting information before it was released.

3.     What information enters the public realm can be decided by people already considered authorities. They function as gatekeepers, letting through only the information they want to.

4.     In the computer world, a set of steps you follow to reach a goal is called an algorithm.

5.     A good example of vetting by algorithm is Google Search. Even though people created the algorithm, there are no experts involved in this process of ranking the results you see.

6.     Social ranking, or popularity, is an increasingly important way of figuring out what information is most relevant to you.

7.     Vetting by the crowd has come a long way and is becoming an important way of checking information. Mechanical Turk is a good example crowd-sourcing. It brings together thousands of people who might be just who is needed to solve a problem for you.

8.     The process by which information is evaluated for accuracy and trustworthiness is calledvetting.

9.     Wikipedia is a wiki, which has come to mean a place where the crowd can collaborate quickly to make Web pages.

10.   An IP address is a series of numbers that identifies a particular computer. They may or may not be a reliable way to link you to what you do on a computer.

11.   There are special people called administrators at Wikipedia and in other systems who have rights and abilities above the normal user's

Fifth story with 6 Vocabulary Words

1.     Before the electronic era information was usually directly communicated and not recorded, much of the information you received was hearsay. As you know, this is an untrustworthy form of information because it's so prone to distortion.

2.     An end-user agreement creates a contract between you and a software company

3.     One type of end-user agreement is Opt in. This means that you are not part of a program or activity until you say you want to be. This requires extra effort on the user's part to say they want to be part of an agreement.

4.     If an end-user agreement is opt out you are part of a program or activity it until you say you don't want to be. It requires extra effort to decide not to participate.

5.     The “Eye in the Sky” refers to satellites, looking down on populations and recording their actions.

6.     The “Data Eye in the Sky” refers to large scale data aggregation that governments like our own are now performing. Governments ask what is going on and what should we do about it?

Sixth story with 9 Vocabulary Words

1.     We will use the term cyber security to stand in for the various other terms people use for the idea of protecting computers from hackers.

2.     Officially, the term is cracked, but most people say a system was hacked to mean it was compromised.

3.     The term social engineering means compromising information by getting someone with access to let you in.

4.     The term denial of service means sending so many requests for information to a server that it crashes under the load.

5.     The idea of a bot net is that hackers install software on your computer that allows them to in some way control it.

6.     The term phishing describes the situation where a hacker disguises themselves as a legitimate organization to get you to enter information they want.

7.     In cross site scripting a hacker uploads code that sends your info to their site instead where you think it is going.

8.     In SQL injection a hacker inserts a query into a site's code to get it to reveal data from the system's database.

9.     The term for malicious, but minor acts of defamation on the web is Trolling

 

Seventh story with 6 Vocabulary Words

1.     Our culture has a split personality about big tech companies like Google. On the one hand we are constantly afraid that they are out for world domination. On the other hand, we love what they offer us and make them our heroes.

2.     To some extent, Apple (like all the best products) goes beyond products and becomes almost a cult.

3.     The Google "desktop" runs in your browser because that is what is available to Google for now. But inside your browser you can "live" in Google applications all day. Google has everything you need. And therein lies their strategy. They want you to use all and only Google applications.

4.     But Microsoft has one thing going for it (their competitive advantage). Chrome can't run without Windows. But Windows can run perfectly well without Chrome. Windows is underneath Chrome

5.     Google can't get to a lot of Facebook data. Facebook's hidden web that can't be accessed through the Google crawling tools because it is behind Facebook's firewall.

6.     Google is an algorithmic company while Facebook understands people

 

Eighth story with 12 Vocabulary Words

1.     UX or User Experience is an umbrella term for what we do help people interact well with and get what they need from an information system.

2.     The ease of use of a system is called usability.

3.     The organization and presentation of the site's information is called information architecture

4.     The term interaction design means creating the way the user and the system will go back and forth in a sort of conversation as the user decides what to do to reach her goal.

5.     The term graphic design describes the process of making the look and feel and layout of the system's information and features.

6.     The term UI design describes the programming and logic behind the presentation of the information and features of a system.

7.     In the method called eye tracking, researchers look at millisecond-by-millisecond behaviors, using a machine that logs where the eyes are directed

8.     Usability field studies are where people are watched minute-by-minute and hour-by-hour as they use a system at home.

9.     Another type of research is log data analysis, where researchers look at millions of user events over the course of days, weeks, and months.

10.   In a quantitative analysis, researchers review and try to draw conclusions by calculations they perform on site logs.

11.   In a qualitative analysis, researchers watch people and try to draw conclusions from what they see the people do.

12.   The bounce rate is the percentage of people who immediately leave a page upon arriving.

 

Ninth story with 5 Vocabulary Words

1.     An information model helps you understand and manage large amounts of information.

2.     A type is kind of information. Actual pieces of information are called information items

3.     An attribute is one part or aspect of an information type.

4.     Attributes have value patterns. They are entry formats that specify the way that values of the attribute are expected to be entered.

5.     Info items have relationships to other items that connect them. As, for example, when a particular person (an item) likes a particular event (another item)

 

Tenth story with 3 Vocabulary Words

1.     The info loop is the cycle that information goes through from database to UI and back again to the database

2.     An action control in the user interface triggers the processing tier to run an algorithm

3.     The character takes on or inherits qualities of the types it is related to such as the class

 

Eleventh story with 2 Vocabulary Words

1.     Mathew Georgiou defines gamification as the application of game mechanics to things in everyday life, such as driving a car or even how you learn.

2.     simulation game tries to present a highly focused and simplified version of a real-life process.

 

12th story with 7 Vocabulary Words

1.     The term programming covers both the process and product of writing computer code. It is the logic and calculations that create the step by step process for getting the computer to do something.

2.     The logic you create is how you tell the computer to do or not do something based on certain conditions.

3.     You create calculations to use data you know to figure out what you want to know. They can be mathematical or other types of manipulations.

4.     The programming languages we use to create code are a lot like human languages. They are different ways of saying the same thing: logic and calculations

5.     All programming code is lines of text that tell the computer step by step what to do.

6.     An algorithm is a determined process that leads you (or more to the point a computer) from a beginning point to defined end.

7.     In the algorithms that we discussed, loops are really important. They keep the system from stopping until you decide to stop it.

 

13th story with 6 Vocabulary Words

1.     In databases, a question is called a query.

2.     Named after the famous George Boole, boolean operators allow you to combine simple phrases into specific searches using the words AND /OR / NOT.

3.     The operator “AND” will bring back only results containing all the words for which you are searching.

4.     The operator “NOT,” excludes results (pages) that have the term on them.

5.     The Booleans (AND, OR, NOT) combine all your criteria together to find the pages that match all your criteria

6.     In a Google search, the term AROUND returns pages where the two words are within a certain distance from each other on the web page.

 

14th story with 4 Vocabulary Words

1.     Google's page rank algorithm is the major way they decide how to order results. It's what made Google famous.

2.     In addition to the page rank algorithm, Google has a large variety of other ways to rank pages by their relevance to your search (called, not surprisingly relevancy ranking).

3.     The process of getting higher rankings on Google is called Search Engine Optimization (SEO).

4.     Search results filtering puts further constraints on your search results so that you see fewer and more relevant results.

 

 

 

 

 

 

 

Answers

(12)
Status NEW Posted 24 Aug 2017 03:08 PM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)