This essay Test has a total of 944 words and 15 pages.
1) A system in which a number of independent computers are linked together to share data and peripherals, such as hard disks and printers
2. OSI Model
3. Media Access Control
4. _____ _______ may qualify you for additional degrees or more advanced technical positions. [ .5 points]
5. What are five soft skills that are important in a team environment? [2.5 points]
a. ability to share sharing
b. communication skills
d. logical thinking
6. List the layers of the OSI model. [ 3 points]
2 Data Link
7. "In order to allow the OSI model to more closely adhere to the protocol structure and operation of a local area network..."
8. Without ____, you could not design a network because one piece of hardware might not work properly with another. [ 2 points]
9. In the following figure, the X represents the ________ of the simplified data frame. [ 2 points]
X Data Sent by Source
10. Connectivity devices, such as bridges and switches, work in the _____ layer. [2 points]
11. The primary function of the _______ is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. [2 points]
12. b. protocol
13. d. frame
14 b. inexact
15 c. pulses
16 a. two
17. d. amplitude
18 a. attenuates
19 c. data
20. a. Access Methodology is one type of topology discussed in the chapter. It is based on sharing media through different forms including CSMA/CD and Token Passing. In CSMA/CD the sender listens to see if someone is already “on the line” with the designated carrier. If the data cannot be transmitted the carrier returns a jamming signal in which the sender interprets and the process is repeated after some time. In Token Passing a monitor from client to client. The client with the token is the only one with control of the network. When there is a break in transmission, the token continues being passed along the network. This method works better with larger systems.
b. Logical Topologies are methods of transporting data from one workstation to its destination. In the sequential method, or ring logical topology, the data is passed from workstation to workstation until one recognizes the data as being meant for it. In broadcast method, the data is sent out to the entire network and each node decides if the message was meant for it.
c. Physical Topologies is the physical connections between the workstations. Most often these are in the star layout with a server as the center and workstations branching out from it. There are however the bus (computers in a linear arrangement) and ring (computers joined on both ends creating a loop) layouts with less effectiveness.
21 b. slows down
22. The figure below is a description of a _______________________ topology. [3 points]
23. a. It is a 3-byte token.
24. c. A hub failure cannot disable a LAN segment
25. The figure below describes a ________________________________ topology. [2 poin
26. a. Business
1) IP convergence by building a high-speed ATM network designed to handle data, voice, and video.
2) Next year GPB will add voice to its network. GPB will add a Mitel SX200 PBX which will connect its voice system to its membership server.
1) Microsoft Office, Oracle database.
2) Real Networks RealVideo server, online video editing and exchange.
1) data, voice and video
1) They decided that ATM was the only technology that would let GPB send voice and video on the network over which all of its data is running. It was best suited to handle multiple protocols and highspeed multimedia applications.
2) In desktop application it is indeed rare.
1) They offered products at 1/3 list, and Madge was only major player supporting Novell’s IPX protocol.
2) 180 ATM workstations.
3) ATMs multiprotocol support allow it to run IPX as well as other applicable protocols.
30. a. What is its purpose?
b. How many users/stations ?
c. Will there be application/file sharing?
d. Where will data be stored (server, client, etc)?
31. a. How much expansion is expected?
b. Is high speed an issue?
c. How much storage is needed?
34 a. security issues
b. ability to share information
c. ability to share hardware
d. centralized administration and support
35 a. UNIX experience
b. ability to work as part of a team.
c. excellent communication and documentation skills
Topics Related to Test
Computing, OSI protocols, Network architecture, Computer architecture, Media technology, Office equipment, Printer, Typography, OSI model
Essays Related to Test
Biographybiography BIOGRPAHY OF BILL GATE William H. Gates Chairman and Chief Executive Officer Microsoft Corporation William (Bill) H. Gates is chairman and chief executive officer of Microsoft Corporation, the leading provider, worldwide, of software for the personal computer. and employs more than 20,000 people in 48 countries. Born on October 28, 1955, Gates and his two sisters grew up in Seattle. Their father, William H. Gates II, is a Seattle attorney. Their late mother, Mary Gates, was a schooltea
Dr Grace Murrary HopperDr Grace Murrary Hopper Dr. Grace Murray Hopper was born on December 9, 1906. As a child Grace Hopper enjoyed learning about machines, technology and other countries cultures. Following her mothers love for mathematics and her fathers love for literature, Grace had high expectations for herself. Family life was large influence as she grew up, from the close relationship she had with her grandfather, a surveyor in New York City, she learned about real life at a young age. Her father, Walter Fle
A Change in Direction at Continental AirlinesA Change in Direction at Continental Airlines What words come to mind when you think of Continental Airlines? Successful company, preferred airline, good service, on-time airline, top carrier, financially solvent, happy employees. These are all true; however, this was not always the case. Just six short years ago, probably not one of those descriptions would even be said in the same breath as Continental Airlines. In fact, in 1994, Continental was facing its third bankruptcy; that bankruptcy wou
ADP Security EvaluationADP Security Evaluation Valuation of a Security Automatic Data Processing, Inc. ADP by: Katie S. McCarthy April 7, 1999 Spring Hill College Management of Financial Resources Dr. Ralph Sandler ADP Automatic Data Processing, Inc. (NYSE:AUD) ADP is one of the largest independent computing services firms in the world with more than $4.5 billion in annual revenues and more than 425,000 clients. Founded in 1949, ADP provides computerized transaction processing, data communications, software, and inf
Advanced Micro DevicesAdvanced Micro Devices Table of Contents Table of Contents 1 Corporate Overview 2 Company History 2 Products 3 Financial Information 4 Market Conditions and Competition 5 Strategies & Goals 6 Foreign Operations 6 International Production Facilities 6 Fujitsu Alliance 7 Foreign Currency Translations 8 Hedging 8 Problematic Issues & Their Solutions 9 Lawsuits 9 Taiwan Earthquake 9 Outlook 10 Appendix A Balance Sheets 11 Appendix B Income Statements 12 Appendix C Foreign Subsidiaries 13 Corpo
Analysis of BoozAllen and HamiltonAnalysis of BoozAllen and Hamilton Introduction Booz-Allen & Hamilton is one of the world\'s largest management consulting firms. Traditionally, the firm had decentralized regional offices serving clients independent of other offices. This made cooperation between offices difficult, which was hurting company\'s overall performance. To overcome this problem they came up with a Vision 2000 plan under which the company was divided into three regions which were further sub-divided (see exhibit 1). T
Analysis on Booz Allen and HamiltonAnalysis on Booz Allen and Hamilton Introduction Booz-Allen & Hamilton is one of the world\'s largest management consulting firms. Traditionally, the firm had decentralized regional offices serving clients independent of other offices. This made cooperation between offices difficult, which was hurting company\'s overall performance. To overcome this problem they came up with a Vision 2000 plan under which the company was divided into three regions which were further sub-divided (see exhibit 1).
Computer fraudcomputer fraud As much as $40 billion are lost every year due to flourishing computer crimes. In 1993 alone, Internet, the world wide system of computer networks, was swindled out of approximately $2 billion, and about $50 million were stolen from various companies such as GTE Corp., AT&T, Bell Atlantic and MCI ( Meyer and Underwood 45). Ironically these same organizations have been collaborating with software manufacturers for an expanded software production ( Cook 53 ). Multinational corporati
Critique of The Limited INCCritique of The Limited INC Critique of The Limited INC. Overall, we think that our classmates, Melissa and Jay, did a good job in their paper. Here are just few comments and suggestion that we think our classmates have missed. History: The management of the Limited relies heavily on the shoulders of CEO Leslie Wexner. The analyst has criticized him that he is frequently creating new businesses that evidently fails. The underperforming stores are as follow: *sum* 1995 Limited Inc. own 84% of Int
EcommerceEcommerce E-Commerce E- Commerce is another name for Electric- Commerce. Electronic-commerce offers what many people believe to be an effective property of the Web. That property is the ability to adjust sites to the different needs, wants, desires and, even personalities of each individual customer. This ability is known to many experts as cognitive computing, a blend of behavioral sciences and computer science. Increasing competition worldwide, increasing demands made by customers, and the r
Gates worldGates world Gates World Congrats to the man of the millennium Mr. Bill Gates. Bill developed the wonderful software that makes computing so much fun! As his company, Microsoft, surges for domination in the computing industry, I picture Bill installing little buttons under his desk for possible world take-over. Forget the Y2K bug, thats nothing! Through Windows I see Bill using Microsoft much like a chess move for world-wide Gates time! But dont worry, Im sure Bill has some pretty exciting pla
GenesisYour vision for the FutureGenesisYour vision for the Future Introduction: GENESIS Your Vision for the Future GENESIS Corporation is a company that deals with production of computer software and business applications that are essential for successful conduct of business today. We strive to provide affordable, innovative software solutions to users worldwide by applying creativity, experience and teamwork. The result of our efforts is production of high quality business solutions that make our customers live easier
HewlettPackard StrategyHewlettPackard Strategy Strategy Paper Hewlett Packard, Inc. (NYSE: HWP) TABLE OF CONTENTS SECTION 1 2 BACKGROUND 2 SECTION 2 2 MISSION, GOALS, AND STRATEGIES 2 Company Mission 2 Company Goals 2 Company Strategies 2 Management By Wandering Around. 2 Management By Objective. 2 Open-Door-Policy 2 Open Communication 2 SECTION 3 2 STAKEHOLDERS 2 Stockholders: 2 Employees: 2 Competition: 2 Major suppliers: 2 SECTION 4 2 EXTERNAL ENVIRONMENT 2 Industry Environment 2 Differentiation versus Commodity 2
History of Intel CorpHistory of Intel Corp I. History of Intel Corporation [Back to Top] Robert Noyce and Gordon Moore, who had left Fairchild Semiconductor, founded Intel Corporation in 1968. The current chairman of Intel, Andy Grove, had also come from Fairchild to become Intel\'s 4th employee. Their first commercial product was the 3101 Schottky bipolar 64-bit static random access memory (SRAM) chip, and it was moderately successful. The success of Intel didn\'t come until the early 1970\'s. Intel was a company f
IBM companyIBM company I. Current Situation (1991-1993) 1. History of IBM: IBM is a multinational corporation that started its activities in 1911. But its origins can be traced back to 1890, during the height of the Industrial Revolution. It was first known as the Computing-Recording Company, then in 1924, it took the name of International Business Machines. Nowadays, this multinational company is known as the « Big Blue ». 2. Mission statement IBM main activity is to find solutions to its wide range of cl
MIS DevelopmentMIS Development MIS Development The term Management Information Systems (MIS) has come to refer to a wide range of applications of computers to data processing and analysis problems in the private and public sectors. The pace of developments in computing in general, and MIS in particular, is breathtaking. Traditional concepts of how computers can and should be integrated into businesses are being challenged by worldwide telecommunications and transmission of sound, graphics, and video alongside
None Provided2None Provided2 Running head: The Edge of Excellence The Edge of Excellence Kathleen P. Munn Community College of Philadelphia Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing profession
What Computer Skills Do Employers Expect From ReceWhat Computer Skills Do Employers Expect From Recent College Graduates What Computer Skills Do Employers Expect From Recent College Graduates? By: Philip Davis, Instructional Technology Librarian Cornell University Ithaca, N.Y. Table of Contents Cornell University 2 Cornell Library Conducts Study 2 Research Methodology 3 A Review of the Results 3 Rankings, Groupings, and Correlations 4 Ranking Computer Skills: 4 Grouping Computer Skills: 4 Other Computer Skills 4 Comments From Employers 5 Variab
A certificationa certification REQUIREMENT #2 A + CERTIFICATION THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL CERTIFICATIONS. THIS CERTIFIES THE COMPENTENCY OF ENTRY-LEVEL (6 MONTHS EXPERIENCE) COMPTER SERVICE TECHNICIANS. CERTIFICATION PROVIDES THE CREDIBILITY, RECOGNITION OF ACHIEVEMENT, AND QUALITY ASSUANCE OF THE INDIVIDUAL TO THE HIREING ORGINIAZITION. THE CERTICATION IS OPEN TO ANYONE WHO WISHES TO TAKE IT. THERE IS NO SPECIFIC REQUI
A Certification RequirementsA Certification Requirements REQUIREMENT #2 A + CERTIFICATION THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL CERTIFICATIONS. THIS CERTIFIES THE COMPENTENCY OF ENTRY-LEVEL (6 MONTHS EXPERIENCE) COMPTER SERVICE TECHNICIANS. CERTIFICATION PROVIDES THE CREDIBILITY, RECOGNITION OF ACHIEVEMENT, AND QUALITY ASSUANCE OF THE INDIVIDUAL TO THE HIREING ORGINIAZITION. THE CERTICATION IS OPEN TO ANYONE WHO WISHES TO TAKE IT. THERE IS NO S
Advancements in Peripherals1Advancements in Peripherals1 Recent Developments in Computer Peripherals Including an in-depth look at Multimedia Input Devices A Report by Mr Matthew James Smith HNC BIT Year One Contents Title Page Number Introduction Two Section One - Development in Peripherals Three Section Two - Multimedia Input Devices Five Section Three - An in-depth look Digital Cameras Six The History of the Digital Camera Six How Digital Cameras Work Seven Conclusion Nine Appendix / References Ten Glossary Eleven Intro
Alan TuringAlan Turing Alan Turing was born in London on 23 June 1912. He was the son of Julius Mathius Turing and Ethel Sara Stoney, the youngest of three children, he was born to a distinguished family. His family background includes diplomats and engineers, three of which succeeded to the Royal Society. Alan turing was educated at Sherbourne school, from 1923 to 1931. After which he studied mathematics at Kings College, Cambridge, graduating in 1935 with a B.A. He was elected a fellow of the college on
Apple vs The WorldApple vs The World Apple vs. The World In past years, Apple was on a downward spiral, but now the Mac is back on the right track. The interim CEO Steve Jobs has brought them from expected quarterly loses to now, first quarter net income of some 150 millions dollars. The question still remains, is Apple back to stay? With the Windows driven world of today, can Apple assert them self to claim market share? Apples stunning new hardware, user-friendly operating system, and drive for incredible new
Artificial IntelligenceArtificial Intelligence ABSTRACT Current neural network technology is the most progressive of the artificial intelligence systems today. Applications of neural networks have made the transition from laboratory curiosities to large, successful commercial applications. To enhance the security of automated financial transactions, current technologies in both speech recognition and handwriting recognition are likely ready for mass integration into financial institutions. RESEARCH PROJECT TABLE OF CO
Artificial Intelligence1Artificial Intelligence1 Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing professionals? Medical facilities, police departments, and manufacturing plants have all been changed by AI but
Building a computerBuilding a computer BUILDING A COMPUTER With increasing popularity of computer games, and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets, and operating system to provide maximal gaming performance. Computers are often called number manipulators, because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers, which allows them to operate
Case about YahooCase about Yahoo 1. Success as a Web Search Engine a. Why was Yahoo! such an early success on the Web? Yahoo was an early success due to a combination of factors such as timing, hard work, and a good understanding of Web surfers tastes and needs.. In early 1995, Net mania was just flowering. It was a great time to be a young entrepreneur with an Internet idea. Dave Faldo and Jerry Yang saw a consumer need for classifying and differentiating web sights. Resting the urge to automate this process,
Censoring the InternetCensoring the Internet Censoring the Internet The internet offers a huge wealth of information both good and bad, unfortunately the vary nature of the internet makes policing this new domain practically impossible. The internet began as a small university network in the United States and has blossomed into a vast telecommunications network spanning the globe. Today the internet is ruled by no governing body and it is an open society for ideas to be developed and shared in. Unfortunately every so
Charles BabbageCharles Babbage Charles Babbage is often called the father of computing because of his invention of the Analytical Engine. However, many people do not know the details of this very important mans life. Charles Babbage was born on December 26, 1792, just about that same time that the industrial revolution was beginning. He was born in Teignmouth, Devon shire. Although not much is really known about his childhood, it is known that he had many brothers and sisters, but many of them died before a
ClientserverClientserver Client/server is the combination of three major technologies: Relational database management systems (RDBMSs), networks, and client interfaces. Clients execute specific local tasks with local resources. Servers provide shared resources and fulfill broad tasks. Communication enables definition and completion of full work processes. Client/Server software Infrastructure With competing paradigms-SQL databases, TP monitors, groupware, and distributed objects-the middleware that connects
Computer CrimesComputer Crimes Computer crime started in the early 1970s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a computer system. These are the people that usually steal data and cause data loss by vandalism. The most common kind of computer crime is espionage committed by people who work for a company, but this is also the one that you rarely hear about. They usually enter false data that will end up making money for them. Hackers are
Computer programercomputer programer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data processing industry that includes companies that write and sell software. Allot of programmers can also be found working for companies that provide engineering and management services, manufacturers of computer and office equipment, financial institutions, insurance carriers, educational institutions, and government agencies
Computer ProgrammerComputer Programmer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data processing industry that includes companies that write and sell software. Allot of programmers can also be found working for companies that provide engineering and management services, manufacturers of computer and office equipment, financial institutions, insurance carriers, educational institutions, and government agencie
Computer undergroundcomputer underground The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called computer hackers, or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast t
Computerization of a CompanyComputerization of a Company The word ubiquitous means ever present or occurring everywhere. This term could be used to describe the use of the computer in the business. The business worlds benefit alone is enough to make a head spin. Every time a person goes to the grocery store, the bank, the local ATM, or even the neighborhood gym the benefit by the use of computers in modern society is unforeseen by most civilians. Many fields in business depend on the convenience, speed, accuracy, and reli
Computers2Computers2 Computers This paper is about the computer. Today computers are used by hundreds of millions of people. There have been many advances in the computer. The computer used to weigh 30 tons and filled warehouse size rooms, but today can be as light as 3 pounds and fit in a persons pocket. There were basically three times the computer was mentioned. One as a mechanical computing device, in about 500 BC The other as a concept in 1833, and the third as the modern day computer in 1946. The fi
Computing nowcomputing now GUIDE TO (mostly) HARMLESS HACKING Beginners Series #2, Section 3. Hacking from Windows 3.x, 95 and NT ____________________________________________________________ This lesson will tell you how, armed with even the lamest of on-line services such as America Online and the Windows 95 operating system, you can do some fairly serious Internet hacking -- today! In this lesson we will learn how to: · Use secret Windows 95 DOS commands to track down and port surf computers used by famou
Computing Power UnleashedComputing Power Unleashed This article mainly deals with the microprocessor chip, which is the computer\'s brain. This computer chip is responsible for the majority of the computers functions, it\'s commonly referred to as the Central Processing Unit (CPU). It receives and executes your instructions and determines if your computer understands software written for a Personal Computer (PC) or a Macintosh (MAC). The CPU chip size is small, about half the size of a business card, and just as small a
Computing professionalComputing professional A Formal Comprised Interview of Devin Blank Computing Professional Compiled by Damon Blank 10-01-00 Intro to Programming ITSE 1402 A Formal Interview of Devin Blank The computer industry has taken a remarkable turn over the past 10 years. The foundation of multi-million dollar companies rest on the hands of those skilled to handle the demands of todays business networks. Email, fax and file services, print sharing and remote file access, are among the many vital fun
DESIGNING A NETWORKDESIGNING A NETWORK I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important issu
Dna Computing The Future or the EndDna Computing The Future or the End DNA Computing, The Future or the End? The future of computers is in the hands of the next century. The evolution of the Computer Age has become a part of everyday life, and as time proceeds, people are depending more and more on computer technology. From controlling a small wrist watch to the largest super-computers that can calculated the center of the universe, computers are essential for everyone in modern societies. Even most societies outside of the civil
Electronic CommerceElectronic Commerce Table of Contents Introduction 2 History of E-commerce ..4 Economic Impact 5 Advantages of E-commerce 5 Disadvantages of E-commerce ...7 The Future of E-commerce .9 Summary ...11 References .12 Electronic Commerce Electronic commerce, or e-commerce has developed very rapidly in the last few years and has left some
Hackinghacking Recently, the word \'\'hacker\'\' has fallen into disrepute, coming to signify in the popular media the perpetrators of various forms of computer-aided crime. But most of the people who call themselves hackers, who have proudly borne that title since the 1950\'s, are not criminals--in fact many are among the intellectual and entrepreneurial elite of their generations. The word \'\'hacker\'\' and the culture it connotes is too rich to sacrifice on the altar of the evening news. Bob Bickfo
History of Computer IndustryHistory of Computer Industry History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been a
History of computers1history of computers1 Early Computational Devices Somewhere around 3000BC the first mechanical counting device created was the abacus. The abacus is still used today and, amazingly to me, with great speed and accuracy. In 1642 another mechanical device was created called the Pascaline (after Blaise Pascal, a famous French mathematician). The Pascaline used gears and wheels (counting-wheels) to perform the calculations. The interesting thing to note is that the counting-wheel design was used in
How Can Artificial Intelligence Help UsHow Can Artificial Intelligence Help Us Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing professionals? AI has changed medical facilities, police departments, and manufacturing plants,
How To Computerize Your AccountsHow To Computerize Your Accounts Mark Demayo OUTLINE THESIS: I will explain the steps that need to be taken to computerize business accounts. The steps are planning and informed selecting of hardware, software, and training. I. Making the decision to computerize II. Choosing the correct tools A. Software B. Hardware C. New and old technology III. Installation and training In the normal course of a day our lives are affected by the technology of computers in ways we can only begin to imagine. Th
How to design a networkhow to design a network I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important
How Will We Use Tomorrows PCsHow Will We Use Tomorrows PCs How Will We Use Tomorrow\'s P.C.s? Tomorrow\'s PCs are going to be different in many ways; they will be more powerful, they will include more facilities for multimedia, and looking further ahead, they may have features such as three dimensional displays, or wrap around virtual reality. These changes will shape the way which we use our PCs, but even without such advances, there are changes that can and will take place in the operating systems that enable us to make b
Interactive classInteractive class How to Go From Class-Room to Web-Room as Painlessly as Possible By Rik Hall, University of New Brunswick, Fredericton, New Brunswick 1.0 ABSTRACT Getting your course onto the World Wide Web (WWW) is best done using a systematic approach. There are a number of steps that need to be taken prior to starting any of the actual web work. Meetings should be held with various groups within your institution. Once the actual coursework is begun, there are some essential components and so