Hello!!! |
Montag, 28. Januar 2008
These is the end!!!!!(1st part)
Blanca.Delcastillo.Uni-Linz, 21:37h
Well the semester is going to finished and with these , these course. For me these course had been very interesting an funny because, it was the first time that I had listened classes in German and although I can not understand lots of thing, it was interesting.
So I want to tell so thing about my semester. For me it was wonderful , when I arrived to Linz , I was afraid because , it was the first time that I was going to live alone (without my parents) and all in the country was new for me, but since the first time that I arrived , all was perfect. I had living all the time in the raab heim , and I had had the same room with my friend Blanca ( the other girl which came class everyday with me) it is very funny . The residence had been incredible , there had been living lots of Erasmus , and now I had lots of friend.During the week , we have lots of party and dinner very funny. During these four moths I had had time to do lots of things , during the week I went to my class I think I am going to pass all the course that I did , in fact I had passed two of there ,and for the other one I have not my marks but I hope to pass. All the Thursday night I went to the mensa ( for me it was the best from Linz ) , there are subrrealistic , in fact al the people used to go very dunker at the Mensa , but if it is only for a day it isn´t so bad , furthemore , the place and the music for these kind of party is very good. During the weekend we had been trying to do trips , I had been two times in Wien ,once of them I was with the Refi , and other one I was only with Blanca and although I had been in Wien before I think it is marvellous an d I have plan to return to Wien In February with my family before the new semester start. We went yet to Prague , Salzburg , Hallstag , Cracow , Munich and we went two weeks ago to doing Ski It was impressionist!! In conclusion , it was an incredible semester , furthermore i think I am going to pass all my subject ,but I hope the next one will be better , although It is difficult. I hope all the people who reads my bloc enjoy and have a nice time. ... link (0 comments) ... comment These is the end!!!!!(1st part)
Blanca.Delcastillo.Uni-Linz, 21:36h
Well the semester is going to finished and with these , these course. For me these course had been very interesting an funny because, it was the first time that I had listened classes in German and although I can not understand lots of thing, it was interesting.
So I want to tell so thing about my semester. For me it was wonderful , when I arrived to Linz , I was afraid because , it was the first time that I was going to live alone (without my parents) and all in the country was new for me, but since the first time that I arrived , all was perfect. I had living all the time in the raab heim , and I had had the same room with my friend Blanca ( the other girl which came class everyday with me) it is very funny . The residence had been incredible , there had been living lots of Erasmus , and now I had lots of friend.During the week , we have lots of party and dinner very funny. During these four moths I had had time to do lots of things , during the week I went to my class I think I am going to pass all the course that I did , in fact I had passed two of there ,and for the other one I have not my marks but I hope to pass. All the Thursday night I went to the mensa ( for me it was the best from Linz ) , there are subrrealistic , in fact al the people used to go very dunker at the Mensa , but if it is only for a day it isn´t so bad , furthemore , the place and the music for these kind of party is very good. During the weekend we had been trying to do trips , I had been two times in Wien ,once of them I was with the Refi , yhe other one i was only with Blanca and altough I had been in Wien before I think it is marvellous an d I have plan to return to Wien In Fevrary with my family before the new semester start. ... link (0 comments) ... comment These is the end!!!!!(1st part)
Blanca.Delcastillo.Uni-Linz, 21:33h
Well the semester is going to finished and with these , these course. For me these course had been very interesting an funny because, it was the first time that I had listened classes in German and although I can not understand lots of thing, it was interesting.
So I want to tell so thing about my semester. For me it was wonderful , when I arrived to Linz , I was afraid because , it was the first time that I was going to live alone (without my parents) and all in the country was new for me, but since the first time that I arrived , all was perfect. I had living all the time in the raab heim , and I had had the same room with my friend Blanca ( the other girl which came class everyday with me) it is very funny . The residence had been incredible , there had been living lots of Erasmus , and now I had lots of friend.During the week , we have lots of party and dinner very funny. During these four moths I had had time to do lots of things , during the week I went to my class I think I am going to pass all the course that I did , in fact I had passed two of there ,and for the other one I have not my marks but I hope to pass. All the Thursday night I went to the mensa ( for me it was the best from Linz ) , there are subrrealistic , in fact al the people used to go very dunker at the Mensa , but if it is only for a day it isn´t so bad , furthemore , the place and the music for these kind of party is very good . ... link (0 comments) ... comment These is the end!!!!
Blanca.Delcastillo.Uni-Linz, 21:28h
Well the semester is going to finished and with these , these course. For me these course had been very interesting an funny because, it was the first time that I had listened classes in German and although I can not understand lots of thing, it was interesting.
So I want to tell so thing about my semester. For me it was wonderful , when I arrived to Linz , I was afraid because , it was the first time that I was going to live alone (without my parents) and all in the country was new for me, but since the first time that I arrived , all was perfect. I had living all the time in the raab heim , and I had had the same room with my friend Blanca ( the other girl which came class everyday with me) it is very funny . The residence had been incredible , there had been living lots of Erasmus , and now I had lots of friend.During the week , we have lots of party and dinner very funny. During these four moths I had had time to do lots of things , during the week I went to my class I think I am going to pass all the course that I did , in fact I had passed two of there ,and for the other one I have not my marks but I hope to pass. All the Thursday night I went to the mensa ( for me it was the best from Linz ) , there are subrrealistic , in fact al the people used to go very dunker at the Mensa , but if it is only for a day it isn´t so bad , furthemore , the place and the music for these kind of party is very good . We went yet to Prague , Salzburg , Hallstag , Cracow , Munich and we went two weeks ago to doing Ski It was impresionant!! In conclusion , it was an incredible semester , furthemore i think I am going to pass all my subject ,but I hope the next one will be better , although It is difficult. I hope all the people who reads my bloc enjoy and have a nice time. ... link (0 comments) ... comment These is the end!!!!
Blanca.Delcastillo.Uni-Linz, 21:26h
Well the semester is going to finished and with these , these course. For me these course had been very interesting an funny because, it was the first time that I had listened classes in German and although I can not understand lots of thing, it was interesting.
So I want to tell so thing about my semester. For me it was wonderful , when I arrived to Linz , I was afraid because , it was the first time that I was going to live alone (without my parents) and all in the country was new for me, but since the first time that I arrived , all was perfect. I had living all the time in the raab heim , and I had had the same room with my friend Blanca ( the other girl which came class everyday with me) it is very funny . The residence had been incredible , there had been living lots of Erasmus , and now I had lots of friend.During the week , we have lots of party and dinner very funny. During these four moths I had had time to do lots of things , during the week I went to my class I think I am going to pass all the course that I did , in fact I had passed two of there ,and for the other one I have not my marks but I hope to pass. All the Thursday night I went to the mensa ( for me it was the best from Linz ) , there are subrrealistic , in fact al the people used to go very dunker at the Mensa , but if it is only for a day it isn´t so bad , furthemore , the place and the music for these kind of party is very good . We went yet to Prague , Salzburg , Hallstag , Cracow , Munich and we went two weeks ago to doing Ski It was impresionant!! In conclusion , it was an incredible semester , furthemore i think I am going to pass all my subject ,but I hope the next one will be better , although It is difficult. I hope all the people who reads my bloc enjoy and have a nice time. ... link (0 comments) ... comment These is the end!!!!
Blanca.Delcastillo.Uni-Linz, 21:21h
Well the semester is going to finished and with these , these course. For me these course had been very interesting an funny because, it was the first time that I had listened classes in German and although I can not understand lots of thing, it was interesting.
So I want to tell so thing about my semester. For me it was wonderful , when I arrived to Linz , I was afraid because , it was the first time that I was going to live alone (without my parents) and all in the country was new for me, but since the first time that I arrived , all was perfect. I had living all the time in the raab heim , and I had had the same room with my friend Blanca ( the other girl which came class everyday with me) it is very funny . The residence had been incredible , there had been living lots of Erasmus , and now I had lots of friend.During the week , we have lots of party and dinner very funny. During these four moths I had had time to do lots of things , during the week I went to my class I think I am going to pass all the course that I did , in fact I had passed two of there ,and for the other one I have not my marks but I hope to pass. All the Thursday night I went to the mensa ( for me it was the best from Linz ) , there are subrrealistic , in fact al the people used to go very dunker at the Mensa , but if it is only for a day it isn´t so bad , furthemore , the place and the music for these kind of party is very good . We went yet to Prague , Salzburg , Hallstag , Cracow , Munich and we went two weeks ago to doing Ski It was impresionant!! In conclusion , it was an incredible semester , furthemore i think I am going to pass all my subject ,but I hope the next one will be better , although It is difficult. I hope all the people who reads my bloc enjoy and have a nice time. ... link (0 comments) ... comment 10th Class!!
Blanca.Delcastillo.Uni-Linz, 20:19h
At the beginnig of the class we was talking about the date for the exam and some questions about that , after that we started the class with:
3.3.2.Relationale Bank. 3.3.2.1.Daten modelling. If a relational database to be built, it is first of all a conceptual model that the users of application programs or data required describes developed. One commonly used method of data modelling is the entity-relationship - model. Through entity relations relationship map, the object classes by rechecked, the relationships between the property by diamond type attribute necessary by the oval. Primary keys are underlined. In dependence of them, as many - to - many - relationships. Relationships can also attribute to have. 3.3.2.2. The business model. The diagram is a simple business model an instructive book a commercial basis. The "customers" issue repeatedly "sluggish" to the teaching buch handel. Each "contract" can have several "books", each in any quantity ordered. Several "publishers" embarrassed "books" with a "book" with a certain number and title only of a "publishing house" can come as a certain "order" exactly one "customer" is assigned. 3.3.2.3. ER elements. For graphical representation of the model he has presented ungs following elements: A lot entiltäts than rectangle. In the book action there is the example entitäts volume customer. On contract. Paper and publishing. As entität be distinct objects from the world. These can be tangible or abstract nature. An attribute is used as ellipse or district represents. In the book action - as the example has to contribute to attribute No, no release date customers. Attributes (properties) risieren a entität characters or a relationship (see the relationship between the contribution and to book the amount of property. Order is made, how many exemplares a Paper in a contract to be ordered) A key or primary key is in red. Key used for sorting, searching and finding in databases. If an entity not appropriate key, can be added to artificial keys, such as a number. A primary key allows for the identification of any entity. It must be unique. So some may not two different customers the same customer number. Relations between entities as diamonds drawn. In the diamond, the name of the relationship. To secure it, the reality derived from concepts to choose. A relationship volume is a collection of links to the same kind of linkage entity levels. 1:1 - Relationship: There can be only one element of an entity with one element from another entity connected. 1: n Relationship: An item from an entity with several other elements of a combined entity, but not vice versa. N: m relationships: Any number of elements of an entity can use any number of other elements of a combined entity. Special cases: Part of relationship. In cases of aggregation. Should such collective works in a database abgbildet, so, for example, part of volumes. Is-a relationship press a specialization or generalization. Example can entity quantities themselves in a lot merged entity. For example, "French textbooks" specialization of the entity quantity "language books." 3.3.2.4. Defining the relations (tables) The presentation of the need in a facility Let ER diagram, with their relationships and attributes does not lead directly to the tables of a relational database. To deduce the corresponding tables are building for the tables to be observed, particularly in the so-called. Normal forms are combined. A table is a collection of data on a given topic. If you have a theme for each separate table, avoiding duplicate data. The backup will be more efficient, and error in the input will be reduced. In tables are data in columns (fields), and rows (records). Each field in the table seben book contains the information for each book. There are 4 conditions on a table: -- A table must be unique. This means that at no time two identical records in the table must exist. It contains only one record. -- A table must atomic attributes and domains. -- The records are at all times as unsorted. -- The attribute sequence is never firmly defined. The following operations are possible with tables: -- A (blank) Data Set -- A data (rate) search -- Data fields -- Delete a record -- (Attributes add / delete) 3.3.2.5. Normalizing the tables With the transfer of the object classes in these tables are then to examine whether they dependencies of the fields themselves. Normalizes, by progressively reviewed whether the tables formed in conditions of normal forms. During this normalization process comes to a reduction of redundancy, but also in parallel to an increase in the number of tables. Whenever discover redundancies will lead to the formation of new tables, through the key fields combined. The adaptation of the tables, on the key fields combined. The adaptation of the tables to the normal forms is the basis of SQL. 1. Normal Form: Remove Repetition group Each field in the data set may be unique. There are several areas of the same type, they must own them in a relationship be saved. The transfer of the object class "contract" in a table (relation), the verbal description of the business model accordingly "Each job may contain a number of books, each in any quantity ordered." As a rule of order in several different books in different amounts, the fields: "Postionsnummer" and "quantity" several times before, was 1 Normal form objects. The consequence is therefore outsourcing of repeat gruop in a separate table “Auftragspos" and the combination of the tables on the key fields. The field "no" on the table "mandate" is key field of the table "contract" and is therefore compatible with the box “Auftragspos”. Order number". The names of the two fields differ, but the content is in both cases ident Here is an inevitable redundancy un relational databases, which are also controlled by redundancy and redundancy of not talking. For the fulfillment of the business model described tasks sin detailed data about the books required. And the end of the was the time to do question about the subject: we did three questuion, the first one was about the Function because we didn´t undestadb good the meaning of a logical fuction.The second one was the the cookie , because altough we had done a work about these , we can´t understan very well it , and the third one was about the handgloves, now we haven´t any problem about these things!!!! ... link (0 comments) ... comment Donnerstag, 24. Januar 2008
9th class!!(14/1/2008)
Blanca.Delcastillo.Uni-Linz, 13:37h
During the class we had been talking about:
3.3 Databases A function of a computer system is, data, text, images, language, sounds store, so that their needs, particularly swift and easy retrieval and benefits possible. For the user of a personal computer is often the situation on that information will be evaluated and processed, for example, in several different graphics, reports and spreadsheets are included. These documents are often using different software packages such as different file formats. The retrieval, and above all, the benefit of these documents therefore requires knowledge of each set PC file formats. In this section, in particular, is a matter of how large volumes of data reliably and permanently stored and retrieved when needed them. Therefore it is necessary for one or more users relevant Ausschitte from reality isolate, and the latter in conventional file systems or databases way. Basic questions of the data organization and the planning of database systems and tools for the widespread use of databases are therefore more content this section. 3.3.1. From the file to the database Files, and therefore those databases contain illustrations of the reality that for inter-operational and information and communication processes as necessary as, for example, prove useful. The completeness and accuracy, for example, a file or database can only involvement in the real environment assessed. 3.3.1.1. The objects file and sentence A set is an object of simplistic reality in a computer system. One such object can be a concrete object, an event or an abstract concept. It is described by its attributes. The object "textbook" can be, for example, by the attributes "number", "Author", "title", "price", "Publishing" and "stock" to describe. The concrete contents of the specific attributes of a textbook will be assigned fields. All fields of a specific object constitute a record. A tabular presentation is suitable for excellent. The table can be to the description of other objects to be extended. Data fields are the smallest unit of files and databases. Data fields are marked with a name, following often with the name of the attributes and can cover different date types. The fields "number" and "there" are like Type, "integer", the field "price" of the type "decimal number." The fields "author", "title" and "publishers" are of the type "text" and the "leaking" of the type "flag" (with the expression "y" or "n"). From similar deresn attribute objects and object classes are formed. A file is a great property; they consist of one or more date rates. In that field, or those areas in which a artefacts. Key are assembled from several fields, they are as combinations key. Such structured files are sometimes referred to as flat, classic or conventional files. Bezuges because of the heavy tasks of services to meet individual user files in the conventional rule is not the inner - and inter-task diversity. A major lack of organisation means of data files is occurring redundancy and inconsistence within the file and other files za, the company will be led. Characteristic of conventional files is also the strong, mutual dependence with the application accessing these programmes. Advances operational procedures, and legal or other changes often make adjustments in the structure of datein necessary. It must, for example, New fields added to a file. In the above example "lehrb <úcher" could be a change in the order - and lieferungs process (of the logistics) the file extension of the "book" to the field "isbn" require 3.3.1.2. Use of a conventional file Based on the following examples are depicted in simple query calculation tables tools explained. Does the program will feature "special filter". The process of a file from those records filters, which meet the specified criteria, the selection means. The basis of selection is the use of logical operators (and, or, not), comparison operators (equal, not equal, bigger, smaller, More immediately, small equal) arithmetic operators and special operators. If, however, from the present number of data fields only certain selected, it is called projection. Selection and projection can be executed in parallel. 3.3.1.3. DBMS database systems (management) Database systems are characterized by the fact that by several / many users and applications used data in a global model (conceptual model). There is a decoupling of the problems of data storage and data organization of the technical tasks of the users. Redundancies are only for reasons of security, integrity or faster access time tolerated. Inconsistencies will, as far as possible off. Database systems are made up of the database and a DBMS. It should basically be whether the data model hierarchy, the network model or the most widely used, explained below relational model is based. All that is the theory about we have been talking at class today and we have been learned with an example how to differenciate between specialfilter and standfilter in a database. We have learned it by an example with books. The special filters have not to be complex and have to be exposed to logic for the relationship to be meaningful and the computer will understand. For example said: search chemistry books published by the company "X", that the computer understands it is only "A and B" for example. Examples of criteria for filtering are "A and B" and "A or B" simple, not complex.All this is not what is known as "selection". We have also seen that there is a database, the area where establishing criteria and the result area, all these fields we have seen directly on the computer with the example we have been doing in class, and thus the entire theory has been previously explained more clearly. ... link (0 comments) ... comment Mittwoch, 16. Januar 2008
After Christmas!!
Blanca.Delcastillo.Uni-Linz, 22:32h
8 CLASS (9/11/2008)
After the Break , that I had doing for Christmas , I must to come back to the work ,It is for that , I am going to do a resume for the main point that we saw at the class. During the class , we spoke about function: 3.2.4. Selected functions for business purposes. 3.2.4.1. Overview of the functions. The following overview shows, which currently features usually in tables kalkulations programs are available, although in particular. In the subsequent detaillierung those selected were required for the solution of tasks of business relevance. Current tables kalkulations programs regularly offer a multiple of functions in the various areas; they should because of the examples here learned in demand also falls under these additional functions out tion of the help function. Financial Mathematical Functions: = Bw. ......... Bart returns the value of an investment. = IKV ......... Internet equity interest rates. = LIA ......... Linear depreciation rate. = Etc Date Functions: = Date ....... reckons with the day, month, year una specified date in order enine current number, you can then sangaben date. = Today ....... returns the current date. = Year ........ calculated from the number dder current year. = Etc Information functions: = Istfehler .... returns true if the cell contains an error value, it can also query whether a cell respect (istbezug), a re except (istfehl), a text (isttext), not text (istktext) , a blank cell (istleer), a truth swert (istlog), a fehlerwert (istnv) or a number (istzahl). Typ = ......... provides a number of the datentyp the specified value. = Cell ....... provides information about formatting, position or content of a cell. Mathematical and trigonometric functions: = ABS ...... OrderForm absolutwet as a result of the number. = ARCCOS delivers the Arkuscosinus .... = ARCSIN delivers the arkussinus .... = Etc. Statistical Functions : = NUMBER ... as a result provides the number of pay. = ANZAHL2 .. as a result provides the number of pay, any values. = MAX ...... supplies grisste number from the argumentliste. Matrix functions: = MDET ..... determinante provides a matrix. = MINV ..... returns the inverse of a matrix. = MMULT .... delivers the matrizen produckt. = Etc Text functions: = PARTY ..... converts a number with a fixed number of comma, in a text. = FIND ... looking for a text in a text and gives the position ¨. Large / small description will beahtet. = GROSS .... Waldelt text in big letters. Logical Functions : = FALSE .... as a result provides the (wahrheits) worth wrong. = NOT ..... returns TRUE, if the argument was false, and vice versa. = TRUE ...... provides the true heitswert TRUE 3.2.4.3. Statische functions The most commonly used formula is certainly the sum formula. It was therefore Excel 3.0 as a separate icon in the toolbar and click of a button can be entered. The function returns expected, the sum total of the figures cited as arguments. In some programs, this function is designed to provide only a range argument can edit. Therefore, the formula in cell is not defined anywhere. Figures is either a single number or a range of numbers. It can be fixed values, formulas or references to other cells can be entered. If the specified range references to cells, which do not contain figures, they are simply disregarded. Would these cells by adding operators added, it would be the result of the error value, because not all cells addiebare values. Be texts or truth-values directly as arguments in the sum formula, then they are converted into numbers and very probably counted. TRUE will be counted as number 1, text with the appropriate numeric value. Do arguments, which are not convertible in numbers are directly as an argument in the sum formula, then the error value # VALUE. The function NUMBER notes how many numbers in the Argumentlische contained and returns the appropriate value. Only values, the null, numbers, truth-values, datumsangaben or numbers in text form sind.Fehlerwerte be counted just like text, which is not convertible into figures. Do you want to include all cells, which contain anything, it stands for the function ANZAHL2 available. These include all cells, which are not empty. Cells with empty text is not empty. The AVERAGE aritmetische provides the means of defined figures. Blank fields are not upošteva, fields with 0 on the other hand, already, even if they do not appear. The function ABUNDANCE is in a class division over a range of numbers. For example, the data in Figure 3.2 / 8 in five categories, with a clef. It can use this function automatically creates a frequency distribution of the individual notes, which now has been a rather cumbersome combination of database and multi-operation could be achieved. The MODALWERT delivers the most value of a data series. With SCHIEFE the skewness of the distribution. The curvature of the distribution compared with a normal distribution is determined by the Kurtosis describe what the function KURT Excel offers. To those Populations know sizes for a given number of group to be able to quickly determine, there is the command in Excel "analysis functions" In the pull-down menu "Tools". Using this feature allows for a range of cells as comfortable histograms, moving average, rank and quartile, and the drawing of samples carried out. 3.2.4.4. Logische functions The spreadsheet can no defined processes, as it is not procedurally is built. However, many situations in which, according to a different value, a cell one, or a different value. It is not possible with functions, depending on one condition a value in one or another cell Submitted. But it is quite possible, in a cell, depending on one condition, different values represent. This objective serves the function if: The truth-value can be used either directly in a cell, then to be referred, or it is the result of a comparison operation. It often happens that several conditions linked. To serve both AND and OR functions. The OR function returns true if at least one condition is TRUE, and the function returns the result TRUE if all conditions contained therein are true. With the result is not reversed. 3.2.4.5. Date functions With the functions DAY, MONTH, YEAR, HOUR, SECOND MINUTE, and the individual values from the serial number. The integer part represents the date, the decimal time. The WEEKDAY function, which is also the current number is used as an argument, returns a number between 1 and 7 Important: The Mac operating system calculates the date generally from 1.1.1904, while Windows default with the 1.1.1900 begins. One must in the Windows version of Excel is the option date values from 1904 to take the same calculation basis. ... link (0 comments) ... comment Test Day!!!!!
Blanca.Delcastillo.Uni-Linz, 21:44h
28/11/2007
Today is the for the exam , because we don’t have a good level of German we can do these exam , but it is not a reason for no work these week. For other subject which I am doing now I must to do a work about virtual team , I think it is interesting , furthermore I think It is very relation with these subject which talked about the computer and new technologies, why I think my work have relation with the subject? Because , The virtual team is able to do thanks to the new technologies. So , It is my work: We are going to talk about virtual team , it is for that we are going to start with a definition of this. A Virtual Team – also known as a Geographically Dispersed Team (GDT) – is a group of individuals who work across time, space, and organizational boundaries with links strengthened by webs of communication technology. They have complementary skills and are committed to a common purpose, have interdependent performance goals, and share an approach to work for which they hold themselves mutually accountable. Geographically dispersed teams allow organizations to hire and retain the best people regardless of location. A virtual team does not always mean teleworkers . Teleworkers are defined as individuals who work from home. Many virtual teams in today’s organizations consist of employees both working at home and small groups in the office but in different geographic locations. Once we have a definition of what is a virtual team, the question may arise of why working in this way, and not face to face as had previously worked in companies, "We will develop the principal advantages of the teams virtual well understand this new way of developing work, these are: § Best employees may be located anywhere in the world. § Workers demand personal flexibility. § Workers demand increasing technological sophistication. § A flexible organization is more competitive and responsive to the market place. § Workers tend to be more productive – less commuting and travel time. § The increasing globalization of trade and corporate activity. § The global workday is 24 vs. 8 hours. § The emergence of environments which require inter-organizational cooperation as well as competition. § Changes in workers’ expectations of organizational participation. § A continued shift from production to service/knowledge work environments. § Increasing horizontal organization structures characterized by structurally and geographically distributed human resources. Of course this new technique has advantages like, have a disadvantage, the major disadvantages are: • Misunderstanding in communications is the leading complaint among members of virtual teams. • Working on a project over the virtual workspace causes lack of project visibility . • Difficulty contacting other members.(For example, email, instant messaging , etc.). • Differences in time zones. • It can be difficult for team members to fully comprehend the meaning of text-based messages. Once we know that is a virtual team, their strengths and weaknesses ,how we are going to develop the creative work developing its principal objectives can be developed in this type of organization. After reading the material recommended, and seeking additional information about this type of work so we can give some recommendations by which the virtual team could carry out their work in a creative way and making its main objectives. These are: -Include Face-to-face Time: Have an initial face-to-face team meeting for the team members to get together, meet each other, and socialize. Meet face-to-face periodically throughout the life of the project. These meetings will help to establish ties, relationships, and trust among team members which are important for an effective team. In addition, many problems can be resolved when people meet face-to-face. -Keep the Project Visible: Many team members consider overall project visibility important. This includes the overall schedule, progress toward goals, and how each team member fits in. Team leaders can send team members copies of the project schedule or provide an electronic view of the project schedule on-line using the Internet. -Avoid or Reduce Communications Delays :Team leaders should recognize that the combination of multiple time zones, busy team members, and electronic communications will likely result in communications delays. This may become a significant problem. One way to begin to address this problem is with the establishment of ground rules or group norms. -Keep Team Members Visible: Use the Internet or work-group calendaring software to store team members calendars. -Use Computer Supported Cooperative Work Technologies Where Possible :The Internet/World-Wide Web combined with email can provide reasonable communications capability and visibility to many teams today. -Establish Ground Rules or Group Norms: Ground rules are important for teams to establish. They are useful in determining how team members interact and what kind of behavior is accepted. These ground rules assist in preventing misunderstandings and disagreements . -Take Time Out for Self-assessment: Periodic assessment is important to determine where the team is vis-à-vis where it is going. Team leaders should periodically stop to examine how well the team is functioning and see if anything is interfering with its effectiveness . -Recognize People : If team leaders recognize peoples’ contributions to team goals, people will respond to recognition. Recognition does not have to be in the form of a raise, a promotion, or stock options; recognition can be as inexpensive as a simple “thank you.” Recognition should be public. Organizations and teams can adopt and adapt the example of recognition from Military organizations where recognition in the form of medals and insignias is given in a public setting. In a virtual environment, where the team cannot physically meet, recognition could be given in a voice or video conference setting or perhaps even more informally using email with all team members copied in a distribution list. -Learn from Experience: Team leaders can learn from other team experiences. Data collected over time can be organized into knowledge bases, FAQs can be established, and other useful forms of information can be made available for sharing. For this study will conclude with some concluding remarks, as we have seen virtual teams can be effective, creative and efficient. People who are virtual teams may be known among them, and trust without having to work every day together. New technologies such as the Internet, and everything related to it (e-mail, webcam, etc.) are an important subject to the effectiveness of this type of group work and without him it would not be possible. Finally, as we have seen, but could operate virtual teams will be more effective and work better if there was any contact between the team face to face. Bibliography: -Wikipedia, the free encyclopedia -Clifton Chair in Leadership, College of Business Administration, University of Nebraska-Lincoln; Director, Gallup Leadership Institute, University of Nebraska-Lincoln. -www.seanet.com/~daveg/articles.htm#Factors. ... link (0 comments) ... comment Seventh class!!!!
Blanca.Delcastillo.Uni-Linz, 21:31h
7 CLASS (21/11/2007)
2.1.4.2. E-MAIL Electronic mail is another Internetdiensst dar. e-mail is so popular because it has a lot of advantages compared to conventional mail offers. Email is shothand term meaning Electronic Mail. Email much the same as a letter, only that it is exchanged in a different way. Computers use the TCP/IP protocol suite to send email messages in the form of packets. The first thing you need to send and recieve emails is an email address. When you create an account with a Internet Service Provider you are usually given an email address to send from and recieve emails. If this isn't the case you can create an email address / account at web sites such as yahoo, hotmail and lycos. The header of an email includes the From:, To:, Cc: and Subject: fields. So you enter the name and address of the recipient in the Fom: field, the name and address of anyone who is being copied to in the Cc: field, and the subject of the message obviously in the Subject: field. The part below the header of the email is called the body, and contains the message itself. Spelling the correct address is critical with an email. Like with a normal postal letter, if you get the address wrong it won't go the correct receiver. If you send an email to an address which doesnt exist the message will come back to you as a Address Unknown erro routine. Email Protocols: IMAP, POP3, SMTP and HTTP Basicaly, a protocol is about a standard method used at each end of a communication channel, in order to properly transmit information. In order to deal with your email you must use a mail client to access a mail server. The mail client and mail server can exchange information with each other using a variety of protocols. IMAP Protocol: IMAP (Internet Message Access Protocol) – Is a standard protocol for accessing e-mail from your local server. IMAP is a client/server protocol in which e-mail is received and held for you by your Internet server. As this requires only a small data transfer this works well even over a slow connection such as a modem. Only if you request to read a specific email message will it be downloaded from the server. You can also create and manipulate folders or mailboxes on the server, delete messages etc. POP3 Protocol: The POP (Post Office Protocol 3) protocol provides a simple, standardized way for users to access mailboxes and download messages to their computers. When using the POP protocol all your eMail messages will be downloaded from the mail server to your local computer. You can choose to leave copies of your eMails on the server as well. The advantage is that once your messages are downloaded you can cut the internet connection and read your eMail at your leisure without incuring further communication costs. On the other hand you might have transferred a lot of message (including spam or viruses) in which you are not at all interested at this point. SMTP Protocol: The SMTP (Simple Mail Transfer Protocol) protocol is used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server. The SMTP protocol can only be used to send emails, not to receive them. Depending on your network / ISP settings, you may only be able to use the SMTP protocol under certain conditions. HTTP Protocol: The HTTP protocol is not a protocol dedicated for email communications, but it can be used for accessing your mailbox. Also called web based email, this protocol can be used to compose or retrieve emails from an your account. Hotmail is a good example of using HTTP as an email protocol. The First E-mail on the Internet In 1971, the first e-mail was typed into the Teletype terminal connected to the Digital Equipment PDP-10 in the rear of the picture below. The message was transmitted via ARPAnet, the progenitor of the Internet, to the PDP-10 in front. Dan Murphy, a Digital engineer, took this photo in the Bolt, Beranek and Newman datacenter. 2.1.4.4 FTP The Internet is a veritable treasure trove of files and programs. To these files on their own computers to download the File Transfer Protocol. Practical significance is also in FTP upload their own home page on the server of the Internet provider. Students, the course IV1 visit can beispieleweise their homework exercise comfortably at home via FTP. With the help of FTP-Protokolls it will be possible to the user files, programs, music files and the like to download. Publicly available FTP_Server can most conveniently on the browser to display. Nevertheless, the use of a separate FTP program usually practicable. If the server is open to the public talk by anonymous FTP. The user logs in as "Anonymous" on the server and used as a password in normal circumstances their own email address. In an identified FTP is entering a user name and a Passworters required. For the task of building exercises on the IDV for the login user name as the matriculation and personal password of the students. By using its own FTP software, as shown in the above figure can be seen, the user's hard disk simultaneously directory and the directories on the server at a glance. The handling is similar to the Windows Explorer ajar, and the files can be easily using drag-and-drop up-oder Downgeloadet. The Internet is a great treasure trove of shareware and freeware programs dar. Many manufacturers are usually for about 30 days a shareware version of their software into the network, which for this period is free testable. Freeware programs, however, are unrestricted free usage. The author maintains, however, the full copyright to the program. In addition, there is usually a number of adware programs, which are also free and unbeschränckt usable. The user must, however, with advertising displays live, he will not, he can usually an ad-free version for a fee. Frequently there are also software, under the GPL (General Public License). GPL called Open Source Software, the user is free to use. Additionally, the source code of the software. Interested parties may develop this software and then distribute under GPL. The mines found in software demo versions available always have a limited function scope "Commercial" always Software, which is also a demo version of the website, but their use is limited in time. In the last few years have also exchanges like Kazaa established. The participants enter on one side files from its collection to the public free and may return the data of other users for download for their use. The use of these exchanges is, however, great caution. Not only that many participants contaminated files to the web, in most cases users try newest MP3_Files, software and films for free to grab. This kind of exchange is, however, illegal, as it infringes the copyrights it. Program, music and video may be used only for its own budget for the purpose of backup copy burned. With the transfer to a third party makes you a criminal offense. Recent CDs and videos contain additional copy protection. This should not be cracked, a recording of an analog copy is allowed. A legal way to come to music, for example, the inclusion of a music webradio dar. 2.1.4.5. Instant Messaging/Chat Enjoy chats on the Internet as a form of real-time communication great popularity. It can be used with people from all over the world to chat without its own identity announce it. It has been established that people in the chat room under a nickname in appearance occurs. The best known is probably the Instant Messenger ICQ. Anyone know his personal contact list, and you can see at a glance whether friends are online. In addition, of course, new contacts around the world to tap. Apart from the traditional chat, it is with Instant Messaging Conference talks to lead or online to play. Even in the division Instant messaging is gaining in importance. 2.1.5.1. Safety in internet 2.1.5.1. VIRUSES Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. To help avoid viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, and that you follow a few basic rules when you surf the Internet, download files, and open attachments. Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection. TROJANS In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. HOAXES The Hoaxs (joke or deceit), they are messages with false alarms of virus, or of any other type of alert or chain (even shared in common, or that involves our own health), or of some type of denunciation, distributed by electronic mail, its common denominator, it is to request to him distributes them "to the greater possible amount of well-known". These alarms, usually they are TOTALLY FALSE, or based on erroneous facts, but what is worse they activate a type of "contamination" very different, propagate hundreds and up to thousands of warning messages on such. And still in the case of denunciations based on fact real, this form to do weakens it totally its true objective. This is a description of hoaxes more common that they circulate around the network. It never returns to send no of these messages. If somebody of good faith sends one to him of these alarms, avi him to it of pages like this so that it leaves its deceit and it obtains more. 2.1.5.2. FIREWALL A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to. Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources. There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates. A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall. Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a barrier established to prevent the spread of fire 2.2 Search and Find on the Internet Often, the term is inaccurate search engines for all types of search tools. In this issue very soon, many well-known throughout the Google search engine and all too easy to forget that there are a lot of good search tools and search strategies, especially for the efficient search on the Internet note. 2.2.1. Search A search engine is a service on the Internet, with the parts you can browse the Internet. A search engine can be equipped with a Indez or a keyword index in a book compared. For the user is presented a search engine on the Web site, like any other web page. In one form of search criteria can be entered. In addition, the search to specific objects, bestimmnte addresses or to a specific date range may be restricted. The search engine provides the user a list of Web Addresses, the criteria at its best. On the Internet, there are numerous search engines. Some try to cover the whole WWW, others seek only in a certain part of the WWW pages only in the German language. But not all websites can be searched via search engines. How does a search engine? A search engine searches the Internet when the user submits a search query. Among the billions of documents on the Internet would be much too long. A search engine consists of three parts robots, Indez and Benutzer-Schnitstelle: Very simply, it will be declared websearch.about.com The technical development of a search engine is demostrate on a schematic representation in the book, but I couldnt copy it here, and with it you can understand the technical development of a search. ... link (0 comments) ... comment Sixth class!!!
Blanca.Delcastillo.Uni-Linz, 21:29h
Sixth class (14/11/2007)
A small data file created by a Web server that is stored on your computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site to recognize you and keep track of your preferences Cookies Are Beneficial Cookies are commonly used to "maintain the state" of the session as a user browses around the site. The shopping cart is an example. You can place an item in the cart, switch to another page or even another site, and when you come back, the site knows who you are, and you can continue with the order. Without cookies, the site would not be able to identify you automatically because the Internet is "stateless. Cookies contain a range of URLs (addresses) for which they are valid. When the Web browser or other HTTP application sends a request to a Web server with those URLs again, it also sends along the related cookies. For example, if your user ID and password are stored in a cookie, it saves you from typing in the same information all over again when accessing that service the next time. By retaining user history, cookies allow the Web site to tailor the pages and create a custom experience for that individual. Your Cookies Know You Quite a bit of personal data may reside in the cookie files in your computer. As a result, this storehouse of private information is sometimes the object of attack ... link (0 comments) ... comment Fifth class!!1
Blanca.Delcastillo.Uni-Linz, 21:14h
5 CLASS (7/11/2007)
1.4.2. Drawing from said The award of texts is not a new invention in the form of sentence and correction instructions, she was an indispensable tool for writers and editors to instructions for the implementation of a manuscript doing. Even the use of large and small description and bold is a form of the award. Strictly speaking, this is a simple form of physical distinction. Physical award means the document content with certain attributes to the visual representation to describe and has become part of the layout design. In the data processing called the Mount of tags in a conventional text file also labeling. When tags are instructions, which consist of two parts. In between, there is either plain text or another tag. In the latter case, talk of a so-called nesting of tags. Since Tags also from text drawing, it is necessary that these differ from the rest of the text at once. Usually, in the markup languages, like HTML and the Grösser Kleiner characters. The opposite of a markup language are file formats, a spezific coding. For example, you can expect special HTML tags in a text with a particular font, color and size. The Physical award may also refer the entire document cover. To include tags for the indication of the page width also added. Of the difference between the logical distinction of a text, the structure of a document describes. This includes, for example, headings, lists, paragraphs, Rahemn, lists and references. There is, of course, for a reception by the people sense that this text elements also represent different visually. The term is also awarded in the name HTML: Hyper Text Markup Language.That name is also clear that with this language called Hyper Text, which are non-linear lyrics, excellent. The connections between individual hyper text, called Links, a part of the structure of a hypertext there. The objective of the award is a logical addition to the structure, above all, a computer-aided processing of hypertext. For various output devices are certain physical representations different. For various output devices are certain physical representations different. This is in the HTML Cascading Style Sheets are available. This clean segregation of us layout structure is in daily practice in many HTML is not given. Why is that old versions of CSS browser does not support the use of style sheets is still not as widespread. For the most flexible use is a separation of the structure, content and format requirements.The mixture of structure and format in HTML, despite the obvious disadvantages of not more than initially disturbing. The use of formatting commands within a document was also rather the usual WYSIWYG view and we have not even thought of a treatment for a variety of output devices. In the early days of the Internet was an easy-to-learn and easy-to-use tool also important. Thus wore these design weaknesses of HTML significantly to the spread of the WWW. But the latest labor Creating Web pages, the same treatment content sources for different output devices, the application of existing enterprise Style Guides, version management, and from certain project sizes is a clean separation of the structure, content and layout is essential. It seems somewhat restrictive, though always of texts such as Hyper text of the speech, it is still at Internet sites throughout today to multimedia presentations. The concept of hypertext, however, to a close only monomediale representation. The reason for the continued use of the term text is that the description of multimedia web pages also by simple texts. Besides HTML, there are other ways to multimedia documents to structure and save. Together, these data formats that it is mainly due to a physical description of a document designed: Word processing programs Page description languages Document Formats In contrast to HTML, it is in these file formats but to no markup languages and the structure, content and the data in a single file. The possibilities for physical distinction has been in HTML CSS 2.0 a level achieved, even nourished hopes that HTML in the near future as a universal page description language, and as a universal document format will be used. A possible indication of this is in the fact that HTML now all Office-Pakten as of alternative export file format. In contrast to the layout are the tags for structuring content in HTML less advanced . This is not necessarily a disadvantage to be seen as the integration of tags to the physical presentation and the low level language with a reason for the slight learnability of HTML been. In addition, HTML, in contrast to many word processing file formats, Desktop-Publishing file formats to un document formats as a platform file format to be considered. Due to the limited opportunities for structuring content, the use of HTML for the creation of documents for an information-processing little sense. The commands for structuring a document available on the Internet hypertext designed and authoritatively defined without their own extensions are possible. For the simple publishing documents on the Internet that makes sense. Typical Internet documents are not too large claims in terms of structuring options. Adding custom tags in HTML is not desirable, such as not useful, because yes, the Internet is different clients on a defined standard of the language relate. Unlike this layout-oriented tasks, but it looks at data-centric tasks. These are problems, mainly in the storage and transmission of data provided by operating daily incurred. These data have a complex internal structure, and should not be only for a presentation prepared on the Internet, but also the most easily can be processed electronically. A most convenient exchange of documents and an easy-to-use information further processing but also for layout centered desirable. More and more often is for the business daily business, the need for such a layout-oriented software systems within heterogeneous IT infrastructure, but also between the EDV-Lanschaften cooperating organizations. New technical requirements for such systems also come from the leadership of the organizations themselves: there is a vital interest in data and document centered sources with different formats for the Knowledge-based management systems and to merge and process. But also for a more intelligent "search and find" on the Internet, such as search engines and software agents, HTML is not the ultimate savior. For these application areas is not only a cross-platform format required, but it also needs to develop a scope of independent us the opportunity provide any bedeutungsspezifische information in a document. In HTML, there are approaches, such as meta tags to describe a document, but they are not expandable. Is a markup language that is not confined to a given grammar and vocabulary is not expandable, but with the possibility of their own markup language to create, which can arbitrarily complex document structures can be mapped. A markup language that satisfies this is called a meta-language. So far, the most comprehensive approach for such a meta language, SGML (Standard Generalized Markup Language), which build on the work of GML in the year 1986 standard. SGML is used in many industries for the document management. Quote value are primarily the automotive and defense industries, which are both due to the complex nature of the early SGML documents for their application areas adapt . The disadvantage of SGML that is a very complex and difficult. This promises to remedy the Extensible Markup Language, with the help of SGML has been defined. 1.4.2.1 Basic concepts of Hypertext Markup Language In comparison to a conventional desktop publishing Programe are the design options in W3 still some limits. The development and standardization of HTML but is a constant He further ungso rizess subject, but in addition to the current standard HTML 4.01 and x HTML 1.o of each client developers deviating from the standard implements additional features. With an extensive support of the W • C already standardized CCS-2 is thus a real page design for Web pages possible. Heading As the quell code apparent Could the HTML document with any text editor or word processing has been applied. Every HTML document begins with the day </ html>. Too formatted text is basically at the beginning of one-and final-Tag marked with the final-tag a slash (1) are presented. Such a comprehensive text tags are also containers. The opposite of this are tags that are not final-tag, such as the first day in these key from Abb.I-2.7.Das day <DOCTYPE> is optional, and refers to the HTML version, and used language In actual textteil there is a lot more opportunities, single-day u setzn. Can titles in six different sizes are defined, but the definition of font and size for each <Hx> tags to W3- Clientes can be set. The syntax is <Hx> text </ Hz>, where x is a number between 1 and 6, and the headings - defined level. To sign so-called style formatting tags are used, the most important are as follows: - Emphasize - strong emphasis. - Bold - italics Listen than enumerating lists, numbered lists, or lists of descriptive executed. An enumerative list starts with the day (Unnumbered List), the individual list entries are like all other forms of Lise with the </ UL> day. Should the individual list entries are numbered, it is with the day (ordered List), and started with the </ OL> tag. A special case is the descriptive list (definition list), whose list of entries with day labeled. The full hypertext functionality in HTML, but only by the possibility of generating links cross-references) to apply. Links with the day (Anchor). For external links to realize the HREF attribute (Hypertext Reference). Embedded graphics and multimedia objects. A picture says more than a thousand words and it is also in W3 using HTML embedded in the graphics a key design element. With the optional ALIGN determines whether the following text above, in the middle or bottom of the image to be published. Multimedia objects are not all W3-Clients processed, but must be equipped with an external helper application or a Browser-Plug-In executed. A special type of graphics integration are called Click Images, the graphics are, by clicking on the various links different areas can be created. Frames are long of the most common browsers, and are now at Version 4.0 component of HTML-Sprachumfanges. Previously, the browser manufacturers developed their own language constructs in the Internet clients. At Frames is a possibility of additional design of hypermedia documents. With the help of frames can be a side window into several smaller ones. Form into HTML documents is a further possibility of interaction in W3. The processing of the data is entered, we at the Clickable images through a server script. 1.4.2.1.1. Cascading Style Sheets A key feature of a markup language is the separation of HTML is not consistently implemented: There are many tags to layout design. For the separation of layout and structure serve Cascading Style Sheets, with the HTML documents linked, or in an HTML file can be directly involved. The possibilities of using CSS2 come, as far as the client, in the area of layouts far beyond the optical tags for presentation in HTML, and in combination with HTML CSS also suitable as a full page description language, such as PostScript. The issue is not only to a limited visual presentation, there are also commands for the acoustic output. Style sheets can be in the head define an HTML file, although this format information only for such a file. If you want to have a consistent layout across multiple files, it is necessary that this format definitions in a separate file. The use of multiple CSS files is also possible. This is erfordelich when different style sheets for multiple output devices wishes. This is true not only for output devices that use different media, but also for output devices, that the same medium. Thus, for example, has an optical output to a printer, unlike on a monitor. ... link (0 comments) ... comment A Big mistake!
Blanca.Delcastillo.Uni-Linz, 21:13h
I did i big mistake since the publication of the third class.I had benn created new blog each time that I put new resume for the class or information. It is for that , I am going to put all my work now in my blog.
... link (0 comments) ... comment ... older stories
|
Online for 6244 days
Last update: 2008.01.28, 21:37 status
You're not logged in ... login
menu
search
calendar
recent updates
These is the end!!!!!(1st...
Well the semester is going to finished and with these... by Blanca.Delcastillo.Uni-Linz (2008.01.28, 21:37) These is the end!!!!!(1st...
Well the semester is going to finished and with these... by Blanca.Delcastillo.Uni-Linz (2008.01.28, 21:36) These is the end!!!!!(1st...
Well the semester is going to finished and with these... by Blanca.Delcastillo.Uni-Linz (2008.01.28, 21:33) These is the end!!!!
Well the semester is going to finished and with these... by Blanca.Delcastillo.Uni-Linz (2008.01.28, 21:28) These is the end!!!!
Well the semester is going to finished and with these... by Blanca.Delcastillo.Uni-Linz (2008.01.28, 21:26) |