Site Management Questionnaire – Part 4 | Class Assignment

SEO & Site Management








Electronic mailing list

An electronic mailing list is a special usage of email that allows for widespread distribution of information to many Internet users. It is similar to a traditional mailing list — a list of names and addresses — as might be kept by an organization for sending publications to its members or customers, but typically refers to four things — a list of email addresses, the people (“subscribers”) receiving mail at those addresses, the publications (email messages) sent to those addresses, and a reflector, which is a single email address that, when designated as the recipient of a message, will send a copy of that message to all of the subscribers.

How automated electronic mailing lists work

Electronic mailing lists are usually fully or partially automated through the use of special mailing list software and a reflector address that are set up on a server capable of receiving email. Incoming messages sent to the reflector address are processed by the software, and, depending on their content, are acted upon internally (in the case of messages containing commands directed at the software itself) or are distributed to all email addresses subscribed to the mailing list. Depending on the software, additional addresses may be set up for the purpose of sending commands.

Many electronic mailing list servers have a special email address in which subscribers (or those that want to be subscribers) can send commands to the server to perform such tasks as subscribing and unsubscribing, temporarily halting the sending of messages to them, or changing available preferences. The common format for sending these commands is to send an email that contains simply the command followed by the name of the electronic mailing list the command pertains to. Examples: subscribe anylist or subscribe anylist John Doe. Some list servers also allow people to subscribe, unsubscribe, change preferences, etc. via a website.

Electronic mailing list servers can be set to forward messages to subscribers of a particular mailing list either individually as they are received by the list server or in digest form in which all messages received on a particular day by the list server are combined into one email that is sent once per day to subscribers. Some mailing lists allow individual subscribers to decide how they prefer to receive messages from the list server (individual or digest).

Content Management System (CMS)

content management system (CMS) is a computer system that allows publishing, editing, and modifying content as well as site maintenance from a central page. It provides a collection of procedures used to manage workflow in a collaborative environment. These procedures can be manual or computer-based.

Main features

The core features of Content Management Systems vary widely from system to system; many simpler systems showcase only a handful of features, while others, notably enterprise systems, are much more complex and powerful.

  • Allow for a large number of people to share and contribute to stored data;
  • Control access to data based on user role (i.e., define information users or user groups can view, edit, publish, etc.);
  • Facilitate storage and retrieval of data;
  • Control data validity and compliance;
  • Reduce duplicate inputs;
  • Simplify report writing;
  • Improve communication among users.
  • Define data as almost anything: documents, movies, texts, pictures, phone numbers, articles etc.

Data types and usage

In a CMS, data can be defined as nearly anything: documents, movies, text, pictures, phone numbers, scientific data, and so forth. CMSs are frequently used for storing, controlling, revising, semantically enriching, and publishing documentation. Serving as a central repository, the CMS increases the version level of new updates to an already existing file.

Web Content Management System

A web content management system (web CMS) is a bundled or stand-alone application used to create, manage, store, and deploy content on Web pages. Web content includes text and embedded graphics, photos, video, audio, and code (e.g., for applications) that renders other content or interacts with the user. A web CMS may also catalog or index content, select or assemble content at runtime, or deliver content to specific visitors in a personalized way, such as in different languages.

What is Mobify?

Mobify is a mobile technology platform that converts existing websites and e-commerce websites into a version optimized for mobile phones and tablet computers.

Site Management Questionnaire – Part 3 | Class Assignment

SEO & Site Management

How does Google Analytics work?

Google Analytics uses a first-party cookie and JavaScript code to collect information about visitors and to track your advertising campaign data. Google Analytics anonymously tracks how visitors interact with a website, including where they came from, what they did on a site, and whether they completed any of the site’s conversion goals. Analytics also keeps track of your e-commerce data, and combines this with campaign and conversion information to provide insight into the performance of your advertising campaigns.

All of this information is presented in an easy-to-read, yet thorough manner, through intuitive, visual reports. Google Analytics won’t affect the performance or the appearance of your website and there are no extra files to host on your website.

With information from Google Analytics, you will be able to drive traffic more efficiently to your site, and convert that traffic more effectively.

Google Analytics Installation Guide

The Google Analytics Installation Guide is intended to allow you to quickly set up and configure a successful set of reports for a profile. If you need more detailed information on any topic, please search our Help Center.

Step 1 – Create a Google Analytics account
Step 2 – Configure your profile
Step 3 – Edit the tracking code for custom website setups
Step 4 – Add the tracking code to your pages
Step 5 – Link with your AdWords account
Step 6 – Create goals and funnels
Step 7 – Tag your advertising campaigns
Step 8 – Creating Filters
Step 9 – Grant access to other users
Step 10 – Enable e-commerce transaction tracking

Research and briefly describe what WHOIS is.

WHOIS (pronounced as the phrase who is) is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system, but is also used for a wider range of other information. The protocol stores and delivers database content in a human-readable format.

How does Google Custom Search Engine work and what benefits can bring to your site?

Google Custom Search enables you to create a search engine for your website, your blog, or a collection of websites. You can configure your search engine to search both web pages and images. You can fine-tune the ranking, customize the look and feel of the search results, and invite your friends or trusted users to help you build your custom search engine. You can even make money from your search engine by using your Google AdSense account.

You can create a search engine that searches only the contents of your website, or you can create one that focuses on a particular topic. You can use your expertise about a subject to tell Custom Search which websites to search, prioritize, or ignore. Because you know your users well, you can tailor the search engine to their interests. For example, when an avid cyclist searches for “wheel” on Google search, she will have to sift through hundreds of results on automobile tires, steering wheels, or Buddhist wheels. This is because Google search cannot tell that the intended context is “wheels for bicycles.” A custom search engine for bicycles, on the other hand, would search only pre-selected websites on bicycles and give relevant results to the cyclist.

WEB 2.0: Making the Web Work for You (Hosie-Bounar/Waxer)-Part 2 | Class Assignment/Project

Web 2.0

Unit C: Collaborating and Sharing Information

  1. Name 2 of the major uses of Web 2.0 technologies by business.  Web 2.0 technologies have helped businesses by cutting costs and improving customer support and innovation. Some businesses use company-based blogs, live chat, and social networking.
  2. Name 2 of the major uses of Web 2.0 technologies by governments.  Governments use Web 2.0 technologies not only to convey information to the public and provide online services, but also to gather information, which then they use to share resources, build consensus, improve services, and make policy decisions.
  3. What is the purpose of a blog? The purpose of a blog is to convey and share information; it is a “public relations” tool.
  4. Why would you subscribe to an RSS feed? An RSS feed provides a subscriber with information from frequently updated Web content, such as blogs. The benefit of RSS feeds is that you don’t have to constantly check whether a site has been updated. When an update occurs, you are notified immediately.
  5. Why would a business use a conversational search engine? In order to monitor what is being said about a company online, a business can use a conversational search engine, which sends updates whenever a person with standing in the industry or area of interest comments about a company or other topic online.
  6. How could offering a product or service for free make money in the long run?.  Because in order to get the free product, potential customers fill out a form with their information. Businesses use this information for customer profiling and data mining, the process of gathering consumer information and then analyzing it in order to get potential clients.
  7. Why is it a good idea to have an agenda for any meeting?. An agenda is a list of items you plan to discuss at a meeting. It is a good idea to have an agenda because groups can easily get off track, and also to avoid missing an important idea or subject to discuss.
  8. What might be the result of a polling question that shows the questioner’s bias? It will probably result in a “push poll”, where the pollster asks questions to push a respondent toward one idea and away from another.
  9. Name 2 situations that would indicate that your poll does not represent an effective sampling of opinion. For example, if the poll allows for an individual person to vote more than once. Another example, if polling the student body, cannot poll only freshmen or only seniors, or exclude some majors. The sample of respondents must be random and broad.
  10. Name 3 benefits of collaborative software.  Flexibility, cost savings, access to documents from anywhere at any time.

Unit D: Perfecting Your Online Persona

  1. List 2 elements that make up your e-persona. Your e-mail address, your profile picture.
  2. Why should you carefully consider each friend request before you accept it?. Because, as people you are linked to, are at the same time linked to other people, you lose control of the distribution of your words or images.
  3. How can you control your visibility on a site like Facebook? By modifying the privacy settings on your account.
  4. What is the purpose of a background check?. To find out who you are.
  5. Why might it be damaging to your reputation if someone sets up an imposter account?. Because the imposter may be pretending it is you, and in this way spam your email list, or worse, steal your identity.
  6. Discuss 2 key differences between social networking and professional networking.  Professional networking connects people based on their shared professions, industries, contacts, and goals. Social networking is casual, connects you with all kinds of people.
  7. Name 3 services that an online professional organization can provide. Training and development, networking, job postings.
  8. What is the difference between a blog and a micro blog?. The difference is that a micro blog only allows a limited number of characters.
  9. Why might a reader object to seeing ads on your blog? Besides of annoyance, because maybe the purpose of the site itself does not agree with advertising.
  10. What is the purpose of an e-portfolio? You can gather your important online information in one place. It is your personal home page.

WEB 2.0: Making the Web Work for You (Hosie-Bounar/Waxer)-Part 1 | School Project/Assignment

Web 2.0








Unit A: Research 2.0

  1. What are the new key features of Web 2.0 technologies, and how they differ from Web 1.0?  In the past, users could only use the Web to get information. With Web 2.0, the user now has the ability to collaborate with others, interact in virtual or online communities, and generate Web content.
  2. Discuss some things you should consider before sharing information on the Web.  Have to keep in mind that whatever you post on the Web is out there for the world to see unless you set some restrictions.  You should also keep in mind that if you browse the Web or open email without having a firewall and virus protection installed on your computer, you are exposing all of the information on your computer to possible attacks, and yourself to possible identity theft.
  3. Give 3 examples of research tools. As an example of research tools on the Web we can name: Search engines, such as Google, Research Databases, such as school’s or public library’s, and Online Catalogs, such as WorldCat.
  4. What is the difference between a search engine and a meta-search engine? A search engine is a website that finds documents or media related to search terms or keywords that user provides. A meta-search engine is a category of a search engine, which uses multiple search engines in a single search, and therefore returns more results.
  5. What are the benefits of a Subject Guide? For more in depth research a user will have better success using a specialized search engine called a Subject Guide. The advantage is that the information it contains is already categorized for the user.
  6. Discuss the difference between a primary source, a secondary source, and a tertiary source, and give examples of each.  A primary source is directly related to the event or historical figure, such as an interview, sound recording, or photograph. A secondary source interprets or reports on the data or information using primary sources, for example, an article written about the Great Depression. A tertiary source is at least two steps removed from the primary source. Might be an encyclopedia or other large reference network.
  7. Name three things you should consider when you try to determine whether or not a source is valid. Should consider if the reference is a primary, secondary, or tertiary source, if the website for the source is reputable, if other sources confirm the information.
  8. What is the difference between a personal bookmark and a social bookmark? Social bookmarks are bookmarks that you share with friends, classmates, or with the entire web community. A personal bookmark is stored locally on your computer .
  9. What is a mind map and what are its benefits? A mind-mapping tool helps you record information in a format that works for you, revise the information to put it into your own words, and reorganize it in a linear or graphical way, depending on your learning style. Example:
  10. Give 3 examples of information that requires you to cite a source.  Quotation or interpretation of data, using direct quotes or data from any primary, secondary, and tertiary source, or if you paraphrase an idea presented in a source.


Unit B: Finding Media for Projects

  1. Copyright Law is a category of what broad area of law? Civil Law.
  2. Name 3 types of work protected by copyright. Photographs, videos, and music.
  3. At what point is a work protected by copyright? As soon as it is created.
  4. Explain what Creative Commons licenses allow. Creative Commons licensing offers a way to assign copyright to your work. CC licenses let creators decide which rights they want to retain while allowing others to use the work under certain conditions that the owner selects. Creator can require simple attribution for his work, restrict its commercia use, or not allow derivative use.
  5. Give an example of when a work enters public domain. In the US, nearly every work created prior to 1923 is in the public domain. Copyright lasts the life of the author plus 70 years. For example, the book “The Phantom of Opera”, by Gaston Leroux, is of public domain, as it was published before 1923.
  6. Discuss the difference between crediting authors for their work and getting permission to use a work.  Giving credit to the copyright holder indicates that you are not trying to claim the work as your own, but it doesn’t mean you are using the work properly, with permission. To get permission, a request should be sent to the author with this minimum information on the request letter: your full name, with complete contact information; a specific description of your intended use; a signature line for the copyright holder; a target date when you would like the copyright holder to respond.
  7. Name 3 rights copyright holders have to their work. Right to reproduce the work, prepare Derivative Works of it, distribute copies of it,  perform it publicly and display it publicly.
  8. Name 3 things you should include in a permissions letter. Full name,  a specific description of your intended use, a target date when you would like the copyright holder to respond.
  9. What do you call the rules users post describing how their work can be used? Terms of Use.
  10. Why shouldn’t you assign a Creative Commons license to scanned photographs you found in a box in the attic? Because the photographs are not your original work; they are someone else’s.

Basic Aspects of PHP | Class Assignment | By Cindy Bryant


1. What is PHP?

  • PHP stands for PHP: Hypertext Preprocessor
  • PHP is a server-side scripting language (Server-side scripting is a web server technology in which a user’s request is verified by running a script directly on the web server to generate dynamic web pages), like ASP
  • PHP scripts are executed on the server
  • PHP supports many databases (MySQL, Oracle, Sybase, Solid, etc.)
  • PHP is an open source software
  • PHP is free to download and use

2. Describe briefly the history of PHP.

As a web language PHP is without a doubt the most popular server language currently in use. PHP was founded in 1995 by Rasmus Lerdorf, because he needed to build a tool that would track the access to his web page. He used C to create his tools and then he released his tools to open source community under the name PHP/FI (PHP Form Interpreter).

In the first release it had many syntax similarities with Perl and in 1997 PHP 2 was released with some new features. In 1998 PHP 3 was released with many more flexible features in it. And even in that stage it’s said to have occupied 10% of web servers.

PHP 4 came in the year 2000 and it brought a new look to PHP language. A new object oriented look, which resulted in initiating many new web trends such as CMS and Frameworks. In 2004, PHP 5 was released with enhanced OOP abilities.

3. Describe general usage of PHP like server-side scripting, command-line scripting, and client-side GUI applications.

PHP is a general-purpose server-side scripting language originally designed for Web development to produce dynamic Web pages. It is among one of the first developed server-side scripting languages to be embedded into an HTML source document, rather than calling an external file to process data. Ultimately, the code is interpreted by a Web server with a PHP processor module which generates the resulting Web page. It also has evolved to include a command-line interface capability and can be used in standalone graphical applications. Any PHP code in a requested file is executed by the PHP runtime, usually to create dynamic Web page content or dynamic images used on Web sites or elsewhere. It can also be used for command-line scripting (Unlike web scripts, Command line scripts doesn’t have any maximum execution time limit and they can run as long as they can, unless until the server shuts down. Using command line scripting, we can accomplish many time consuming tasks like taking backup of entire website and databases, transferring files to another server through ftp, and many more), and client-side GUI applications. PHP can be deployed on most Web servers, many operating systems and platforms, and can be used with many relational database management systems (RDBMS). It is available free of charge, and the PHP Group provides the complete source code for users to build, customize and extend for their own use.

PHP acts primarily as a filter, taking input from a file or stream containing text and/or PHP instructions and outputting another stream of data; most commonly the output will be HTML.

Web content management systems written in PHP include Joomla, WordPress, Drupal. All Web sites created using these tools are written in PHP, including the user-facing portion of Wikipedia, Facebook, and Digg.

4. Explain basic PHP syntax.

A PHP scripting block always starts with <?php and ends with ?>. A PHP file normally contains HTML tags, just like an HTML file, and some PHP scripting code. Below, we have an example of a simple PHP script which sends the text “Hello World” to the browser:


echo “Hello World”;


Each code line in PHP must end with a semicolon. The semicolon is a separator and is used to distinguish one set of instructions from another.

There are two basic statements to output text with PHP: echo and print. In the example above we have used the echo statement to output the text “Hello World”.

Note: The file must have a .php extension. If the file has a .html extension, the PHP code will not be executed.

In PHP, we use // to make a single-line comment or /* and */ to make a large comment block.

Variables are used for storing values, like text strings, numbers or arrays.All variables in PHP start with a $ sign symbol. The correct way of declaring a variable in PHP:

$var_name = value;


$txt=”Hello World!”;

PHP is a Loosely Typed Language: In PHP, a variable does not need to be declared before adding a value to it. PHP automatically converts the variable to the correct data type, depending on its value.

Naming Rules for Variables:

  • A variable name must start with a letter or an underscore “_”
  • A variable name can only contain alpha-numeric characters and underscores (a-z, A-Z, 0-9, and _ )
  • A variable name should not contain spaces. If a variable name is more than one word, it should be separated with an underscore ($my_string), or with capitalization ($myString)

5. Explain how PHP can be applied to a website.

To get access to a web server with PHP support, you can:

  • Install Apache (or IIS) on your own server, install PHP, and MySQL
  • Or find a web hosting plan with PHP and MySQL support

If your server supports PHP you don’t need to do anything. Just create some .php files in your web directory, and the server will parse them for you. Because it is free, most web hosts offer PHP support. However, if your server does not support PHP, you must install PHP.

PHP enjoys such widespread popularity because:

  • It is easy to learn: Its C-like syntax makes it an easy language to learn for programmers and nonprogrammers alike.
  • It blends well with HTML: You can mix PHP scripts right inside your HTML or place HTML tags and code inside PHP files.
  • PHP has a vast library of functions and APIs: PHP’s ability to interact with LDAP, databases and the file system makes it a great “one stop shop” for developers.
  • You can rapidly create Web applications and database-backed applications: PHP is so often used with databases, especially open-source databases, that several books are available on the shared topic of PHP and MySQL.
  • It is cross-platform capable: PHP is used on Windows, Linux, commercial flavors of Unix and MacOS X.