Thursday, September 1, 2022

Join LiveJournal.Microsoft Office In Practice

Join LiveJournal.Microsoft Office In Practice

Looking for:

Microsoft office 2016 in practice simnet free.Please wait while your request is being verified... 













































   

 

- Microsoft office 2016 in practice simnet free



 

What are the two types of e-mail systems? What are viruses, spam, spam blockers, and spam filters? Search Tools The web can be an incredible resource, providing information on nearly any topic imaginable. Are you interested in music? Writing a paper on the environment? Looking for a movie review? Trying to locate a long-lost friend? Information sources related to these questions, and much, much more, are available on the web.

With over 20 billion pages and more being added daily, the web is a massive collection of interrelated pages. With so much available information, locating the precise information you need can be difficult.

Fortunately, a number of organizations called search services operate websites that can help you locate the information you need. Search services maintain huge databases relating to information provided on the web and the Internet. The information stored at these databases includes addresses, content descriptions or classifications, and keywords appearing on web pages and other Internet informational resources.

Additionally, search services provide special programs called search engines that you can use to locate specific information on the web. Search Engines Search engines are specialized programs that assist you in locating information on the web and the Internet. See Figure for a list of commonly used search engines. Figure Search engines To use a search website, you enter a keyword or phrase reflecting the information you want.

The search engine compares your entry against its database and returns the search result, or a list of sites on that topic. Each search result includes a link to the referenced web page or other resource along with a brief discussion of the information contained at that location.

Many searches result in a large number of search results. For example, if you were to enter the keyword music, you would get billions of sites on that topic. Search engines order the search results according to those sites that most likely contain the information requested and present the list to you in that order, usually in groups of Because each search service maintains its own database, the search results returned by one search engine will not necessarily be the same results returned by another search engine.

Therefore, when researching a topic, it is best to use more than one search engine. Content Evaluation Search engines are excellent tools to locate information on the web.

Be careful, however, how you use the information you find. Unlike most published material found in newspapers, journals, and textbooks, not all the information you find on the web has been subjected to strict guidelines to ensure accuracy.

In fact, anyone can publish content on the web. Some sites promote fake news or information that is inaccurate or biased. Many of these sites are designed to look like legitimate news sites. Is the author an expert in the subject area? Read beyond the headlines and consult other reputable sources on any surprising claims to separate the real news from the fake. Headlines can be misleading and fake news articles often make their statements seem accurate by referencing other fake news articles.

Is the information factually reported, or does the author have a bias? Is the information up to date? Does the site specify the date when the site was updated? If not, the site is most likely not being actively maintained. What is fake news? Deep fakes? What are the four considerations for evaluating website content? Electronic Commerce Electronic commerce, also known as e-commerce, is the buying and selling of goods over the Internet.

Electronic commerce is fast-growing and widely used in part because it provides incentives for both buyers and sellers. Another advantage is reduced inventory. Traditional stores maintain an inventory of goods in their stores and periodically replenish this inventory from warehouses.

With e-commerce, there is no in-store inventory and products are shipped directly from warehouses. While there are numerous advantages to e-commerce, there are disadvantages as well. Although these issues are being addressed, very few observers suggest that ecommerce will replace bricks-and-mortar businesses entirely. It is clear that both will coexist and that e-commerce will continue to grow. Just like any other type of commerce, electronic commerce involves two parties: businesses and consumers.

It is the fastest-growing type of e-commerce. Whether large or small, nearly every existing corporation in the United States provides some type of B2C support as another means to connect to customers.

Because extensive investments are not required to create traditional retail outlets and to maintain large marketing and sales staffs, e-commerce allows start-up companies to compete with larger established firms. The three most widely used B2C applications are for online banking, financial trading, and shopping.

C2C often takes the form of an electronic version of the classified ads or an auction. Web auctions are similar to traditional auctions except that buyers and sellers seldom, if ever, meet face to face. Sellers post descriptions of products at a website, and buyers submit bids electronically.

Like traditional auctions, sometimes the bidding becomes highly competitive and enthusiastic. One of the most widely used auction sites is eBay. For a list of some of the most popular web auction sites, see Figure This is typically a manufacturer—supplier relationship.

For example, a furniture manufacturer requires raw materials such as wood, paint, and varnish. Figure Auction sites concept check What is electronic commerce? What are some of the advantages and disadvantages of electonic commerce?

Security The two greatest challenges for e-commerce are 1 developing fast, secure, and reliable payment methods for purchased goods and 2 providing convenient ways to submit required information such as mailing addresses and credit card information. Credit card fraud, however, is a major concern for both buyers and sellers. We will discuss this and other privacy and security issues related to the Internet in Chapter 9. Buyers purchase digital cash from a third party a bank that specializes in electronic currency and use it to purchase goods.

Most digital cash is a digital version of traditional currency, such that a digital U. However, some digital cash, like bitcoin, have no traditional cash equivalent and exist only on the Internet. Sellers convert the digital cash to traditional currency through the third party. Although not as convenient as credit card purchases, digital cash is more secure. For a list of digital cash providers, see Figure While some suggest that cloud computing is merely a marketing term designed to promote new products, many others see cloud computing as a new model for computing that frees users from owning, maintaining, and storing software and data.

It provides access to these services from anywhere through an Internet connection. Several prominent firms are aggressively pursuing this new concept. The basic components of cloud computing are clients, the Internet, and service providers. This access is to be available anywhere and anytime that a connection to the Internet is available. End users do not need to buy, install, and maintain application programs and data.

These providers may charge a fee or the services may be free. For example, researchers are currently experimenting with sensor-equipped clothing that works with smart thermostats to automatically adjust room conditions to individuals.

Other technologies in development include more devices connected to motion sensors, which can reduce electricity usage considerably. You will also learn about security and privacy challenges associated with cloud computing. What are the three basic components of cloud computing?

What are the two most critical factors that determine the efficiency of cloud computing? The Internet of Things The Internet is becoming more and more a part of our lives. As discussed in Chapter 1, the Internet of Things IoT is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. These everyday objects include cell phones, wearable devices, and even coffeemakers. For example, the Fitbit is a bracelet that monitors health data and sends that data to your cell phone or personal web page.

Google Nest is a collection of IoT devices for the home that allow you to answer your front door when you are not home, improve home security, and automate your home thermostat. These reports provide information about your health, including your heart rate, steps taken each day, and an estimate of daily calories burned.

How do they work together? The job may include backup of the company website, updating of resources, or development of new resources. Webmasters are often involved in the design and development of the website. Some webmasters monitor traffic on the site and take steps to encourage users to visit the site. Webmasters also may work with marketing personnel to increase site traffic and may be involved in the development of web promotions.

Those with experience using web authoring software and programs like Adobe Illustrator and Adobe Dreamweaver are often preferred. Good communication and organizational skills are vital in this position. This position is relatively new in many corporations and tends to have fluid responsibilities.

With technological advances and increasing corporate emphasis on a web presence, experience in this field could lead to managerial opportunities.

Smart homes can offer all these solutions. Smart homes of the future will do so much more! The smart home of the future will have furniture that can monitor and improve your health, rooms that can expand and contract as your needs change, and gardens that farm themselves and turn compost into energy. Researchers at Cambridge Consultants are working on even smarter homes that will reduce waste, increase savings, and make for a more sustainable world.

The smart home of the future will have smart trash cans that monitor and separate waste, recyclables, and compostable trash. Recyclables and compost can be repurposed within the home to create energy and reduce carbon emissions.

It will monitor and adjust energy use based on your needs and the energy sources available. Interconnected IOT devices will work together to maximize their efficiency to make for a lower energy home.

Devices monitor inside and outside temperature, news and weather reports, and fluctuating power availability from home solar panels and community wind turbines.

These homes will also use sensors in the home to predict energy needs, such as increased hot water in the mornings when people shower and reduced air conditioning when you go away for a weekend. Your smart home in the future will not just use less energy. It will use less space as well. Researchers at Samsung envision a home of smart walls that use adjustable surfaces and actuators to change the size of a room effectively, making empty rooms smaller and occupied rooms larger.

When you are entertaining guests, the walls will reposition to create extra seating directly out of the wall. When the guests leave, the extra seating disappears back into the wall. While these advances sound great, perhaps the greatest advantages of a smart home will be the ability to improve health and longevity. Currently, researchers are investigating the ways that IoT devices can help people make healthier choices. The smart home of the future will monitor your health and adjust your home to make healthier choices, from furniture that reads your posture and guides you to improve how you sit, to refrigerators that monitor your food intake and promote healthier dining choices.

IoT and Web 4. Of course, these advances include an increase in potential risks. A home that records every movement and activity could be used to spy on you. Finally, by putting your security and privacy in the hands of a smart home, you risk that smart home being hacked and opening your home to criminals. Are the conveniences of the smart home of the future worth the risks to your privacy and security? What smart home features exist right now that you would like to have?

What smart home features that researchers are working on would be most valuable to you? Four generations: Web 1. Providers Internet service providers connected to the Internet provide a path to access the Internet. Connection technologies include DSL, cable, and wireless modems. Browsers Browsers mobile and desktop provide access to web resources.

To efficiently and effectively use computers, you need to be aware of resources available on the Internet and web, to be able to access these resources, to effectively communicate electronically, to efficiently locate information, to understand electronic commerce, and to use web utilities. Web utilities are specialized utility programs that make using the Internet and the web easier and safer. Filters Filters are used by parents and organizations to block certain sites and to monitor use of the Internet and the web.

File Transfer Utilities File transfer utilities copy files to downloading and from uploading your computer. Internet Security Suite An Internet security suite is a collection of utility programs designed to protect your privacy and security on the Internet. Common features include profiles, pages, groups, friends, news feeds, and share settings.

Two well-known sites are LinkedIn and Facebook. Blogs, Microblogs, Podcasts, and Wikis Other sites that help individuals communicate across the web are blogs, microblogs, podcasts, and wikis. Some are like online diaries. Businesses, newspapers, and others also use blogs as a quick publishing method.

Twitter allows characters per tweet. Instagram is primarily used to share images and videos. Wikipedia is one of the most popular wikis. Texting while driving is very dangerous and illegal in several states. Most instant messaging programs also include videoconferencing features, file sharing, and remote assistance. E-mail E-mail electronic mail is the transmission of electronic messages. A typical e-mail has three basic elements: header including address, subject, and perhaps attachment , message, and signature.

Spam is unwanted and unsolicited e-mail that may include a computer virus or destructive programs often attached to unsolicited e-mail. Spiders are programs that update these databases.

Search Engines Search engines are specialized programs to help locate information. To use, enter a keyword or phrase, and a list of search results is displayed. Content Evaluation Not all information you find on the web has been subjected to strict guidelines to ensure accuracy. Many sites allow anyone to post new material, sometimes anonymously and without critical evaluation. Many fake news sites are designed to look like legitimate news sites.

Is the author an expert? Consult other reputable sources to verify surprising claims. Fake news articles often reference other fake news articles. Is the information factual or does the author have a bias?

Does the site specify when information is updated? Web auctions are similar to traditional auctions except buyers and sellers rarely, if ever, meet face to face. Two types are credit cards and digital cash. Objects include cell phones, wearable devices, and even coffeemakers. LAN d. The rules for exchanging data between computers. DSL b. WWW 3. Using file transfer utility software, you can copy files to your computer from specially configured servers on the Internet.

This is called: a. Communities of individuals who share a common interest typically create Facebook: a. A very popular microblogging site: a. LinkedIn b. Facebook c.

Twitter d. Wikipedia 7. Using a keyword, a search engine returns a list of related sites known as: a. Internet dollars 9. The continuing Internet development that allows objects to send and receive data over the Internet. HTML b. IoT c. Web 2. CSS b. Web 3. C2C c. Internet f. ISP g. LinkedIn h. The most popular Internet activity. Transmission of electronic messages over the Internet. A business-oriented social networking site.

Individual website to keep in touch with friends and family. Publishes short sentences. Maintain huge databases relating to information provided on the web and the Internet. Electronic commerce involving individuals selling to individuals.

Discuss the Internet and web, including their origins, the four generations of the web, and the most common uses. Describe how to access the Internet. What are providers? What are web utilities? Discuss filters, file transfer utilities, and Internet security suites.

Discuss Internet communications, including social networking, blogs, microblogs, podcasts, wikis, client-based and web-based e-mail, and text and instant messaging. Define search tools, including search services. Discuss search engines and fake news.

Describe how to evaluate the content of a website. Describe electronic commerce, including business-to-consumer, consumer-toconsumer, and business-to-business e-commerce, and security. Discuss the Internet of Things IoT. Describe three basic components of cloud computing.

If so, which ones? If not, do you plan on using one in the future? Be specific. Which would be better for exposing you to new ideas? Which one would be better at challenging your point of view? Be specific and defend your position. Review the Privacy box on page 34, and respond to the following: a Who should be responsible for ensuring privacy on social networking sites?

Defend your position. Have you ever checked your settings? If you responded no to a , can you think of any situations in which it would not be appropriate to block or remove content? If so, does it include the news and features that you would find in your daily paper?

Does it offer a digital subscription? How does the digital edition differ from the print edition? How does the digital edition price compare to the print edition price?

If so, what ones do you subscribe to? If not, would you consider switching to digital subscriptions? We can expect applications beyond our imagination, and to control these applications entirely with our voice, gestures, and thoughts.

Learning Objectives After you have read this chapter, you should be able to: 1 2 3 4 5 6 Identify general-purpose applications. Describe word processors, spreadsheets, presentation programs, and database management systems. Describe specialized applications, such as graphics, web authoring, and video game development programs. Describe mobile apps and app stores. Identify software suites.

Describe office suites, cloud suites, specialized suites, and utility suites. Market analysts used calculators to project sales. Graphic artists created designs by hand. Data processing clerks created electronic files to be stored on large computers. Now you can do all these tasks—and many others— with a personal computer and the appropriate application software. Think of the personal computer as an electronic tool. You may not consider yourself very good at typing, calculating, organizing, presenting, or managing information.

However, a personal computer can help you do all these things and much more. All it takes is the right kinds of software. To efficiently and effectively use computers, you need to understand the capabilities of general-purpose application software, which includes word processors, spreadsheets, presentation programs, and database management systems.

You also need to know about integrated packages and software suites. Application Software As we discussed in Chapter 1, there are two kinds of software. System software works with end users, application software, and computer hardware to handle the majority of technical details.

Application software can be described as end-user software and is used to accomplish a variety of tasks. Application software can be divided into three categories. One category, general-purpose applications, includes word processing programs, spreadsheets, presentation software, and database management systems.

The third category, mobile apps, consists of programs designed for cell phones and tablets. User Interface A user interface is the portion of the application that allows you to control and to interact with the program. The mouse controls a pointer on the screen that is used to select items such as icons. Another feature is the use of windows to display information. A window is simply a rectangular area that can contain a document, program, or message. More than one window can be opened and displayed on the computer screen at one time.

The standard GUI uses a system of menus, toolbars, and dialog boxes. Many applications, and Microsoft applications in particular, use an interface known as the Ribbon GUI, which changes based on the needs of the user. This GUI uses a system of interrelated ribbons, tabs, and galleries. These activities are displayed as tabs and appear in the first ribbon. Each tab is then organized into groups that contain related items. Some tabs, called contextual tabs, appear only when they are needed and anticipate the next operation to be performed by the user.

What is a graphical user interface? What are windows, menus, toolbars, and dialog boxes? What is the Ribbon GUI? What are ribbons, tabs, and galleries? Discuss some of the most common features in application programs. General-Purpose Applications As mentioned previously, general-purpose applications include word processors, spreadsheets, presentation software, and database management systems.

Word Processors Word processors create text-based documents and are one of the most flexible and widely used software tools. All types of people and organizations use word processors to create memos, letters, and reports. Organizations create newsletters, manuals, and brochures to provide information to their customers. Students and researchers use word processors to create reports.

Microsoft Word is the most widely used word processor. Other popular word processors include Apple Pages and Google Docs. Assume that you have accepted a job as an advertising coordinator for Adventure Travel Tours, a travel agency specializing in active adventure vacations.

To see how you could use Microsoft Word as the advertising coordinator for the Adventure Travel Tours, see Figures and As you enter the text, the spell checker and grammar checker catch some spelling and grammatical errors. Once the text has been entered, you proofread the text and then focus your attention on enhancing the visual aspects of the flyer. You add a photograph and experiment with different character and paragraph formats, including fonts, font sizes, colors, and alignments.

Creating a Report Your next assignment is to create a report on Tanzania and Peru. After conducting your research, you start writing your paper. As you enter the text for the report, you notice that the AutoCorrect feature automatically corrects some grammar and punctuation errors. Your report includes several figures and tables.

You use the captions feature to keep track of figure and table numbers, to enter the caption text, and to position the captions. You use the footnote feature to assist in adding notes to further explain or comment on information in the report. Finally, you prepare the report for printing by adding header and footer information. Spreadsheets Spreadsheets organize, analyze, and graph numeric data such as budgets and financial reports.

Once used exclusively by accountants, spreadsheets are widely used by nearly every profession. Marketing professionals analyze sales trends. Financial analysts evaluate and graph stock market trends. Students and teachers record grades and calculate grade point averages. The most widely used spreadsheet program is Microsoft Excel. Other spreadsheet applications include Apple Numbers and Google Sheets. One of your responsibilities is to create a financial plan for the next year. You begin by studying sales data and talking with several managers.

After obtaining sales and expense estimates, you are ready to create the first-quarter forecast. You start structuring the worksheet by inserting descriptive text entries for the row and column headings. Next, you insert numeric entries, including formulas and functions to perform calculations.

To test the accuracy of the worksheet, you change the values in some cells and compare the recalculated spreadsheet results with hand calculations. Analyzing Your Data After presenting the First-Quarter Forecast to the owner, you revise the format and expand the workbook to include worksheets for each quarter and an annual forecast summary. You give each worksheet a descriptive sheet name. At the request of the owner, you perform a what-if analysis to test the effect of different estimates for payroll, and you use a chart to visualize the effect.

Presentation Software Presentation software are programs that combine a variety of visual objects to create attractive, visually interesting presentations. They are excellent tools to communicate a message and to persuade people. People in a variety of settings and situations use presentation software programs to make their presentations.

For example, marketing managers use presentation software to present proposed marketing strategies to their superiors. Salespeople use these programs to demonstrate products and encourage customers to make purchases. Students use presentation software to create high-quality class presentations. Assume that you have volunteered for the Animal Rescue Foundation, a local animal rescue agency.

You have been asked to create a powerful and persuasive presentation to encourage other members from your community to volunteer. To see how you could use Microsoft PowerPoint, see Figure Creating a Presentation You have been asked to create a powerful and persuasive presentation for the director of the foundation designed to encourage other members from your community to volunteer. The first step is to meet with the director of the foundation to determine the content of the presentation.

Then, using PowerPoint, you begin creating the presentation by selecting a presentation template and document theme. After entering the content, you add interest to the presentation by adding animation to selected objects and using slide transition effects. It is the electronic equivalent of a file cabinet. A database management system DBMS or database manager is a program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database.

All kinds of individuals use databases, from hospital administrators recording patient information to police officers checking criminal histories. Organizations of all types maintain employee databases. Assume that you have accepted a job as an employment administrator for the Lifestyle Fitness Club. To see how you could use Microsoft Access, see Figure Using Microsoft Access, you design the basic structure or organization of the new database system to include a table that will make entering data and using the database more efficient.

You create the table structure by specifying the fields and primary key field. To make the process faster and more accurate, you create a form and enter the data for each employee as a record in the table. What are they used for? What are spreadsheets? What are presentation software programs? What are database management systems? Specialized Applications While general-purpose applications are widely used in nearly every profession, specialized applications are widely used within specific professions.

These programs include graphics programs and web authoring programs. Graphics Programs Graphics programs are widely used by professionals in the graphic arts profession. They use video editors, image editing programs, illustration programs, and desktop publishing programs. Once used only by Hollywood professionals, video editors are now widely used to edit highquality video captured using cell phones and other devices. You can readily add special effects, music tracks, titles, and on-screen graphics.

Just a few years ago, video editors were used only by professionals with expensive specialized hardware and software. Now, there are several free or inexpensive editors designed to assist the amateur videographer. However, some professionals can use these programs to significantly manipulate the content or meaning of a photo or video.

Such changes are often intended to influence the opinions or emotions of the viewer. Supporters argue that this type of editing is acceptable and is just another way to express an opinion or feeling from an editor. Critics note that this type of image and video manipulation is unethical because it intentionally misleads the viewer and often creates unobtainable or unhealthy definitions of beauty. They are often used to touch up photographs to remove scratches and other imperfections.

For incremental volume control, at least one intermediate step of 12 dB of gain shall be provided. Technologies which use encoding, signal compression, format transformation, or similar techniques shall not remove information needed for access or shall restore it upon delivery. The force required to activate controls and keys shall be 5 lbs.

Key repeat rate shall be adjustable to 2 seconds per character. As soon as practicable, but not later than July 1, , widescreen digital television DTV displays measuring at least 7. Personal headsets for private listening are not assistive technology. The product must provide the ability to interrupt, pause, and restart the audio at anytime.

Where the ambient noise level of the environment is above 45 dB, a volume gain of at least 20 dB above the ambient level shall be user selectable. Published in the Federal Register on January 18, and amended on March 23, SUMMARY: We, the Architectural and Transportation Barriers Compliance Board Access Board or Board , are revising and updating, in a single rulemaking, our standards for electronic and information technology developed, procured, maintained, or used by Federal agencies covered by section of the Rehabilitation Act of , as well as our guidelines for telecommunications equipment and customer premises equipment covered by Section of the Communications Act of The revisions and updates to the section based standards and section based guidelines are intended to ensure that information and communication technology covered by the respective statutes is accessible to and usable by individuals with disabilities.

Compliance with the section based guidelines is not required until the guidelines are adopted by the Federal Communications Commission. The incorporation by reference of certain publications listed in the final rule is approved by the Director of the Federal Register as of March 20, Telephone: — voice or — TTY. Telephone: — voice or — TTY E-mail addresses: access-board. In this final rule, the Access Board is updating its existing Electronic and Information Technology Accessibility Standards under section of the Rehabilitation Act of , " Standards" , as well as our Telecommunications Act Accessibility Guidelines under Section of the Communications Act of " Guidelines".

Given the passage of nearly two decades since their issuance, the existing Standards and Guidelines are in need of a "refresh" in several important respects. This final rule is intended to, among other things, address advances in information and communication technology that have occurred since the guidelines and standards were issued in and respectively, harmonize with accessibility standards developed by standards organizations worldwide in recent years, and ensure consistency with the Board's regulations that have been promulgated since the late s.

The Revised Standards and Guidelines support the access needs of individuals with disabilities, while also taking into account the costs of providing accessible information and communication technology to Federal agencies, as well as manufacturers of telecommunications equipment and customer premises equipment.

The final rule also reflects a significantly revamped organizational structure relative to the existing standards and guidelines. Appendix A provides general application and scoping for Section , while Appendix B does likewise for Section Appendix C contains seven separate chapters setting forth the functional performance criteria and technical accessibility standards that apply to both covered and covered ICT.

These chapters are, generally speaking, broken down by functional area e. Lastly, Appendix D republishes the existing Standards, which, as discussed below, may be needed to evaluate Section covered existing legacy ICT under the safe harbor provision. Additionally, the term "information and communication technology" ICT is used widely throughout this preamble. Unless otherwise noted, it is intended to broadly encompass electronic and information technology covered by Section , as well as telecommunications products, interconnected Voice over Internet Protocol VoIP products, and Customer Premises Equipment CPE covered by Section Examples of ICT include computers, information kiosks and transaction machines, telecommunications equipment, multifunction office machines, software, Web sites, and electronic documents.

Section of the Rehabilitation Act of hereafter, "Section " , as amended, mandates that Federal agencies "develop, procure, maintain, or use" ICT in a manner that ensures Federal employees with disabilities have comparable access to, and use of, such information and data relative to other Federal employees, unless doing so would impose an undue burden.

Section also requires Federal agencies to ensure that members of the public with disabilities have comparable access to publicly-available information and services unless doing so would impose an undue burden on the agency.

In accordance with section a 2 A , the Access Board must publish standards that define electronic and information technology along with the technical and functional performance criteria necessary for accessibility, and periodically review and amend the standards as appropriate. When the Board revises its existing Standards whether to keep up with technological changes or otherwise , Section mandates that, within six months, both the Federal Acquisition Regulatory Council FAR Council and Federal agencies incorporate these revised standards into their respective acquisition regulations and procurement policies and directives.

Thus, with respect to procurement-related matters, the Access Board's Standards are not self-enforcing; rather, these standards take legal effect when adopted by the FAR Council.

Section of the Communications Act hereafter, "Section " , requires telecommunications equipment and services to be accessible to, and usable by, individuals with disabilities, where readily achievable. In determining whether an access feature is readily achievable, the Federal Communications Commission FCC , which has exclusive implementation and enforcement authority under Section , has directed telecommunications equipment manufacturers and service providers to weigh the nature and cost of that feature against the individual company's overall financial resources, taking into account such factors as the type, size, and nature of its business operation.

Section tasks the Access Board, in conjunction with the FCC, with the development of guidelines for the accessibility of telecommunications equipment and customer premises equipment, as well as their periodic review and update.

The FCC, however, has exclusive authority under Section to issue implementing regulations and carry out enforcement activities. Moreover, when issuing implementing regulations, the FCC is not bound to adopt the Access Board's guidelines as its own or to use them as minimum requirements.

The Revised Standards and Guidelines replace the current product-based regulatory approach with an approach based on ICT functions. The revised technical requirements, which are organized along the lines of ICT functionality, provide requirements to ensure that covered hardware, software, electronic content, and support documentation and services are accessible to people with disabilities.

In addition, the revised requirements include functional performance criteria, which are outcome-based provisions that apply in two limited instances: when the technical requirements do not address one or more features of ICT or when evaluation of an alternative design or technology is needed under equivalent facilitation.

Some of the key provisions and updates reflected in the Revised Standards and Guidelines relative to the existing standards and guidelines include:. Technological advances over the past two decades have resulted in the widespread use of multifunction devices that called into question the ongoing utility of the product-by-product approach used in the Board's existing Standards and Guidelines.

Consequently, one of the primary purposes of the final rule is to replace the current product-based approach with requirements based on functionality, and, thereby, ensure that accessibility for people with disabilities keeps pace with advances in ICT. To ensure that compliance under both laws, to the maximum extent possible, can be measured against a common set of technical requirements, the implementing regulations have been consolidated into a single part: 36 CFR part As discussed below, this is a new organizational format for the Standards and Guidelines that mirrors the formatting of other standards and guidelines issued by the Access Board over the past decade.

Appendix A applies only to Section covered ICT and consists of Chapter 1, which sets forth general application and administration provisions, while Chapter 2 contains scoping requirements which, in turn, prescribe which ICT — and, in some cases, how many — must comply with the technical specifications. Appendix B, which applies to covered ICT only, is organized similarly with Chapter 1 setting forth general application and administration provisions and Chapter 2 containing scoping requirements.

Appendix C sets forth technical specifications that apply equally to ICT covered under Sections or Appendix C includes five chapters, each of which with the exception of the final chapter address a separate ICT functional area. Lastly, in Appendix D, the existing Standards are republished in full albeit with a revised section numbering system for reference when evaluating Section covered existing legacy ICT under the "safe harbor" provision.

See discussion infra Section IV. For Section covered ICT, all covered Web and non-Web content and software — including, for example, Web sites, intranets, word processing documents, portable document format documents, and project management software — is required, with a few specific exceptions, to conform to WCAG 2. By applying a single set of requirements to Web sites, electronic documents, and software, the revised requirements adapt the existing Standards to reflect the newer multifunction technologies e.

For Section covered ICT, electronic content and software that is integral to the use of telecommunications and customer premise equipment is required to conform to WCAG 2. There are several exceptions related to non-Web documents and software.

From the outset, one of the Access Board's primary goals in this rulemaking has been to increase harmonization with international standards relating to ICT accessibility that have been developed worldwide over the past decade.

Some of these standards such as WCAG 2. For other standards such as EN , which is the European accessibility standard for public ICT procurement , harmonization comes in the form of ensuring that the relevant accessibility specifications in such standard and the final rule can both be met simultaneously without conflict.

Harmonization with international standards and guidelines creates a larger marketplace for accessibility solutions, thereby attracting more offerings and increasing the likelihood of commercial availability of accessible ICT options. The Revised Standards specify that all types of public-facing content, as well as nine categories of non-public-facing content that communicate agency official business, have to be accessible, with "content" encompassing all forms of electronic information and data.

The existing standards require Federal agencies to make electronic information and data accessible, but do not delineate clearly the scope of covered information and data. As a result, document accessibility has been inconsistent across Federal agencies. By focusing on public-facing content and certain types of agency official communications that are not public facing, the revised requirements bring needed clarity to the scope of electronic content covered by the Standards and, thereby, help Federal agencies make electronic content accessible more consistently.

The existing standards require ICT to be compatible with assistive technology — that is, hardware or software that increases or maintains functional capabilities of individuals with disabilities e. However, in the past the existing requirement resulted in ambiguity of application. The ensuing confusion led, in some cases, to unnecessary delay in procurements intended to provide reasonable accommodations to employees under Section , creating a hardship for both agencies and their employees with disabilities.

The final rule provides more specificity about how operating systems, software development toolkits, and software applications should interact with assistive technology. The final rule also specifically exempts assistive technology from the interoperability provisions.

The Board expects the final rule to improve software interoperability with assistive technology, allowing users better access to the functionalities that ICT products provide. Federal agencies will have one year from publication of this final rule to comply with the Revised Standards. This extended period for compliance is responsive to some agencies' concerns about the time it will take them to make ICT compliant with the Revised Standards.

In addition, the Revised Standards include a "safe harbor" provision for existing i. Under this safe harbor, unaltered, existing ICT including content that complies with the existing Standards need not be modified or upgraded to conform to the Revised Standards. This safe harbor applies on an element-by-element basis in that each component or portion of existing ICT is assessed separately. Corresponding definitions have also been added for "existing ICT" and "alteration.

Notably, the extended compliance date and safe harbor provision apply only to Section covered ICT; these provisions do not apply to telecommunications equipment and customer premises equipment covered by Section Since compliance with the Revised Guidelines is not required unless and until they are adopted by the FCC, matters addressed in these two provisions fall within the commission's province.

Consistent with the obligation under Executive Orders and that Federal agencies promulgate regulations only upon a reasoned determination that benefits justify costs, the final rule has been evaluated from a benefit-cost perspective in a final regulatory impact analysis Final RIA prepared by the Board's consulting economic firm. The focus of the Final RIA is to define and, where possible, quantify and monetize the potential incremental benefits and costs of the Revised Standards and Guidelines.

We summarize its methodology and results below. To estimate likely incremental compliance costs attributable to the final rule, the Final RIA estimates, quantifies, and monetizes costs in the following broad areas: 1 costs to Federal agencies and contractors related to policy development, employee training, development of accessible ICT, evaluation of ICT, and creation of accessible electronic documents; 2 costs to Federal agencies of ensuring that speech-output enabled hardware with closed functionality has braille instructions e.

On the benefits side, the Final RIA estimates likely incremental benefits by monetizing the value of three categories of benefits expected to accrue from the Revised Standards: a increased productivity of Federal employees with certain disabilities who are expected to benefit from improved ICT accessibility; b time saved by members of the public with certain disabilities when using more accessible Federal Web sites; and c reduced phone calls to Federal agencies as members of the public with certain disabilities shift their inquiries and transactions online due to improved accessibility of Federal Web sites.

The Final RIA, for analytical purposes, defines the beneficiary population as persons with vision, hearing, speech, learning, and intellectual disabilities, as well as those with manipulation, reach, or strength limitations. The Final RIA does not formally quantify or monetize benefits accruing from the Revised Guidelines due to insufficient data and methodological constraints.

Table 1 below summarizes the results from the Final RIA with respect to the likely monetized benefits and costs, on an annualized basis, from the Revised Standards and Guidelines. All monetized benefits and costs are incremental to the applicable baseline, and were estimated for a year time horizon starting in since the final rule requires Federal agencies to comply one year after its publication and converted to annualized values using discount rates of 7 and 3 percent. Three scenarios of incremental benefits and costs are presented using alternative parameters that are assumptions-based.

These scenarios include: a low net benefit scenario using parameters which results in lower benefits and higher costs , an expected scenario consisting of expected values for assumed parameters , and a high net benefit scenario using parameters which results in higher benefits and lower costs. While the Final RIA monetizes likely incremental benefits and costs attributable to the final rule, this represents only part of the regulatory picture.

Today, though ICT is now woven into the very fabric of everyday life, millions of Americans with disabilities often find themselves unable to use — or use effectively — computers, mobile devices, Federal agency Web sites, or electronic content.

The Board's existing standards and guidelines are greatly in need of a "refresh" to keep up with technological changes over the past fifteen years. The Board expects this final rule to be a major step toward ensuring that ICT is more accessible to and usable by individuals with disabilities — both in the Federal workplace and society generally. Indeed, much — if not most — of the significant benefits expected to accrue from the final rule are difficult, if not impossible, to quantify, including: greater social equality, human dignity, and fairness.

Each of these values is explicitly recognized by Executive Order as important qualitative considerations in regulatory analyses. Moreover, American companies that manufacture telecommunications equipment and ICT-related products will likely derive significant benefits from the Access Board's concerted efforts to harmonize the accessibility requirements in the Revised Standards and Guidelines with voluntary consensus standards.

Given the relative lack of existing national and globally-recognized standards for accessibility of mobile technologies, telecommunications equipment manufacturers will, we believe, greatly benefit from harmonization of the Revised Guidelines with consensus standards. Similar benefits will likely accrue more generally to manufacturers of all ICT-related products as a result of harmonization.

It is also equally important to note that some potentially substantial incremental costs arising from the final rule are not evaluated in the Final RIA, either because such costs could not be quantified or monetized due to lack of data or for other methodological reasons or are inherently qualitative.

For example, due to lack of information, the Final RIA does not assess the cost impact of new or revised requirements in the Revised Guidelines on computer and telecommunications equipment manufacturers. The Access Board issued the existing Guidelines for telecommunications equipment and customer premises equipment in Two years later, in , the Board published the existing Standards. In this preamble, all citations to 36 CFR part refer to the existing Guidelines in force since , while all citations to 36 CFR Part refer to the existing Standards in force since The existing Standards require Federal agencies to ensure that persons with disabilities — namely, Federal employees with disabilities and members of the public with disabilities — have comparable access to, and use of, electronic and information technology regardless of the type of medium absent a showing of undue burden.

Among other things, these standards: define key terms such as "electronic and information technology" and "undue burden" ; establish technical requirements and functional performance criteria for covered electronic and information technologies; require agencies to document undue burden determinations when procuring covered products; and mandate accessibility of support documentation and services.

Generally speaking, the existing Standards take a product-based regulatory approach in that technical requirements for electronic and information technology are grouped by product type: software applications and operating systems; Web-based intranet and Internet information and applications; telecommunications products; self-contained, closed products; and desktop and portable computers. The existing Guidelines require manufacturers of telecommunications equipment and customer premises equipment to ensure that new and substantially upgraded existing equipment is accessible to, and usable by, individuals with disabilities when readily achievable.

The existing guidelines, as with the Standards, define key terms such as "telecommunications equipment" and "readily achievable" and establish technical requirements for covered equipment, software, and support documentation.

These guidelines also require manufacturers of covered equipment to consider inclusion of individuals with disabilities in their respective processes for product design, testing, trials, or market research. In the years following our initial promulgation of the existing Standards and Guidelines, technology has continued to evolve at a rapid pace.

Pursuant to our statutory mandate, the Access Board deemed it necessary and appropriate to review and update the existing Standards and Guidelines in order to make them consistent with one another and reflective of technological changes. See Advisory Committee Report, U. Access Board Apr. This TEITAC Report provided a set of recommended updates to the existing Standards and Guidelines, which, the committee noted, were intended to balance two competing considerations: the need for clear and specific standards that facilitate compliance, and the recognition that static standards "consisting of design specification[s] and fixed checklists" would tend to "stifle innovation" and "delay the availability of technology advancements to people with disabilities.

To address these considerations, the TEITAC Advisory Committee recommended that the Access Board jettison its existing product-based regulatory approach in favor of technical requirements to achieve accessibility based on ICT functions or features. The Committee also noted the importance of harmonizing with international standards to both spur development of accessible ICT products and reduce manufacturers' costs in the global market.

All told, the TEITAC Report provided a comprehensive recommended set of technical requirements applicable to a broad range of ICT functions and features, including: closed functionality; hardware with and without speech output; user interfaces; electronic content; processing and display of captions and audio description; RTT; authoring tools; and, product support documentation and services.

While the majority of the proposed requirements in the draft rule were not substantively changed from the existing Standards and Guidelines, there were some notable proposed substantive revisions. Two of the most significant were the proposals to require that Federal agencies make electronic content of specified official communications accessible, and to harmonize with WCAG 2.

In the draft rule, the proposed standards and guidelines shared a common set of functional performance criteria Chapter 2 and technical design criteria Chapters , but had separate introductory chapters Chapters 1 and 2 , which outlined the respective scoping, application, and definitions for the revised Standards and Guidelines. We also received written comments during the comment period. Comments came from industry, Federal and state governments, foreign and domestic companies specializing in information technology, disability advocacy groups, manufacturers of hardware and software, trade associations, institutions of higher education, research and trade organizations, accessibility consultants, assistive technology industry and related organizations, and individuals.

In general, commenters agreed with our approach to addressing the accessibility of ICT through functionality rather than discrete product types. For example, commenters noted confusion by virtue of the fact that some chapters focused on functional features of accessibility while others addressed specific types of technology, or that the meaning of "ICT" seemed to vary depending on the context of the specific chapter.

Other commenters opined that deviations from WCAG 2. By the following year, in , the Access Board was poised to invite public comment on a revised version of the draft rule.

The Board acknowledged that, based on comments to the ANPRM, the draft rule needed to be reorganized and made more concise. More importantly, we needed to obtain further comment on major issues and harmonize with the European Commission's ICT standardization efforts that were already underway at that time. To address comments criticizing the length and organization of the ANPRM as unwieldy, the revised draft rule consolidated and streamlined provisions into six chapters from ten , consolidated advisories, and reduced the page count from close to to less than We also made revisions to improve the clarity of various proposed provisions and ensure a consistent organizational structure throughout this draft rule.

See, e. Additionally, to address commenters' collective concern that rephrasing of WCAG 2. In issuing the ANPRM, the Access Board also took notice of the standardization work going on in Europe at the time, stating: [T]he Board is interested in harmonizing with standards efforts around the world in a timely way.

Accordingly, the Board is now releasing this second Advance Notice of Proposed Rulemaking ANPRM to seek further comment on specific questions and to harmonize with contemporaneous standardization efforts underway by the European Commission. Comments came from industry, Federal and state governments, foreign and domestic companies specializing in information technology, disability advocacy groups, manufacturers of hardware and software, trade associations and trade organizations, institutions of higher education and research, accessibility consultants, assistive technology industry and related organizations, and individual stakeholders who did not identify with any of these groups.

In general, commenters continued to agree with our approach to address ICT accessibility by focusing on features, rather than discrete product types. Commenters supported the conciseness of the proposed provisions in the ANPRM, and asked for further streamlining where possible.

Commenters also generally voiced strong support for the Board's decision to incorporate by reference WCAG 2. In , the Access Board formally commenced the rulemaking process by issuing a notice of proposed rulemaking to update the existing Standards and Guidelines.

This proposed rule—while making editorial changes and other updates in response to comments on the ANPRM— retained the same overall structure and approach to referencing WCAG 2. Additionally, written comments were received in response to the NPRM. Comments came from industry, Federal and state governments, disability advocacy groups, manufacturers of hardware and software, trade associations and trade organizations, institutions of higher education and research, and individuals who did not identify with any of these groups.

Overall, we received about comments in response to the NPRM, including written comments and oral testimony from witnesses at the three public hearings. These commenters represented, when excluding multiple submissions, about different entities or individuals.

By general category, these NPRM commenters can be broken down as follows: individuals 59 ; disability advocacy organizations 59 ; ICT companies 10 ; accessible ICT services providers 11 ; trade associations representing ITC and telecommunications companies 11 ; individuals or groups identifying themselves as ICT subject matter experts 13 ; academicians 6 ; state or local governmental agencies 7 ; standards development organizations 3 ; international disability advocacy organizations 9 ; and, anonymous 4.

In general, commenters spoke positively about the proposed rule, and noted that it was much improved from earlier iterations in the and ANPRMs. By a wide margin, the single most commented-upon aspect of the proposed rule and the issue on which commenters expressed the greatest unanimity was timing. Characterizing refresh of the Standards and Guidelines as "long overdue," these commenters urged the Access Board to issue its final rule as expeditiously as possible. On substantive matters, a large number of commenters addressed some aspect of the requirements for electronic content, with the bulk of these comments relating to Section covered content.

Another technical area receiving sizeable comment was our proposal that, under both Sections and , WCAG 2. Additionally, real-time text RTT was a subject of great interest to NPRM commenters, with most commenters representing disability advocacy organizations and academicians supporting the Board's RTT proposal, while ITC manufacturers and trade groups expressed opposition.

Further, the issue of harmonization with EN received considerable comment. In general, ITC industry-related commenters urged the Board to harmonize more closely with this European specification. Disability advocacy organizations and consumer-related commenters, on the other hand, viewed the proposed rule and EN as well harmonized already and expressed concern that further harmonization would be improvident because, in their view, EN set forth weaker accessibility requirements in some areas.

Lastly, the Board received multiple comments from individuals or entities addressing various types of electromagnetic sensitivities. These commenters requested that the final rule require accommodations for people with electromagnetic intolerances, so that they might use Federal buildings and Federally-funded facilities.

The Board acknowledges the challenges faced by individuals with electromagnetic sensitivities, and notes that electromagnetic sensitivities may be considered a disability under the ADA if the sensitivity so severely impairs the neurological, respiratory, or other functions of an individual that it substantially limits one or more of the individual's major life activities. However, most of the accommodations suggested by these commenters are beyond the scope of this rulemaking or our statutory jurisdiction.

Moreover, none of our prior rulemaking notices i. Thus, were the Board to address electromagnetic sensitivity issues posed by ITC, this complex area would require thorough research and notice-and-comment rulemaking before being addressed through rulemaking.

While the Access Board was in the process of updating its existing Standards and Guidelines, a similar process began in Europe to create the first European set of ICT accessibility standards. In , the European Commission issued Mandate , which sought the assistance of several private European standards organizations in the development of European accessibility guidelines for public ICT procurements. See European Comm. In early , the three European standardization organizations completed their development process by formally adopting and publishing the first European set of specifications on e-accessibility for public ICT procurements, EN Unlike the Standards, however, EN —by its own terms— establishes only non-binding, voluntary accessibility requirements for public ICT procurements.

EN is thus now available to government officials in EU member states who may use it as technical specifications or award criteria in public procurements of ICT products and services.

In the final rule, the Board has made multiple changes that are similar to EN Both the final rule and EN address the functions of technology, rather than categories of technologies. Similarly, both offer technical requirements and functional performance criteria for accessible ICT. For example, our use of the phrase "information and communication technology" ICT in the final rule, as a replacement of the existing term "electronic and information technology," originates in the common usage of ICT throughout Europe and the rest of the world.

Moreover, both documents are organized in similar ways, in that they both have initial scoping and definitions chapters, followed by separate chapters containing technical requirements and functional performance criteria. Organizationally, the documents differ in several respects. These general differences are outlined in Table 2 below:. For non-Web documents, we are explicit with the word substitution necessary, and provide an exception for the four problematic success criteria.

The NPRM delineated specific types of electronic content that Federal agencies would need to make accessible consistent with the technical requirements of the proposed rule. As explained in the NPRM, the Board proposed these provisions to further clarify the requirement in the existing Standards that Federal agencies make electronic information and data accessible to employees and members of the public.

The Board noted confusion over what type of content was covered under the broad language of the existing Standards, and the difficulty that Federal agencies displayed in effectively meeting their obligations to provide accessible electronic content. The NPRM specifically proposed that two discrete groups of content be covered by the refresh of the Standards. First, in proposed E Public-facing content refers to electronic information and data that a Federal agency makes available directly to the general public.

The requirement to make accessible public-facing content is discussed below in Section IV. Second, in proposed E We sought comment in the NPRM on whether the proposed eight categories of non-public-facing content were sufficiently clear, and whether they provided sufficient accessibility without unnecessarily burdening agencies.

The Board further requested comment on whether a ninth category for "widely disseminated" electronic content should be included in the final rule. Nine commenters responded to the proposed provision regarding non-public-facing electronic content proposed E In general, commenters agreed with the proposed approach requiring that only certain categories of non-public-facing content be made accessible, and most commenters found the categories to be sufficiently clear.

Another commenter, an ICT subject matter expert, requested clarification of the internal and external program and policy announcements category and suggested including an additional category for announcements sent to all employees. An accessible ICT services provider was the only commenter to object to the eight categories, finding them too confusing and too difficult to implement.

That commenter preferred that the requirement for accessibility of non-public-facing content be tied to the extent of the content's distribution, and suggested that any document distributed to 50 or more individuals be made accessible. Three other commenters responded to the NPRM's question five as to whether a "widely disseminated" category should be added. One Federal agency opposed inclusion of this category, asserting that it would cause confusion.

One ICT subject matter expert and one Federal agency generally liked the idea of such a category, but acknowledged that definitional challenges would make it difficult to implement. The Federal agency supporting inclusion of the "widely disseminated" category indicated that the eight proposed categories would not sufficiently encompass the internal Web pages available to employees, and suggested that the problem could be solved with the addition of a ninth category for internal Web pages.

This commenter asserted that without such a category for internal Web pages, agencies would need to develop systems to categorize internal Web page content, ensure that employees with disabilities could navigate to the covered content, and find a way to create an integrated accessible experience across internal Web sites where some content is accessible and some is not. Upon careful consideration of the comments, we have decided to retain the proposed eight categories in the final rule and have added a ninth category for intranet content, as described below.

Most commenters concurred with the proposed approach providing categories for non-public-facing content, and indicated that the categories were clearly described. The Board, therefore, finds no reason to alter the eight proposed categories, and has retained them, as proposed, in the final rule.

However, the Board did not intend for the use of these categories to exclude some intranet content; all intranet content is currently covered under the existing Standards.

Therefore, in the final rule, the Board has added a ninth category to final E The Board agrees with commenters that a "widely disseminated" standard would be difficult to define and implement in a consistent manner across agencies, and would likely cause confusion.

The Board thus declines to add such a category to the final rule. A discussion of the scoping of these requirements under the Revised Standards and Guidelines can be found below in Section IV. This approach stimulated the formation of an industry ad hoc working group aimed at determining the practicality of using WCAG 2.

This working group analyzed each WCAG 2. Therefore, these Success Criteria can be applied directly as written to non-Web documents and software. Of the remaining 12 Success Criteria, the working group found that 8 could be applied as written if certain Web-specific terms or phrases, e.

The remaining four Success Criteria posed problems in being applied to non-Web content because they refer to "sets of Web pages. Applying these four criterion to non-Web documents and software would require interpretation that could inadvertently change the meaning of the requirements.

In their report, the working group concluded that circumstances in which those four Success Criteria could be applied outside the context of Web content would be "extremely rare. Sixteen commenters responded to the proposal of applying WCAG 2.

Six commenters five ICT companies and trade associations, and an ICT subject matter expert strongly advocated for returning to the previous approach of reprinting three variants of WCAG 2. These commenters asserted that agencies would not be able to consistently apply the WCAG 2.

They were also concerned that by incorporating WCAG 2. SEO monitoring keeps an eye on the phone 24 hours a day and before problems arise we will let you know what goes wrong. Duplicate titles or content? Missing meta tags, untraceable images and server errors?

Whether pages are added or removed, or even when changes are made within pages. We track it all for you! Very easy. Even before problems arise, the SEO monitor detects deviations on your customer's websites. Titles or content removed? Missing meta tags, untraceable pages and server errors?

Is something important going wrong? We will immediately send you an alert! Every day we keep track of your keyword positions for you on mobile and desktop devices.

Get more insight into the positions of your customers, organize keywords in useful groups and create branded reports. Getting those Google visitors ultimately comes down to outperforming your competitors. That is why we also keep track of the SERP positions of your competitors for you.

Up to 5 years ago. Monitor all your marketing channels in 1 dashboard. See immediately what is important to you, switch quickly and without logging in between customers and report in your own house style.

Get important insight at first glance. Check how your site or the sites of customers are doing. Fully adapt the dashboard to your KPIs.

 


Microsoft office 2016 in practice simnet free



 

Is the information up to date? Does the site specify the date when the site was updated? If not, the site is most likely not being actively maintained. What is fake news? Deep fakes? What are the four considerations for evaluating website content? Electronic Commerce Electronic commerce, also known as e-commerce, is the buying and selling of goods over the Internet. Electronic commerce is fast-growing and widely used in part because it provides incentives for both buyers and sellers.

Another advantage is reduced inventory. Traditional stores maintain an inventory of goods in their stores and periodically replenish this inventory from warehouses. With e-commerce, there is no in-store inventory and products are shipped directly from warehouses. While there are numerous advantages to e-commerce, there are disadvantages as well. Although these issues are being addressed, very few observers suggest that ecommerce will replace bricks-and-mortar businesses entirely.

It is clear that both will coexist and that e-commerce will continue to grow. Just like any other type of commerce, electronic commerce involves two parties: businesses and consumers. It is the fastest-growing type of e-commerce. Whether large or small, nearly every existing corporation in the United States provides some type of B2C support as another means to connect to customers.

Because extensive investments are not required to create traditional retail outlets and to maintain large marketing and sales staffs, e-commerce allows start-up companies to compete with larger established firms. The three most widely used B2C applications are for online banking, financial trading, and shopping.

C2C often takes the form of an electronic version of the classified ads or an auction. Web auctions are similar to traditional auctions except that buyers and sellers seldom, if ever, meet face to face. Sellers post descriptions of products at a website, and buyers submit bids electronically.

Like traditional auctions, sometimes the bidding becomes highly competitive and enthusiastic. One of the most widely used auction sites is eBay. For a list of some of the most popular web auction sites, see Figure This is typically a manufacturer—supplier relationship. For example, a furniture manufacturer requires raw materials such as wood, paint, and varnish. Figure Auction sites concept check What is electronic commerce?

What are some of the advantages and disadvantages of electonic commerce? Security The two greatest challenges for e-commerce are 1 developing fast, secure, and reliable payment methods for purchased goods and 2 providing convenient ways to submit required information such as mailing addresses and credit card information.

Credit card fraud, however, is a major concern for both buyers and sellers. We will discuss this and other privacy and security issues related to the Internet in Chapter 9. Buyers purchase digital cash from a third party a bank that specializes in electronic currency and use it to purchase goods.

Most digital cash is a digital version of traditional currency, such that a digital U. However, some digital cash, like bitcoin, have no traditional cash equivalent and exist only on the Internet. Sellers convert the digital cash to traditional currency through the third party. Although not as convenient as credit card purchases, digital cash is more secure. For a list of digital cash providers, see Figure While some suggest that cloud computing is merely a marketing term designed to promote new products, many others see cloud computing as a new model for computing that frees users from owning, maintaining, and storing software and data.

It provides access to these services from anywhere through an Internet connection. Several prominent firms are aggressively pursuing this new concept. The basic components of cloud computing are clients, the Internet, and service providers. This access is to be available anywhere and anytime that a connection to the Internet is available. End users do not need to buy, install, and maintain application programs and data.

These providers may charge a fee or the services may be free. For example, researchers are currently experimenting with sensor-equipped clothing that works with smart thermostats to automatically adjust room conditions to individuals.

Other technologies in development include more devices connected to motion sensors, which can reduce electricity usage considerably. You will also learn about security and privacy challenges associated with cloud computing. What are the three basic components of cloud computing? What are the two most critical factors that determine the efficiency of cloud computing?

The Internet of Things The Internet is becoming more and more a part of our lives. As discussed in Chapter 1, the Internet of Things IoT is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. These everyday objects include cell phones, wearable devices, and even coffeemakers.

For example, the Fitbit is a bracelet that monitors health data and sends that data to your cell phone or personal web page. Google Nest is a collection of IoT devices for the home that allow you to answer your front door when you are not home, improve home security, and automate your home thermostat. These reports provide information about your health, including your heart rate, steps taken each day, and an estimate of daily calories burned.

How do they work together? The job may include backup of the company website, updating of resources, or development of new resources. Webmasters are often involved in the design and development of the website.

Some webmasters monitor traffic on the site and take steps to encourage users to visit the site. Webmasters also may work with marketing personnel to increase site traffic and may be involved in the development of web promotions.

Those with experience using web authoring software and programs like Adobe Illustrator and Adobe Dreamweaver are often preferred. Good communication and organizational skills are vital in this position. This position is relatively new in many corporations and tends to have fluid responsibilities. With technological advances and increasing corporate emphasis on a web presence, experience in this field could lead to managerial opportunities.

Smart homes can offer all these solutions. Smart homes of the future will do so much more! The smart home of the future will have furniture that can monitor and improve your health, rooms that can expand and contract as your needs change, and gardens that farm themselves and turn compost into energy.

Researchers at Cambridge Consultants are working on even smarter homes that will reduce waste, increase savings, and make for a more sustainable world. The smart home of the future will have smart trash cans that monitor and separate waste, recyclables, and compostable trash. Recyclables and compost can be repurposed within the home to create energy and reduce carbon emissions. It will monitor and adjust energy use based on your needs and the energy sources available.

Interconnected IOT devices will work together to maximize their efficiency to make for a lower energy home. Devices monitor inside and outside temperature, news and weather reports, and fluctuating power availability from home solar panels and community wind turbines. These homes will also use sensors in the home to predict energy needs, such as increased hot water in the mornings when people shower and reduced air conditioning when you go away for a weekend.

Your smart home in the future will not just use less energy. It will use less space as well. Researchers at Samsung envision a home of smart walls that use adjustable surfaces and actuators to change the size of a room effectively, making empty rooms smaller and occupied rooms larger.

When you are entertaining guests, the walls will reposition to create extra seating directly out of the wall. When the guests leave, the extra seating disappears back into the wall. While these advances sound great, perhaps the greatest advantages of a smart home will be the ability to improve health and longevity.

Currently, researchers are investigating the ways that IoT devices can help people make healthier choices. The smart home of the future will monitor your health and adjust your home to make healthier choices, from furniture that reads your posture and guides you to improve how you sit, to refrigerators that monitor your food intake and promote healthier dining choices.

IoT and Web 4. Of course, these advances include an increase in potential risks. A home that records every movement and activity could be used to spy on you. Finally, by putting your security and privacy in the hands of a smart home, you risk that smart home being hacked and opening your home to criminals.

Are the conveniences of the smart home of the future worth the risks to your privacy and security? What smart home features exist right now that you would like to have?

What smart home features that researchers are working on would be most valuable to you? Four generations: Web 1. Providers Internet service providers connected to the Internet provide a path to access the Internet. Connection technologies include DSL, cable, and wireless modems. Browsers Browsers mobile and desktop provide access to web resources. To efficiently and effectively use computers, you need to be aware of resources available on the Internet and web, to be able to access these resources, to effectively communicate electronically, to efficiently locate information, to understand electronic commerce, and to use web utilities.

Web utilities are specialized utility programs that make using the Internet and the web easier and safer. Filters Filters are used by parents and organizations to block certain sites and to monitor use of the Internet and the web. File Transfer Utilities File transfer utilities copy files to downloading and from uploading your computer. Internet Security Suite An Internet security suite is a collection of utility programs designed to protect your privacy and security on the Internet.

Common features include profiles, pages, groups, friends, news feeds, and share settings. Two well-known sites are LinkedIn and Facebook. Blogs, Microblogs, Podcasts, and Wikis Other sites that help individuals communicate across the web are blogs, microblogs, podcasts, and wikis. Some are like online diaries. Businesses, newspapers, and others also use blogs as a quick publishing method.

Twitter allows characters per tweet. Instagram is primarily used to share images and videos. Wikipedia is one of the most popular wikis. Texting while driving is very dangerous and illegal in several states. Most instant messaging programs also include videoconferencing features, file sharing, and remote assistance. E-mail E-mail electronic mail is the transmission of electronic messages. A typical e-mail has three basic elements: header including address, subject, and perhaps attachment , message, and signature.

Spam is unwanted and unsolicited e-mail that may include a computer virus or destructive programs often attached to unsolicited e-mail. Spiders are programs that update these databases. Search Engines Search engines are specialized programs to help locate information.

To use, enter a keyword or phrase, and a list of search results is displayed. Content Evaluation Not all information you find on the web has been subjected to strict guidelines to ensure accuracy.

Many sites allow anyone to post new material, sometimes anonymously and without critical evaluation. Many fake news sites are designed to look like legitimate news sites. Is the author an expert? Consult other reputable sources to verify surprising claims.

Fake news articles often reference other fake news articles. Is the information factual or does the author have a bias? Does the site specify when information is updated? Web auctions are similar to traditional auctions except buyers and sellers rarely, if ever, meet face to face. Two types are credit cards and digital cash. Objects include cell phones, wearable devices, and even coffeemakers. LAN d. The rules for exchanging data between computers. DSL b. WWW 3. Using file transfer utility software, you can copy files to your computer from specially configured servers on the Internet.

This is called: a. Communities of individuals who share a common interest typically create Facebook: a. A very popular microblogging site: a.

LinkedIn b. Facebook c. Twitter d. Wikipedia 7. Using a keyword, a search engine returns a list of related sites known as: a. Internet dollars 9. The continuing Internet development that allows objects to send and receive data over the Internet. HTML b. IoT c. Web 2. CSS b. Web 3. C2C c. Internet f. ISP g. LinkedIn h. The most popular Internet activity. Transmission of electronic messages over the Internet. A business-oriented social networking site. Individual website to keep in touch with friends and family.

Publishes short sentences. Maintain huge databases relating to information provided on the web and the Internet. Electronic commerce involving individuals selling to individuals. Discuss the Internet and web, including their origins, the four generations of the web, and the most common uses.

Describe how to access the Internet. What are providers? What are web utilities? Discuss filters, file transfer utilities, and Internet security suites. Discuss Internet communications, including social networking, blogs, microblogs, podcasts, wikis, client-based and web-based e-mail, and text and instant messaging.

Define search tools, including search services. Discuss search engines and fake news. Describe how to evaluate the content of a website. Describe electronic commerce, including business-to-consumer, consumer-toconsumer, and business-to-business e-commerce, and security.

Discuss the Internet of Things IoT. Describe three basic components of cloud computing. If so, which ones? If not, do you plan on using one in the future? Be specific. Which would be better for exposing you to new ideas? Which one would be better at challenging your point of view?

Be specific and defend your position. Review the Privacy box on page 34, and respond to the following: a Who should be responsible for ensuring privacy on social networking sites? Defend your position. Have you ever checked your settings? If you responded no to a , can you think of any situations in which it would not be appropriate to block or remove content? If so, does it include the news and features that you would find in your daily paper?

Does it offer a digital subscription? How does the digital edition differ from the print edition? How does the digital edition price compare to the print edition price? If so, what ones do you subscribe to? If not, would you consider switching to digital subscriptions? We can expect applications beyond our imagination, and to control these applications entirely with our voice, gestures, and thoughts.

Learning Objectives After you have read this chapter, you should be able to: 1 2 3 4 5 6 Identify general-purpose applications. Describe word processors, spreadsheets, presentation programs, and database management systems.

Describe specialized applications, such as graphics, web authoring, and video game development programs. Describe mobile apps and app stores. Identify software suites. Describe office suites, cloud suites, specialized suites, and utility suites.

Market analysts used calculators to project sales. Graphic artists created designs by hand. Data processing clerks created electronic files to be stored on large computers. Now you can do all these tasks—and many others— with a personal computer and the appropriate application software. Think of the personal computer as an electronic tool. You may not consider yourself very good at typing, calculating, organizing, presenting, or managing information.

However, a personal computer can help you do all these things and much more. All it takes is the right kinds of software. To efficiently and effectively use computers, you need to understand the capabilities of general-purpose application software, which includes word processors, spreadsheets, presentation programs, and database management systems.

You also need to know about integrated packages and software suites. Application Software As we discussed in Chapter 1, there are two kinds of software. System software works with end users, application software, and computer hardware to handle the majority of technical details. Application software can be described as end-user software and is used to accomplish a variety of tasks.

Application software can be divided into three categories. One category, general-purpose applications, includes word processing programs, spreadsheets, presentation software, and database management systems. The third category, mobile apps, consists of programs designed for cell phones and tablets. User Interface A user interface is the portion of the application that allows you to control and to interact with the program.

The mouse controls a pointer on the screen that is used to select items such as icons. Another feature is the use of windows to display information. A window is simply a rectangular area that can contain a document, program, or message. More than one window can be opened and displayed on the computer screen at one time.

The standard GUI uses a system of menus, toolbars, and dialog boxes. Many applications, and Microsoft applications in particular, use an interface known as the Ribbon GUI, which changes based on the needs of the user.

This GUI uses a system of interrelated ribbons, tabs, and galleries. These activities are displayed as tabs and appear in the first ribbon. Each tab is then organized into groups that contain related items. Some tabs, called contextual tabs, appear only when they are needed and anticipate the next operation to be performed by the user.

What is a graphical user interface? What are windows, menus, toolbars, and dialog boxes? What is the Ribbon GUI? What are ribbons, tabs, and galleries? Discuss some of the most common features in application programs. General-Purpose Applications As mentioned previously, general-purpose applications include word processors, spreadsheets, presentation software, and database management systems. Word Processors Word processors create text-based documents and are one of the most flexible and widely used software tools.

All types of people and organizations use word processors to create memos, letters, and reports. Organizations create newsletters, manuals, and brochures to provide information to their customers.

Students and researchers use word processors to create reports. Microsoft Word is the most widely used word processor. Other popular word processors include Apple Pages and Google Docs. Assume that you have accepted a job as an advertising coordinator for Adventure Travel Tours, a travel agency specializing in active adventure vacations. To see how you could use Microsoft Word as the advertising coordinator for the Adventure Travel Tours, see Figures and As you enter the text, the spell checker and grammar checker catch some spelling and grammatical errors.

Once the text has been entered, you proofread the text and then focus your attention on enhancing the visual aspects of the flyer. You add a photograph and experiment with different character and paragraph formats, including fonts, font sizes, colors, and alignments. Creating a Report Your next assignment is to create a report on Tanzania and Peru.

After conducting your research, you start writing your paper. As you enter the text for the report, you notice that the AutoCorrect feature automatically corrects some grammar and punctuation errors.

Your report includes several figures and tables. You use the captions feature to keep track of figure and table numbers, to enter the caption text, and to position the captions. You use the footnote feature to assist in adding notes to further explain or comment on information in the report. Finally, you prepare the report for printing by adding header and footer information.

Spreadsheets Spreadsheets organize, analyze, and graph numeric data such as budgets and financial reports. Once used exclusively by accountants, spreadsheets are widely used by nearly every profession. Marketing professionals analyze sales trends. Financial analysts evaluate and graph stock market trends.

Students and teachers record grades and calculate grade point averages. The most widely used spreadsheet program is Microsoft Excel. Other spreadsheet applications include Apple Numbers and Google Sheets. One of your responsibilities is to create a financial plan for the next year. You begin by studying sales data and talking with several managers. After obtaining sales and expense estimates, you are ready to create the first-quarter forecast. You start structuring the worksheet by inserting descriptive text entries for the row and column headings.

Next, you insert numeric entries, including formulas and functions to perform calculations. To test the accuracy of the worksheet, you change the values in some cells and compare the recalculated spreadsheet results with hand calculations.

Analyzing Your Data After presenting the First-Quarter Forecast to the owner, you revise the format and expand the workbook to include worksheets for each quarter and an annual forecast summary. You give each worksheet a descriptive sheet name. At the request of the owner, you perform a what-if analysis to test the effect of different estimates for payroll, and you use a chart to visualize the effect.

Presentation Software Presentation software are programs that combine a variety of visual objects to create attractive, visually interesting presentations. They are excellent tools to communicate a message and to persuade people. People in a variety of settings and situations use presentation software programs to make their presentations. For example, marketing managers use presentation software to present proposed marketing strategies to their superiors.

Salespeople use these programs to demonstrate products and encourage customers to make purchases. Students use presentation software to create high-quality class presentations. Assume that you have volunteered for the Animal Rescue Foundation, a local animal rescue agency. You have been asked to create a powerful and persuasive presentation to encourage other members from your community to volunteer.

To see how you could use Microsoft PowerPoint, see Figure Creating a Presentation You have been asked to create a powerful and persuasive presentation for the director of the foundation designed to encourage other members from your community to volunteer.

The first step is to meet with the director of the foundation to determine the content of the presentation. Then, using PowerPoint, you begin creating the presentation by selecting a presentation template and document theme.

After entering the content, you add interest to the presentation by adding animation to selected objects and using slide transition effects. It is the electronic equivalent of a file cabinet. A database management system DBMS or database manager is a program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database.

All kinds of individuals use databases, from hospital administrators recording patient information to police officers checking criminal histories.

Organizations of all types maintain employee databases. Assume that you have accepted a job as an employment administrator for the Lifestyle Fitness Club. To see how you could use Microsoft Access, see Figure Using Microsoft Access, you design the basic structure or organization of the new database system to include a table that will make entering data and using the database more efficient.

You create the table structure by specifying the fields and primary key field. To make the process faster and more accurate, you create a form and enter the data for each employee as a record in the table. What are they used for? What are spreadsheets? What are presentation software programs? What are database management systems?

Specialized Applications While general-purpose applications are widely used in nearly every profession, specialized applications are widely used within specific professions. These programs include graphics programs and web authoring programs. Graphics Programs Graphics programs are widely used by professionals in the graphic arts profession. They use video editors, image editing programs, illustration programs, and desktop publishing programs. Once used only by Hollywood professionals, video editors are now widely used to edit highquality video captured using cell phones and other devices.

You can readily add special effects, music tracks, titles, and on-screen graphics. Just a few years ago, video editors were used only by professionals with expensive specialized hardware and software. Now, there are several free or inexpensive editors designed to assist the amateur videographer. However, some professionals can use these programs to significantly manipulate the content or meaning of a photo or video. Such changes are often intended to influence the opinions or emotions of the viewer.

Supporters argue that this type of editing is acceptable and is just another way to express an opinion or feeling from an editor. Critics note that this type of image and video manipulation is unethical because it intentionally misleads the viewer and often creates unobtainable or unhealthy definitions of beauty. They are often used to touch up photographs to remove scratches and other imperfections. The photographs consist of thousands of dots, or pixels, that form images, often referred to as bitmap or raster images.

One limitation of bitmap images, however, is that when they are expanded, the images can become pixelated, or jagged on the edges. For example, when the letter A in Figure is expanded, the borders of the letter appear jagged, as indicated by the expanded view. While bitmap images use pixels to represent images, vector images, also known as vector illustrations, use geometric shapes or objects.

These objects are created by connecting lines and curves, avoiding the pixeleted or ragged edges created by bitmap images. Because these objects can be defined by mathematical equations, they can be rapidly and easily resized, colored, textured, and manipulated. An image is a combination of several objects. Illustration programs are often used for graphic design, page layout, and creating sharp artistic images.

While word processors focus on creating text and have the ability to combine text and graphics, desktop publishers focus on page design and layout and provide greater flexibility. Professional graphic artists use desktop publishing programs to create documents such as brochures, newsletters, newspapers, and textbooks. These programs provide the capability to create text and graphics; however, typically graphic artists import these elements from other sources, including word processors, digital cameras, scanners, image editors, illustration programs, and image galleries.

What are image editors? Bitmap images? What are illustration programs? Vector images? What are desktop publishing programs? Video Game Design Software Have you ever thought about designing a video game? Although it may initially be unrealistic to create an immersive 3D world like Call of Duty or Grand Theft Auto, you can experiment and create some impressive games on your own with the right software. The second step is to choose the right video game design software.

Video game design software will help you organize your thoughts and guide you through the game design process, including character development and environmental design.

There are many choices from free software to very expensive software designed for professional game designers. Figure Video game design software Cryengine tips Do you take photos with your cell phone? Almost everyone does. Here are some suggestions to keep in mind. Quickly launch the camera app. Compose your shot. Your cell phone camera can help you line up or balance your photos by displaying gridlines on the screen. Finally, turn on the Grid option. Web Authoring Programs There are over a billion websites on the Internet, and more are being added every day.

Corporations use the web to reach new customers and to promote their products. Individuals create online diaries or commentaries, called blogs. Creating a site is called web authoring. Almost all websites consist of interrelated web pages. More specialized and powerful programs, called web authoring programs, are typically used to create sophisticated commercial sites.

Manufacturers shall comply with the requirements in the Revised Guidelines applicable to telecommunications equipment and customer premises equipment and related software integral to the operation of telecommunications functions when newly released, upgraded, or substantially changed from an earlier version or model.

Manufacturers shall also conform to the requirements in the Revised Guidelines for support documentation and services, including electronic documents and Web-based product support. When a manufacturer determines that conformance to one or more requirements in Chapter 4 Hardware or Chapter 5 Software would not be readily achievable, it shall ensure that the equipment or software is compatible with existing peripheral devices or specialized customer premises equipment commonly used by individuals with disabilities to the extent readily achievable.

Manufacturers shall ensure that telecommunications equipment and customer premises equipment is accessible to and usable by individuals with disabilities by providing direct access to all telecommunications functionality.

Where manufacturers can demonstrate that it is not readily achievable for such equipment to provide direct access to all functionality, the equipment shall support the use of assistive technology and specialized customer premises equipment where readily achievable. No change shall be undertaken that decreases, or has the effect of decreasing, the net accessibility, usability, or compatibility of telecommunications equipment or customer premises equipment.

Manufacturers shall evaluate the accessibility, usability, and interoperability of telecommunications equipment and customer premises equipment during its product design, development, and fabrication. Where the requirements in Chapters 4 and 5 do not address one or more functions of telecommunications or customer premises equipment, the functions not addressed shall conform to the Functional Performance Criteria specified in Chapter 3.

Where components of telecommunications equipment and customer premises equipment are hardware, and transmit information or have a user interface, those components shall conform to applicable requirements in Chapter 4. Where software is integral to the use of telecommunications functions of telecommunications equipment or customer premises equipment and has a user interface, such software shall conform to C and applicable requirements in Chapter 5.

Where support documentation and services are provided for telecommunications equipment and customer premises equipment, manufacturers shall ensure that such documentation and services conform to Chapter 6 and are made available upon request at no additional charge. Where a visual mode of operation is provided, ICT shall provide at least one mode of operation that does not require user vision.

Where a visual mode of operation is provided, ICT shall provide at least one mode of operation that enables users to make use of limited vision. Where a visual mode of operation is provided, ICT shall provide at least one visual mode of operation that does not require user perception of color. Where an audible mode of operation is provided, ICT shall provide at least one mode of operation that does not require user hearing. Where an audible mode of operation is provided, ICT shall provide at least one mode of operation that enables users to make use of limited hearing.

Where speech is used for input, control, or operation, ICT shall provide at least one mode of operation that does not require user speech. Where a manual mode of operation is provided, ICT shall provide at least one mode of operation that does not require fine motor control or simultaneous manual operations. Where a manual mode of operation is provided, ICT shall provide at least one mode of operation that is operable with limited reach and limited strength.

ICT shall provide features making its use by individuals with limited cognitive, language, and learning abilities simpler and easier. The requirements of Chapter 4 shall apply to ICT that is hardware where required by Chapter 2 Scoping Requirements , Chapter 2 Scoping Requirements , and where otherwise referenced in any other chapter of the Revised Standards or Revised Guidelines.

ICT with closed functionality shall be operable without requiring the user to attach or install assistive technology other than personal headsets or other audio couplers, and shall conform to ICT with a display screen shall be speech-output enabled for full and independent use by individuals with vision impairments.

Where transactional outputs are provided, the speech output shall audibly provide all information necessary to verify a transaction. Speech output shall be delivered through a mechanism that is readily available to all users, including, but not limited to, an industry standard connector or a telephone handset.

Speech shall be recorded or digitized human, or synthesized. Speech output shall be coordinated with information displayed on the screen. Speech output for any single function shall be automatically interrupted when a transaction is selected. Speech output shall be capable of being repeated and paused. Where speech output is required by ICT that delivers sound, including speech output required by Where ICT provides private listening, it shall provide a mode of operation for controlling the volume.

Where ICT delivers output by an audio transducer typically held up to the ear, a means for effective magnetic wireless coupling to hearing technologies shall be provided. Where ICT provides non-private listening, incremental volume control shall be provided with output amplification up to a level of at least 65 dB.

A function shall be provided to automatically reset the volume to the default level after every use. At least one mode of characters displayed on the screen shall be in a sans serif font. Characters shall contrast with their background with either light characters on a dark background or dark characters on a light background. Characters on variable message signs shall conform to section Where provided, biometrics shall not be the only means for user identification or control.

ICT that transmits or converts information or communication shall not remove non-proprietary information provided for accessibility or shall restore it upon delivery. The same degree of privacy of input and output shall be provided to all individuals. When speech output required by Where data connections used for input and output are provided, at least one of each type of connection shall conform to industry standard non-proprietary formats.

Where provided, operable parts used in the normal operation of ICT shall conform to Where provided, keys and controls shall contrast visually from background surfaces.

Characters and symbols shall contrast visually from background surfaces with either light characters or symbols on a dark background or dark characters or symbols on a light background. At least one input control conforming to Input controls shall be operable by touch and tactilely discernible without activation.

Where provided, numeric keys shall be arranged in a key ascending or descending keypad layout. The number five key shall be tactilely distinct from the other keys. Where a keyboard with key repeat is provided, the delay before the key repeat feature is activated shall be fixed at, or adjustable to, 2 seconds minimum. Where a timed response is required, the user shall be alerted visually, as well as by touch or sound, and shall be given the opportunity to indicate that more time is needed.

At least one mode of operation shall be operable with one hand and shall not require tight grasping, pinching, or twisting of the wrist.

The force required to activate operable parts shall be 5 pounds Where tickets, fare cards, or keycards are provided, they shall have an orientation that is tactilely discernible if orientation is important to further use of the ticket, fare card, or keycard.

At least one of each type of operable part of stationary ICT shall be at a height conforming to Operable parts used with speech output required by Operable parts shall be positioned for a side reach or a forward reach determined with respect to a vertical reference plane.

The vertical reference plane shall be located in conformance to Where a side reach is provided, the vertical reference plane shall be 48 inches mm long minimum. Where a forward reach is provided, the vertical reference plane shall be 30 inches mm long minimum. Operable parts of ICT providing a side reach shall conform to The vertical reference plane shall be centered on the operable part and placed at the leading edge of the maximum protrusion of the ICT within the length of the vertical reference plane.

Where a side reach requires a reach over a portion of the ICT, the height of that portion of the ICT shall be 34 inches mm maximum. Where the operable part is located 10 inches mm or less beyond the vertical reference plane, the operable part shall be 48 inches mm high maximum and 15 inches mm high minimum above the floor. Where the operable part is located more than 10 inches mm , but not more than 24 inches mm , beyond the vertical reference plane, the height of the operable part shall be 46 inches mm high maximum and 15 inches mm high minimum above the floor.

The operable part shall not be located more than 24 inches mm beyond the vertical reference plane. Operable parts of ICT providing a forward reach shall conform to The vertical reference plane shall be centered, and intersect with, the operable part. Where a forward reach allows a reach over a portion of the ICT, the height of that portion of the ICT shall be 34 inches mm maximum.

Where the operable part is located at the leading edge of the maximum protrusion within the length of the vertical reference plane of the ICT, the operable part shall be 48 inches mm high maximum and 15 inches mm high minimum above the floor.

Where the operable part is located beyond the leading edge of the maximum protrusion within the length of the vertical reference plane, the operable part shall conform to The maximum allowable forward reach to an operable part shall be 25 inches mm. Knee and toe space under ICT shall be 27 inches mm high minimum, 25 inches mm deep maximum, and 30 inches mm wide minimum and shall be clear of obstructions.

Where stationary ICT provides one or more display screens, at least one of each type of display screen shall be visible from a point located 40 inches mm above the floor space where the display screen is viewed.

Where ICT emits lights in flashes, there shall be no more than three flashes in any one-second period. Where provided, status indicators shall be discernible visually and by touch or sound. Where provided, color coding shall not be used as the only means of conveying information, indicating an action, prompting a response, or distinguishing a visual element.

Where provided, audible signals or cues shall not be used as the only means of conveying information, indicating an action, or prompting a response. ICT that provides two-way voice communication shall conform to Volume gain conforming to 47 CFR Where ICT delivers output by a handset or other type of audio transducer that is typically held up to the ear, ICT shall reduce interference with hearing technologies and provide a means for effective magnetic wireless coupling in conformance with ICT in the form of wireline handsets, including cordless handsets, shall conform to TIAB incorporated by reference, see Where provided, caller identification and similar telecommunications functions shall be visible and audible.

Where ICT provides real-time video functionality, the quality of the video shall be sufficient to support communication using sign language. ICT equipment or systems with two-way voice communication that do not themselves provide TTY functionality shall conform to ICT shall provide a microphone capable of being turned on and off to allow the user to intermix speech with TTY use.

Where provided, voice mail, auto-attendant, interactive voice response, and caller identification systems shall be usable with a TTY. Where ICT displays or processes video with synchronized audio, ICT shall provide closed caption processing technology that conforms to Players and displays shall decode closed caption data and support display of captions. Where ICT displays or processes video with synchronized audio, ICT shall provide audio description processing technology conforming to ICT other than digital television tuners shall provide audio description processing.

Where ICT displays video with synchronized audio, ICT shall provide user controls for closed captions and audio descriptions conforming to Where ICT provides operable parts for program selection, ICT shall also provide operable parts for the selection of audio description. The requirements of Chapter 5 shall apply to software where required by Chapter 2 Scoping Requirements , Chapter 2 Scoping Requirements , and where otherwise referenced in any other chapter of the Revised Standards or Revised Guidelines.

Software shall interoperate with assistive technology and shall conform to Software with platform features defined in platform documentation as accessibility features shall conform to Platform software shall provide user control over platform features that are defined in the platform documentation as accessibility features. Software shall not disrupt platform features that are defined in the platform documentation as accessibility features.

Platform software and software tools that are provided by the platform developer shall provide a documented set of accessibility services that support applications running on the platform to interoperate with assistive technology and shall conform to Applications that are also platforms shall expose the underlying platform accessibility services or implement other documented accessibility services.

The object role, state s , properties, boundary, name, and description shall be programmatically determinable. States and properties that can be set by the user shall be capable of being set programmatically, including through assistive technology. If an object is in a data table, the occupied rows and columns, and any headers associated with those rows or columns, shall be programmatically determinable. Any current value s , and any set or range of allowable values associated with an object, shall be programmatically determinable.

Values that can be set by the user shall be capable of being set programmatically, including through assistive technology. Any relationship that a component has as a label for another component, or of being labeled by another component, shall be programmatically determinable. Any hierarchical parent-child relationship that a component has as a container for, or being contained by, another component shall be programmatically determinable.

The content of text objects, text attributes, and the boundary of text rendered to the screen, shall be programmatically determinable. Text that can be set by the user shall be capable of being set programmatically, including through assistive technology.

A list of all actions that can be executed on an object shall be programmatically determinable. Applications shall allow assistive technology to programmatically execute available actions on objects.

Applications shall expose information and mechanisms necessary to track focus, text insertion point, and selection attributes of user interface components. Focus, text insertion point, and selection attributes that can be set by the user shall be capable of being set programmatically, including through the use of assistive technology. Applications shall permit user preferences from platform settings for color, contrast, font type, font size, and focus cursor.

Where an application provides an alternative user interface that functions as assistive technology, the application shall use platform and other industry standard accessibility services. Where user controls are provided for volume adjustment, ICT shall provide user controls for the selection of captions at the same menu level as the user controls for volume or program selection.

Where user controls are provided for program selection, ICT shall provide user controls for the selection of audio descriptions at the same menu level as the user controls for volume or program selection. Where an application is an authoring tool, the application shall conform to to the extent that information required for accessibility is supported by the destination format. Authoring tools shall permit authors the option of overriding information required for accessibility.

Authoring tools shall, when converting content from one format to another or saving content in multiple formats, preserve the information required for accessibility to the extent that the information is supported by the destination format. The technical requirements in Chapter 6 shall apply to ICT support documentation and services where required by Chapter 2 Scoping Requirements , Chapter 2 Scoping Requirements , and where otherwise referenced in any other chapter of the Revised Standards or Revised Guidelines.

Documentation shall list and explain how to use the accessibility and compatibility features required by Chapters 4 and 5. Documentation shall include accessibility features that are built-in and accessibility features that provide compatibility with assistive technology.

Where support documentation is only provided in non-electronic formats, alternate formats usable by individuals with disabilities shall be provided upon request. ICT support services including, but not limited to, help desks, call centers, training services, and automated self-service technical support, shall conform to ICT support services shall include information on the accessibility and compatibility features required by Support services shall be provided directly to the user or through a referral to a point of contact.

Such ICT support services shall accommodate the communication needs of individuals with disabilities. The Director of the Office of the Federal Register has approved these standards for incorporation by reference into this part in accordance with 5 U. Copies of the referenced standards may be inspected at the U. Box , Santa Monica, CA — Box , Los Alamitos, CA — Series E.

Overall Network Operation, Telephone Service, Service Operation and Human Factors—International operation - Numbering plan of the international telephone service, Arrangement of digits, letters and symbols on telephones and other devices that can be used for gaining access to a telephone network, February Series G.

Copies of the referenced standard may be obtained from the Internet Engineering Task Force. Definition of the Opus Codec, September , J. Valin, Mozilla Corporation, K. Vos, Skype Technologies S. Terriberry, Mozilla Corporation. Redesignated and amended at 82 FR , Jan. The purpose of this part is to implement section of the Rehabilitation Act of , as amended 29 U.

Section requires that when Federal agencies develop, procure, maintain, or use electronic and information technology, Federal employees with disabilities have access to and use of information and data that is comparable to the access and use by Federal employees who are not individuals with disabilities, unless an undue burden would be imposed on the agency. Section also requires that individuals with disabilities, who are members of the public seeking information or services from a Federal agency, have access to and use of information and data that is comparable to that provided to the public who are not individuals with disabilities, unless an undue burden would be imposed on the agency.

When developing, procuring, maintaining, or using electronic and information technology, each agency shall ensure that the products comply with the applicable provisions of this part, unless an undue burden would be imposed on the agency. Agencies cannot claim a product as a whole is not commercially available because no product in the marketplace meets all the standards. If products are commercially available that meet some but not all of the standards, the agency must procure the product that best meets the standards.

Systems which are critical to the direct fulfillment of military or intelligence missions do not include a system that is to be used for routine administrative and business applications including payroll, finance, logistics, and personnel management applications. Nothing in this part is intended to prevent the use of designs or technologies as alternatives to those prescribed in this part provided they result in substantially equivalent or greater access to and use of a product for people with disabilities.

Applications also shall not disrupt or disable activated features of any operating system that are identified as accessibility features where the application programming interface for those accessibility features has been documented by the manufacturer of the operating system and is available to the product developer. The focus shall be programmatically exposed so that assistive technology can track focus and focus changes.

When an image represents a program element, the information conveyed by the image must also be available in text. The minimum information that shall be made available is text content, text input caret location, and text attributes. The content of the text-only page shall be updated whenever the primary page changes.

Paragraphs l , m , n , o , and p of this section are different from WCAG 1. Web pages that conform to WCAG 1. WCAG 1. Microphones shall be capable of being turned on and off to allow the user to intermix speech with TTY use. For incremental volume control, at least one intermediate step of 12 dB of gain shall be provided. Technologies which use encoding, signal compression, format transformation, or similar techniques shall not remove information needed for access or shall restore it upon delivery.

The force required to activate controls and keys shall be 5 lbs. Key repeat rate shall be adjustable to 2 seconds per character. As soon as practicable, but not later than July 1, , widescreen digital television DTV displays measuring at least 7. Personal headsets for private listening are not assistive technology. The product must provide the ability to interrupt, pause, and restart the audio at anytime.

Where the ambient noise level of the environment is above 45 dB, a volume gain of at least 20 dB above the ambient level shall be user selectable. Published in the Federal Register on January 18, and amended on March 23, SUMMARY: We, the Architectural and Transportation Barriers Compliance Board Access Board or Board , are revising and updating, in a single rulemaking, our standards for electronic and information technology developed, procured, maintained, or used by Federal agencies covered by section of the Rehabilitation Act of , as well as our guidelines for telecommunications equipment and customer premises equipment covered by Section of the Communications Act of The revisions and updates to the section based standards and section based guidelines are intended to ensure that information and communication technology covered by the respective statutes is accessible to and usable by individuals with disabilities.

Compliance with the section based guidelines is not required until the guidelines are adopted by the Federal Communications Commission. The incorporation by reference of certain publications listed in the final rule is approved by the Director of the Federal Register as of March 20, Telephone: — voice or — TTY.

Telephone: — voice or — TTY E-mail addresses: access-board. In this final rule, the Access Board is updating its existing Electronic and Information Technology Accessibility Standards under section of the Rehabilitation Act of , " Standards" , as well as our Telecommunications Act Accessibility Guidelines under Section of the Communications Act of " Guidelines".

Given the passage of nearly two decades since their issuance, the existing Standards and Guidelines are in need of a "refresh" in several important respects. This final rule is intended to, among other things, address advances in information and communication technology that have occurred since the guidelines and standards were issued in and respectively, harmonize with accessibility standards developed by standards organizations worldwide in recent years, and ensure consistency with the Board's regulations that have been promulgated since the late s.

The Revised Standards and Guidelines support the access needs of individuals with disabilities, while also taking into account the costs of providing accessible information and communication technology to Federal agencies, as well as manufacturers of telecommunications equipment and customer premises equipment.

The final rule also reflects a significantly revamped organizational structure relative to the existing standards and guidelines. Appendix A provides general application and scoping for Section , while Appendix B does likewise for Section Appendix C contains seven separate chapters setting forth the functional performance criteria and technical accessibility standards that apply to both covered and covered ICT.

These chapters are, generally speaking, broken down by functional area e. Lastly, Appendix D republishes the existing Standards, which, as discussed below, may be needed to evaluate Section covered existing legacy ICT under the safe harbor provision. Additionally, the term "information and communication technology" ICT is used widely throughout this preamble.

Unless otherwise noted, it is intended to broadly encompass electronic and information technology covered by Section , as well as telecommunications products, interconnected Voice over Internet Protocol VoIP products, and Customer Premises Equipment CPE covered by Section Examples of ICT include computers, information kiosks and transaction machines, telecommunications equipment, multifunction office machines, software, Web sites, and electronic documents.

Section of the Rehabilitation Act of hereafter, "Section " , as amended, mandates that Federal agencies "develop, procure, maintain, or use" ICT in a manner that ensures Federal employees with disabilities have comparable access to, and use of, such information and data relative to other Federal employees, unless doing so would impose an undue burden. Section also requires Federal agencies to ensure that members of the public with disabilities have comparable access to publicly-available information and services unless doing so would impose an undue burden on the agency.

In accordance with section a 2 A , the Access Board must publish standards that define electronic and information technology along with the technical and functional performance criteria necessary for accessibility, and periodically review and amend the standards as appropriate. When the Board revises its existing Standards whether to keep up with technological changes or otherwise , Section mandates that, within six months, both the Federal Acquisition Regulatory Council FAR Council and Federal agencies incorporate these revised standards into their respective acquisition regulations and procurement policies and directives.

Thus, with respect to procurement-related matters, the Access Board's Standards are not self-enforcing; rather, these standards take legal effect when adopted by the FAR Council.

Section of the Communications Act hereafter, "Section " , requires telecommunications equipment and services to be accessible to, and usable by, individuals with disabilities, where readily achievable. In determining whether an access feature is readily achievable, the Federal Communications Commission FCC , which has exclusive implementation and enforcement authority under Section , has directed telecommunications equipment manufacturers and service providers to weigh the nature and cost of that feature against the individual company's overall financial resources, taking into account such factors as the type, size, and nature of its business operation.

Section tasks the Access Board, in conjunction with the FCC, with the development of guidelines for the accessibility of telecommunications equipment and customer premises equipment, as well as their periodic review and update. The FCC, however, has exclusive authority under Section to issue implementing regulations and carry out enforcement activities. Moreover, when issuing implementing regulations, the FCC is not bound to adopt the Access Board's guidelines as its own or to use them as minimum requirements.

The Revised Standards and Guidelines replace the current product-based regulatory approach with an approach based on ICT functions. The revised technical requirements, which are organized along the lines of ICT functionality, provide requirements to ensure that covered hardware, software, electronic content, and support documentation and services are accessible to people with disabilities.

In addition, the revised requirements include functional performance criteria, which are outcome-based provisions that apply in two limited instances: when the technical requirements do not address one or more features of ICT or when evaluation of an alternative design or technology is needed under equivalent facilitation. Some of the key provisions and updates reflected in the Revised Standards and Guidelines relative to the existing standards and guidelines include:. Technological advances over the past two decades have resulted in the widespread use of multifunction devices that called into question the ongoing utility of the product-by-product approach used in the Board's existing Standards and Guidelines.

Consequently, one of the primary purposes of the final rule is to replace the current product-based approach with requirements based on functionality, and, thereby, ensure that accessibility for people with disabilities keeps pace with advances in ICT.

To ensure that compliance under both laws, to the maximum extent possible, can be measured against a common set of technical requirements, the implementing regulations have been consolidated into a single part: 36 CFR part As discussed below, this is a new organizational format for the Standards and Guidelines that mirrors the formatting of other standards and guidelines issued by the Access Board over the past decade.

Appendix A applies only to Section covered ICT and consists of Chapter 1, which sets forth general application and administration provisions, while Chapter 2 contains scoping requirements which, in turn, prescribe which ICT — and, in some cases, how many — must comply with the technical specifications.

Appendix B, which applies to covered ICT only, is organized similarly with Chapter 1 setting forth general application and administration provisions and Chapter 2 containing scoping requirements.

Appendix C sets forth technical specifications that apply equally to ICT covered under Sections or Appendix C includes five chapters, each of which with the exception of the final chapter address a separate ICT functional area. Lastly, in Appendix D, the existing Standards are republished in full albeit with a revised section numbering system for reference when evaluating Section covered existing legacy ICT under the "safe harbor" provision.

See discussion infra Section IV. For Section covered ICT, all covered Web and non-Web content and software — including, for example, Web sites, intranets, word processing documents, portable document format documents, and project management software — is required, with a few specific exceptions, to conform to WCAG 2.

By applying a single set of requirements to Web sites, electronic documents, and software, the revised requirements adapt the existing Standards to reflect the newer multifunction technologies e. View the tools and metrics that are important to you and present them in a handy overview. No more switching between accounts but combine all marketing channels such as Analytics, Google Ads, Facebook, Search console and more in your own marketing dashboard.

Think how much time it saves! The smart help that the web searches for content ideas and angles that you have missed so far. You can think of it as your personal researcher who is available 24 hours a day. Content Intelligence searches for the hidden factors in the Google search results and through AI Deep Learning supplement your content to better perform with the public and the search engines.

Distinguish yourself as an Agency and treat your customers to their own White Label environment. Use link building even more effectively and report all activities effortlessly. How do you distinguish yourself as an Agency? Give your clients access to their own dashboard, on your own domain, fully branded, tailored to your specifications.

Easily find linkbuilding prospects based on obtained links from competitors, link pages in your industry or on relevant blog articles. Start your drip mail campaign automatically for the maximum efficiency. Automatically check link placements over time. Report task and activities automatically every month in branded PDF reports or give your customers white label access to the time registration module. MarketingTracer smart A. Then we'll help you get it done.

Contact Support About us. Free trial. We make Online Marketing transparent and effective! SEO Audit. SEO Monitoring.

   


No comments:

Post a Comment

Autodesk alias autostudio 2019 win x64 free

Autodesk alias autostudio 2019 win x64 free Looking for: Autodesk Alias AutoStudio v Win x64 - Nullpk | Free Premium Downloads.  Click he...