Tuesday, October 7, 2008

Week 8 Readings

W3 schools HTML Tutorial

I thought this article was a nice step by step on how to use HTML. There were lots of examples, which was nice. The tutorial mentioned that us can use HTML or HTML extension and I am not really sure what that really is. Maybe when I create a website I will figure it out.

HTML Cheat sheet

I do not really have a whole lot to say about this site. It basically had a list of what you need to type in HTML and what effect it will have. It was very straight forward.

W3 School Cascading Style Sheet Tutorial

First, I would like to say I have never heard of CSS, but then again I have also never made a website or did any programming. I think it is one of those things, that if you start using it, it will make more sense. From my understanding CSS defines how things are displayed and all major browsers support CSS. That is what I got out of the tutorial. There were many examples, which basically went over my head.

Beyond HTML

What stood out to me in this article was the fact that the Georgia State University library had a ridiculously crappy system as of 2000! Not to mention the library liaisons did not seem to care about the fact it was so bad and kept on producing really bad stuff. I would think if you had a group of people who did not want to make their site any better, why not have someone come in a get it fixed sooner instead of waiting three years? I just do not understand how there were no standards, management or oversight. Other than that it seems that the CMS system works rather well and sets a standard and is easy to use. Unfortunately it is not an universally adopted system.

Muddiest Point

When people "steal" other people's internet and are looking up repulsive and illegal things like child pornography and the authorities discover this, does it get traced back to the person who is paying for the internet or can it be traced to the person who actually is committing the crime?

5 comments:

elaina v. said...

Your muddiest point caught my attention--I steal the internet from my downstairs neighbor (I think?? Thanks whoever you are!!) and every time I use my credit card to buy something I think "I wonder if they can get this information off my computer...", which is dumb, because they obviously can. Note to self: don't do this!

Susan Barbish said...

I agree with you about the Beyond HTML article. Why did they wait so long to do anything. If the system was bad which it obviously why they should of done something earlier. It is a diservice to the students to keep it that way for so long.

rjz said...

Hi Theresa,
I also agree that it is irresponsible of the library to continue to use such an inefficient internet database, so why does our library continue to do so?

sr. becky said...

I agree with you on the issue at Georgia State University, you would think that people working there would care about the tools they use.
I also liked your muddiest point, I'm not sure how that works either.

Daqing said...

i think that it probably difficult to trace back to you, unless you put in any personal information when you use the network.

As to Elaina's point, indeed, if the internet session you put your credit card information is not secured, you run the risk of other people see your personal information. having said that, most online sessions that ask for your credit card information is secured, but still you need to know how safe your network is.