CGD 218 Week 4 DQ 2 Advertising
December 23, 2015 | By FB6CA776AED |
Advertising The textbook explains that, although counterintuitive, advertising should not focus on the product or service being sold, but should rather focus on the needs and desires of its target market. It quotes Michael Newman (2003) stating: “Don’t tell me about your manure, tell me about my flowers” View the advertisements, below. Then, select three and explain if and how you see the above concept in action. Describe what product or service each of the three ads is trying to sell (e.g., manure). Then, explain what you think each ad is actually selling (e.g., a beautiful flower garden). Finally, describe whether you can think of any ethical concerns related to this approach of communication.
More from FB6CA776AED
Discussion Question 2 • Due Date: Day 4 [Main forum] • Post your response to the following: What is the importance of an operating system (OS)? What reasons would a computer user have to change from one OS to another? What do you like and dislike about the OS on your computer at home or at work? Explain why.
Discussion Question 1 • Due Date: Day 2 [Main forum] • Post your response to the following: Most personal computers come equipped with a version of the Windows operating system, whereas Apple personal computers have a different operating system. Other choices are also available, such as UNIX and Linux. Why do you think Windows is so prevalent? What do the other systems have to offer that Windows does not? Who uses the other systems?
Discussion Question 2 • Due Date: Day 4 [Main forum] • Post your response to the following after exploring Web sites such as http://www.foxnews.com/. After visiting several similar sites, what is one example of a computer based non-interactive multimedia? What is one example of an interactive multimedia? What are some of the advantages that interactive multimedia has over noninteractive multimedia? How might interactive multimedia benefit education? Be sure to cite specific examples.
Discussion Question 1 • Due Date: Day 2 [Main forum] • Post your response to the following after exploring one or more graphic programs available on your computer: Share your experience with the class. What did you like and dislike about the program? What advice could you give someone using the program for the first time?
Discussion Question 2 • Due Date: Day 4 [Main forum] • Post your response to the following: How does electronic commerce (e-commerce) affect you as a consumer, and how do you think e-commerce affects the way companies do business?
Discussion Question 1 • Due Date: Day 2 [Main forum] • Post your response to the following after considering how technology enables people to communicate constantly with each other through mobile phones, instant messaging, video teleconferencing, and e-mail: How often do you gain or exchange information via your computer? In how many ways is this possible? How valuable do you think the internet has become to personal communication? What are some of the problems that sometimes arise through the use of this technology? How could it affect a learning environment?
Discussion Question 2 • Due Date: Day 4 [post to the Main forum] • Post your response to the following: As you have discovered, there are a variety of computers available, from the smallest computer in a domestic device to the supercomputers used in industry. Despite the different uses of computers, they all have basics elements in common—each computer system involves hardware, software, data, and users. Think about the role of each component of your home or work computer: How do the components of your computer system interact within the system? What improvements or additions to your system do you think would benefit you or make the system more user-friendly? Why?
Discussion Question 1 • Due Date: Day 2 [post to the Main forum] • Post your response to the following: Think about how computer technology permeates society. Throughout the day, you encounter many types of computerized devices at the grocery store, fast food chains, school, and work. Describe one such device available today: Who uses it, what are they able to accomplish with its use, and how do people benefit from its existence?
CheckPoint: Types of Networks • Resource: Ch. 9 (pp. 346-347) in Computing Fundamentals • Due Date: Day 5 [Individual forum] • Refer to Ch. 9 (pp. 346-347) in Computing Fundamentals. • Compare and contrast LANs, WANs, CANs, MANs, and HANs in 200 to 350 words. • Cite any additional resources used in APA format. • Post the CheckPoint as an attachment.
CheckPoint: Microsoft® Word • Resource: pp.303-307 in Computing Fundamentals and the Computer Applications Tutorial • Due Date: Day 4 [Individual forum] • Refer to pp.303-307 in Ch. 8 of Computing Fundamentals. • Complete the Word portion of the Computer Applications Tutorial at http://corptrain.phoenix.edu/office_tools/index.htm and manipulate a document using the word processing program on your computer with the following specifics: o Open Microsoft® Word. o Create a new document by clicking on File, then New. o Copy and paste the following paragraph: 1. Click and move your mouse over the paragraph, highlighting the paragraph. 2. Click Ctrl + C (copy). 3. Click on your blank document with the mouse. 4. Click Ctrl + V (paste).
CheckPoint: Internet Scavenger Hunt • Resource: Appendix B • Due Date: Day 5 [Individual forum] • Choose a topic related to computer technology that interests you. Possible subjects can be gleaned from your text. • Narrow the topic to a specific search. If you are interested in available storage devices, for example, narrow your topic to a particular item such as a USB flash drive. • Write a statement in Appendix B next to Search Statement that explains exactly what you are searching for, then complete the following steps: o Decide which keywords from your statement to use for your search. Use at least two and record them in Appendix B next to Search Keywords. o Choose three search engines from which to begin your research, such as google.com, yahoo.com, live.com, ask.com, and lycos.com. You may choose from this list or find your own.
CheckPoint: Formatting Excel Spreadsheets • Resource: Ch. 8 (pp. 308-311) in Computing Fundamentals, the Computer Applications Tutorial and Appendix D • Due Date: Day 4 [Individual forum] • Refer to Ch. 8 (pp. 308-311) in Computing Fundamentals. • Review the Excel portion of the Computer Applications Tutorial at http://corptrain.phoenix.edu/office_tools/index.htm and explore the spreadsheet program on your computer. • Use the information available in Appendix D to format a Microsoft® Excel data set. The scenario for this data set is as follows: You just had a birthday a couple of weeks ago and you were somewhat surprised by some of the presents you received, pleasantly in several cases and unpleasantly in others. On a whim, you lightheartedly decide to find out who loves you the most based upon the gifts you were given. You use a spreadsheet to analyze the information. For this CheckPoint, you refine the spreadsheet, manipulating the document in the following ways: o Use at least two different font sizes.
CheckPoint: Data Versus Information • Resource: Ch. 5 in Computing Fundamentals • Due Date: Day 4 [Individual forum] • Consider the following: Computers use a completely different language than people, yet they communicate effectively with people. • Refer to Ch. 5 in Computing Fundamentals. • Distinguish between computer data represented by the state of a computer’s electrical switches and the meaningful information that is displayed to the user. • Write a 200- to 350-word paper that describes the distinctions of data and information and briefly explains the process a computer uses to convert data into information. • Cite any additional resources you reference in APA format. • Post the CheckPoint as an attachment.
CheckPoint: Cyber Security • Resource: Ch. 12 in Computing Fundamentals • Due Date: Day 4 [Individual forum] • Read the following scenario: James was traveling for his job. The internet card provided by his company was not working and he had an important project due that day. James was in a small town about an hour away from the nearest internet kiosk, so he decided to drive around a nearby suburb to see if he could find a wireless system he could “borrow” to send out his project. James found a wireless system without a security key and, after parking near the home with the system, uploaded the project. Afterward, just for fun, James peaked into the computer on the wireless system and found, to his dismay, some bank accounts and passwords.
CheckPoint: Computer Comparison • Resources: Ch. 1 (pp. 27-32) of Computing Fundamentals and PCWorld and Macworld Web sites • Due Date: Day 5 [post to the Individual forum] • Read pp. 27-32 of Ch.1. • Think about how your computer system compares to a state-of-the-art system. CIS 105 Survey of Computer Information Systems Course Syllabus Page 11 • Identify the following components of your system: type of central processing unit (CPU), amounts of random access memory (RAM) and read-only memory (ROM), input and