MOBILE LEARNING 2013 Ii

Total Page:16

File Type:pdf, Size:1020Kb

MOBILE LEARNING 2013 Ii INTERNATIONAL CONFERENCE MOBILE LEARNING 2013 ii PROCEEDINGS OF THE INTERNATIONAL CONFERENCE MOBILE LEARNING 2013 LISBON, PORTUGAL MARCH 14-16, 2013 Organised by IADIS International Association for Development of the Information Society iii Copyright 2013 IADIS Press All rights reserved This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Permission for use must always be obtained from IADIS Press. Please contact [email protected] Edited by Inmaculada Arnedillo Sánchez and Pedro Isaías Associate Editor: Luís Rodrigues ISBN: 978-972-8939-81-6 iv TABLE OF CONTENTS FOREWORD ix PROGRAM COMMITTEE xi KEYNOTE LECTURE xvii INVITED TALK xviii CONFERENCE TUTORIAL xix FULL PAPERS COMMON MOBILE LEARNING CHARACTERISTICS-AN ANALYSIS OF 3 MOBILE LEARNING MODELS AND FRAMEWORKS Umera Imtinan, Vanessa Chang and Tomayess Issa WALKING TOWARDS INSTRUMENTAL APPROPRIATION OF MOBILE 12 DEVICES. A COMPARISON OF STUDIES Maria José Hernandez Serrano and Lingling Yang TWITTER MICRO-BLOGGING BASED MOBILE LEARNING APPROACH TO 19 ENHANCE THE AGRICULTURE EDUCATION PROCESS Uvasara Dissanayeke, K.P. Hewagamage, Robert Ramberg and G.N. Wikramanayake DESIGNING MIXED REALITY MOBILE GAMES FOR CRISIS 27 MANAGEMENT TRAINING Ines Di Loreto, Simone Mora and Monica Divitini FROM LEARNING OBJECT TO LEARNING CELL: A RESOURCE 35 ORGANIZATION MODEL FOR UBIQUITOUS LEARNING Shengquan Yu, Xianmin Yang and Gang Cheng LINGOBEE – CROWD-SOURCED MOBILE LANGUAGE LEARNING IN THE 43 CLOUD Sobah Abbas Petersen, Emma Procter-Legg and Annamaria Cacchione MEDIA CREATION AND SHRING IN INFORMAL, SITUATED, AUTHENTIC 51 MOBILE LEARNING FOR LOCAL CULTURAL DIVERSITY INVESTIGATION Jacek Walinski TEXT MESSAGING FOR OUT-OF-CLASS COMMUNICATION: IMPACT ON 59 AFFECTIVE LEARNING Paul Hayes, Stephan Weibelzahl and Tim Hall v PRISMA-MAR: AN ARCHITECTURE MODEL FOR DATA VISUALIZATION 67 IN AUGMENTED REALITY MOBILE DEVICES Mauro Alexandre Folha Gomes Costa, Bianchi Serique Meiguins, Nikolas S. Carneiro and Aruanda Simões Gonçalves Meiguins WHAT DO CONTEXT AWARE ELECTRONIC ALERTS FROM VIRTUAL 76 LEARNING ENVIRONMENTS TELL US ABOUT USER TIME & LOCATION? Laura Crane and Phillip Benachour TABLET COMPUTERS ON TRIAL: A TRANSFORMATIVE FORCE IN 83 EDUCATION? Skúlína Hlíf Kjartansdóttir and Sólveig Jakobsdóttir DEVELOPMENT AND USE OF AN EFL READING PRACTICE APPLICATION 91 FOR AN ANDROID TABLET COMPUTER Yasushige Ishikawa, Craig Smith, Mutsumi Kondo, Ichiro Akano, Kate Maher and Norihisa Wada MOBILE LEARNING APPLICATION INTERFACES: FIRST STEPS TO A 101 COGNITIVE LOAD AWARE SYSTEM Robin Deegan ”MOBILE PHONES AND OTHER DISTURBING OBJECTS...” 109 Torbjörn Ott ROLE OF PASSIVE CAPTURING IN A UBIQUITOUS LEARNING 117 ENVIRONMENT Hiroaki Ogata, Bin Hou, MengMeng Li, Noriko Uosaki and Kousuke Mouri ANDROID BASED MOBILE ENVIRONMENT FOR MOODLE USERS 125 Gisela T. de Clunie, Clifton Clunie T., Aris Castillo and Norman Rangel A MOBILE PLATFORM FOR ADMINISTERING QUESTIONNAIRES AND 133 SYNCHRONIZING THEIR ANSWERS Maria Germana Ginardi and Giordano Lanzola SHORT PAPERS FUTURE EDUCATORS’ EXPLAINING VOICES 143 Janaina Minelli de Oliveira, Pablo Buenestado Caballero and Mar Camacho A FRAMEWORK FOR THE CREATION OF MOBILE EDUCATIONAL GAMES 148 FOR DYSLEXIC CHILDREN Juan Haladjian, Daniel Richter, Paul Muntean, Damir Ismailović and Bernd Brügge MOBILE LEARNING 4ALL 153 Secundino Correia, Paula Medeiros, Mafalda Mendes and Margarida Silva LOCATION-AWARE MOBILE LEARNING OF SPATIAL ALGORITHMS 158 Ville Karavirta LEARNING WITH SMARTPHONES: STUDENTS’ LIVED EXPERIENCE OF 163 vi USING SMARTPHONES Nee Nee Chan, Alan Walker-Gleaves and Richard Remedios INVESTIGATION OF USING ANALYTICS IN PROMOTING MOBILE 168 LEARNING SUPPORT Videhi Visali and Niraj Swami TABLET USE WITHIN MEDICINE 173 Rebecca J. Hogue BENEFITS AND FINANCIAL IMPACTS OF ADOPTING TECHNOLOGY IN 177 LEARNING Katri Grenman, Minna Isomursu, Maija Federley and Anu Seisto M-LEARNING FOR QUR’AN MEMORIZATION AND TEACHING ITS 183 SCIENCES Ahmed Sameh LEARNING POTENTIALS OF THE UBIQUITOUS INTERNET: USING 188 MOBILE DEVICES TO SUPPORT THE INDIVIDUAL, SOCIAL AND PHYSICAL CONTEXT OF THE LEARNER Christian Dalsgaard, Nicholai Friis Pedersen and Janus Holst Aaen SMARTPHONES IN CLINICAL NURSING PRACTICE: A MULTIPHASED 193 APPROACH TO IMPLEMENTATION AND DEPLOYMENT Brad Johnson, CJ Davison and Lisa Moralejo TRANSMEDIA STORYBUILDING IN SLOYD 199 Annika Wiklund-Engblom, Kasper Hiltunen, Juha Hartvik and Mia Porko-Hudd MOBILE LEARNING IN SECONDARY EDUCATION: PERCEPTIONS AND 204 ACCEPTANCE OF TABLETS OF TEACHERS AND PUPILS Hannelore Montrieux, Cédric Courtois, Frederik De Grove, Annelies Raes, Tammy Schellens and Lieven De Marez ONDIGITA: A PLATFORM FOR THE MANAGEMENT AND DELIVERY OF 209 DIGITAL DOCUMENTS Riccardo Mazza, Andrea Baldassari and Roberto Guidi REFLECTION PAPERS FROM RADIO, TO SATELLITE, TO MLEARNING: INTERACTIVE DISTANCE 217 EDUCATION IN AUSTRALIA Stephen Crump FLIPPED APPROACH TO MOBILE ASSISTED LANGUAGE LEARNING 221 Junko Yamamoto MOBILE PEDAGOGY 225 Lee Schlenker CONTEXT AND CONCEPTS IN MOBILE LEARNING 230 Jimmy Jaldemark M-LEARNING SYSTEMS DESIGN - TECHNOLOGY AND PEDAGOGY 235 vii ASPECTS Elissaveta Gourova, Asya Asenova and Pavlin Dulev THE POTENTIAL FOR MOBILE LEARNING IN ENGLISH AS A FOREIGN 240 LANGUAGE AND NURSING EDUCATION C. J. Davison PROMOTING STEM EDUCATION THROUGH MOBILE TEACHING AND 245 LEARNING Murali Krishnamurthi and Stephanie Richter POSTERS A LEARNING COMMUNITY EXPLORES THE POTENTIAL OF MOBILE 251 APPS IN HIGHER EDUCATION Joan Van Duzer and Kathy D. Munoz MOBILE LEARNING APPLICATION BASED ON RSS FEED TECHNOLOGY 253 Mahmoud Mohanna and Laurence Capus MOBILE LEARNING USING MOBILE PHONES 257 Paula Vicente SUITABILITY OF M-LEARNING TO ENHANCE LEARNING ENGLISH 260 LANGUAGE J.F. Fazeena, Y. Ekanayaka and K. P. Hewagamage DOCTORAL CONSORTIA INTEGRATED AUTHORING TOOL FOR MOBILE AUGMENTED 265 REALITY-BASED E-LEARNING APPLICATIONS Marcos Fermín Lobo, Víctor Manuel Álvarez García and María del Puerto Paule Ruiz ENHANCING MOBILE WORKING MEMORY TRAINING BY USING 269 AFFECTIVE FEEDBACK Kristina Schaaff AUTHOR INDEX viii FOREWORD These proceedings contain the papers of the International Conference on Mobile Learning 2013, which was organised by the International Association for Development of the Information Society, in Lisbon, Portugal, March 14 – 16, 2013. The Mobile Learning 2013 International Conference seeks to provide a forum for the presentation and discussion of mobile learning research which illustrate developments in the field. In particular, but not exclusively, we aim to explore the theme of mobile learning under the following topics: - Learning analytics and mobile learning - Cloud computing and mobile learning - Pedagogical approaches, models and theories for mLearning - mLearning in and across formal and informal settings - Strategies and challenges for integrating mLearning in broader educational scenarios - User Studies in mLearning - Learner mobility and transitions afforded by mlearning - Socio-cultural context and implications of mLearning - Mobile social media and user generated content - Enabling mLearning technologies, applications and uses - Evaluation and assessment of mLearning - Research methods, ethics and implementation of mLearning - Innovative mLearning approaches - Tools, technologies and platforms for mLearning - mlearning: where to next and how? The Mobile Learning Conference 2013 received 116 submissions from more than 28 countries. Each submission has been anonymously reviewed by an average of 4 independent reviewers, to ensure that accepted submissions were of a high standard. Consequently only 17 full papers were approved which means an acceptance rate of 15%. A few more papers were accepted as short papers, reflection papers, posters and doctoral papers. An extended version of the best papers will be published in the International Journal of Mobile and Blended Learning (ISSN: 1941-8647). The Conference, besides the presentation of full papers, short papers, reflection papers, posters and doctoral papers also included a keynote presentation from an internationally distinguished researcher. We would therefore like to express our gratitude to Professor Frans Mäyrä, INFIM/TRIM/Game Research Lab & School of Information Sciences, University of Tampere, Finland, for accepting our invitation as keynote speaker. Also a special thanks to Cathie Norris, Regents Professor, University of North Texas, Denton, TX. USA and Elliot Soloway, Arthur F. Thurnau Professor, University of Michigan, Ann Arbor, MI, USA for being our invited speakers and also for presenting a tutorial. ix A successful conference requires the effort of many individuals. We would like to thank the members of the Program Committee for their hard work in reviewing and selecting the papers that appear in this book. We are especially grateful to the authors who submitted their papers to this conference and to the presenters who provided the substance of the meeting. We wish to thank all members of our organizing committee. Last but not least, we hope that everybody has enjoyed Lisbon and their time with colleagues from all over the world, and we invite you all to next edition of the International Conference Mobile Learning in 2014. Inmaculada Arnedillo Sánchez, Trinity College Dublin, Ireland. Conference Program Chair Pedro Isaías, Universidade Aberta
Recommended publications
  • 20 Must-Have Apps Für Android
    DE PROFESSIONELLES INTERNET- UND OPEN-SOURCE-KNOW-HOW MEDIA. Holger Reibold BRAIN- 20 Must-have Apps für Android Mehr als 100.000 Downloads Aktualisierte und erweiterte Neuauflage Mobile.Edition April 2015 Die zwanzig besten Apps für Android- Smartphones und -Tablets in der Praxis Holger Reibold 20 Must-have-Apps für Android Neuauflage – April 2015 2 20 Must-have-Apps für Android Alle Rechte vorbehalten. Ohne ausdrückliche schriftliche Genehmigung des Ver- lags ist es nicht gestattet, das Buch oder Teile daraus in irgendeiner Form durch Fotokopien oder ein anderes Verfahren zu vervielfältigen oder zu verbreiten. Das- selbe gilt auch für das Recht der öffentlichen Wiedergabe. Der Verlag macht darauf aufmerksam, dass die genannten Firmen- und Marken- namen sowie Produktbezeichnungen in der Regel marken-, patent- oder warenrech- tlichem Schutz unterliegen. Verlag und Autor übernehmen keine Gewähr für die Funktionsfähigkeit beschrie- bener Verfahren und Standards. © 2015 Brain-Media.de Herausgeber: Dr. Holger Reibold Umschlaggestaltung: Brain-Media.de Satz: Brain-Media.de Korrektorat: Theresa Tting Coverbild: panthermedia.net / Lasse Kristensen ISBN: 978-3-95444-200-3 www.brain-media.de Inhaltsverzeichnis 3 Inhaltsverzeichnis Inhaltsverzeichnis Vorwort ....................................................................................................................7 1 Android mit Zedge personalisieren...............................................................9 1.1 Hintergrundbilder .................................................................................10
    [Show full text]
  • Android-Smartphone – Die Verständliche Anleitung
    Sehen wie‘ s geht! Leseprobe Das Standardkommunikationsmittel E-Mail nutzen Sie auf Ihrem Android-Smartphone in der Regel mit Gmail. Wie Sie E-Mails schreiben, verwalten, sortieren und ordnen, und welche Alter- nativanbieter es gibt, erfahren Sie in dieser Leseprobe. Kapitel 6: »E-Mails senden und empfangen« Inhalt Stichwortverzeichnis Der Autor Leseprobe weiterempfehlen Rainer Hattenhauer Android-Smartphone – Die verständliche Anleitung 392 Seiten, broschiert, in Farbe, März 2015 19,90 Euro, ISBN 978-3-8421-0155-5 www.vierfarben.de/3809 Kapitel 6 – E-Mails senden und empfangen Kapitel 6 E-Mails senden und empfangen Sie ist zwar mittlerweile infolge des hohen Spamaufkommens ein wenig in Verruf geraten, gehört aber immer noch zum Standardkommunikations­ mittel des Webbürgers: die E­Mail. Zentrale Schnittstelle für alles, was elek­ tronische Post auf Ihrem Android­Smartphone betrifft, ist das Programm Gmail. Manche Hersteller verwenden eigene Lösungen, ich werde mich aber nachfolgend auf die Beschreibung von Gmail beschränken. Diese App finden Sie auf allen aktuellen Android­Smartphones. Das Google-Programm Gmail Das Gmail­Konto steht Ihnen sofort nach der Aktivierung Ihres Smart­ phones bei Google zur Verfügung. Zur Anmeldung verwenden Sie eine E­Mail­Adresse entweder in der Form <IhrName>@gmail.com oder <IhrName>@<IhrProvider>.de. Testen wir zunächst, ob Ihr Gmail­Account funktioniert. Stellen Sie dazu sicher, dass Ihr Smartphone online ist. 1. Schicken Sie sich vom PC aus von Ihrem bisherigen Mailaccount eine E­Mail an Ihre Gmail­Adresse. Die Mailadresse hat typischerweise die Form <IhrName>@gmail.com. 2. Achten Sie auf den oberen Displaybereich Ihres Smartphones: Nach kur­ zer Zeit sollte der Eingang der neuen E­Mail über das Benachrichtigungs­ system angezeigt werden 1.
    [Show full text]
  • Metadefender Core V4.14.2
    MetaDefender Core v4.14.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 11 Key Features of Metadefender Core 12 1. Quick Start with MetaDefender Core 13 1.1. Installation 13 Operating system invariant initial steps 13 Basic setup 14 1.1.1. Configuration wizard 14 1.2. License Activation 19 1.3. Process Files with MetaDefender Core 19 2. Installing or Upgrading Metadefender Core 20 2.1. Recommended System Requirements 20 System Requirements For Server 20 Browser Requirements for the Metadefender Core Management Console 22 2.2. Installing Metadefender 22 Installation 22 Installation notes 23 2.2.1. Installing Metadefender Core using command line 23 2.2.2. Installing Metadefender Core using the Install Wizard 25 2.3. Upgrading MetaDefender Core 25 Upgrading from MetaDefender Core 3.x 25 Upgrading from MetaDefender Core 4.x 26 2.4. Metadefender Core Licensing 26 2.4.1. Activating Metadefender Licenses 26 2.4.2. Checking Your Metadefender Core License 33 2.5. Performance and Load Estimation 34 What to know before reading the results: Some factors that affect performance 34 How test results are calculated 35 Test Reports 35 Performance Report - Multi-Scanning On Linux 35 Performance Report - Multi-Scanning On Windows 39 2.6. Special installation options 42 Use RAMDISK for the tempdirectory 42 3. Configuring MetaDefender Core 46 3.1. Management Console 46 3.2.
    [Show full text]
  • Just the Basics “Table of Contents”
    1 Just the Basics “Table of Contents” (TOC) (revised weekly) Presented by the Sequim PC Users group Compiled by Steve Solberg Updated: March 17, 2021 June 30, 2008 (original date for class & materials) All programs are Freeware or Open Source. Documents from past presentations are in separate folders according to the type of document. All programs updated to the latest versions as of this update. All programs come with a description or a user manual. Note 1: When some programs have 32 bit and 64-bit versions then both programs are listed. Note 2: There is a description inside each folder with a URL for reference and future updates. Note 3: All of these programs work with Windows 10 unless otherwise specified. Note 4: Just the Basics folder size is approximately 12.9GB. Note 5: Added hyperlinks to Categories to make it easier to find programs in TOC. Note 6: When opening the PDF, left click to select category to jump to that section. Control + left click to select category to jump to that section These are in alphabetical order. Categories: These links will bring you to the category in table of contents. Advanced Windows Advanced Windows Amateur Radio Anti-Virus Tools Tools Cont. Applications Astronomy Backup Utilities Browsers Budget, Finance & CD_DVD Burners Compression CPU & Video Testers PIM Crapware removers Data Recovery Disk & Registry Disk Tools & Cloning Defraggers Dog & Cat Database Coding Drivers eBook Readers, Editor, converter & Library Education E-Mail Encryption Encryption Tools File Shredders Productivity Tools File Tools and FTP Tools Hard Drive Test Tools Managers Internet Apps Internet Radio Internet Tools iTunes Alternative Java & Flash Keyboard Tester Laptop Apps LCD Monitor Testers License, Serial & Key Mail Clients MATH Finders Memory Testers Misc.
    [Show full text]
  • From Mobile to Security : Towards Secure Smartphones
    Fakultät für Elektrotechnik und Informationstechnik From Mobile to Security Towards Secure Smartphones Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakultät für Elektrotechnik und Informationstechnik an der Ruhr-Universität Bochum vorgelegt von Johannes Hoffmann aus Herdecke Bochum, 30. 09. 2014 Erstgutachter: Prof. Dr. Thorsten Holz » Ruhr-Universität Bochum Zweitgutachter: Prof. Dr. Felix C. Freiling » Friedrich-Alexander-Universität Erlangen-Nürnberg Fakultät für Elektrotechnik und Informationstechnik From Mobile to Security Towards Secure Smartphones Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakultät für Elektrotechnik und Informationstechnik an der Ruhr-Universität Bochum vorgelegt von Johannes Hoffmann aus Herdecke Bochum, 30. 09. 2014 Tag der mündlichen Prüfung: 28. 08. 2014 Erstgutachter: Prof. Dr. Thorsten Holz » Ruhr-Universität Bochum Zweitgutachter: Prof. Dr. Felix C. Freiling » Friedrich-Alexander-Universität Erlangen-Nürnberg Quis custodiet ipsos custodes? D. Iunius Iuvenalis This thesis was typeset with LATEX, KOMA-Script and Kile. Abstract This thesis addresses problems in the research field of mobile security—a field of in- creasing importance since the introduction of the first smartphones in 2007. Nowa- days, smartphones are commonly used, and because of their rich feature set always online, easily extensible with third-party applications, and usable for many tasks. Just like normal computers, they are complex systems of hard- and software process- ing vast amounts of data. Depending on the use cases, this may include private user data such as contact information or pictures, company secrets, as well as account credentials and payment information. A lack of knowledge related to security-sensitive tasks of most users and security related bugs in software provide evildoers with many attack vectors.
    [Show full text]
  • Veritas Information Map User Guide
    Veritas Information Map User Guide November 2017 Veritas Information Map User Guide Last updated: 2017-11-21 Legal Notice Copyright © 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This product may contain third party software for which Veritas is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Refer to the third party legal notices document accompanying this Veritas product or available at: https://www.veritas.com/about/legal/license-agreements The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Veritas Technologies LLC and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
    [Show full text]
  • Complete List of ALL File Extensions and Information - Botcrawl
    Complete List of ALL File Extensions and Information - Botcrawl Extension Information A Image Alchemy File (Handmade Software, Inc.) A Unknown Apple II File (found on Golden Orchard Apple II CD Rom) A ADA Program A Free Pascal Archive File for Linux or DOS Version (FPC Development Team) a UNIX Static Object Code Library A Assembly Source Code (Macintosh) A00 Archive Section A01 ARJ Multi-volume Compressed Archive (can be 01 to 99) (also see .000) (can be 01 to 99) (also see .000) A01 OzWin CompuServe E-mail/Forum Access SYSOP File A01 Archive Section A02 Archive Section A02 OzWin CompuServe E-mail/Forum Access SYSOP File A03 Archive Section A03 annotare ava 04 Project File (annotare.net) A03 OzWin CompuServe E-mail/Forum Access SYSOP File A04 OzWin CompuServe E-mail/Forum Access SYSOP File A04 Archive Section A05 OzWin CompuServe E-mail/Forum Access SYSOP File A05 Archive Section A06 OzWin CompuServe E-mail/Forum Access SYSOP File A06 Archive Section A06 Lotto Pro 2002 Smart Number Ticket A07 OzWin CompuServe E-mail/Forum Access SYSOP File A07 Archive Section A07 TaxCalc Tax File (Acorah Software Products Ltd.) A08 OzWin CompuServe E-mail/Forum Access SYSOP File A08 Archive Section A09 OzWin CompuServe E-mail/Forum Access SYSOP File A09 Archive Section A1 Free Pascal Archive File for GO321v1 Platform (FPC Development Team) A1 Unknown Apple II File (found on Golden Orchard Apple II CD Rom) A10 OzWin CompuServe E-mail/Forum Access SYSOP File A11 AOL Instant Messenger (AIM) Graphic (America Online, Inc.) A2 Unknown Apple II File (found on
    [Show full text]