Information to Users

Total Page:16

File Type:pdf, Size:1020Kb

Information to Users Diffusion of network information retrieval in academia Item Type text; Dissertation-Reproduction (electronic) Authors Ashley, Nancy Winniford Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 05/10/2021 15:52:07 Link to Item http://hdl.handle.net/10150/187072 INFORMATION TO USERS This ~uscript ,has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely. event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the origina1, beginning at the upper left-hand comer and contim1jng from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy•. Higher quality 6" x 9" black and white photographic prints are aVailable for any photOgraphs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. UMI A Bell & Howell Information Company 300 North Zeeb Road. Ann Arbor. MI4S106-1346 USA 313/761-4700 800:521·0600 DIFFUSION OF NETWORK INFORMATION RETRIEVAL IN ACADEMIA by Nancy W inniford Ashley A Dissertation Submitted to the Committee on BUSINESS ADMINISTRATION In Partial Fulfillment of the Requirements For the Degree of DOcrOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 1995 OMI Number: 9531094 UMI Microform 9531094 Copyright 1995, by OMI Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United states Code. uw 300 North Zeeb Road Ann Arbor, MI 48103 ---~- ~ ...... ". 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Final Examination Committee, we certify that we have read the dissertation prepared by_______ N~a_n_c~y~W~i~n~n~i~f~o~r~d~A~s~h_l_e~y ________ __ entitled ____~D~i~f~f~u~s~i~o~n~o~f~·~N~e~t~w~o~r~k~in~f~o~rm~a~t~i~o~n~R~e~t~r~i~e~v~a~l~i~n~A~c~a~d~e=m=i=a ____ and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of ______D_o_c __ to_r __ o_f __ P_h_i_l_o_s_o~p_h~y ______________ __ /(,- I.., - tfy Date Date Date Date Final approval and acceptance of this dissertation is contingent upon the candidate's submission of the final copy of the dissertation to the Graduate College. I hereby certify that I have read this dissertation prepared under my direction and recommend that it be accepted as fulfilling the dissertation Date 3 STATEMENT BY AUTHOR This dissertation bas been submitted in partial fulfillment of requirements for an advanced degree at The University of Arizona and is deposited in the University Library to be made available to borrowers under rules of the Library. Brief quotations from this dissertation are allowable without special permission, provided that accurate acknowledgement of source is made. Requests for permission tor extended quotation from or reproduction of this manuscirpt in whole or in part may be granted by the head of the major department or the Dean of the Graduate College when in his or her judgment the proposed use of the material is in the interests of scholarship. In all other instances, liowever, permission must be obtained from the author. SIGNED:~~~~ 4 ACKNOWLEDGEMENTS My advisor, Dr. Suzie Weisband, has been an exceptionally intuitive and optimistic guide through the research process. I particularly appreciated my conversations with Dr. Gretchen Whitney, my minor advisor in Library Science, in the early years of forming my research ideas. I would also like to thank the other members of my committee, Dr. Mark Pendergast, Dr. Titus Purdin, and Dr. Charlie Seavey for their efforts and suggestions which have made this research better. I am grateful to my parents, Dr. Robert Winhlford and Georgene Winniford, who made the academic life look attractive. I am also thankful for my sister, Dr. MaryAnne Winniford, who encouraged me when I decided to follow in her academic footsteps. It is a fine thing to have a doctoral sibling to commiserate with in the bad times and to rejoice with in the good times. 5 DEDICATION To my husband Rhett -- a gifted artist and sculptor. he is also adept at the fine craft of marriage. 6 TABLE OF CONTENTS LIST OF FIGURES .......................................................................... 9 LIST OF TABLES ........................................................................... 10 ABS'IRACf.................. ...... II ••••• II •• II •••••••••• II ••••••• II.... ••••••••••••••••••••••• 12 1. INTRODUCTION ....................................................................... 14 What is N'IR. ? ......................................................................... 16 NIR Resources and Technologies. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. 19 Databases ....................... '. II •••••••••••••••••••••••••••••• II.. • •• •••••••••• 20 Files for Public Access ...................................................... 22 Electronic Discussions ....................................................... 24 Accessing Information Resources ....................................... 26 2. THEORETICAL BASIS FOR THE STUDY OF NIR ....................... 36 Theories Considered ............................................................... 36 Reasons for Choice of TheOlY.................................................. 41 Diffusion of Innovation Theory ............................................... 44 Applying the Diffusion of Innovation Theory to NIR ................. 50 Communication Channels used by the Potential Adopter ....... 50 Perceived Characteristics of the Innovation ......................... 53 Compatibility with Needs, Practices, and Norms .............. 53 Compatibility with Needs ....................................... 54 Compatibility with Previous Practice ....................... 56 Compatibility with Social Norms ............................. 58 Relative Advantage over Previous Practice ..................... 60 Complexity .................................................................. 63 Trialability .................................................................. 63 7 TABLE OF CONfENfS -- CONTINUED Observability ............................................................... 64 3. METHODOLOGy .......................................... 1 ••••••••••••••••••• I •••••••• 67 Choice of Research Methodologies ........................................... 67 Survey Methodology ............................................................... 71 Subjects ......................... II .................................................. 71 Procedures ........................ II •••••••••••••••••••••••••••••• II ••••••••••••• 73 Hypotheses an.d Measures .........' ........................... , .............. 74 Survey Response ........................ II ••••••••••••••••••••••••••••••••••••• 75 Survey Resu.lts. .. .. ... .. .. .... ... .... .. .. .. .. .. .. .. .. .. 77 Case Study Methodology ......................................................... 79 Subjects. 11 .......................................................................... ,79 Procedures ....................................................................... 81 Predicted Relationships and Measures ................................. 83 4. ANALYSIS OF THE CASESTUDYDATA................................... 86 Awareness Associated with Type of Communication Channe1. ..... 86 Use Associated with Type of Communication Channel. ............... 88 Use Associated with NIR. Compatibility with Need ..................... 88 Use Associated with NIR Compatibility with Previous Pm.ctices .............................................................................. 90 Use Associated with NIR Compatibility with Social Norms ......... 91 Use Associated with Relative Advantages of NIR ....................... 93 Use Associated with NIR Complexity........................................ 96 Use Associated with NIR Trialability ........................................ 98 TABLE OF CONfENTS -- CONTINUED 8 TABLE OF CONTENTS -- CONTINUED 5. DISCUSSION AND RESEARCH IMPLICATIONS ........................ 100 Effects of Communication Channels on Awareness of NIR .......... 102 Effects of Communication Channels on Use of NIR .................... 110 Effects of Perceived Characteristics of NIR. on Use of NIR ......... 111 Perceived Need for NIR and Use of NIR. ............................. 111 Previous Practice and Use ofNIR....................................... 117 Social Nonns and Use of NIR ............................................ 119 Relative Advantage and Use of NIR. ...................................
Recommended publications
  • How to Find out the IP Address of an Omron
    Communications Middleware/Network Browser How to find an Omron Controller’s IP address Valin Corporation | www.valin.com Overview • Many Omron PLC’s have Ethernet ports or Ethernet port options • The IP address for a PLC is usually changed by the programmer • Most customers do not mark the controller with IP address (label etc.) • Very difficult to communicate to the PLC over Ethernet if the IP address is unknown. Valin Corporation | www.valin.com Simple Ethernet Network Basics IP address is up to 12 digits (4 octets) Ex:192.168.1.1 For MOST PLC programming applications, the first 3 octets are the network address and the last is the node address. In above example 192.168.1 is network address, 1 is node address. For devices to communicate on a simple network: • Every device IP Network address must be the same. • Every device node number must be different. Device Laptop EX: Omron PLC 192.168.1.1 192.168.1.1 Device Laptop EX: Omron PLC 127.27.250.5 192.168.1.1 Device Laptop EX: Omron PLC 192.168.1.3 192.168.1.1 Valin Corporation | www.valin.com Omron Default IP Address • Most Omron Ethernet devices use one of the following IP addresses by default. Omron PLC 192.168.250.1 OR 192.168.1.1 Valin Corporation | www.valin.com PING Command • PING is a way to check if the device is connected (both virtually and physically) to the network. • Windows Command Prompt command. • PC must use the same network number as device (See previous) • Example: “ping 172.21.90.5” will test to see if a device with that IP address is connected to the PC.
    [Show full text]
  • Xerox® Colorqube 8580/8880 Color Printer 3 System Administrator Guide
    Xerox® ColorQube® 8580 / 8880 Color Printer Imprimante couleur System Administrator Guide Guide de l’administrateur système © 2015 Xerox Corporation. All rights reserved. Unpublished rights reserved under the copyright laws of the United States. Contents of this publication may not be reproduced in any form without permission of Xerox Corporation. Copyright protection claimed includes all forms of matters of copyrightable materials and information now allowed by statutory or judicial law or hereinafter granted, including without limitation, material generated from the software programs which are displayed on the screen such as styles, templates, icons, screen displays, looks, and so on. Xerox® and Xerox and Design®, Phaser®, PhaserSMART®, PhaserMatch®, PhaserCal®, PhaserMeter™, CentreWare®, PagePack®, eClick®, PrintingScout®, Walk-Up®, WorkCentre®, FreeFlow®, SMARTsend®, Scan to PC Desktop®, MeterAssistant®, SuppliesAssistant®, Xerox Secure Access Unified ID System®, Xerox Extensible Interface Platform®, ColorQube®, Global Print Driver®, and Mobile Express Driver® are trademarks of Xerox Corporation in the United States and/or other countries. Adobe® Reader®, Adobe® Type Manager®, ATM™, Flash®, Macromedia®, Photoshop®, and PostScript® are trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, EtherTalk, TrueType, iPad, iPhone, iPod, iPod touch, Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries. AirPrint and the AirPrint logo are trademarks of Apple Inc. HP-GL®, HP-UX®, and PCL® are trademarks of Hewlett-Packard Corporation in the United States and/or other countries. IBM® and AIX® are trademarks of International Business Machines Corporation in the United States and/or other countries. Microsoft®, Windows Vista®, Windows®, and Windows Server® are trademarks of Microsoft Corporation in the United States and other countries.
    [Show full text]
  • Cs-204: Computer Networks
    CS-204: COMPUTER NETWORKS Lecture 5 Chapter 19- Network Layer: Logical Addressing Instructor: Dr. Vandana Kushwaha 1. INTRODUCTION Communication at the network layer is host-to-host (computer-to-computer); a computer somewhere in the world needs to communicate with another computer somewhere else in the world. Usually, computers communicate through the Internet. The packet transmitted by the sending computer may pass through several LANs or WANs before reaching the destination computer. For this level of communication, we need a global addressing scheme; we called this logical addressing or IP address. 2. IPv4 ADDRESSES An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet. IPv4 addresses are unique. They are unique in the sense that each address defines one, and only one, connection to the Internet. Two devices on the Internet can never have the same address at the same time. But by using some strategies, an address may be assigned to a device for a time period and then taken away and assigned to another device. On the other hand, if a device operating at the network layer has m connections to the Internet, it needs to have m addresses. A router is such a device which needs as many IP addresses as the number of ports are there in it. 2.1. Address Space A protocol such as IPv4 that defines addresses has an address space. An address space is the total number of addresses used by the protocol. If a protocol uses N bits to define an address, the address space is 2N because each bit can have two different values (0 or 1) and N bits can have 2N values.
    [Show full text]
  • Multitech Bluetooth Network Access Point Administrator Guide S000619 Rev 1.2 for Use with Model: MT200B2E
    MultiTech Bluetooth® Network Access Point Administrator Guide MultiTech Bluetooth Network Access Point Administrator Guide S000619 Rev 1.2 For use with model: MT200B2E Copyright This publication may not be reproduced, in whole or in part, without the specific and express prior written permission signed by an executive officer of Multi-Tech Systems, Inc. All rights reserved. Copyright © 2015 by Multi-Tech Systems, Inc. Multi-Tech Systems, Inc. makes no representations or warranties, whether express, implied or by estoppels, with respect to the content, information, material and recommendations herein and specifically disclaims any implied warranties of merchantability, fitness for any particular purpose and non- infringement. Multi-Tech Systems, Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Multi-Tech Systems, Inc. to notify any person or organization of such revisions or changes. Trademarks MultiTech, MultiConnect, and the MultiTech logo are registered trademarks of Multi-Tech Systems, Inc. Bluetooth is a registered trademark of Bluetooth SIG, Inc. All other brand and product names are trademarks or registered trademarks of their respective companies. Contacting MultiTech Knowledge Base The Knowledge Base provides immediate access to support information and resolutions for all MultiTech products. Visit http://www.multitech.com/kb.go. Support Portal To create an account and submit a support case directly to our technical support team, visit: https://support.multitech.com Support Business Hours: M-F, 9am to 5pm CT Country By Email By Phone Europe, Middle East, Africa: [email protected] +(44) 118 959 7774 U.S., Canada, all others: [email protected] (800) 972-2439 or (763) 717-5863 World Headquarters Multi-Tech Systems, Inc.
    [Show full text]
  • INTRODUCTION to SUBNETTING How to Maximize Network Addresses
    Volume 1 • Issue 8 September–October 2000 Introduction to Industrial Ethernet, Part 5. Part 4 was featured in Issue 6, the MAY–JUNE 2000. If you would like a copy, please send your request to EXTENSION [email protected] A Technical Supplement to control NETWORK © 2000 Contemporary Control Systems, Inc. INTRODUCTION TO SUBNETTING How to maximize network addresses. By George Thomas, Contemporary Controls INTRODUCTION address to distinguish it from the Class Addressing other computers. With IP In a previous article we discussed addressing, servers and IPv4 is called a classful system the Internet Protocol and the workstations are all termed hosts under RFC 761 with IP addresses structure of IP addresses. An IP but each address not only identifies being defined as belonging to one address identifies the source and a host but the address of the of five classes A, B, C, D or E. destination of a directed or unicast network on which the host resides. Classes A, B and C define different possible combinations of network message and is defined in RFC 761. This is because IP is an and host addresses. Class D is IPv4 is the most common version internetworking protocol that not reserved for multicasting. of IP addressing requiring 32-bit only allows communication Multicasting is the ability of one addresses. Although IPv6, the 128- between hosts on the same host to communicate with many bit version, will be used in the network, but communication other hosts with one transmission future, this article will restrict the between hosts on different and is beyond the scope of this discussion to IPv4.
    [Show full text]
  • Exploring Tech Tools and Productivity Apps
    University at Albany, State University of New York Scholars Archive University Libraries Faculty Scholarship University Libraries 2-1-2021 Exploring Tech Tools and Productivity Apps Lauren Puzier University at Albany, State University of New York, [email protected] Follow this and additional works at: https://scholarsarchive.library.albany.edu/ulib_fac_scholar Part of the Library and Information Science Commons, and the Technology and Innovation Commons Recommended Citation Puzier, Lauren, "Exploring Tech Tools and Productivity Apps" (2021). University Libraries Faculty Scholarship. 139. https://scholarsarchive.library.albany.edu/ulib_fac_scholar/139 This Article is brought to you for free and open access by the University Libraries at Scholars Archive. It has been accepted for inclusion in University Libraries Faculty Scholarship by an authorized administrator of Scholars Archive. For more information, please contact [email protected]. Exploring Tech Tools and Productivity Apps LAUREN PUZIER University at Albany, Albany, New York, USA Address correspondence to Lauren Puzier, University Library, University at Albany, 1400 Washington Ave., Albany, NY 12222 email [email protected] Tech tools is a topic we like to revisit again and again because technology is continuously changing and there are always new tools and apps to test out. There are tools for everything from productivity, audio, communication, content creation and design, coding, automation, VR, video, etc. The NMRT Online Discussion Committee asked members what tools they have found useful in their work, at their library, or at home over the past year. Members shared tools they were interested in trying and which apps helped their daily workflow. Time by Aline Dassel from Pixabay ​ ​ ​ ​ 1 When it comes to productivity, PomoDone App helps get jobs done.
    [Show full text]
  • Eyecare Advantage Version 11.0.8 Enhancements (1/5/2017)
    Eyecare Advantage Version 11.0.8 Enhancements (1/5/2017) Take Course Now! Click to watch a video of these enhancements in Compulink University. You’ll need the Username and Password associated with your student account to log in. Ask your manager or Compulink Administrator if you don’t have this information. Items marked (Client Request) were requested by clients, and satisfied with this update. Companion Courses Associated with this Version (If viewing in a PDF viewer, click the link below the course to go directly to Compulink University LMS. If viewing in a browser, highlight the entire link, right click and Open Link in New Tab.) 2017 Quality Measure Code Changes (Course ID:QPP_100) http://prosperitylms3.com/req/compulink/_student/indexcrs.cfm?crsid=QPP_100 HOT TOPICS 2017 Quality Measures > 2017 Quality Measures • Please refer to CMS for 2017 Quality Reporting guidelines for your medical specialty. Not all clinicians are required to report in 2017. • Exam Screen Updates • All products running Version 11.0.8.0 and higher, have a NEW 'Quality' or 'Quality Measures 2017' tab that contain the Measures for reporting the Quality Category for MIPS in 2017 (formerly PQR). • Code Updates • A new QualityMeasureInfo2017.pdf file with Code changes was included with the version, and can be found in your product folder. • You MUST add the corresponding entries in your Services table, with identical POST Codes, for those Codes to post from the EHR to the patient Ledger. • For detailed information on how to update your Services table with the new code changes, view the following course in Compulink University LMS: 2017 Quality Measure Code Changes Physician Quality Reporting System (PQRS) > ICD-10 Code Updates and Impact to 4th Quarter 2016 • International Classification of Diseases (ICD)-10 Code Updates and Impact to 4th Quarter 2016 Eligible Professional Medicare Quality Programs • On October 1, 2016, new International Classification of Diseases (ICD)-10-CM and ICD-10- PCS code sets went into effect.
    [Show full text]
  • Social Networking: How It Can Help Advance Our Profession
    ROUNDTABLE Social Networking: How it Can Help Advance Our Profession never thought I would call myself a “blogger.” However, tools, such as Twitter, Facebook, and YouTube. This I following a quick demonstration of some user-friendly, allows our audience to connect back to the blog and free software (Wordpress and Blogger are the most respond to messages they are exposed to, thereby driv- popular) and a test run, I was hooked! Blogging is rela- ing traffic to the blog. tively easy and is written in a simple, conversational tone. I hope some of you will start new blogs after read- Through the Georgia Forestry Commission (GFC)’s new ing this. Remember, your comments and Sustainable Community Forestry Program (SCFP) Blog, we replies are always welcome on the GFC provide a growing network of readers with news and infor- Sustainable Community Forestry Blog mation about a myriad of urban forestry topics, including at gfccommunityforestry.wordpress.com. special events, workshops, and timely studies. Follow me on Twitter @Treegirl, and on It’s no wonder social media has become such a phe- Facebook too. I’ll be watching for you! nomenon. It allows people to connect and communicate —Susan Reisch, Urban & Community Forestry Coordinator, their thoughts and opinions, creating conversations in an Georgia Forestry Commission online world. Plus, it provides critical, real-time informa- tion that we would normally spend thousands of dollars ith so much happening in urban and commu- to collect through focus groups and market research. Wnity forestry these days it’s a real task to stay This means a lot when there is little or no budget to current.
    [Show full text]
  • An Internet Protocol (IP) Address Is a Numerical Label That Is
    Computer Communication Networks Lecture No. 5 Computer Network Lectures IP address An Internet Protocol (IP) address is a numerical label that is assigned to devices participating in a computer network, that uses the Internet Protocol for communication between its nodes. An IP address serves two principal functions: 1- host or network interface identification 2- location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." The designers of TCP/IP defined an IP address as a 32-bit number and this system, known as Internet Protocol Version 4 or IPv4, is still in use today. However, due to the enormous growth of the Internet and the resulting depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995. Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 208.77.188.166 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6). The Internet Protocol also routes data packets between networks; IP addresses specify the locations of the source and destination nodes in the topology of the routing system. For this purpose, some of the bits in an IP address are used to designate a sub network. As the development of private networks raised the threat of IPv4 address exhaustion, RFC 1918 set aside a group of private address spaces that may be used by anyone on private networks. They are often used with network address translators to connect to the global public Internet.
    [Show full text]
  • IP ADDRESS ASSIGNMENT in a MOBILE AD HOC NETWORK Mansoor Mohsin and Ravi Prakash the University of Texas at Dallas Richardson, TX
    MILCOM 2002 1 IP ADDRESS ASSIGNMENT IN A MOBILE AD HOC NETWORK Mansoor Mohsin and Ravi Prakash The University of Texas at Dallas Richardson, TX Abstract—A Mobile Ad Hoc Network (MANET) consists of a set of iden- proactive approach based on the binary split idea of [5] [6]. tical mobile nodes communicating with each other via wireless links. The network's topology may change rapidly and unpredictably. Such networks II. SYSTEM MODEL may operate in a stand-alone fashion, or may be connected to the larger In- ternet. In traditional networks, hosts rely on centralized servers like DHCP We consider an autonomous Mobile Ad Hoc Network work- for configuration, but this cannot be extended to MANETs because of their ing on its own. It has no gateway or connection to the external distributed and dynamic nature. Many schemes have been proposed to solve this problem. Some of these approaches try to extend the IPv6 state- world. The network is formed by a group of nodes coming to- less autoconfiguration mechanism to MANETs, some use flooding the en- gether. The nodes can join and leave the network any time and tire network to come up with a unique IP address, and others distribute are free to move around. Hence the size and topology of the IP addresses among nodes (using binary split) so that each node can inde- network is dynamic and unpredictable in nature. pendently configure new nodes. None of these existing solutions consider network partitioning and merging. In this paper, we propose a proactive There is no single DHCP server.
    [Show full text]
  • Using Technology to Enhance Clinical Supervision and Training
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263504457 Using Technology to Enhance Clinical Supervision and Training Chapter · May 2014 DOI: 10.1002/9781118846360.ch9 CITATIONS READS 7 1,173 1 author: Tony Rousmaniere University of Washington Seattle 27 PUBLICATIONS 125 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Clinical Outcome Study View project All content following this page was uploaded by Tony Rousmaniere on 05 September 2014. The user has requested enhancement of the downloaded file. 9 Using Technology to Enhance Clinical Supervision and Training Tony Rousmaniere The past two decades has witnessed an explosion in the number of technologies being used to deliver and enhance supervision and training,1 such as Web-based videocon- ference, the iPad, webcams, the Internet “cloud,” clinical virtual reality software, Web-based software for tracking clinical outcomes, and software to code psycho- therapy session videos. Around the world, supervisors have been rapidly moving their services online; clinical supervision and training is no longer restricted by geography. In June 2013, a Google search for “psychotherapy Skype supervision” resulted in over 300 listings for individual or group psychotherapy supervision by videoconfer- ence, provided by supervisors around the world, in a diverse range of modalities, including acceptance and commitment therapy (ACT), addictions treatment, cognitive-behavioral therapy (CBT), dialectical-behavioral therapy (DBT), emotion- focused therapy (EFT), eye-movement desensitization and reprocessing (EMDR), drama therapy, equine-assisted therapy, Gestalt, imago therapy, intensive short-term dynamic psychotherapy (ISTDP), music therapy, psychoanalysis, sandplay therapy, and sensory motor therapy.
    [Show full text]
  • Lab 2.8.1: Basic Static Route Configuration
    Lab 2.8.1: Basic Static Route Configuration Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 172.16.3.1 255.255.255.0 N/A R1 S0/0/0 172.16.2.1 255.255.255.0 N/A Fa0/0 172.16.1.1 255.255.255.0 N/A R2 S0/0/0 172.16.2.2 255.255.255.0 N/A S0/0/1 192.168.1.2 255.255.255.0 N/A FA0/0 192.168.2.1 255.255.255.0 N/A R3 S0/0/1 192.168.1.1 255.255.255.0 N/A PC1 NIC 172.16.3.10 255.255.255.0 172.16.3.1 PC2 NIC 172.16.1.10 255.255.255.0 172.16.1.1 PC3 NIC 192.168.2.10 255.255.255.0 192.168.2.1 Learning Objectives Upon completion of this lab, you will be able to: • Cable a network according to the Topology Diagram. • Erase the startup configuration and reload a router to the default state. • Perform basic configuration tasks on a router. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 20 CCNA Exploration Routing Protocols and Concepts: Static Routing Lab 2.8.1: Basic Static Route Configuration • Interpret debug ip routing output. • Configure and activate Serial and Ethernet interfaces. • Test connectivity. • Gather information to discover causes for lack of connectivity between devices. • Configure a static route using an intermediate address.
    [Show full text]