Seventh Framework Programme Information and Communication Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Seventh Framework Programme Information and Communication Technologies SEVENTH FRAMEWORK PROGRAMME NFORMATION AND OMMUNICATION ECHNOLOGIES I C T Project Accessibility Assessment Simulation Environment for New Applications Design and Development (ACCESSIBLE, Grant Agreement No. 224145) Deliverable D 2.1 - State of the Art Survey in Accessibility Research and Market Survey Lead beneficiary CS WP. no, title WP2 – User needs, benchmarking, accessibility and and activity type simulation requirements (RTD) Contributing Task (s) Task 2.2: Literature review and market survey Dissemination Public level Delivery date January 2010 Status Updated Final File name and “ACCESSIBLE_D2.1_FINAL_updated_Jan2010.doc”, 10486 Kb size ACCESSIBLE Deliverable D2.1 -PU- Grant Agreement No. 224145 Authors List Leading Author (Editor) Surname Initials Beneficiary Name Contact email (Short Name) Staehli Benjamin SB CS [email protected] Co-authors (In alphabetic order) # Surname Initials Beneficiary Name Contact email (Short Name) 1 Mourouzis Alexandros MA CERTH/HIT [email protected], 2 Chalkia Eleni CE CERTH/HIT [email protected] 3 Bekiaris Evangelos BE CERTH/HIT [email protected] 5 Lopes, Rui R. FFCUL [email protected] 6 Kavadias Christoforos Ch. Solinet [email protected] 7 Antona AM FORTH [email protected] (add lines as appropriate) Peer Reviewers List # Surname Initials Contact email 1 Ntoa Stavroula NS [email protected] 2 Nitsch H [email protected] January 2010 -iii- CS ACCESSIBLE Deliverable D2.1 -PU- Grant Agreement No. 224145 History of versions Table Date Comments September 2009 1st version of D2.1 November 2009 First updated version of D2.1 with optimised methodological framework, updated standards and devices SoA. January 2010 Second updated version after the comments of the reviewers on the first ACCESSIBLE review. January 2010 -iv- CS ACCESSIBLE Deliverable D2.1 -PU- Grant Agreement No. 224145 January 2010 -v- CS ACCESSIBLE Deliverable D2.1 -PU- Grant Agreement No. 224145 Executive Summary This Deliverable consists of two parts. The first part focuses on research efforts and achievements in the fields of accessibility and assistive technologies and presents the results stemming from a thorough review conducted in the context of the ACCESSIBLE project to search for the state of the art of application accessibility technologies. Such technologies include well-established standards, but also appropriate accessibility assessment tools, developer‘s aid tools and well-defined methodologies. As a starting point, the relevant research work conducted in ASK-IT IP project for various disabilities (both literature work and prototypes trials results) was thoroughly reviewed. The recommendations coming from all relevant conducted trials with relevant prototypes as well as the identification of gaps in the undergoing literature review and studies oriented the further research held in the context of ACCESSIBLE. In summary, the current state-of-the-art in the following fields was considered: a) Current and emerging accessibility standards such as Section 508, WCAG 1.0&2.0, WAI-ARIA, ISO/IEC Guide 71, ISO/DIS 9241-151, etc. b) Existing accessibility check or repair tools for accessibility assessment such as Bobby, WebKing, RAVEN, aDesigner, LIFT, AccRepairf c) Current guidelines and accessibilities technologies from Sun, Microsoft and IBM d) The current accessibility status of desktop and mobile applications and services e) Survey regarding simulation tools for accessibility support. The second part focuses on market data, as a way to establish the commercial possibilities of the systems developed in the ACCESSIBLE project. This Deliverable describes the plans and preparations towards the market survey to be conducted in ACCESSIBLE, including the realisation and circulation of a relevant template for collecting structured data on actual state of art of the benchmarking accessibility tools market. The task T8.4 (Market Analysis & Business Plan) will take-over this activity to carry a full market survey by Month 12, which will be constantly updated during the course of the project, to cater for new technological evolution and reported as part of the month 32 milestone ―Business plan and market analysis available‖. January 2010 -vi- CS ACCESSIBLE Deliverable D2.1 -PU- Grant Agreement No. 224145 January 2010 -vii- CS ACCESSIBLE Deliverable D2.1 -PU- Grant Agreement No. 224145 Table of contents Authors List ..................................................................................................................iii Peer Reviewers List ......................................................................................................iii History of versions Table .............................................................................................. iv Executive Summary ...................................................................................................... vi Table of contents .........................................................................................................viii List of figures ................................................................................................................. x List of charts ................................................................................................................. xi List of tables .................................................................................................................. xi List of definitions & abbreviations .............................................................................. xii 1 Introduction ............................................................................................................... 15 1.1 Aim and object ................................................................................................... 15 1.2 Methodology ...................................................................................................... 15 2 Survey of standards ................................................................................................... 17 2.1 Accessibility standards & guidelines templates ................................................. 18 2.1.1 Template for Standards Gathering & Standards Compliance ..................... 18 2.2 Accessibility standardisation bodies and initiatives .......................................... 18 2.3 Accessibility standards overview ....................................................................... 22 2.3.1 Web application accessibility standards. ................................................... 23 2.3.2 Web services accessibility standards. ......................................................... 27 2.3.3 Description languages accessibility standards. ........................................... 27 2.3.4 Mobile applications accessibility standards. ............................................... 27 2.4 Conclusions for the accessibility standards ....................................................... 29 2.5 Accessibility guidelines & technologies ............................................................ 29 2.5.1 IBM accessibility guidelines ....................................................................... 30 2.5.2 Sun Microsystems accessibility technologies ............................................. 30 2.5.3 Microsoft accessibility technologies ........................................................... 33 2.5.4 APPLE accessibility technologies .............................................................. 37 2.6 European benchmarking initiatives .................................................................... 41 2.6.1 The Fifth Framework Programme .............................................................. 41 2.6.2 The Sixth Framework Programme .............................................................. 42 2.6.3 Benchmarking Tools and Methods for the Web ......................................... 42 2.6.4 The Seventh Framework Programme ......................................................... 46 2.6.5 Relevant Projects ........................................................................................ 48 3 Market Survey ........................................................................................................... 53 3.1 Survey of tools ................................................................................................... 53 3.2 Market survey Template .................................................................................... 54 3.3 Accessibility assessment tools ........................................................................... 55 3.3.2.1 Results for accessibility assessment tools ............................................ 55 3.3.2.2 Conclusions for the accessibility simulation tools ............................... 62 3.3.3 Accessibility simulation tools ..................................................................... 67 3.3.3.1 Results for accessibility simulation tools ............................................. 68 3.3.3.2 Conclusions for the accessibility simulation tools ............................... 75 3.4 Survey of devices ............................................................................................... 77 3.4.1 Screen Readers ............................................................................................ 77 3.4.2 Braille .......................................................................................................... 79 3.4.3 Alternative Keyboards or Switches ............................................................ 80 3.4.4 Screen Magnifiers ......................................................................................
Recommended publications
  • Just Another Perl Hack Neil Bowers1 Canon Research Centre Europe
    Weblint: Just Another Perl Hack Neil Bowers1 Canon Research Centre Europe Abstract Weblint is a utility for checking the syntax and style of HTML pages. It was inspired by lint [15], which performs a similar function for C and C++ programmers. Weblint does not aspire to be a strict SGML validator, but to provide helpful comments for humans. The importance of quality assurance for web sites is introduced, and one particular area, validation of HTML, is described in more detail. The bulk of the paper is devoted to weblint: what it is, how it is used, and the design and implementation of the current development version. 1. Introduction The conclusion opens with a summary of the information and opinions given in this paper. A Web sites are becoming an increasingly critical part of selection of the lessons learned over the last four years how many companies do business. For many companies is given, followed by plans for the future, and related web sites are their business. It is therefore critical that ideas. owners of web sites perform regular testing and analysis, to ensure quality of service. 2. Web Site Quality Assurance There are many different checks and analyses which The following are some of the questions you should be you can run on a site. For example, how usable is your asking yourself if you have a web presence. I have site when accessed via a modem? An incomplete list of limited the list to those points which are relevant to similar analyses are given at the start of Section 2.
    [Show full text]
  • My Cloud EX2 Ultra
    My Cloud™ EX2 Ultra Privater Cloud-Speicher Bedienungsanleitung WD Service und Support Sollten Probleme auftreten, geben Sie uns bitte Gelegenheit, sie zu beheben, bevor Sie das Produkt zurücksenden. Viele technische Fragen können über unsere Knowledge Base oder unseren E-Mail-Support unter http://support.wd.com beantwortet werden. Falls Sie dort keine geeignete Antwort finden oder Sie einen persönlichen Kontakt bevorzugen, rufen Sie WD unter der unten angegebenen Telefonnummer Ihres Landes an. Ihr Produkt schließt eine 30-tägige kostenlose telefonische Unterstützung während der Garantiezeit ein. Diese 30-tägige Frist beginnt mit dem Datum Ihres ersten telefonischen Kontakts mit dem technischen Support von WD. Der E-Mail-Support ist für die gesamte Garantiezeit kostenlos, und unsere gesamte Knowledge Base ist rund um die Uhr verfügbar. Damit wir Sie weiterhin über neue Funktionen und Serviceleistungen informieren können, denken Sie bitte daran, Ihr Produkt im Internet zu registrieren unter http://register.wd.com. Zugriff auf den Onlinesupport Auf unserer Produktsupport-Website unter http://support.wd.com können Sie unter den folgenden Themen wählen: Downloads – Laden Sie Treiber, Software und Updates für Ihr WD-Produkt herunter. Registrierung – Registrieren Sie Ihr WD-Produkt, um die neuesten Updates und Sonderangebote zu erhalten. Garantie- und Austauschservices – Informationen über Garantie, Produktersatz (RMA), RMA-Status und Datenwiederherstellung. Knowledge Base – Suchen Sie nach Schlüsselwort, Ausdruck oder Antwort-ID. Installation – Hier finden Sie online Hilfe zur Installation Ihres WD-Produkts oder Ihrer Software. WD Community – Tauschen Sie Ihre Gedanken mit anderen WD-Benutzern aus. Online-Schulungszentrum – Kommen Sie hierhin, um das meiste aus Ihrem privaten Cloud-Speichergerät herauszuholen: (http://www.wd.com/setup).
    [Show full text]
  • Symantec Netrecon™ 3.6 Security Update 21 Release Notes Symantec Netrecon Security Update 21 Release Notes
    Symantec NetRecon™ 3.6 Security Update 21 Release Notes Symantec NetRecon Security Update 21 Release Notes The software that is described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: v3.6 040831 Copyright Notice Copyright 2004 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec and the Symantec logo are U.S. registered trademarks, and Symantec NetRecon, Symantec Enterprise Security Architecture, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 3 Technical support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world.
    [Show full text]
  • Symantec Netrecon™ 3.6 Security Update 24 Release Notes Symantec Netrecon Security Update 24 Release Notes
    Symantec NetRecon™ 3.6 Security Update 24 Release Notes Symantec NetRecon Security Update 24 Release Notes The software that is described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: v3.6 040930 Copyright Notice Copyright 2005 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec and the Symantec logo are U.S. registered trademarks, and Symantec NetRecon, Symantec Enterprise Security Architecture, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 3 Technical support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world.
    [Show full text]
  • Detecting and Analyzing Insecure Component Integration
    Taeho Kwon December 2011 Computer Science Detecting and Analyzing Insecure Component Integration Abstract Component technologies have been widely adopted for designing and engineering software ap- plications and systems, which dynamically integrate software components to achieve desired func- tionalities. Engineering software in a component-based style has significant benefits, such as im- proved programmer productivity and software reliability. To support component integration, oper- ating systems allow an application to dynamically load and use a component. Although developers have frequently utilized such a system-level mechanism, programming errors can lead to insecure component integration and serious security vulnerabilities. The security and reliability impact of component integration has not yet been much explored. This dissertation systematically investigates security issues in dynamic component integration and their impact on software security. On the conceptual level, we formulate two types of insecure component integration—unsafe component loading and insecure component usage—and present practical, scalable techniques to detect and analyze them. Our techniques operate directly on soft- ware binaries and do not require source code. On the practical level, we have used them to discover new vulnerabilities in popular, real-world software, and show that insecure component integration is prevalent and can be exploited by attackers to subvert important software and systems. Our research has had substantial practical impact and helped
    [Show full text]
  • Sublimelinter Documentation Release 4.0.0
    SublimeLinter Documentation Release 4.0.0 The SublimeLinter Community Sep 16, 2021 User Documentation 1 Installation 3 2 Settings 5 2.1 Settings stack...............................................5 2.2 Styles (colors)..............................................5 2.3 Project settings..............................................6 2.4 Settings Expansion............................................6 3 Linter Settings 9 3.1 args....................................................9 3.2 disable..................................................9 3.3 env.................................................... 10 3.4 excludes................................................. 10 3.5 executable................................................ 10 3.6 filter_errors................................................ 10 3.7 lint_mode................................................. 11 3.8 python.................................................. 11 3.9 selector.................................................. 11 3.10 styles................................................... 12 3.11 working_dir............................................... 13 4 Customization 15 4.1 Context Menu.............................................. 15 4.2 Key bindings............................................... 15 5 Troubleshooting 17 5.1 Debug mode............................................... 17 5.2 The linter doesn’t work!......................................... 17 5.3 Debugging PATH problems....................................... 17 6 Creating a gutter theme 19 7 Creating a
    [Show full text]
  • Windows® Scripting Secrets®
    4684-8 FM.f.qc 3/3/00 1:06 PM Page i ® WindowsSecrets® Scripting 4684-8 FM.f.qc 3/3/00 1:06 PM Page ii 4684-8 FM.f.qc 3/3/00 1:06 PM Page iii ® WindowsSecrets® Scripting Tobias Weltner Windows® Scripting Secrets® IDG Books Worldwide, Inc. An International Data Group Company Foster City, CA ♦ Chicago, IL ♦ Indianapolis, IN ♦ New York, NY 4684-8 FM.f.qc 3/3/00 1:06 PM Page iv Published by department at 800-762-2974. For reseller information, IDG Books Worldwide, Inc. including discounts and premium sales, please call our An International Data Group Company Reseller Customer Service department at 800-434-3422. 919 E. Hillsdale Blvd., Suite 400 For information on where to purchase IDG Books Foster City, CA 94404 Worldwide’s books outside the U.S., please contact our www.idgbooks.com (IDG Books Worldwide Web site) International Sales department at 317-596-5530 or fax Copyright © 2000 IDG Books Worldwide, Inc. All rights 317-572-4002. reserved. No part of this book, including interior design, For consumer information on foreign language cover design, and icons, may be reproduced or transmitted translations, please contact our Customer Service in any form, by any means (electronic, photocopying, department at 800-434-3422, fax 317-572-4002, or e-mail recording, or otherwise) without the prior written [email protected]. permission of the publisher. For information on licensing foreign or domestic rights, ISBN: 0-7645-4684-8 please phone +1-650-653-7098. Printed in the United States of America For sales inquiries and special prices for bulk quantities, 10 9 8 7 6 5 4 3 2 1 please contact our Order Services department at 1B/RT/QU/QQ/FC 800-434-3422 or write to the address above.
    [Show full text]
  • Data Visualisation: the Path to Understandability
    DATA VISUALISATION: THE PATH TO UNDERSTANDABILITY Olof Schybergson Paul Kahn CEO, Fjord Managing Director, Kahn+Associates [email protected] [email protected] 2 CONTENTS WHY DATA VISUALISATION MATTERS A Fjord Report examining How service design is being influenced by new current thinking, future paradigms in data and information display developments, and how Understanding data visualisation – the context organisations can harness Information as a commodity the power of effective Data and information overload data visualisation Big data sets – but small screens The rules of successful data visualisation apply to consumer and corporate products alike WHAT ARE THE KEYS TO SUCCESSFUL DATA VISUALISATION? The tools and techniques that make a difference Information dashboards Actionable information Above: An application for building deployment plans The social factor for software projects (top) and aligning projects and events to a single calendar (bottom) by Kahn+Associates. Real-time information Managers in an international corporation are able to see Dynamic information the projects that will affect their division during specific time periods. THE WAY AHEAD What the future holds – and how to plan for it www.fjordnet.com 3 INTRODUCTION Data and information are everywhere. More than methods of distinguishing the data they deliver to fill Fjord believes that struggle towards ever, we are constantly connected to a world in our insatiable need for ‘understandability’. understandability should be actively shaped by which anything from news stories, TV and video service design practice, user insight, and interface content, financial transactions, search results, and However, at present there are only a limited number design. The way in which these disciplines email, Skype, Twitter and Facebook messages crowd of genuinely useful and effective tools that help users interconnect is a crucial part of the puzzle.
    [Show full text]
  • Notetab User Manual
    NoteTab User Manual Copyright © 1995-2016, FOOKES Holding Ltd, Switzerland NoteTab® Tame Your Text with NoteTab by FOOKES Holding Ltd A leading-edge text and HTML editor. Handle a stack of huge files with ease, format text, use a spell-checker, and perform system-wide searches and multi-line global replacements. Build document templates, convert text to HTML on the fly, and take charge of your code with a bunch of handy HTML tools. Use a power-packed scripting language to create anything from a text macro to a mini-application. Winner of top industry awards since 1998. “NoteTab” and “Fookes” are registered trademarks of Fookes Holding Ltd. All other trademarks and service marks, both marked and not marked, are the property of their respective ow ners. NoteTab® Copyright © 1995-2016, FOOKES Holding Ltd, Switzerland All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. “NoteTab” and “Fookes” are registered trademarks of Fookes Holding Ltd. All other trademarks and service marks, both marked and not marked, are the property of their respective owners. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document.
    [Show full text]
  • 0789747189.Pdf
    Mark Bell 800 East 96th Street, Indianapolis, Indiana 46240 Build a Website for Free Associate Publisher Copyright © 2011 by Pearson Education Greg Wiegand All rights reserved. No part of this book shall be Acquisitions Editor reproduced, stored in a retrieval system, or transmit- Laura Norman ted by any means, electronic, mechanical, photo- copying, recording, or otherwise, without written Development Editor permission from the publisher. No patent liability is Lora Baughey assumed with respect to the use of the information contained herein. Although every precaution has Managing Editor been taken in the preparation of this book, the Kristy Hart publisher and author assume no responsibility for Senior Project Editor errors or omissions. Nor is any liability assumed for Betsy Harris damages resulting from the use of the information contained herein. Copy Editor ISBN-13: 978-0-7897-4718-1 Karen A. Gill ISBN-10: 0-7897-4718-9 Indexer The Library of Congress Cataloging-in-Publication Erika Millen data is on file. Proofreader Williams Woods Publishing Services Technical Editor Christian Kenyeres Publishing Coordinator Cindy Teeters Book Designer Anne Jones Compositor Nonie Ratcliff Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Que Publishing cannot attest to the accuracy of this infor- mation. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis.
    [Show full text]
  • Projectreport.Pdf (2.519Mb)
    ! Mobile App Monetization – Expectations and Attitudes Formed by Users in Response to Advertising and Pay To Download Monetization Models Master’s Program Missouri School of Journalism University of Missouri by Anthony Brown Dr. Margaret Duffy, Committee Chair Jim Spencer Dr. Kevin Wise August, 2013 ii Acknowledgments Thanks to Dr. Duffy and Dr. Wise for their guidance and leadership throughout this too-lengthy process. Your patience and flexibility is a golden virtue. Thanks also to Jim Spencer, whose final firm push is exactly what I needed to put my head down and carry this research across the finish line. iii Table of Contents ACKNOWLEDGMENTS ........................................................................ ii LIST OF TABLES ................................................................................. iv ABSTRACT ............................................................................................ v Chapter 1. INTRODUCTION ........................................................................ 1 2. ACTIVITIES DESCRIPTION ....................................................... 3 3. EVALUATION ........................................................................... 14 4. PHYSICAL EVIDENCE ............................................................. 15 5. ANALYSIS ................................................................................ 16 APPENDIX 1. ONLINE SURVEY TEXT AND RESULTS ................................ 31 2. FOCUS GROUP DISCUSSION GUIDE AND TRANSCRIPT ... 61 3. PROJECT PROPOSAL ...........................................................
    [Show full text]
  • Introduction, Internet and Web Basics, XHTML and HTML
    Introduction, Internet and Web Basics, XHTML and HTML http://localhost:8080/cocoon/projects/cscie12/slides/20070130/handout.html Introduction, Internet and Web Basics, XHTML and HTML http://localhost:8080/cocoon/projects/cscie12/slides/20070130/handout.html Table of Contents | All Slides | Link List | Examples | CSCI E-12 CSCI E-12, Fundamentals of Web Site Development Introduction, Internet and Web Basics The Course XHTML and HTML Course Syllabus | Course Schedule I. Content for the Web January 30, 2007 A. Markup (XHTML, HTML) B. Style (CSS) Harvard University C. Building a Site Division of Continuing Education D. Images and Media Extension School II. "Everything" else Course Web Site: http://cscie12.dce.harvard.edu/ A. Javascript and AJAX B. Hypertext Transfer Protocol (HTTP) Copyright 1998-2007 David P. Heitmeyer C. The Apache HTTP Server D. Keeping a site healthy Instructor email: [email protected] E. Dynamic Sites Course staff email: [email protected] The Course Staff David Heitmeyer Teaching Fellows Mike Cynn Rei Diaz Evan Elias Sonal Patel Susan Smith 1 of 39 2/7/2007 4:26 PM 2 of 39 2/7/2007 4:26 PM Introduction, Internet and Web Basics, XHTML and HTML http://localhost:8080/cocoon/projects/cscie12/slides/20070130/handout.html Introduction, Internet and Web Basics, XHTML and HTML http://localhost:8080/cocoon/projects/cscie12/slides/20070130/handout.html Texts What the Course "Is" and "Is Not" In addition to the texts, there will be online readings assigned and online references cited. Is Is Not Required texts: Freeman, Elisabeth and Eric Freeman. 2005. Head First HTML with CSS & XHTML.
    [Show full text]