0% found this document useful (0 votes)
1K views24 pages

General Purpose Application Software

General purpose application software can be used for a variety of tasks and is not limited to one particular function. It provides users with a large number of features. Examples include word processors, which allow users to write novels, menus, or posters. Productivity software is a type of application software dedicated to producing information through documents, presentations, spreadsheets, databases, charts and other media. There are four main types: word processing software, spreadsheet software, graphics software, and multimedia software. Word processing software is used to create documents, spreadsheet software for working with numbers and formulas, graphics software to draw images, and multimedia software to create visual presentations. Software refers to a collection of instructions that operate and coordinate with computer hardware

Uploaded by

Babar Zafar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views24 pages

General Purpose Application Software

General purpose application software can be used for a variety of tasks and is not limited to one particular function. It provides users with a large number of features. Examples include word processors, which allow users to write novels, menus, or posters. Productivity software is a type of application software dedicated to producing information through documents, presentations, spreadsheets, databases, charts and other media. There are four main types: word processing software, spreadsheet software, graphics software, and multimedia software. Word processing software is used to create documents, spreadsheet software for working with numbers and formulas, graphics software to draw images, and multimedia software to create visual presentations. Software refers to a collection of instructions that operate and coordinate with computer hardware

Uploaded by

Babar Zafar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

General purpose application software

General purpose application software is a kind of application that can be used


for a variety of tasks. It is not limited to one particular function. They provide
large no of features for its users.For example, a word processor could be classed
as general purpose software as it would allow a user to write a novel, create a
restaurant menu or even make a poster.

Types Of Productivity Software

Productivity software is a type of application software dedicated to producing


information, such as documents, presentations, worksheets, databases, charts,
and many others.

4 Types Of Productivity Software

WORD PROCESSING SOFTWARE:


We used Word processing software to produce documents such as letters,
reports, papers, and memos. MS Word, Word Perfect, and Notepad are some
examples of Word processing software.

SPREADSHEET SOFTWARE:
We use Spreadsheet software to work with numbers and formulae. A user enters
numbers in the grid of row and columns on the spreadsheet, and the computer
performs the calculations. MS Excel Lotus 1-2-3 and Corel's Quattro Pro are
some examples of spreadsheet software.

GRAPHICS SOFTWARE:
People use Graphics software to draw pictures, 3D images, and animations. MS
Paint and Adobe Photoshop are some examples of Graphics software.

MULTIMEDIA SOFTWARE:
Multimedia software is a productivity software that we use to create visual
presentations. A user can also insert audio and video clips in the presentation.
MS PowerPoint and Adobe Flash are some examples of Multimedia software.
What is a multimedia file?

A multimedia file can be any computer file that plays audio and video, audio
only, or video only. Some examples of popular multimedia files include
the .mp3 audio file, .mp4, video, and avi video, and wmv files.

What is multimedia software?

A multimedia program, multimedia application, or any multimedia


software is software that can play or record audio and video files. For example,
in our earlier example of a multimedia thesaurus that plays audio of famous
speeches, it is considered multimedia software.

What is a multimedia computer?

For a computer to be a multimedia computer, it must meet the MPC standard,


which today all computers with a sound card and video card meet.

Graphics software
Graphics software is a type of computer program that is used to create and edit
images. There is a wide range of graphics software available on the market,
ranging from simple programs that allow users to create and edit basic images,
to complex tools that can be used to create detailed 3D models and animations.
Some of the most popular graphics software programs include Adobe
Photoshop, Corel Painter, and Autodesk Maya.
Characteristics:
• A graphics software program is a computer application used to create
digital images.
• Graphics software programs can be used to create both vector and
raster images.
• Common features of graphics software programs include the ability to
create, edit, and save images in a variety of formats.
• Some graphics software programs also offer features such as the
ability to create animations or 3D models.
• Popular examples of graphics software programs include Adobe
Photoshop, GIMP, and Inkscape.
Examples:
Some popular graphics software programs are Adobe Photoshop, Adobe
Illustrator, and CorelDRAW. These programs can be used to create and edit
digital images, illustrations, and logos. They offer a variety of features and tools
that allow users to manipulate photos and graphics to create custom designs.
• Adobe Photoshop is a popular graphics software used by
photographers and graphic designers.
• Adobe Illustrator is another popular graphics software used by
graphic designers, especially for creating vector illustrations.
• CorelDRAW is a graphics software used by both professionals and
hobbyists.
• GIMP is a free and open source graphics software with capabilities
similar to Photoshop.
• Inkscape is a free and open source vector graphics software used by
graphic designers and illustrators.

What is a web application?


A web application (web app) is an application program that is stored on a
remote server and delivered over the internet through a browser interface. Web
services are web apps by definition and many, although not all, websites contain
web apps.

Internet Software

Internet Software comprises of all the tools needed for networking through
computer. Following are a few important components of the Internet Software −
• Transmission Control Protocol/ Internet Protocol (TCP/IP)
• Dialer Software
• Interment Browser

Internet Applications

Internet applications are server-based applications. Following are a few Internet


Applications −
• World Wide Web (WWW)
• Electronic mail (e-mail)
• File Transfer Protocol (FTP)
• Telnet (i.e., log-in to the computer located remotely)
• Internet Relay Chat (IRC) (Real time video chatting)
Home Design / Landscape Software:
Home design / Landscape software helps the user in designing home or
landscape. It provides many predefined designs that can also be customized to a
design a home. It can also provide information about the material and cost for
the home. BroaderBund 3D Home Design Suite and Instant Architect are
examples of home design software.

Educational Software:
Educational software is used in education field to learn different skills. Many
software packages are available on different subjects. Students and comman
people can learn foreign languages and use of application software through
educational software. It is also used to educate basic skills of math, reading and
writing to the students of preliminary classes.

1.Computer-Assisted Instruction ( CAI )


Computer- assisted instruction (CAI) has been used in education for more than
two decades. Computer- assisted instruction software helps in teaching the facts,
information and skills associated with subject- related materials. The computer-
assisted instruction is also called computer based instruction (CBI ) computer
based learning (CBL) and computer aided learning (CAL).

2. Drill-and-Practice Software:
Drill-and-practice software provides factual information. It allows the students
to work on specific materials to memorize information through repetitive
exercises. It is also known as skills-reinforcement software. It is effective for
learning basic skills and for remediation. Remediation is a process of reviewing
contents many times using alternative ways until a student grasps the concepts.
An important feature of drill-and - practice software is that the students receive
instant feedback on correct and incorrect answers. It can increase students'
performance in areas that are weak. This software moves the student to the next
level when he has completed a level.

3.Educational Games:
Many educational games are available on CDs, DVDs and the Internet.
Educational games usually include a set of rules.The students can compete
against other students or the game itself .These games can be an effective way
to teach contents through repetition and practice. It is an interesting way to
learn. Various educational games create problem-solving environments and the
students use their thinking skills to find the solutions. These games develop
problem solving skills in the students. Many games are freely available for the
students and teachers.

4.Tutorials:
A tutorial is a teaching program that helps individuals to learn the use of a
product or concepts. Many software products contain built-in tutorials to teach
the user how to use the software. The developers create computer-based
educational tutorials so that the students can learn the contents without any
additional help.The tutorials provide different types of teaching solutions.Some
solutions use the structured linear approach with specific content
objectives.Some solutions use a non-linear approach that offers alternative paths
based on the students' responses called branching. Branching reflects classroom
learning and allows the students to improve at their own pace. It provides
feedback and remediation when needed.

5. Educational Simulations:
Educational simulation is a computerized modal of real life. It may represent an
event, reality or phenomenon. The use of simulation is not a new teaching
strategy. The business and industry have been using simulation for many years.
Many educational simulations are available for students to interact with the
examples for real life. Some popular simulations are Sim City, Sim Theme
Park and Sim Coaster.

6. Integrated Learning Systems:


An integrated learning system (ILS) is usually developed by an educational
software corporation as a complete educational software solution in one
package. These software solutions provide the following:

Diagnostic data of individual student through pretests


Continuous monitoring of student performance with automatic adjustments in
instruction when needed
A variety of formats for teaching contents
7. Curriculum-Specific Educational Software
Many high- quality interactive and digital media educational programs are
available for the teachers. Most of these programs are available on CD and
DVD . Some programs are installed on school networks and others are available
via the web. Many educational software applications are designed fo5r
curriculum- specific teaching and learning.

Software:
Software is a collection of programs that co-ordinates with the hardware to run
the machine. It is set of instructions or data that operates the computer how to
work. Software is opposite of the physical aspect, i.e., hardware and it is a
complement to the hardware in computer.
Application:
Application is package that performs a specific task for end users. It is a
product or a program that is designed only for end users requirements. All the
applications may be in category of software but vice-versa is not possible.

Difference between Software and Application:

Software Application

Software is a set of instructions or Application is a package to


data that operates the hardware. perform a specific task.

Application is a type of
Software is an all encompassing
software that does a certain
term for computer data.
task.

Software may executable or may not Application is always


be. executable.

Software is not often operating Application is operation


system based. system based.

Software does not need user Application need user


interaction for functioning. interaction for functioning.

Software is used as mediator Application is used only by


between user and hardware. end users.
Software Application

All the software are not All the application are


applications. software.

System Requirements

System requirements are the required specifications a device must have in order
to use certain hardware or software. For example, a computer may require a
specific I/O port to work with a peripheral device. A smartphone may need a
specific operating system to run a particular app.
Before purchasing a software program or hardware device, you can check the
system requirements to make sure the product is compatible with your system.
Typical system requirements for a software program include:

1. Operating system
2. Minimum CPU or processor speed
3. Minimum GPU or video memory
4. Minimum system memory (RAM)
5. Minimum free storage space
6. Audio hardware (sound card, speakers, etc)
System requirements listed for a hardware device may include:

1. Operating system
2. Available ports (USB, Ethernet, etc)
3. Wireless connectivity
4. Minimum GPU (for displays and graphics hardware)

Minimum vs Recommended Requirements

Some products include both minimum and recommended system requirements.


A video game, for instance, may function with the minimum required CPU and
GPU, but it will perform better with the recommended hardware. A more
powerful processor and graphics card may produce improved graphics and
faster frame rates (FPS).
Some system requirements are not flexible, such as the operating system(s) and
disk space required for software installation. Others, such as CPU, GPU, and
RAM requirements may vary significantly between the minimum and
recommended requirements. When buying or upgrading a software program, it
is often wise to make sure your system has close to the recommended
requirements to ensure a good user experience.
Below is an example of minimum versus recommended system requirements for
a Windows application.

1. OS: Windows 7 with SP1; Recommended: Windows 10


2. CPU: Intel or AMD processor with 64-bit support; Recommended: 2.8
GHz or faster processor
3. GPU: nVidia GeForce GTX 1050 or equivalent; Recommended: nVidia
GeForce GTX 1660 or Quadro T1000
4. Disk Storage: 4 GB of free disk space
5. Monitor Resolution: 1280x800; Recommended: 1920x1080
6. Internet: Internet connection required for software activation

What is the Internet?

The Internet is a global network of billions of computers and other electronic


devices. With the Internet, it's possible to access almost any information,
communicate with anyone else in the world, and do much more.

You can do all of this by connecting a computer to the Internet, which is also
called going online. When someone says a computer is online, it's just another
way of saying it's connected to the Internet.
What is the Web?

The World Wide Web—usually called the Web for short—is a collection of
different websites you can access through the Internet. A website is made up of
related text, images, and other resources. Websites can resemble other forms of
media—like newspaper articles or television programs—or they can be
interactive in a way that's unique to computers.

The purpose of a website can be almost anything: a news platform, an


advertisement, an online library, a forum for sharing images, or an educational
site like us!

Once you are connected to the Internet, you can access and view websites using
a type of application called a web browser. Just keep in mind that the web
browser itself is not the Internet; it only displays websites that are stored on the
Internet.
How does the Internet work?

At this point you may be wondering, how does the Internet work? The exact
answer is pretty complicated and would take a while to explain. Instead, let's
look at some of the most important things you should know.

It's important to realize that the Internet is a global network of physical cables,
which can include copper telephone wires, TV cables, and fiber optic cables.
Even wireless connections like Wi-Fi and 3G/4G rely on these physical cables
to access the Internet.

When you visit a website, your computer sends a request over these wires to
a server. A server is where websites are stored, and it works a lot like your
computer's hard drive. Once the request arrives, the server retrieves the website
and sends the correct data back to your computer. What's amazing is that this all
happens in just a few seconds!

Understanding The Differences Between Internet Connections


When determining which type of Internet speed and Internet connection
type is right for you or your family, it's important to understand the distinction
between each connection. In today's age, there are numerous ways to connect
laptops, desktops, mobile phones, gaming consoles, e-readers and tablets to
the Internet. Some of the most widely used Internet connections are described
below.
MOBILE
Many cell phone and smartphone providers offer voice plans with Internet
access. Mobile Internet connections provide good speeds and allow you to
access the Internet.
WIFI HOTSPOTS
Wifi Hotspots are sites that offer Internet access over a wireless local area
network (WLAN) by way of a router that then connects to an Internet service
provider. Hotspots utilize WiFi technology, which allows electronic devices
to connect to the Internet or exchange data wirelessly through radio waves.
Hotspots can be phone-based or free-standing, commercial or free to the
public.
DIAL-UP
Dial-up connections require users to link their phone line to a computer in
order to access the Internet. This particular type of connection—also referred
to as analog—does not permit users to make or receive phone calls through
their home phone service while using the Internet. Now more outdated, a dial-
up connection used to be among the most common Internet connection type.
BROADBAND
This high-speed Internet connection is provided through either cable or
telephone companies. One of the fastest options available, broadband
Internet uses multiple data channels to send large quantities of information.
The term broadband is shorthand for broad bandwidth. Broadband Internet
connections such as DSL and cable are considered high-bandwidth
connections. Although many DSL connections can be considered broadband,
not all broadband connections are DSL.
DSL
DSL, which stands for Digital Subscriber Line, uses existing 2-wire copper
telephone line connected to one's home so service is delivered at the same
time as landline telephone service. Customers can still place calls while
surfing the Internet.
CABLE
Cable Internet connection is a form of broadband access. Through use of a
cable modem, users can access the Internet over cable TV lines. Cable
modems can provide extremely fast access to the Internet, making a cable
connection a viable option for many.
SATELLITE
In certain areas where broadband connection is not yet offered, a satellite
Internet option may be available. Similar to wireless access, satellite
connection utilizes a modem.
ISDN
ISDN (Integrated Services Digital Network) allows users to send data, voice
and video content over digital telephone lines or standard telephone wires.
The installation of an ISDN adapter is required at both ends of the
transmission—on the part of the user as well as the Internet access provider.
There are quite a few other Internet connection options available, including T-
1 lines, T-3 lines, OC (Optical Carrier) and other DSL technologies. Read
more about how new technologies like 5g home internet compares to cable.

Key Differences Between Internet and WWW

Internet WWW

The Internet allows you to link your The World Wide Web is a
computer to any other computer on the collection of information
planet. accessible through the Internet.
The Internet is a worldwide network of The World Wide Web refers to
interconnected computer networks that HTML-formatted online material
connect devices using the TCP/IP that may be accessed using the
protocol. HTTP protocol.

The Internet can be compared to a large The web can be considered as a


bookstore. store with a collection of books.

The World Wide Web is a subset


Internet is superset of WWW. of the Internet.

Tim Berners-Lee, an English


It first appeared in the late 1960s. scientist, created the World Wide
Web in 1989.

The Internet is mostly based on In comparison to the Internet, the


hardware. WWW is more software-oriented.

Authentication

• Authentication is used by a server when the server needs to know exactly


who is accessing their information or site.
• Authentication is used by a client when the client needs to know that the
server is system it claims to be.
• In authentication, the user or computer has to prove its identity to the
server or client.
• Usually, authentication by a server entails the use of a user name and
password. Other ways to authenticate can be through cards, retina
scans, voice recognition, and fingerprints.
• Authentication by a client usually involves the server giving a certificate
to the client in which a trusted third party such as Verisign or Thawte
states that the server belongs to the entity (such as a bank) that the
client expects it to.
• Authentication does not determine what tasks the individual can do or
what files the individual can see. Authentication merely identifies and
verifies who the person or system is.

Authorization

• Authorization is a process by which a server determines if the client has


permission to use a resource or access a file.
• Authorization is usually coupled with authentication so that the server has
some concept of who the client is that is requesting access.
• The type of authentication required for authorization may vary;
passwords may be required in some cases but not in others.
• In some cases, there is no authorization; any user may be use a resource
or access a file simply by asking for it. Most of the web pages on the
Internet require no authentication or authorization.

Encryption

• Encryption involves the process of transforming data so that it is


unreadable by anyone who does not have a decryption key.
• The Secure Shell (SSH) and Socket Layer (SSL) protocols are usually
used in encryption processes. The SSL drives the secure part of
“https://” sites used in e-commerce sites (like E-Bay and Amazon.com.)
• All data in SSL transactions is encrypted between the client (browser)
and the server (web server) before the data is transferred between the
two.
• All data in SSH sessions is encrypted between the client and the server
when communicating at the shell.
• By encrypting the data exchanged between the client and server
information like social security numbers, credit card numbers, and
home addresses can be sent over the Internet with less risk of being
intercepted during transit.

Using authentication, authorization, and encryption

Authentication, authorization, and encryption are used in every day life. One
example in which authorization, authentication, and encryption are all used is
booking and taking an airplane flight.
• Encryption is used when a person buys their ticket online at one of the
many sites that advertises cheap ticket. Upon finding the perfect flight
at an ideal price, a person goes to buy the ticket. Encryption is used to
protect a person’s credit card and personal information when it is sent
over the Internet to the airline. The company encrypts the customer’s
data so that it will be safer from interception in transit.
• Authentication is used when a traveler shows his or her ticket and driver’s
license at the airport so he or she can check his or her bags and receive
a boarding pass. Airports need to authenticate that the person is who he
or she says she is and has purchased a ticket, before giving him or her a
boarding pass.
• Authorization is used when a person shows his or her boarding pass to the
flight attendant so he or she can board the specific plane he or she is
supposed to be flying on. A flight attendant must authorize a person so
that person can then see the inside of the plane and use the resources
the plane has to fly from one place to the next.

Here are a few examples of where encryption, authentication, and authorization


are used by computers:

• Encryption should be used whenever people are giving out personal


information to register for something or buy a product. Doing so
ensures the person’s privacy during the communication. Encryption is
also often used when the data returned by the server to the client should
be protected, such as a financial statement or test results.
• Authentication should be used whenever you want to know exactly who
is using or viewing your site. Weblogin is Boston University’s primary
method of authentication. Other commercial websites such as
Amazon.com require people to login before buying products so they
know exactly who their purchasers are.
• Authorization should be used whenever you want to control viewer
access of certain pages. For example, Boston University students are
not authorized to view certain web pages dedicated to professors and
administration. The authorization requirements for a site are typically
defined in a website’s .htaccess file.
• Authenticationand Authorization are often used together. For example,
students at Boston University are required to authenticate before
accessing the Student Link. The authentication they provide determines
what data they are authorized to see. The authorization step prevents
students from seeing data of other students.
Internet Services allows us to access huge amount of information such as text,
graphics, sound and software over the internet. Following diagram shows the four
different categories of Internet Services.

Communication Services

There are various Communication Services available that offer exchange of


information with individuals or groups. The following table gives a brief
introduction to these services:

S.N. Service Description

1 Electronic Mail
Used to send electronic message over the internet.

2 Telnet
Used to log on to a remote computer that is attached to internet.

3 Newsgroup
Offers a forum for people to discuss topics of common interests.

4 Internet Relay Chat (IRC)


Allows the people from all over the world to communicate in real time.

5 Mailing Lists
Used to organize group of internet users to share common information
through e-mail.
6 Internet Telephony (VoIP)
Allows the internet users to talk across internet to any PC equipped to
receive the call.

7 Instant Messaging
Offers real time chat between individuals and group of people. Eg.
Yahoo messenger, MSN messenger.

Information Retrieval Services

There exist several Information retrieval services offering easy access to


information present on the internet. The following table gives a brief introduction
to these services:

S.N. Service Description

1 File Transfer Protocol (FTP)


Enable the users to transfer files.

2 Archie
It’s updated database of public FTP sites and their content. It helps to
search a file by its name.

3 Gopher
Used to search, retrieve, and display documents on remote sites.

4 Very Easy Rodent Oriented Netwide Index to Computer Achieved


(VERONICA)
VERONICA is gopher based resource. It allows access to the
information resource stored on gopher’s servers.

Web Services

Web services allow exchange of information between applications on the web.


Using web services, applications can easily interact with each other.
The web services are offered using concept of Utility Computing.

World Wide Web (WWW)


WWW is also known as W3. It offers a way to access documents spread over the
several servers over the internet. These documents may contain texts, graphics,
audio, video, hyperlinks. The hyperlinks allow the users to navigate between the
documents.

Video Conferencing

Video conferencing or Video teleconferencing is a method of communicating by


two-way video and audio transmission with help of telecommunication
technologies.
Modes of Video Conferencing
Point-to-Point
This mode of conferencing connects two locations only.

Multi-point
This mode of conferencing connects more than two locations through Multi-
point Control Unit (MCU).
1. Evaluate the Design Experience

A great website should have a crisp, user-friendly design. A minimalistic or


simplistic website that’s appealing to the eyes and offers clarity is the best way
to facilitate visitors to the site. People want speed, convenience, and clear
communication when they visit an online store. Your design should cater to
these needs and expectations.
Review your website with a new perspective. Is it clunky or complicated? Have
others look at it for the first time. Document their responses and see what you
can improve on. Here is a great resource on key data to analyze if you need
an eCommerce redesign.

2. Review the Copy


Great design is only a component of your website. It’s the foundation needed to
sell. But what actually sells? It’s the copy— the words used to communicate
your value. If you aren’t growing the way you want to, you should always look
at the content first. Is it connected to pain points? Is it clear? Is there a hard-to-
refuse offer?

Find ways to improve your copy on the site and test it through heat maps, A/B
testing, and other methods to see what resonates the most.

3. Study Conversions with the Call-to-Action

If you are reading this article, you’re probably already aware of your conversion
rate, or at least of how effective sales are per website visitor. These steps will
help you improve it but one thing to consider is the placement and wording of
your call-to-action button.

Brands see night and day results by moving the position of their button and
using more effective copy for it. For example, call-to-action buttons do best
when the main one is placed at the top of the screen (usually under the title or
subheading). It should be visible without scrolling (this eliminates another
barrier to taking action).
Make sure your website points specifically to this main action.

4. Evaluate Your Organic Traffic

Source: Google Analytics

While ads and promotions offer short-term gains, investing in organic


marketing methods has an ROI that lives for a long time. One of the main
methods we use to achieve this goal is SEO. With effective blog articles, videos,
images, metadata, and other tactics, we can promote more organic traffic to the
site.

Is your organic traffic growing? Is it shrinking or remaining the same? Review


it at its current state. If you aren’t active on content creation, start planning to
produce relevant pieces consistently. If you already have a strong portfolio of
content but see no improvement, review the most popular pieces and double
down on those topics.

Invest in strategizing your linking outreach. Encourage followers and fans to


share your website pages, content, and more, by providing easy buttons and
ways to spread the word. Connect with other websites that may want to link
some of your content on their pages for relevant sources (so you can build link
authority and expand your reach).
5. Review the Style of the Design

Think about your current audience. Do the colors and style make sense for
them? It might look nice and professional but if it doesn’t connect with your
customers, then it’ll fall flat. Research what’s in style today (because it always
shifts) and make sure your design reflects and represents your customers.

Something as little as a darker or lighter color could divide your audience by


age groups, sub-niches, and more. Make sure you are appealing to the right
target audience. If you are tied by your branding, it might be time to update it
through slight and careful tweaking.

Brands like Wendy’s have done an incredible job updating their logo and brand
on a routine basis while keeping the integrity of their brand recognition, where
some don’t even notice the shift.

6. Find Out How Effective Your Checkout Is

Source: Recharge
It’s amazing how many eCommerce stores do not have the means to evaluate
their checkout process. It’s essential to know how many people click checkout,
how many abandon it, and how many fully convert. Small improvements could
give you double percentage gains. It’s amazing to see.

Implement abandoned checkout tools to identify who leaves your site and
doesn’t follow through on their purchase. Add a way to communicate and
remind them about their checkout. You can incentivize them with a coupon if
needed.

If emailing doesn’t work, you can re-target these qualified leads through ads.

7. Review Your Website Brand

Earlier we mentioned the style and brand relating to your audience. Another
factor to consider is if your website is well-branded, uniform, and representative
of your company.

It’s tempting to have different designs and colors because they look good. But
sometimes it looks mismatched and it’s hard for others to identify with it. Your
brand should be memorable.

Make sure it looks professional and original. The more unique your design
looks, within the parameters of what looks good and resonates, the better chance
visitors will come back to you and remember what you offer.

8. Is There a Why?

Simon Sinek made the WHY famous for businesses all over the world in his
book Start with Why. People don’t buy what you offer, they buy the WHY
behind it. In other words, what’s your purpose behind your brand?
If you don't have a deeper purpose, you are going to compete with price and
difficult competitors in a race that feels impossible to win. Adding more value
to your brand produces super fans that will support your eCommerce store.

These are 8 ways to evaluate your eCommerce website. Use them to improve
your store and position yourself for growth.

What is inappropriate behavior online?

According to CORE¹, harmful conduct occurs when a “the child


witnesses, participates in or is a victim of potentially harmful conduct such as
bullying, hateful peer activity, trolling, sexual messages, pressures or
harassment, or is exposed to potentially harmful user communities (e.g., self-
harm or eating disorders). Typically conduct risks arise from interactions among
peers, although not necessarily of equal status.”

What are some examples of inappropriate


and appropriate online behavior?

Inappropriate online behavior often includes cyberbullying. Cyberbullying can


include:
• Posting mean or threatening texts/messages
• Causing embarrassment to others by posting pictures, creating a website,
or revealing personal information
• Pretending to be someone by using their name

Check out our blog post on The Dangers of Social Media for Kids to learn
more.

According to the Media Literacy Council, appropriate online behavior includes:


• Keeping personal information private
• Don’t be a bystander when someone is being bullied
• Communicating appropriately (consider who you are speaking to)
• Being empathetic while posting, texting, or sharing

What would be inappropriate behavior in social media?

According to Real Simple, a study done by Influence.co shows that bullying


other people in comments is considered the most inappropriate behavior on
social media. Sharing discriminatory content, posting fake news, making
passive-aggressive comments, and sharing too much personal information are
among some of the most frowned upon behaviors that occurs
on these platforms.

How can you identify inappropriate conduct online?

OnGuard, part of the Netsweeper platform, identifies harmful content in real-


time, and works both offline and offline to protect students, wherever they may
be learning. OnGuard gives educators deep insights into online activity, and can
help quickly identify when a student is at-risk.

You might also like