Student Marks Reporting System via Email and SMS
نویسندگان
چکیده
منابع مشابه
Email - SMS - MMS - Preamble
15 1 Even though Jansen's NetLingo Internet Dictionary postulates the hyphenised spelling of the word email, i.e. " e-mail " , arguing that email is short for " electronic mail " , it will be spelt without a hyphen in this volume for the simple reason that the language of CMC tends to be reduced, so hyphens do not ¿ t in the concept of shortenings. Also, it can be recognised that people tend to...
متن کاملSMS Based Student Feedback and Assessment
INTRODUCTION The use of EVS (electronic voting systems) in teaching and learning has been extensively reported in the literature. These systems are based on the use of individual ‘handsets’ with which students can provide individual responses to questionnaires in an interactive manner. A variety of hardware technologies could be used for the handsets, such as networked computers, custom-built w...
متن کاملA SMS Based Security Providing for an Email ID by Creating an Email Server
Email is a method of exchanging digital messages from an author to one or more recipients. Email communication is responsible for spreading the majority of virtual infections and poses one of the greatest security risks for companies today. Furthermore, unprotected email messaging also violates compliance regulations in terms of sending highly sensitive information over the Internet. The users’...
متن کاملStudent-instructor communication: The role of email
We report on the use of email lists as a supplement to teaching. We argue that email lists can provide a valuable students–instructor communication channel and describe the process of setting up and managing such lists. A case study of email messages exchanged in an introductory operations research course is also included. The case illustrates how a strategic use of email leads to a richer lear...
متن کاملSuspicious Email Detection System via Triple DES Algorithm: Cryptography Approach
Abstract: The paper presents a suspicious email detection System which detect suspicious activities. In the paper we proposed the use of cryptography strategies for terrorists email detection. Security plays a very important and crucial role in the field of Internet and for email communication. So there is a need of suspicious email detection system which detects all suspicious activities. The ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of New Technology and Research
سال: 2019
ISSN: 2454-4116
DOI: 10.31871/ijntr.5.3.23