坦桑尼亚电子文化遗产管理的网络服务(IJITCS-V9-N12-7)

坦桑尼亚电子文化遗产管理的网络服务(IJITCS-V9-N12-7)
坦桑尼亚电子文化遗产管理的网络服务(IJITCS-V9-N12-7)

I.J. Information Technology and Computer Science, 2017, 12, 52-63

Published Online December 2017 in MECS (https://www.360docs.net/doc/fb5728361.html,/)

DOI: 10.5815/ijitcs.2017.12.07

Web Services for Transforming e-Cultural Heritage Management in Tanzania

Gloriana Joseph Monko

Nelson Mandela African Institution of Science and Technology (NM-AIST), Arusha, P.O. Box 447, Tanzania

E-mail: monkog@nm-aist.ac.tz

Khamisi Kalegele

Tanzania Commission for Science and Technology (COSTECH), Dar-es-salaam, P.O. Box 4302, Tanzania

E-mail: kalegs03@https://www.360docs.net/doc/fb5728361.html,

Dina Machuve

Nelson Mandela African Institution of Science and Technology (NM-AIST), Arusha, P.O. Box 447, Tanzania

E-mail: dina.machuve@nm-aist.ac.tz

Received: 12 September 2017; Accepted: 07 November 2017; Published: 08 December 2017 Abstract—Globally, applications of Information and

Communication Technologies (ICTs) in services management and delivery have positively transformed various sectors of economies. Similar transformations have been witnessed in Tanzania, where mobile money and the Internet have transformed the way businesses are done. However, the transformations have not taken place across all sectors of the Tanzanian economy with some sectors lagging further behind than others. Cultural heritage sector, in particular, has been slow in leveraging ICT to transform the delivery of services. The sector is characterized by poor consumption of heritage sites and artworks, neglect, low publicity, weak branding, to mention a few. Although the achieved level of skills in Internet and Web have enabled the proliferation of many useful Websites which offer services to the public, information gathering remains a huge challenge considering the size of the country, its cultural heritage from 126 tribes and the vast nature reserves.

We have investigated the usefulness of Web services in promoting mechanisms to gather and disseminate information about e-Cultural Heritage in Tanzania. In our investigations, we analyzed stakeholders of the sector and realized that Web services can be used to foster mechanisms within specific groups using crowdsourcing techniques. We then proposed specific Web services that cater for information flow chain of Tanzanian's artwork industry and developed an e-cultural heritage portal for demonstration.

We tested the system with a sample of selected stakeholders and the initial results indicated that the locals’ readiness for such a system is strong enough and that apart from developers benefiting from the Web services, accessibility of information and stakeholder s’ visibility will improve.

Index Terms—e-Cultural Heritage, Tourism, Web Mapping, Web services, Crowdsourcing, Tanzania.

I.I NTRODUCTION

In modern societies where digital technology reigns supreme in facilitating delivery of human services, the term e-service has been created to refer to electronic services. In recent years, millions of people are using web for one or the other purpose and this number now has reached to its highest level [1]. The advent of Internet reshaped the promotion of tourism and cultural products and tourists' learning demands [2]. Continuous developments in the field of information and communication technologies (ICT) in our societies have changed how people access, share and use information [3] [4]. Due to the advancement of technology the digital landscape is constantly changing the cultural consumption and production patterns which force the cultural heritage industry to adopt the new technologies with regard to delivery, access and re-use of their digital heritage collections. Most of the developed countries have managed to digitize their cultural heritage centers for the purpose of increasing accessibility of information and making it available for all anywhere at any time regardless of distance and disabilities. [5] Stated that the need to create an e-culture environment arose from the undeniable fact that the cultural heritage of a nation defines it and therefore, should be disseminated to all, regardless of their location and their disability.

The objective of digitizing cultural activities is to provide e-content for education to local stakeholders and tourists as well as to provide e-learning and technical training for e-heritage which will help to achieve broader awareness and knowledge for cultural growth [6]. According to the World's Heritage sites statistics of July 2016, globally there are 1,052 heritage sites of which 814 are cultural, 203 natural and 35 mixed properties, in 165 states [7]. Out of 1,052 heritage sites, 96 are found in Africa. Tanzania is among the seven African countries

with many heritage sites and the first in East Africa with seven world heritage sites [7]. Out of the seven heritage sites, three of them are cultural, three are natural and one is mixed properties [7]. However, Tanzania national emphasis and investment in cultural heritage is not substantial enough making the sector among of those that are left out. The sector suffers from low promotion and maintenance regardless of its importance in characterizing the identity of the nation. Most people are not aware of the cultural heritage sites and cultural materials present in our country making these sites receive only minimal attention from the public which in turn leaves the heritage sites in poor condition and eventual deterioration. With regard to historical sites, it is estimated that more than 70% of them are not in good condition while others are not well preserved and also in deterioration [8].

On top of that, many entrancing cultural heritage locations are hidden from tourists, especially When considering that the country is full of historic attractions which in turn makes them unpopular/unknown to many [9]. This makes unease for the tourists to discover them. The management of cultural insights in museums, heritage conservation and art creation houses in the country is in desperate need of improvements, the systems in use are old in terms of design and technology with very low usability (poor access, less content) and are not integrated with one another. Although a lot of strides have been made by the government in improving e-cultural heritage industry, more work still needs to be done. Among the various interventions, ICTs have not been particularly embraced enough in this sector of our economy.

Therefore, there is a need for a portal where researchers, scholars, teachers, tourists and the general citizenry can have easy access to information in our heritage institutions, visibility as well as contribute to the documentation of such cultural heritage sites. Cultural heritage preservation should be seen as an integral part of interrelated and dependent economic activities that extend from data collection, through knowledge transfer to educational systems, and lifelong learning.

In this research, we utilize web services technology to facilitate collection and acquisition of information using crowdsourcing techniques, which will allow the consumers to be engaged in giving ideas, and build social media campaign in promoting our cultural values [11] [12]. This will also improve the accessibility of information across the theme. The use of a mapping application system will also help to determine the locations of cultural heritage sites that are found in Tanzania. The digitization of cultural collections, combined with the increasing capacity of storage and Internet access to digital information will cause a rapid change in the traditional models of using, managing and accessing knowledge and information related to cultural heritage and artworks [13]. For that matter, a transformed e-cultural heritage industry will foster the cultural heritage business and subsequently magnify the economic contribution tourism makes towards the overall country's gross domestic product (GDP) [14]. The layout of this paper is as follows; after introduction, research methodology follows and thereafter results and discussion are covered before finalizing with a conclusion and acknowledgments.

II.R ELATED W ORKS

In this section we review literature material related to the problem discussed in this paper. The review is organized mainly in two major sections, which discuss the benefit of digitizing archives and solution towards making interoperable systems.

A. Benefits of digitizing archives

Several approaches have been made in order to improve cultural heritage centers such as museums by the help of ICT tools and different literatures have discussed about the internal as well as external benefits of digitizing archives. Several scholars explained how good digital archive could ease the work for curatorial staff, save space and preserve objects for future generations to enjoy. Digitization helps to get rid of limitations such as space, time, weight (e.g. for printed books) etc. at the same time proving access to vast information, contrary to conventional methods. According to one commentator, easy access is provided to cultural information and makes the information available for all complying with the logic (equal access and knowledge for all) [15].

The digitization of museum/archives is seen to have a great impact on cultural heritage since we have collection of documents and objects that are invaluable/ irreplaceable both culturally and monetarily. Usually, such items marked many turning points in modern history and need to be maintained due to their historical and cultural importance. Artworks that are recorded on papers are difficult to preserve and requires special environment to prevent destruction. By digitizing these documents more people can still have a taste of it for a much longer time scale in the near and distant future, contrary to the case if they were displayed in a heavily shielded case in a museum [16]. Digitization would also preserve cultural heritage in some visual form even when their physical reality has been completed destroyed by phenomena such as wars and natural disasters.

B. Web services for interoperable systems

Several studies discuss on how to improve information systems’ integrations in different ways. One of the best solutions suggested by many is through web services. Web service is one of the latest technologies used for solving a problem of information system’ integration [17]. Web services are defined as software designed to support interoperable machine-to-machine interaction over a network by the World Wide Web Consortium (W3C). [17] Expounds how web services could be a huge solution due to its ability of making its components re-usable by offering application-components (like currency conversion, weather reports, or even language translation

as services) and connecting existing software that can help to solve the interoperability problem by giving different applications a way to link their data.

Currently many electronic businesses, e-learning platforms and e-governance projects tend to apply web services in order to maintain robustness of their systems. Likewise, in this research web services technology is applied to save the same purpose as one way of solving a problem in the existing cultural heritage information systems in Tanzania. [17] further discusses the essential issues that enhance the robustness of applications based on web services; these include availability of the services, reliability, security and interoperability of applications. Furthermore, web service allows organizations to easily combine/integrate services across different organizations as well as within organizations. Such web-service-based integrated applications should guarantee consistent data manipulation and outcome of business processes running across multiple loosely-coupled organizations; hence, web services technologies should be expanded to equip with transaction-processing functionalities [18].

Despite of efforts made in Tanzania on improvement of our cultural heritage information systems, ICT is not well utilized in protecting and promoting this sector, therefore we set out to provide this tool as a solution for enhancing acquisition, discovery and accessibility of artifacts/artworks information in our museums/heritage centres for knowledge sharing and awareness of our cultural heritage. Besides, to the best of our knowledge there are no published works on this topic relevant to Tanzania which this work will help to narrow this information gap.

III. R ESEARCH M ETHODOLOGY

A mixed research methodology was employed in our investigation and design activities. Stakeholder analysis approaches were used to gather knowledge about relevant actors so as to capture their information needs and the kind of influence they exert to the cultural heritage sector. The gathered knowledge then became key to designing the Web services using a top-down approach which is both modular and functional oriented. Experimental approaches were used to evaluate the functioning and usability of the services.

Fig.1. Modified Schematic Representation of rationale, typology and Methods

A. Stakeholder Analysis

The meaning of stakeholder analysis is quite subjective and over the years researchers have developed various methods and approaches for different purposes. In this research, we adopted with modifications the framework that was proposed by [19]. The framework mapped typical rationale for stakeholder analysis, topology and respective methods. Since the desire in our study was to gain insight, the descriptive rationale was found to be more relevant whereby the focus was to identify stakeholders, differentiate or categorize them, and lastly investigate existing relationships. In identifying the stakeholders, instead of using what [19] proposed i.e. either focus groups or semi structured interview or

snowball sampling, we decided not to invent the wheel and conducted an analytical identification of stakeholders through content analysis of various reports and documents from authorities [20] [21] [22].

Fig 1 shows the schematic representation of the methods with the new one added to it. To categorize stakeholders, an analytical categorization approach was used. The approach used by [23] allows observations of a phenomenon (i.e. interactions between stakeholders) to be used in categorization based on factors like interest, competition, cooperation, roles, to mention a few. In this study, three factors were considered: interest, influence, and role. Table 1 summarizes these factors. To establish relationship an actor-linkage matrix was created and the interrelations described as either “business and service

provision” or “regulation and law enforcement” or “support”.

Table 1. Categorization Factors

B. Web services.

The essence of using a top-down approach while ensuring modularity and functional organization is so that a wider range of people can later contribute to the proposed Web services (WS). This is also intended to accommodate the needs of our software development industry that is characterized by novice programmers. Thus, the specification of the overall system is first viewed as a black box with the major modules only, and then upcoming designers are allowed to decide how the internals of the lower level boxes should be. Functionally, modules or services are categorized as either registry or reporting or interactivity or mapping as presented in Table 2.

Table 2. Functional groups of Web services

C. Experimentation and evaluation

To evaluate the designed services, prototypes were developed and tested. The objectives were to demonstrate that the proposed design works efficiently and to also conduct preliminary investigations on readiness and practicability of crowdsourcing technique of gathering information. One of the key functionalities of the developed prototype, e-Cultural Heritage portal, is geolocation of creation houses and cultural heritage sites. This mapping component of the e-Cultural Heritage portal was developed using services from the e-Cultural Heritage-WS which implements the designed Web services.

IV.R ESULTS AND D ISCUSSION

A. The cultural heritage and digital documentation requirements.

The Conducted analysis confirmed that Tanzania is one of the countries with very rich heritage which is derived from its history, geography and the 126 tribes. There are about 19 different tangible artworks and sites, and about 9 different kinds of non-tangible heritage events. These are in no way exhaustive but rather those which have been well documented. Each of these was analyzed to establish ideal digital representation format and tools that can be used for capturing associated data as shown in Table 3.

B. Key players or actors

The key players who are involved in the Tanzania Heritage information ecosystem are the locals who engage in creation of various artworks (i.e. creation houses); citizens, clients and tourists who propose sites, buy artifacts and visit sites; The Government of Tanzania (GOT) which makes policies, regulate and protect, market places where business happens; museums where things are kept; and the international community through development partnerships, intercultural dialogues, and designation of special cultural or physical importance for protection. The information needs and contributions from each of the group of actors differ significantly. Fig 2 shows the key sets of information for each one of them in an ecosystem. Some groups of actors have been combined for convenience and also due to the fact that their information needs resemble to a large extent. For instance, tour companies have been considered as part of the market places, and preservation authorities have been considered as part of the Government.

Table 3. Typical cultural heritage and documentation requirements

By identifying the key actors the ecosystem helps to elucidate how actors’ engagement and relationships may influence management for the successful development of e-cultural heritage industry. It also reflects sets of activities done by each key player in the value chain and therefore how each can contribute to building an effective e-cultural heritage industry.

Arts creation houses are responsible for creating artworks creatively and in return, they receive revenue and use profiles and feedback, which form the basis for further improvements. Market places such as hotels, airports and art markets are advertisement areas and selling points of these artworks, through e-cultural heritage industry market houses are able to get fees commission's revenue. In this network, clients, as one of the stakeholders provide feedback via a system and pay fees when accessing the information. Among the different stakeholders, a key role is played by The Government, which strategically manages a system where other public, private and non-profit actors operate by laying down the policies, strategies for implementation and setting conservation regulations. The government also collects income tax from industry. One of the most important key players is Museums, they preserve, interpret and

promote the tangible and intangible natural and cultural inheritance of humanity. By virtue of their role museums contain huge collections of artworks where people can have an easy access to them. As it is seen in Fig 2, the fee is paid whenever someone wants to access the museum collections. International heritage caretaker organization like UNESCO is there to encourage the integration of the preservation of heritage in urban and territorial development projects and ensures the inclusion of a social element to heritage conservation. They also act as a source of financial support through the International Monetary Fund (IMF) or the World Bank (WB).

Fig.2. Ecosystem of Key Actors

C. Categories of Actors and Relationships

As explained in the methodology, actors were categorized using three factors: interest, influence and roles. From the conducted stakeholder analysis, a stakeholder Interest-Influence matrix which categorizes stakeholders in terms of their interest to information and influence was derived. By adding a third dimension, which represented the role factor, to the matrix, it was easier to extract relationships between actors. The information extracted from the matrix was organized into

specific information spaces whereby for each, a special format r(tf) was used to describe role, interest and influence. In the r (tf ) format, r is r ole, t is in t erest, and f is in f luence, whereas t and f can be either H=high or L=low while r can be either producer or broker or consumer . The matrix is presented in tabular form in Table 4. The sets of information as was presented in fig 2 are here classified into “administrative”, “business” and “use” information spaces.

Table 4. Interest-Influence Matric in Tabular form

The representation can also be used to infer the necessary actions to be taken in order to strengthen information flow and prosperity of the heritage industry. Fig 3 shows possible actions that can be taken for each of the interest-influence combination i.e. LL, LH, HL, and HH. Citizens need to be monitored for change through provision of information on e-cultural heritage portal. One goal of this research will be to provide such a

platform where citizens will be informed on the importance and utility of accessing, collecting and enjoyment of e-cultural heritage. On the other hand, the international community is hypothesized to be highly influential in changing the landscape of cultural heritage in Tanzania through their consumption while having minimal interest in developing it (as this is the nation's role). Our platform will keep the international community

satisfied through provision of access to the Tanzania's e-cultural heritage information. Stakeholders with both high influence and high interest are the government of Tanzania, museums, tourists and art creation houses. The e-cultural heritage platform will help these stakeholders gain greater access to a greater amount of e-cultural heritage materials through the constantly (and almost real-time) updated list of materials. Finally, stakeholders with high interest and moderately low influence include marketplaces, students and researchers. This platform will help keep them informed of the status of e-cultural heritage in Tanzania. We hope that through this platform eventually, all stakeholders will be moving to the high interest and high influence quadrant.

Fig.3. Matrix-Action mapping D. Web Services

After understanding how each actor fits into specific roles and respective position within interest-influence matrix, a conceptual use case diagram and then an architectural diagram was prepared. Fig 5 shows the architecture together with a use case diagram (Fig 6), which shows the processes. Each of the processes in the use case diagram should implement the same architecture regardless of the information space (administrative or business or use).

In order to implement the web service architecture, we adopted the web service composition taxonomy as discussed by [24] but only concentrated on three service composition which is language, knowledge reuse and target user. The reason to why use only three of them is because they are the major key components in this study. Starting with language is the core dimension, which decides how composition occurs, which and how activities should be reinforced. Given its key role in the composition process language is further split into two sub-dimension and look at the different components and application targets the language may support [24]. This is well demonstrated in Fig 4.

The architecture follows the generic RESTFULL approach by considering all language service composition such as type of service, description, data format, interaction protocols, interaction style and selection to characterize the components [24].

Fig.4. Web Service Composition for E-Cultural Heritage Portal

Type: identifies whether the components will act as a data source, provide access to logic application or use Graphical User Interface (GUI) in rendering basic infrastructure services [24]. As of this study, a web service acts as a data source and provides access to other applications. The services provided in this architecture include registry service, reporting service, interactivity service and mapping service as indicated in Table 2.

Interaction protocol: Due to the fact that Representational State Transfer (REST) is an architectural pattern that exposes data and functionality through resources accessed via dedicated Uniform Resource Locators (URLs) over Hypertext Transfer Protocol (HTTP), in this architecture HTTP protocol is used as an interaction protocol for services to communicate and style of communication is done via Universal Resource Locators (URLs) where every communication is initiated.

Description: WADL/RAML are ways, which were used to describe the components. Web Application Description Language (WADL) use XML description of HTTP-based application [25], RESTful API Modeling Language (RAML) is a language for describing RESTful API [24]. The use of Web API (Application Program Interface) description is to allow the combination of the multiple web services into new single application which we call mashup. As an example, in this research, a map application developed use content from more than one sources to create a map mashup of cultural heritage sites’ locations.

Data format: In the developed platform data format for service requests and responses is presented in eXtensible Markup Language (XML) and JavaScript Object Notation (JSON). Therefore it allows the program and scripts to dynamically access and updates the content, structure and style of these documents.

Interaction style: To support the communication between Client and Server in this architecture PULL style is used as an interaction style to allow a client/application to invoke the web services by following request-response pattern. This will only allow a client/application to access the services after the request is made by client/application.

Selection: The selection component describes the service composition life cycle that occurs in three different stages (i.e. design time, deployment time and runtime) [24]. Design time is when a developer chooses the services by selecting the actions which predefine the interaction with web services. Deployment time is the phase when the composition is deployed ready for execution and runtime is when composition is executed.

Knowledge reuse: Knowledge reuse is another web service composition which acknowledges the reused based nature, in our case the information provided relies on reuse artifacts. This allows adding existing artifact or creating new artifacts in the reused module.

Target user: Since the web service architecture intends to simplify the development of applications for developers the target users are the end-user programmer.

By identifying the key composition of the web service we arrived with an architecture for implementing the services. Fig 5 describes the interaction between REST server and client/ application by acquiring information from E-heritage database, which is collected from different sources such as mobile application, web application and other sources of the Internet. The RESTful web services will be accessed by an automated client or an application acting on behalf of the user. Conversely, this can be done by human interacting directly, which is done by constructing a GET URL with

the web browser and read the content that is returned [26].

Fig.5. E-heritage Web Services Architecture

Fig.6. Use case Diagram

E. Experimentation results.

After the initial testing, we allowed selected stakeholders to manage their profiles while we observed their responses. The few selected stakeholders from three regions of Arusha, Dar es Salaam and Coast region were artwork creators from (Tingatinga Arts cooperative society, Ryno Carvings and Cultural Heritage), museum curators from (National Museum, Village Museum and Mambo ya kale Museum, Swahili for a Old Things Museum), Historical sites conservator from (Kaole ruins and Olduvai Gorge), arts galleries owners and sellers of cultural products from (Oldonyo Orok Arts and Gallery, Maasai Arts Gallery, Cultural Heritage, Trek Africa Art Gallery Kisongo Art Gallery, Masai Market, Tingatinga and Masai arts Gallery). They were able to do several registries as seen in Fig 7 and provide their locations (i.e. latitude and longitude) which later were deployed on the map.

For that reason, we were able to geolocate some cultural heritage sites in the three regions (Arusha, Dar es Salaam and Coast regions) as shown in Fig 8. The top panel (a) shows an example of mapped locations found in Arusha and bottom panel (b) shows mapped locations in Dar es Salaam and Coast regions.

By geolocating, these cultural heritage sites will solve a problem of discovering the hidden cultural heritage sites from tourists and make it easier for them to access their locations. Generally, the platform will be useful for people especially citizen to report undiscovered cultural heritage sites locations which will improve the documentation and eventually popularize them.

Fig 9 below shows the results of the request made by user after requesting a map service. It shows the communication, which takes place between Service Consumer (Client/user) and Service Provider (Web Server). A request made by client is passed on the URL where the connection between client and server occurs and then the communication is done over the HTTP protocol, the request is then sent to the server and returns the results to the client in an XML format document. All communications are accessible under presence of Internet. The document returned in an XML format can be reused in other applications that require the map service by the use of Application Program Interface (API). This simplifies works for other developers by avoiding re-writing of the code from scratch. Furthermore, it will enhance the integration of different system handling cultural heritage information.

Fig.7. Web services

Fig.8. Example of mapped location in Arush (a) and in Dar es Salaam and Coast regions (b)

Fig.9. Example map service request

V.C ONCLUSIONS

In this research, a Web Service for transforming e-Cultural Heritage industry of Tanzania has been designed and implemented. The motivation for employing web service architecture is to support interoperability of different applications and make the application components reusable. Initial evaluation of the design shows that users of the services are able to seamlessly utilize the services. In the evaluation that is ongoing, we expect a positive reaction from the stakeholders in contributing to the e-Heritage portal. It is not clear to which extent they are willing to be engaged but also the employment of crowdsourcing technique is expected to bring powerful results by involving the users in the process of documentation and promotion of cultural values through the interactive system. A completed portal will help to keep track of the dynamics of the industry and enable new studies that aim at improving information logistics.

A CKNOWLEDGMENTS

We would like to extend our acknowledgments to the government of Tanzania through the Higher Education Students’ Loan Board (HESLB) for funding this research and the University of Dodoma for granting an academic leave to the corresponding author.

R EFERENCES

[1]R. Bibi, M. Jannisar, and M. Inayet, “Quality Implication

for Prognos es Success in Web Applications,” Int. J. Mod.

Educ. Comput. Sci., vol. 8, no. 3, pp. 37–44, 2016.

[2]R. G. Connolly, D., Olsen, M. D., Moore, “The internet as

a distribution channel.,” in Cornell Hotel and

Administration Quarterly, 1998, p. 39(4), 43-54.

[3]K. T aghandiki, A. Zaeri, and A. Shirani, “A Supervised

Approach for Automatic Web Documents Topic Extraction Using Well-Known Web Design Features,” Int.

J. Mod. Educ. Comput. Sci., vol. 8, no. 11, pp. 20–27, 2016.

[4]R. M. Alguliyev and M. Rasmiyya Sh, “Information

Culture Formation as the Most Promising Direction of Individual`s General Culture,” Int. J. Mod. Educ. Comput.

Sci., vol. 7, no. 3, pp. 54–61, 2015.

[5]J. Glentzes, “An e-culture –e-museums environment for

common citizens and disabled individua ls,” Int. J.of Digital Culture and Electronic Tourism, vol. 1, no. 4, 2009.

[6] F. M. Go, R. M. Lee, and A. P. Russo, "E-Heritage in the

Globalizing Society: Enabling Cross-Cultural Engagement Through ICT," Inf. Technol. Tour., vol. 6, no.

1, pp. 55–68, 2003.

[7]UNESCO, “UNESCO World Heritage Center - World

Heritage List,” 2016. [Online]. Available:

https://www.360docs.net/doc/fb5728361.html,/en/list/. [Accessed: 13-Nov-2016].

[8]Ministry of Communications Science and Technology -

the United Republic of Tanzania, "Research Priorities for Tanzania 2015 -2020,", United Republic of Tanzania, 2015.

[9] C. E. P. Armir Bujari, Matteo Ciman, Ombretta Gaggi,

“Using Gamification to Discover Cultural Heritage Locations from Geo-tagged Photos,” vol. 21, no. 2, p. pp 235–252, 2017.

[10] B. Vodopivec, R. Epp ich, and R. ?arni, “Cultural

Heritage Information Systems State of the Art and Perspectives,” In Euro-Mediterranean Conference,

Springer, Cham, pp. 146–155, 2014.

[11]R. Spiegel, “3 Ways to Benefit From Social Media

Crowdsourcing,” 2011. [Online]. Available:

https://www.360docs.net/doc/fb5728361.html,/3-ways-to-do-

social-media-crowdsourcing/. [Accessed: 19-Jul-2017]. [12]G. Barbier and R. Zafarani, “Maximizing Benefits from

Crowdsourced Data,” Comput. Math. Organ. Theory, vol.

18, no. 3, pp. 257–279, 2012.

[13] E. Bertacchini a nd F. Morando, “The Future of Museums

in the Digital Age: New Models of Access and Use of Digital Collections,” no. 5, pp. 1–14, 2011.

[14]T. Rochelle, “Travel & Tourism economic impact 2015

Tanzania,” The authority on world travel & tourism, 2015.

[15] A. S. Drig as, L. G. Koukianakis, and J. G. Glentzes, “A

dynamical system for e-culture services,” WSEAS Trans.

Syst., vol. 5, no. 1, pp. 125–130, 2006.

[16]S. McDonough, J. P., Olendorf, R., Kirschenbaum, M.,

Kraus, K., Reside, D., Donahue, R., ... & Rojo, “Preserving Virtual Worlds Final Report,” Library

(Lond)., p. 195, 2010.

[17] A. Meligy, E. Elabd, and S. Kotb, “Web Services Privacy

Preserving Based on Negotiation and Certificate Authorities,” Int. J. Mod. Educ. Comput. Sci., vol. 8, no.

10, pp. 49–55, 2016.

[18]S. Choi et al., “A framework for ensuring consistency of

Web Services Transactions,” Inf. Softw. Technol., vol. 50, no. 7–8, pp. 684–696, 2008.

[19]M. S. Reed, A. Graves, N. Dandy, H. Posthumus, K.

Hubacek, J. Morris, C. Prell, C. H. Quinn, and L. C.

Stringer, “Who ’ s in and why?? A typology of stakeholder analysis methods for natural resource management,” J.

Environ. Manage., vol. 90, no. 5, pp. 1933–1949, 2009. [20]I. Bakari, “Culture and Creative Industries in Tanzania: A

Plan for Strategic Action,” Dar es Salaam, 2012.

[21]UNESCO, “Myanmar UNESCO Country Programming

Document 2013-2015,” Dar es Salaam, 2011.

[22]NSGRP, II, “National Strategy for Growth and Reduction

of Poverty,” 2010.

[23]Hare, M., & Pahl-Wostl, C. (2002). Stakeholder

Categorisation in Participatory Integrated Assessment Processes. Integrated Assessment, 3(1), 50–62.

https://https://www.360docs.net/doc/fb5728361.html,/10.1076/iaij.3.1.50.7408

[24] A. L. Lemos, F. Daniel, and B. Benatallah, “Web Service

Composition: A Survey of Techniques and Tools,” ACM Comput. Surv., vol. 48, no. 3, pp. 1–41, 2015.

[25]Hadley, M. J, “Web Application Description Language

(WADL)”. Search (Vol. 12). Retrieved from Retrieved from https://https://www.360docs.net/doc/fb5728361.html,/wadl20061109.pdf, 2006 [26] B. Sun, “A multi-tier architecture for building RESTful

Web services,” IBM Dev. Work., pp. 1–7, 2009.

Authors’ Profiles

Gloriana J. Monko was born in Tanzania

on 24th September 1989. She is a student

at the Nelson Mandela Institution of

Science and Technology in Arusha,

Tanzania, pursuing Masters in Information

and Communication Science and

Engineering. Studied Bachelor of Science

in Informatics at Sokoine University of

Agriculture (SUA) in Tanzania and has a strong background in Information Communication and Technology field. She is an employee at the University of Dodoma (UDOM) in Tanzania as a Tutorial Assistant.

Khamisi Kalegele is an ICT specialist and

a researcher, currently working for The

Tanzania Commission for Science and

Technology (COSTECH) as The Chief

Research Officer but also as The Acting

Director for Knowledge Management. He

received his PhD in Information Sciences

from Tohoku University in Japan, Master

of Engineering in Computer Sciences from Ehime University in Japan in 2010, and Bachelor of Science in Engineering and Information Technology with Honors from The University of Dar es Salaam in Tanzania in 2003. He has a diverse background that includes industrial experiences in networking support, applications development, and telecommunication Engineering. Before working for the commission, he worked as a lecturer in the graduate school of

information and communication science and engineering at The

Nelson Mandela African Institution of Science and Technology in Arusha-Tanzania where he also successfully supervised a number of doctoral and master students, and as research fellow at The Flexible Information Center of The Research Institute of Electrical Communication in Sendai-Japan. His main interest in research and development activities lies in the novel and innovative application of information and communication technologies for socio-economic development of developing countries. He has ventured and developed solutions in various sectors including health, education, agriculture, water, transportation and now tourism.

Dina Z. Machuve received her PhD in

Information and Communication Science

and Engineering from the Nelson Mandela

African Institution of Science and

Technology (NM-AIST), Tanzania in 2016.

She is currently a Lecturer in the School of

Computational and Communication

Science and Engineering at NM-AIST. She is a technical committee member of Data Science Africa (https://www.360docs.net/doc/fb5728361.html,). Her research interests are data science, mobile applications development, agriculture Informatics on food value chains, electrical engineering and STEM education in schools.

How to cite this paper:Gloriana Joseph Monko, Khamisi Kalegele, Dina Machuve, "Web Services for Transforming e-Cultural Heritage Management in Tanzania", International Journal of Information Technology and Computer Science(IJITCS), Vol.9, No.12, pp.52-63, 2017. DOI: 10.5815/ijitcs.2017.12.07

网络安全管理与运维服务

网络安全管理与运维服务 近年来,随着我国信息化建设的不断推进及信息技术的广泛应用,在促进经济发展、社会进步、科技创新的同时,也带来了十分突出的安全问题。根据中国国家信息安全漏洞库(CNNVD)、国家互联网应急中心(CNCERT)的实时抽样监测数据,2013年3月份,新增信息安全漏洞数量比上个月增加了33.9%;境内被挂马网站数量比上月增加17.9%;境内被黑网站数量为7909个,境内被篡改网站数量为9215个,境内被木马或僵尸程序控制主机数量为129万台。面对我国网络信息安全问题日益严重的现状,国家层面在陆续出台相关专门网络信息安全保护法律法规。在各行各业根据不同时代威胁对象及方法的不同,在不断完善自己的安全建设。随着网络系统规模的扩大,各种应用系统不断完善,对各类业务数据的安全提出了新的要求——如何加强网络安全管理?如何使运维服务行之有效? 一、网络管理体系化、平台化 网络安全管理不是管理一台防火墙、路由器、交换机那么简单,需要从以体系化的设计思路进行通盘考虑,需要统一和规范网络安全管理的内容和流程,提升风险运行维护的自动化程度,实现风险可视化、风险可管理、风险可处置、风险可量化。使日常的风险管理由被动管理向主动的流程化管理转变,最终真正实现网络安全管理理念上质的飞跃,初步建立起真正实用并且合规的网络安全管理运维体系。 网络安全管理平台作为管理的工具其核心理念是管理,网络安全管理平台围绕此开展设计,最终形成安全工作的工作规范,通过不断完善的工作规范,通过安全

工作能力的不断提升,通过对工作内容及结果的工作考核,形成安全建设螺旋上升的建设效果。在网络安全管理平台建设上重点考虑如下几个方面的内容: 1)安全资源的统一管理 安全策略是企业安全建设的指导性纲领。信息安全管理产品应能在安全策略的指导下,对与信息安全密切相关的各种资产进行全面的管理,包括网络安全设备(产品)、重要的网络资源设备(服务器或网络设备),以及操作系统和应用系统等。要实现关键防护设备的健壮性检查工作。 2)安全管理可视化 实现安全运维管理服务流程的可视化、结果可跟踪、过程可管理,支持完善的拓扑表达方式,支持可视化的设备管理、策略管理和部署,支持安全事件在网络逻辑拓扑图中显示。信息安全全景关联可视化展示方法和技术,从信息展示逻辑和操作方式上提高可视化的视觉效果,增强系统的易用性和信息的直观性。采用了众多图形化分析算法技术从大量图表数据中揭示更深层次的关联信息和线索。 3)信息安全全景关联模型及方法 各种类型、不同厂家的安全设备得以大规模使用,产生难以手工处理的海量安全信息,如何统一监控、处理这些不同类型的安全信息,如何从这些海量的安全信息中整理、分析出真正对用户有价值的安全事件。通过设计一个基于关联的信息安全事件管理框架,实现安全信息的关联及关联后事件表示,实现安全信息精简、降低误报率和漏报率以及改进报警语义描述,达到增强安全系统间的联系、建立安全信

《激发正能量做最好的员工》读后感

《激发正能量做最好的员工》读后感 《激发正能量做最好的员工》是一本非常好的成功学书,本书包括“前言”、“向优秀看齐,最好的员工要有正能量”、“常怀感恩之心,内心充满正能量”、“不要找借口。责任激发正能量”“忠诚履职,好品格就是一种正能量”“提升执行力,释放正能量”“用心工作,为效率提升正能量”“重视小细节,挖掘工作中的正能量”“不做‘独行侠’,凝聚团队正能量”“当好主人翁,散发正能量”“超越自我,激发内心正能量”十一部分组成,每一章都有一个主题,每一篇都有附带故事,跟看小说似的,最后还有总结分析,能量加油站教给人们如何转化负能量、凝聚那些潜伏在身心之中的正能量。这本书告诉我们,很多事,如果想去做,就去做,用表现这种张力的形式去做,就会让能量变成积极向上,成为正能量。相反,不去做,一个劲的不用行动而只是用思维在自己的脑海里打转转,任何想法总残留在脑海,而不去实施,就是一种负能量,让这种负能量笼罩,那么一个人就会变的意志消沉。全书语言文字浅显易懂,很少有深奥的或者含义复杂的语句和名词。而这本书,就如同一个亲切的老师,面对面的对你窃窃私语,用的都是大白话,所举的事例都是信手拈来就能做到的。 阅读了这本《激发正能量》,让我感受颇多。书中许多内容给我留下了深刻的印象。 在第二章的常怀感恩之心,内心充满正能量部分,告诉我们:用感恩的心看世界,你就不会产生抱怨,你就不会感到乏味,你就不会在困难面前退缩,你就会觉得工作是为自己,你再受到批评时就不会满心委屈。感恩领导,领导都会有他的闪光点和过人之处,而且,对我们年轻的员工传帮带,有人说读万卷书,不如行万里路,行万里路

不如名人指路,名人指路还不如跟随成功者的脚步,跟随着领导,会少走很多弯路,无论是经验,人脉还是人力,都会对我们往前走的过程有很大帮助。感恩老教师,毕竟是长辈,有时候可能学习经历不一样,认识也不尽相同,尊敬老教师是我们理所当然做的。常怀感恩,感恩领导知遇之恩,感恩同事互相帮助,感恩竞争对手让自己更强大,怀感恩之心对待每一个人,让自己圈子越走越宽,让自己工作更轻松而不是压抑。 在第三部分,对我感触最深的是“责任面前不需要任何借口”中那位来自坦桑尼亚的马拉松运动员艾克瓦里的故事,他是最后一位抵达已经空无一人的体育场的选手,他还是很吃力的跑至终点。他告诉我们“没有任何借口,没有任何怨言”职责就是他一切行动的准则。无论遇到多大的困难,都要想尽一切办法,竭力去完成,不找任何借口。现实生活中,我们千万不要因为害怕承担责任或因为遇到一点困难就找借口,满口都是借口的人哪儿都不会受欢迎。 在读到第四章、第八章和第十章之前,我跟大多数职工一样总是抱怨上班时间早,下班时间晚,拿的工资也少,总感觉自己的付出大于收获。读了这本书之后我的思想有了很大的转变。我相信所有职工都是一样的,作为一名基层职工,不要把一切归咎于运气不好,也不要去抱怨社会的不公平,把所有的精力都用在你的工作上,认真努力的去做,激发出自己的正能量,就能在以后的工作中脱颖而出。不论何时我想对基层的职工说,首先,在工作当中任务重才说明自己有利用的价值,假如你一文不值,领导不会器重你,也不会派给你重要的任务去做。所以说在工作中能体现自己价值的一面就是看自己是否每天忙碌着。其次,做最好的员工表面上看是做给领导,其实不然,做

网络应用服务管理复习试卷1

网络应用服务管理复习题1 一、填空题(20分) 1. 在一台计算机上建立多个Web站点的方法有:利用多个()、利用多个TCP端口和利用多个主机头名称。 2. 在创建Web网站时,需要为其设定()目录,默认时网站中的所有资源都存放在这个目录中。 3. 在配置FTP站点时,为了使用户可以通过完全合格域名访问站点,应该在网络中配置()服务器。 4. 常见的流媒体格式主要有:RealMedia格式、()格式和Windows Media格式。 5. 目前,应用于互联网上的流媒体发布方式主要有:()播、广播、多播和点播等四种方式。 6. 默认时,Web服务所使用的TCP端口为()。 7. 为了便于对站点资源进行灵活管理,还可以把文件存放在本地计算机的其它文件夹中或者其它计算机的共享文件夹中,然后再把这个文件夹映射到站点主目录中的一个()目录上。 8. 专门用来处理电子邮件业务的计算机称为“()服务器”,它将用户发送的电子邮件接收下来,然后再转送到指定的目的地,或者将来自网内或网外的电子邮件存储到相关的电子邮箱中,等待电子邮箱的所有者来收取电子邮件。 9. 匿名的FTP服务器允许用户在访问它们时不需要提供用户帐户和()。 10. 电子邮件服务使用的两个最重要协议是:()协议和POP3协议。 二、单项选择题(20分) 1. 目前建立Web服务器的方法主要有:()。 A.IIS B.URL C.SMTP D.DNS 2. 用户将文件从FTP服务器复制到自己计算机的过程,称为()。 A.上传B.下载C.共享D.打印 3. ()的FTP服务器要求用户在访问它们时必须提供用户帐户和密码。 A.匿名B.独立C.共享D.专用 4. 如果希望在用户访问网站时若没有指定具体的网页文档名称时,也能为其提供一个网页,那么需要为这个网站设置一个默认网页,这个网页往往被称为()。 A.链接B.首页C.映射D.文档 5. ()协议用于发送电子邮件。 A.HTTP B.POP3 C.SMTP D.FTP 6. 用户在访问Web资源时需要使用统一的格式进行访问,这种格式被称为()。 A.物理地址B.IP地址C.邮箱地址D.统一资源定位符 7. 流媒体技术主要用于:()、现场点播和视频会议。 A.远程教育B.名称解析C.路由D.邮件传输 8. Internet是世界上最大、覆盖范围最广的计算机网络,它采用()协议,将全世界不同国家、不同地区、不同部门和不同结构的计算机、国家骨干网、广域网、局域网,通过网络互联设备联接在一起。 A.TCP/IP B.AppleTalk C.NetBEUI D.IPX/SPX 9. 在FTP服务器上建立(),向用户提供可以下载的资源。

在坦桑尼亚工作心得

赴坦旅游工作、生活学习常见问题解 答 文/图龙世界 针对广大网友关于来坦桑尼亚形形色色的提问,集结了一些常见问题,以后还会根据实际提问,不断的进行补充和更新。 旅游: 1、到坦桑尼亚旅游都需要带些什么东西? 答:呵呵,每当我听到这个问题的时候,虽然提问者的心情我能理解,但我总还是觉得有点好笑的。因为你要带什么东西,我的答案肯定是不适合你的。即

使有公共交集部分,相同的可能性也非常的小。所以,如果你自己身体、饮食、生活习惯、心理和生理方面有什么特殊的需要,那就请带上。如果没有,那就带上证件、机票、电子产品、随行洗漱用品、换洗衣物、常备药品即可。 2、入境是否要提供黄皮书? 答:是的,入境必须要有黄皮书。而且黄皮书中黄热疫苗一项,入境日期必须是生效日期以后方可入境,生效日期为注射疫苗10日后。如果疫苗注射时间不足10日,那你就需要付一些“小费”给检验检疫人员了。 3、坦桑尼亚是否支持落地签证? 答:坦桑尼亚对中国公民支持旅游落地签证,费用50-60美元,一般会给3个月有效期。

4、贴士:要重视入境卡的填写。 答:请正确对待坦桑尼亚入境卡的填写,否则即使你是旅游的,也有被黑钱的危险。坦桑尼亚入境卡从(1)“姓名”一直到(12)“旅行目的”项,请按护照及正常情况填写。(13)项“在坦当地居住地址”,请填写你所预定的酒店名称、地址、酒店联系电话。此环节一旦移民局认为你有工作倾向,那你就会被要求办理两个月有效的CTA(临时工作签证),价格:USD200。

网友@totopony在评论中说了她的亲身经历:“我入境的时候就把卡填错了,问我要两百刀,坚决不给,把卡改一下重新排队,过了。” 5、当地银行是否支持VISA或者Mastercard信用卡?是否可以提现?手续费贵吗? 答:一些国际如Stanbic、Barclays等银行的ATM可以提到当地币。提现限额依据ATM提示而定,手续费依据银行间协议而定。目前,坦桑尼亚的超市接受信用卡消费,不像前几年会加收额外的手续费,但有些酒店、坦桑蓝宝石店,都还要额外加收5%的手续费。 6、那里治安情况如何? 答:这里总体来说政局稳定,但偷盗、抢劫事件也是频发的,尤其对于携带大量现金的中国人来说,还是需要格外的注意。旅行者去非旅游区之前,最好提前向当地人或当地中国朋友进行咨询,以确保得到足够的信息保证安全。

Windows网络服务管理

《Windows网络服务管理(专科)》试卷(A卷) 一、单项选择题 1.资源记录中解析主机名称到IP 地址的记录类型是(A)。 A.A B.SOA C.MX D.PTR 2.显示计算机中ARP表的命令是(C)。 A.ARP -c B.ARP -n C.ARP -a D.ARP -d 3.使用 NetBIOS 广播名称查询,则NetBT 节点类型为(A)。 A.B节点 B.P节点 C.M节点 D.H节点 4.https://www.360docs.net/doc/fb5728361.html,中的cn是(B)。 A.根域 B.顶级域 C.二级域 D.主机名 5.创建虚拟网站的方法不包括(D)。 A.使用多个IP地址 B.使用端口号 C.使用主机头名 D.使用计算机名称 6.Hosts文件的作用是(C)。 A.用于把主机名到 IP 地址的映射加载到服务器端解析程序缓存中 B.用于把FQDN到 IP 地址的映射加载到服务器端解析程序缓存中 C.用于把主机名到 IP 地址的映射加载到客户端解析程序缓存中 D.用于把FQDN到 IP 地址的映射加载到客户端解析程序缓存中7.https://www.360docs.net/doc/fb5728361.html,.被称为计算机的(A)。 A.FQDN名 B.主机名 C.Internet名 D.NetBIOS名 8.DNS中的老化是指(D)。 A.判断旧的 DNS 资源记录已在 DNS 数据库注册的时间是否忆达到一个阀值 B.判断是否应将陈旧的 DNS 资源记录进行备份的过程 C.判断是否应将陈旧的 DNS 资源记录在 DNS 数据库中永久保留的过程 D.判断是否应将陈旧的 DNS 资源记录从 DNS 数据库中删除的过程

9.WINS 复制的工作方式中不包括(D)。 A.“推”复制 B.“拉”复制 C.“推”/“拉”复制 D.阀值复制 10.(B)文件中包含WEB站点设定的所有元素。 A.Web.con B.Web.config C.IIS.Web.con D.IIS.Web.configs 二、填空题 1.DHCP服务器分配的基本信息包括__IP 地址__、__子网掩码_、_默认网关_。2.DNS服务器的区域类型有__主要区域_、__辅助区域__、__存根区域____。3.根据路由的目的地不同,路由可以划分为__子网路由__和__主机路由___。4.验证DNS中资源记录已存在的命令包括_Nslookup_和__DNScmd___。 三、问答题 1.使用DHCP服务器的好处有哪些。 2.画图并解释说明请求拨号路由方案的实现方法。 参考答案: 1. ?不必为每个客户端手动分配静态 IP 地址 ?不必为每个客户端的 IP 配置信息做额外记录 ?客户端在子网之间移动时可以自动获取 IP 地址 ?客户端离开网络时可以释放 IP 地址以便分配给其他客户端 ?减少出现 IP 地址冲突的情况 ?探测网络中未授权的 DHCP 服务器 2. 网络 A 和 B 处于不同的地理位置,对于在网络之间传输的通信量来说,租用广域网(WAN) 链路是不经济的。路由器 1 和路由器 2 可以在两端使用调制解调器(或其他类型的连接,例如 ISDN),通过模拟电话线路连接。网络 A 上的计算机启动与网络 B 上的计算机的通信时,路由器 1 与路由器 2 建立电话连接。只要存在来回传输的数据包,调制解调器连接就会保持。连接空闲时,路由器 1 将挂断,以减少连接开销。

脱贫攻坚电视专题片《摆脱贫困》第七集:命运与共学习心得体会观后感之人类命运共同体

脱贫攻坚电视专题片《摆脱贫困》第七集:命运与共学习心得体会观后感之人类命运共同 体 ____总书记在十八大明确提出要倡导”人类命运共同体”意识。人类命运共同体旨在追求本国利益时兼顾他国合理关切,在谋求本国发展中促进各国共同发展。当今世界面临着百年未有之大变局,政治多极化、经济全球化、文化多样化和社会信息化潮流不可逆转,各国间的联系和依存日益加深,但也面临诸多共同挑战。各种各样的全球非传统安全问题层出不穷,对国际秩序和人类生存都构成了严峻挑战。不论人们身处何国、信仰如何、是否愿意,实际上已经处在一个命运共同体中。人类命运共同体,作为一种应对人类共同挑战为目的的全球价值观正逐步获得国际共识。 从新中国建立以来,中国人民经过艰苦卓绝的奋斗,到今天已经使八亿多人摆脱贫困,2020年更是成功脱贫,全面奔小康,一个没有落下,成为世界上率先完成联合国千年发展目标中减贫目标的发展中国家,为世界减贫事业作出了重大贡献,创造出人类减贫史上前所未有的奇迹。 除了解决自身贫困问题,我国还对世界上多个发展中国家传授经验,成立一个个帮扶项目,为其他国家的扶贫事业提供专业支持。____总书记提出建设“新丝绸之路经济带”

和“21世纪海上丝绸之路”的合作倡议。“一带一路”将帮助各国打破发展瓶颈,缩小发展差距,共享发展成果,打造甘苦与共、命运相连的发展共同体。随着“一带一路”建设的推进,中国在自身脱贫中探索出的经验和智慧,也像当年的中国丝绸一样,受到了“一带一路”沿线国家和人民的喜爱。根据世界银行2021年1月5日发布的《世界经济展望》报告,中国努力推进共建“一带一路”预计将帮助760万人摆脱极端贫困,3200万人摆脱中度贫困。片中的中国农业大学教授帮扶坦桑尼亚莫罗戈罗省佩雅佩雅村村民bishenga、亚吉铁路司机培训班就是这些项目的一个缩影。 共建一个没有贫困、共同发展的人类命运共同体,实现消除贫困的人类梦想,是中国人民的美好愿望,也是超越民族、国家和意识形态的全球观。中国打赢了脱贫攻坚战,无数经验和技术,为世界脱贫提供了样板。在构建人类命运共同体的前进之路上,中国将携手世界为推动建设持久和平、共同繁荣的和谐世界做出更大贡献。

《网络应用服务管理》

《网络应用服务管理》 学号码:1035001408324 姓名:朱亚松 1. 填空题(将答案填写在题目的横线处) (1)WWW服务主要通过HTTP 协议向用户提供网页信息。 (2)默认时,FTP服务所使用的TCP端口为21 。 (3)如果一个Web网站所使用的IP地址为:192.168.0.200,TCP端口号为:4040,则用户应该在Web浏览器的地址栏中输入http://192.168.0.200:4040 以访问这个Web网站。(4)在创建Web网站时,需要为其设定一个主目录,默认时网站中的所有资源都存放在这个目录中。 (5)利用FTP 协议,用户可以将远程计算机上的文件下载到自己计算机的磁盘中,也可以将自己的文件上传到远程计算机上。 (6)在一台计算机上建立多个Web站点的方法有:利用多个IP地址、利用多个TCP 端口和利用多个主机头名称。 (7)用户使用POP3 协议从电子邮件服务器那里获取电子邮件。 (8)在配置FTP站点时,为了使用户可以通过完全合格域名访问站点,应该在网络中配 置DNS 服务器。 (9)目前,应用于互联网上的流媒体发布方式主要有:单播、广播、多播和点播等四种方式。 (10)为了便于对站点资源进行灵活管理,还可以把文件存放在本地计算机的其它文件夹中或者其它计算机的共享文件夹中,然后再把这个文件夹映射到站点主目录中的一 个虚(虚拟)目录上。 2. 单项选择题(将答案填写在题目的括号中) (1)目前建立Web服务器的方法主要有:( A )。 A.IIS B.URL C.SMTP D.DNS (2)用户将文件从FTP服务器复制到自己计算机的过程,称为( B )。 A.上传B.下载C.共享D.打印 (3)( A )的FTP服务器不要求用户在访问它们时提供用户帐户和密码。 A.匿名B.独立C.共享D.专用 (4)如果希望在用户访问网站时若没有指定具体的网页文档名称时,也能为其提供一个网页,那么需要为这个网站设置一个默认网页,这个网页往往被称为(c)。 A.链接B.首页C.映射D.文档 (5)( C )协议用于发送电子邮件。 A.HTTP B.POP3 C.SMTP D.FTP (6)用户在访问Web资源时需要使用统一的格式进行访问,这种格式被称为( D )。 A.物理地址B.IP地址C.邮箱地址D.统一资源定位符 (7)流媒体技术主要用于:( A )、现场点播和视频会议。

网络服务器配置与管理(第2版)答案

教材答案 第一章 一、填空题 1.管理网络上的各种资源,提高网络的可用性和可靠性2.FTP服务、DNS、Web服务、DHCP服务、电子邮件服务3.虚拟机 4.root 二、选择题 1-6:DBCDAA 第二章 一、填空题 1.自主访问控制、强制访问控制和基于角色的访问控制2.用户账户 3.用户组 4.访问权限 5./etc/passwd、/etc/shadow。 6.Administrator、Guest。 二、选择题 1-5:ACADD 6-8:BCC 第三章 一、填空题 1. Network File System(网络文件系统) UNIX和Linux 2. Windows Linux 3. RPC(Remote Procedure Calls,远程过程调用) 4. smbd 和nmbd 5. “/etc/samba”smb.conf 6. smbclient 二、选择题 1-6 CAADCD 第四章 一、填空题 1. Domain Name System(域名系统) 2.53 3. 主域名服务器、辅助域名服务器和高速缓存域名服务器 4. 主机记录、别名记录和邮件交换 二、选择题 1-5 BCABB 6-8 CBB

第五章 一、填空题 1. 动态主机配置协议 2. MAC地址 3. /etc/dhcp 4.68 67 二、选择题 1-5 BABCB 6-8 DCA 第六章 一、填空题 1. Hyper Text Transfer Protocol(超文本传输协议) 2. 设置监听IP地址及端口号 3. ApacheApache IIS Nginx 二、选择题 1-5 DCADD 6-9 DADD 第七章 一、填空题 1.File Transfer Protocol(文件传输协议),应用 2.控制连接数据连接20 3.主动模式、被动模式 4.21 二、选择题 1-6:BADBAB 第八章 一、填空题 1.(Simple Mail Transfer Protocol,简单邮件传输协议)。2.SMTP、POP3、IMAP4。 3.Mail 二、选择题 1:ACD 2-6:BDBCD 第九章 一、选择题 1-6:ABDBCC

207-208《网络服务器配置与管理》考试试卷

2017-2018第二学期《网络服务器配置与管理》课程 考试试卷 一、选择题(在本题的每一小题的备选答案中,有一个答案是正确的,请把正 1 ( ) A. root B. guest C. administrator D. supervistor. 2、 在Windows 2008中,添加或删除服务器“功能”(例如telnet )的工具是( ) A .功能与程序 B. 管理您的服务器 C. 服务器管理器 D. 添加或删除程序 3、 在一台安装了Windows 2008操作系统的计算机上,如果想让用户具有创建共享文件夹的权限,可以把该用户加入( )组 A .Administrators B .Power Users C .Backup Operators D .Print Operators 4、linux 哪个目录存放用户密码信息是 ( ) A. /boot B. /etc C. /var D. /dev 5、 linux 默认情况下管理员创建了一个用户,就会在什么目录下创建一个用户主目录 ( ) A. /usr B. /home C. /root D. /etc 6、如果要列出一个目录下的所有文件需要使用命令行是 ( ) A. ls –l B. ls C. ls –a(所有) D. ls –d 7、 Windows 2008那个命令可以修改系统配置信息、服务信息和启动信息。( ) A .MSConfig B. ipconfig C . ping D .cmd 8、 windows Server 2008默认安装的位置是( ) A .C:\Winnt B .C:\Windows 2008 C .C:\Windows D .C:\Windows Server 2008 9、 欲查询 bind 套件是否有安装,可用下列那一指令是 ( ) A .rpm -ivh bind*.rpm B .rpm -q bind*.rpm C .rpm -U bind*.rpm D .rpm -q bind 10、在windows Server 2008中,下列关于删除用户的描述中,错误的是( ) A .administration 账户不可以删除 B .普通用户可以删除 C .删除账户后,再建一个同名的账户,该账户仍具有原理账户的权限 D .删除账户后,即使建一个同名的账户,也不具有原理账户的权限 11、 欲把当前目录下的 file1.txt 复制为 file2.txt ,正确的命令是 ( ) A. copy file1.txt file2.txt B. cp file1.txt | file2.txt C. cat file2.txt file1.txt D. cat file1.txt > file2.txt 12、在windows Server 2008中,要创建隐藏共享文件夹,只需要在共享名后加( )符号。 A .% B. $ C. & D. * 13、以下命令可以重新启动Linux 系统的是( ) A. reboot B. halt C. shutdown –s D. init 0 14、以下Windows 2008高级安全Windows 防火墙的描述中,错误的是( ) A .支持双向保护 B .可以配置入站规则 C .不能配置出站规则 D .将Windows 防火墙和IPSEC 集成到了一个控制台中 15、在VI 编辑器中可以使用( )命令,保存文本并退出 A. :q! B. :w C. :wq D. :e 16、要显示当前的工作目录的绝对路径,应使用命令( ) A. ls B. cd C. pwd D.path 17、在windows server 2008中,要改变ping 命令每次发送的数据包大小,使用( )。 A .–l B .–a C .–t D .-? 18、重启网络服务功能的命令为( ) A. service xinetd.d restart B. service network restart C. service restart D.restart all 19、在windows server 2008系统中,默认的密码最长使用时间是( ) A .30 天 B .35天 C .42天 D .48天 20、在windows server 2008 中,要实现数据备份,必须要添加 ( )功能 A .Windows server backup B .Ntbackup C .Power Shell D .Telnet 二、判断题(请判断正误,正确的在括号内打“√”,错误的在括号内打“×”,每题2分,共20分)) 1.通过IIS6.0可以建立Web 站点和DNS 服务器。( ) 2.HTTP 协议、FTP 协议等位于OSI 参考模型的应用层。( ) 班级 学号 姓名 ---------------------------------------------密-------------------------------------封---------------------------------线-----------------------------------------

在工作的九时间里

在工作的九年时间里,我勤勤恳恳,扎扎实实,脚踏实地地做好一个教师的本职工作,认真完成学校领导交给我的任务,虚心向各位老教师和优秀教师学习先进的教学经验,并注意不断阅读有关教育教学理念和实践的书籍,充实自我。在学校中,我一直担任的是语文教学和班主任的工作。从2003年开始,我担任了学校语文教研组长的职务,从2004年秋开始,我担任了学校大队辅导员的职务。下面从几个方面来总结九年来的工作情况。一、思想方面:本人能积极参加政治学习,关心国家大事,拥护以江泽民同志为核心的党中央的正确领导,坚持四项基本原则,拥护党的各项方针政策,遵守劳动纪律,团结同志,热心帮助同志;教育目的明确,态度端正,钻研业务,勤奋刻苦;班主任工作认真负责,关心学生,爱护学生,为人师表,有奉献精神。二、教学方面1、备课我积极参加教研室组织的教研活动,仔细听,认真记,领会精神实质。然后根据要求,提前两周备好课,写好教案。平时做到周前备课。备课时认真钻研教材、教参,学习好大纲,虚心向同年组老师学习、请教。力求吃透教材,找准重点、难点。为了上好一节课,我上网查资料,集中别人的优点确定自己的教学思路,常常工作到深夜。为了学生能更直观地感受所学的知识内容,我积极查找课件,制作课件,准备、制作教具。复习阶段,我把每一单元的词语、重点内容用电脑打印在四裁的图画纸上,为的就是让学生有个清晰的复习印象。每次,当我工作完的时候,脖子就已经感到十分僵硬而疼痛。而家人都已熟睡,时钟已悄然滑过深夜十一时、十二时,有时已经凌晨一时多了。2、上课上好课的前提是做好课前准备,不打无准备之仗。上课时认真讲课,力求抓住重点,突破难点,精讲精练。运用多种教学方法,从学生的实际出发,注意调动学生学习的积极性和创造性思维,使学生有举一反三的能力。培养学困生的学习兴趣,有难度的问题找优等生;一般问题找中等生;简单些的总是找学困生回答。桌间巡视时,注意对学困生进行面对面的辅导,课后及时做课后记,找出不足。3、作业根据减负的要求,我把每天的作业经过精心地挑选,适当地留一些有利于学生能力发展的、发挥主动性和

《网络应用服务管理》期末复习指导

《网络应用服务管理》课程期末复习指导 计算机网络是现代通信技术与计算机技术结合的产物,Internet则是计算机网络的最具体应用。因此,对计算机网络中的各种应用服务,尤其对Internet中广泛使用的应用服务进行了解和学习是非常重要的。《网络应用服务管理》主要介绍了Internet的多项重要应用服务,是一门实践性比较强的课程,技术点多、涉及面广,部分章节存在着理解困难的问题。为帮助大家有效地复习这门课程,下面按照教学大纲的要求,对各章的重点、难点进行归纳、总结,供同学们在复习时参考。 一、本课程的复习方法 1.复习方法 (1)抓住重点,掌握基本概念和基本方法 在复习时要紧紧围绕每章的主要内容,突出掌握重点概念。结合主教材和本复习指导中给出的学习重点与教学要求,充分理解每一章阐述的主要内容是什么,然后总结一下:要解决什么问题,采用什么方法予以解决。如果能把每章中的各个知识点连贯起来、并结合上机实验的体会进行复习,效果会更好。 例如:在学习第二章“配置Web服务”时,首先需要理解这一章要介绍的内容是“Web服务”,然后总结一下:这个服务能够解决什么问题?(用来为Internet用户提供Web资源);采用什么方式解决?(通过搭建Web服务器为用户提供Web资源);使用什么工具搭建Web 服务器?(IIS和Apache);怎么搭建?(在计算机上安装IIS,然后在IIS创建Web站点)。按照这样的思路,可以很快把每章中各个知识点贯穿起来,再结合上机实验,会起到事半功倍的复习效果。 (2)注重上机实验 这门课的实践性比较强,很多技术知识的理解只有通过实验才能真正理解,所以上机实验很重要。它不仅可以加深对课本知识的理解,而且可以学到很多实际工作的经验,这对于增强动手技能和分析解决实际问题的能力、提高专业素质很有帮助。同学们应该尽量做全、做好实验。实验前要进行预习:准备做什么,用到哪些知识,大致会出现什么结果,心中应有数。实验时应注意出现的结果,并分析原因,特别是不正常的情况,对现象、解决办法、原因都最好记下来。 (3)认真完成书上的练习与作业 平时应认真、独立地完成树上的练习与作业,正确地使用答案。在复习时,应把作业复习一遍,掌握做题的规律和技巧,特别对重点要求的内容和解题出现过错误的地方应格外注意。根据教学大纲要求,考试难度不会超出规定范围,而书上的练习与作业就已经充分体现了教学与考核的重点,所以应该认真完成这些作业。 2、学习建议 ?学习这门课要从宏观和微观两方面把握。从宏观上理解各网络服务的应用场合、实现方式和技术原理,微观上应注重掌握实现各服务所涉及到的概念、原理和技术。 ?在做实验之前,应该仔细阅读教材和观看IP录像,里面有实验步骤的详细介绍和演示,这将有助于同学们少走弯路。 ?注意加强对自主学习能力和动手能力的培养,努力实现“学以致用”的目标。 3、使用的教材及媒体

Web服务器创建与管理习题及答案

一、填空题 格式:():络服务器根据应用层次或规模档次可划分为:入门级服务器、( )、()和企业级服务器。 3.电子邮件服务器使用()协议向外发送电子邮件。 4.用户主要使用()协议访问互联网中的Web网站资源。 5.常用的IP地址级别分为3类,即()、()和()。 区域分为两类:()和()。 7.在一台计算机上建立多个Web站点的方法有:利用多个()、利用多个()和利用多个主机头名称。 协议使用的端口号是(),FTP协议使用的端口号是()和(),SMTP协议的标准TCP端口为(),POP3协议的标准TCP端口号为(),IMAP协议的标准TCP端口号为() 9.用户使用_( )协议从电子邮件服务器那里获取电子邮件。 10.在搜索引擎中,根据搜索范围可将搜索引擎分为()和()。 11.国际顶级域名分为()和()两种模式。 的地址是()位的二进制数,而IPv6是()位的二进制数。 13.电子邮件系统由()、()和()组成的。 14.电子邮件服务使用的两个最重要协议是:()协议和POP3协议。 15.列出五种Windowsserver2003常用的网络服务()、()、()、()、()。 16.目前,应用于互联网上的流媒体发布方式主要有:单播、广播、多播和( )等四种方式。 17.使用WindowsMedia可以提供()和()等服务。 18.主要服务器操作系统目前有三种,即Window、()()。 IP配置完毕后,用命令Ping是() 文件实现的功能是()。

是一种简化主机IP配置管理的TCP/IP标准,全称()。 浏览器和服务器是通过()协议来建立连接、传输信息和终止连接。 通过分配TCP端口、()和()来运行和管理多个网站。 24.对于TCP/IP网络来说,()提供域名解析服务。 全称为()协议,是用于TCP/IP网络及INTERNET的最简单协议之一。 26.专用的FTP服务器要求用户在访问它们时必须提供用户帐户和()。 27.在配置电子邮件服务器时,为了使用户可以通过完全合格域名访问电子邮件服务器,应该在网络中配置( )。 28.常见的流媒体格式主要有;RealMedia格式、( )格式和WindowsMedia格式。 29.在创建Web网站时,需要为其设定( ),默认时网站中的所有资源都存放在这个目录中。 二、判断题 1.一个FTP服务器上只能建立一个FTP站点。(×) 2.通过可以建立Web站点和DNS服务器。(×) 服务只能使用TCP端口80。(×) 协议、FTP协议等位于OSI参考模型的应用层。(√) 5.在同一台计算机上,两个Web网站不能使用相同的TCP端口号。(×) 6.在DNS中,每个区域可以包含多个子域,子域可以有自己的主机记录。(√) 网站中的所有资源都必须存储在主目录中,用户无法访问位于主目录之外的网页资源。(×) 具备双向传输的功能。(√) 9.代理服务器可以通过提供较大的高速缓存,从而减少出口流量。(√) 10.帐户管理就是为用户分配邮件地址或电子邮件。(×) 11.默认时,SMTP服务使用的TCP端口为:25。(√)

酒店工作总结

2014年度酒店工作总结 【篇一:酒店餐饮部2013年工作总结及2014年工作计 划】 餐饮部2013年工作总结及2014年工作计划 回顾一年的学习工作,在上级的正确领导和宾馆各部门的大力支持下,餐饮部团结一致,集思广益,圆满完成了年度计划。现将一年的工作情况总结 一、经营情况 1:各种经济指标完成情况 全年餐饮部实现营业收入:—.共:2110000 元比去年的:2162135元,下降:52135 元,今年平均值,年上座率:%,完成了酒店公司和其他会议团队的接 待任务,重大投诉率为0。 二:日常管理 1、部门规范管理 由部门管理人员于组成,每天中午11:15分对部门各区域进行检查,对查出问题逐一整改落实,并按制度规定奖罚分明,卫生稳步提高。 2、成本控制和节能降耗

1、结合后厨部制定了新的餐具管理办法。餐具分顺序,分类,分框收放,2 分类清洗,3易碎品自己清洗,4每日定时开关灯,空调,热水器,5合理利用 边角余料不浪费,6严格控制低值易耗品,做到领用有记。 3、做到抓“销售”抓“内务” 1发动部门全员营销,主要以口碑式宣传。 2规范了仓库和布草管理仓库,布草由领班专人负责整理和清点,2小方巾由 部门定人清洗存放。3、建立出品估清供应监督制度。 4、抓“培训”抓“落实”。 培训1礼节礼貌和服务意识,2铺台布,托盘,摆台,上菜,斟酒,口布叠花,3亲自参与服务工作并定时检查。 5、做到美丽酒店,安全酒店。 做好环境卫生,护好外围绿化,重点防火防盗,注重食品安全,保证自身安康。 6、制度面前人人平等。 三、餐饮工作中仍存在一些不足 1仍有一些员工的主观能动性较差,机械性地去工作,部分员工自律性较差,如:站位纪律,服务礼貌用语,餐中服务等。

网络管理服务常识

网络管理服务常识 核心理念: 为社会创造价值,为客户满足需求,为员工提供机会,为发展培养精英。 服务理念: 理解真诚用心 经营理念: 责任共赢永续 发展远景: 打造专业型网吧管理专家 发展使命: 用网络传播文明 人才理念: 有才有德放心着用,有德有才培养着用 有才无德观察着用,无德无才坚决不用 工作理念: 如果你有智慧,请你出现智慧; 如果你缺少智慧,请你付出汗水; 如果既没有智慧有不付出汗水,只有选择离开。 虚拟网络员工培训 我们的宗旨时: 高端的配置、舒适的环境 尊贵的服务、优惠的价格。 服务细责: 要让顾客体会到“尊贵的服务”,服务时要不卑不亢,有气质、有气势。在服务的过程中网管表现出自身的尊贵才能体现出顾客的尊贵,才能体现“尊贵的服务”,面对顾客时我们不需要介绍服务业的重要性 工业、农业、服务业时国民经济的三大经济命脉,服务业时其中不可缺少的一部分。 服务是具有无形特征却可给人带来某种利益或满足感的可供有偿转让的一种或一系列活动。 要求:”请”字当头,“谢”字不离口。 迎宾时1、你好,欢迎光临!2、您好,帅哥/美女! 顾客呼叫网管1、您好,先生(美女)!(正常情况下) 2、您好,先生(美女)!请问几号机?(不清楚顾客位置) 到达顾客位置时您好,先生(美女),有什么需要帮助的? 顾客需要排除故障时1、好的,先生(美女)请稍等。(一般情况) 2、不好意思,请让一下,谢谢,(需要顾客起身时) 顾客需要购买商品时好的,先生(美女)请问你需要什么? 要有推销我们的商品,介绍时注意巧计:价格由高向底。 顾客需要外卖时不好意思,公司规定上班事件不得离岗,我们公司有XX,主动推销我们的商品。 为顾客服务完毕时先生(美女)不好意思,让你久等了,这是你需要的XX,找你XX,祝你玩的开心,有什么需要叫我。 (接送钱或物品时,要唱收唱付,双手接送,轻拿轻放

《网络服务器搭建、配置与管理-Linux(第二版)》课后习题答案#(精选.)

《网络服务器搭建、配置与管理-Linux版(第二版)》 课后习题答案 1.6 练习题 一、选择题 1. Linux最早是由计算机爱好者 B 开发的。 A. Richard Petersen B. Linus Torvalds C. Rob Pick D. Linux Sarwar 2. 下列 C 是自由软件。 A. Windows XP B. UNIX C. Linux D. Windows 2000 3. 下列 B 不是Linux的特点。 A. 多任务 B. 单用户 C. 设备独立性 D. 开放性 4. Linux的内核版本2.3.20是 A 的版本。 A. 不稳定 B. 稳定的 C. 第三次修订 D. 第二次修订 5. Linux安装过程中的硬盘分区工具是 D 。 A. PQmagic B. FDISK C. FIPS D. Disk Druid 6. Linux的根分区系统类型是 C 。 A. FATl6 B. FAT32 C. ext4 D. NTFS 二、填空题 1. GUN的含义是:GNU's Not UNIX。 2. Linux一般有3个主要部分:内核(kernel)、命令解释层(Shell或其他操作环境)、实用工具。 3. 安装Linux最少需要两个分区,分别是swap交换分区和/(根)分区。 4. Linux默认的系统管理员账号是root 。 三、简答题(略) 1.简述Red Hat Linux系统的特点,简述一些较为知名的Linux发行版本。 2.Linux有哪些安装方式?安装Red Hat Linux系统要做哪些准备工作? 3.安装Red Hat Linux系统的基本磁盘分区有哪些? 4.Red Hat Linux系统支持的文件类型有哪些?

洽谈会工作总结

第十六届西洽会 投资促进部及商务厅工作总结 按照大会执委会的部署安排,我部与各有关部门通力合作、精心策划、科学组织,圆满完成了本届西洽会承担的各项工作任务。现简要总结如下: 一、主要工作 (一)承办了一批省际重点投资促进活动。 1、省际经济合作交流大会。由中国开发区协会,中国产业转移投资促进会、中国企业国际融资洽谈会组委会、福建、山西、湖南、西藏、新疆、陕西等21个省区市代表团、陕西商会代表团共同举办,54个商协会协办,600余家省内外企业参会。 山西省委常委、副省长高建民,西藏自治区党委常委、常务副主席秦宜智,湖南省人大常委会副主任陈叔红,新疆维吾尔自治区副主席史大刚,福建省政协副主席雷春美、陕西省副省长景俊海、中国开发区协会会长师荣耀等领导出席大会并致辞。大会在完善合作机制、拓宽合作领域、打造合作载体、创新合作模式,消除市场壁垒,引导产业有序转移等方面形成了共识。 2、七个专题对接会和走进地市活动。作为省际经济合

作交流大会的重要组成部分,举办了7个专题对接会,分别是陕沪产业转移合作项目对接会、陕苏浙纺织项目对接会、陕津中小企业投融资项目对接会、陕粤装备制造合作项目对接会、陕鲁特色产业合作项目对接会、陕川渝循环经济项目对接会和中国西部清真食品产业园招商推介会。根据参会代表意愿和客商分流需要,我们还分别组织了商会代表团走进铜川、走进延安活动。通过针对性较强的项目推介、现场对接、专题座谈、新闻发布会等形式进行了充分的项目洽谈。 3、开发区投资合作工作座谈会。西洽会期间,省商务厅和中国开发区协会共同主办了“2012年开发区投资合作工作座谈会”。参加会议的有全国近30个国家级开发区和我省部分开发区的代表。会议就开发区投资促进工作交流了经验,就促进东中西部开发区间的产业合作与共同发展进行了研讨。会上,中国开发区协会与富平县工业园区管委会签署了战略合作协议。 (二)协调服务外省市代表团举办的对接交流活动。 协助有关省市代表团组织了10多场对接交流活动,分别有新疆代表团项目推介暨签约仪式、甘肃省投资环境(西安)说明会、宁夏回族自治区经贸合作推介会暨项目签约仪式、广西壮族自治区重点产业园区投资说明会、山东半岛蓝色经济区和黄河三角洲高效生态经济区投资环境说明暨项目发布会等。上述活动,我们都确定了专人,密切跟

快运网络服务质量管理制度

韵达快运网络服务质量管理制度 第一部分总则 第一条、为规范韵达网络服务水平,提升服务质量,促进韵达网络健康发展,依据《快递服务标准》,特制定本制度。 第二条、总公司各职能部门为本制度的执行机构。 第三条、各网点必须严格按照《韵达快递岗位操作手册》,本着安全、快速、方便、合理的原则依托韵达网络服务区域依照本制度向客户提供快递服务。 第二部分服务承诺 第四条、服务区域 韵达快运服务区域以韵达快递网站https://www.360docs.net/doc/fb5728361.html,网点服务区域为准。 第五条、服务时效 除偏远地区外,公司提供的快递服务时效不得超出《服务标准》中对以服务时限的要求。 第六条、营业时间:至。 第六条、资费标准 韵达快运服务价格参考国家邮政局网站公示的“快递企业价格查询系统”中韵达快运服务价格,具体的价格可向寄件地的韵达网点咨询。 第七条、信息保密 除依法配合国家安全、公安等机关需要外,工作人员不得泄漏和挪用客户及快件的相关信息。 第八条、安全保障 工作人员应通过各种安全措施保护快件的安全,同时在向顾客提供服务

时不得给客户造成危害。 第九条、公司对客户的快件可提供两次的免费投递服务。 第三部分损失赔偿 第十条、赔偿范围及赔偿主体 对客户的快件延误、遗失、破损、短少的,由发件公司对客户进行赔偿,但不对因此造成的间接损失承担赔偿责任。 第十一条、免责范围 对由于以下原因造成延误、遗失、破损、短少的,本公司不承担责任:(一)、发生不可抗力,如战争、暴乱、恶劣天气、重大疫情、坠机等严重灾害的; (二)、客户寄递的物品为法律法规所禁止寄递的; (三)、快件本身属性导致快件短少的; (四)、客户填写的收件人信息错误或者变更的造成快件延误的; (五)、依据客户要求或者约定造成快件投递超出服务时效的; (六)、其他的因客户或快件的原因导致的。 第十二条、赔偿标准 1.快件延误的,赔偿数额有约定的按约定赔偿;没有约定的,参照《快递服务》标准赔偿。 2.快件损毁、短少、遗失的,对未保价物品的损毁、短少、遗失,有约定的按约定赔偿;没有约定按实际价值赔偿,但最高不超过赔偿限额人民币伍佰元; 3.对保价的物品损毁、短少的,以实际损毁、短少的比例,按对应的保价金额进行赔偿,但不超出最高赔偿限额人民币拾万元;对保价物品遗失的,按保价金额赔偿,但不超出最高赔偿限额人民币拾万元。

相关文档
最新文档