Skip to main content

Home/ elearning 2.0/ Group items tagged examination

Rss Feed Group items tagged

Ihering Alcoforado

Digitisation Perspectives - Review | Subject Centre for Information and Computer Sciences - 2 views

  •  
    Book Reviews Book title: Digitisation Perspectives Type: book Author: Ruth Rikowski Year: 2010 Edition: 1st ISBN: 9460912982 Publisher: Sense Publishers Publisher's Description: This book examines various views and perspectives on digitisation. As Simon Tanner, Director Digital Consultancy, King's College London says in the Foreword: "Digitisation has become a cultural, scholastic, economic and political imperative and raises many issues for our consideration." Furthermore, that the book: "...seeks to address and answer some of the big questions of digitisation... It succeeds on many levels..." There are 22 contributors in the book, all experts in their fields. The book is divided into six parts: Part 1: 'Background and Overview to Digitisation and Digital Libraries' Part 2: 'Digitisation and Higher Education' Part 3: 'Digitisation and Inequalities' Part 4: 'Digital Libraries, Reference Services and Citation Indexing' Part 5: 'Digitisation of Rare, Valued and Scholarly Works' Part 6: 'Futuristic Developments of Digitisation' Topics covered include electronic theses, search engine technology, digitisation in Africa, citation indexing, reference services, the Scholarly Publishing and Academic Resources Coalition, new media and scholarly publishing. The final chapter explores virtual libraries, and poses some interesting questions for possible futures. The book will be of particular interest to information professionals, educators, librarians, academics and I.T. and knowledge experts. Ruth Rikowski concludes by indicating that: "...hopefully, the book will provide a source of inspiration for further research, leading to some more effective ways to proceed with the digitisation process. Also, that it will be possible to do this within a framework that can be used for good rather than ill, and for the benefit of many." Reviewer: Eric Jukes (Formerly of College of Haringey, Enfield and North East London) Book Rating: 5/5 Buy this book from Amazon  Review Summary
Fabin Bearil

Acquire Money Right Now With Effortlessly And Opportunely - 0 views

  •  
    Advance cash loans today are fleeting money advances and are otherwise called "loan". The tips for the compensation day credits incorporate examining loan fees and attempt to locate the most reduced rates, read every one of the terms and conditions without any delay.
Martin Burrett

Interactive Ear - 0 views

  •  
    Use this interactive online ear diagram to examine the workings of how we hear sound. You can embed the ear on to your website (much better that embedding a website in to your ear!) Found via @WengersToyBus http://ictmagic.wikispaces.com/Science
Raynor Plank

Doorstep Collection Loans- Get Quick Financial Aid At The Doorstep - 0 views

  •  
    Doorstep collection loans bring cash at the doorsill of the borrower when it is needed on simple procedures. It is fast, convenient and hassle free. But the borrower should carefully examine whether he can withstand the interest rate applied and repay the amount in time lest the deal will end up in big financial burden.
Allison Kipta

Flexknowlogy - 0 views

  •  
    "George Siemens posts frequently and with clarity on his blog elearnspace, and often I find myself nodding my head as I read or questioning my assumptions or bouncing around to other web sites as I hunt down reinforcing or contradicting information. Today I challenged a couple claims made in his posting, Explaining leads to information, which examines the past, present, and future roles of universities."
Mike Chelen

Resources - ccLearn - 1 views

  •  
    ccLearn is always on the look out for helpful and informative media championing the strengths of open educational resources. If you know of a good OER resource, helpful article, or interesting video, please let us know and we will examine it for inclusion. This page is constantly being updated, so be sure to come back and check out the latest information on open education.
James OReilly

Facebook Friends FriendFeed - 0 views

  • I’ve been using FriendFeed for awhile and if you subscribe to my feed you’ll see just about everything that I do online. My feed includes all the articles I bookmark with delicious. When I write a new blog post it automatically shares it on my feed. Every time I tweet on Twitter and when I update my status on Facebook, they’re included here. When I add a video to my favorites on YouTube it is shared here as well. Currently there are 58 different sites that you can link to your FriendFeed, so it’s like the one stop shopping place for everything online!
  • FriendFeed also has a search function where someone without even registering on the site, can easily search all FriendFeed updates.
  • Facebook has been in the news quite a bit this week which they started off with the announcement that they have acquired the social-identity aggregator, FriendFeed.
Evelyn McCormack

Blackberry Interruptus: Whatever Happened to Eye Contact? | School Communications 2.0 - 0 views

  •  
    Monica Hesse has a fun story in today's Washington Post that examines a trend in cultural disturbia - that of the Blackberry-interrupted conversation. Hasn't this happened to you too many times to count?
Allison Kipta

Plymouth e-Learning Conference 2010 - 2 views

  •  
    The 5th Plymouth e-Learning Conference will examine the theme of e-learning in a time of change, and will challenge notions of traditional boundaries, learning spaces and roles. We will focus on new practices, new technologies, new environments and new learning. There will be primary, secondary and tertiary education threads. We invite papers on the digital divide, e-learning methods and case studies, mobile and pervasive technologies, digital games, multi-user virtual environments, informal learning, new classroom technologies (PDAs interactive whiteboards, etc), personal learning environments, visual media (videoconference, digital photography), e-portfolios and social software (wikis, blogs, podcasting, etc).
cristina costa

Contemporary Art Iraq - Cornerhouse - 4 views

  •  
    "The first comprehensive UK exhibition of new and recent contemporary art from Iraq since the first Gulf War, examining practices that are emerging with fresh perspectives from a culture marked by conflict and turmoil. "
Travis Noakes

m4Lit Project - 0 views

  •  
    This is the research blog of a research project that examines the potential role of mobile phones in promoting reading and improved literacy in (South) African schools.
Dennis OConnor

What Do Students Learn Through Discussion? | Faculty Focus - 0 views

  •  
    A thoughtful look at why we use discussions in online classes. It's a good thing to examine our assumptions and return to first principals.  Enormously useful. 
Nigel Robertson

The dissonance between the constructivist paradigm and the implementation of ... - 26 views

  •  
    Great post from David Jones examining the difference between what we believe to be good practice in elearning and what institutions actually support (whether that support is explicit or not).
Allison Kipta

Characteristics of Technology-Based Virtual Learning Communities - 15 views

  •  
    "This article defines 'community' for educators and proceed to examine fundamental issues around new theories and practice for constructing learning communities. Our concept of community asks the reader not to consider the shape of institutions or "schools" that exist today, but to ponder some possible shapes for (virtual) learning communities that could exist tomorrow. Second, we discuss some foundational considerations from theoreticians preparing us to build these communities with technological support. Practical issues around building new communities are illustrated with examples of virtual community types - including examples of technologically supported learning strategies that fall far short of our definition of virtual learning communities. Finally, some tactics for building robust learning communities are offered."
Nigel Robertson

Implementing a Cost Effectiveness Analyzer for Web-Supported Academic Instruction: A Ca... - 6 views

  •  
    "This paper describes the implementation of a quantitative cost effectiveness analyzer for Web-supported academic instruction that was developed in Tel Aviv University during a long term study. The paper presents the cost effectiveness analysis of Tel Aviv University campus. Cost and benefit of 3,453 courses were analyzed, exemplifying campus-wide analysis. These courses represent large-scale Web-supported academic instruction processes throughout the campus. The findings were described, referring to students, instructors and university from both the economical and educational perspectives. The cost effectiveness values resulting from the calculations were summarized in four "coins" (efficiency coins=$; quality coins; affective coins; and knowledge management coins) for each of the three actors (students, instructors and university). In order to examine the distribution of those values throughout the campus assessment scales were created on the basis of descriptive statistics. The described analyzer can be implemented in other institutions very easily and almost automatically. This enables us to quantify the costs and benefits of Web-supported instruction on both the single-course and the campus-wide levels. "
Diana Rizzo

Siding Installations St Louis | Geissler Roofing Company Inc - 0 views

  •  
    The commercial siding experts at Geissler Roofing are more than siding installers, you can consider us your commercial exterior advisors. If you have a commercial building, we have a solution. We will carefully examine your project and present you with options that fit your needs and your budget.
Nigel Coutts

Slow Looking at Home or Doing More with Less - The Learner's Way - 0 views

  •  
    It seems that thanks to COVID19, educators, parents and students are in a rush. It seems the rush started moments after the decision was made to promote social distancing by offering remote learning. From quality learning in classrooms focused on deep learning we shifted into top gear. Packets of work were prepared, online tools rapidly expanded, new options for content delivery were examined and quickly deployed. We wanted to make sure that our students would be kept busy. Parents wanted their children to be busy. - Maybe slow looking is the solution?
Jaxon Smith

Geography Dissertation Help - Total Assignment Help - 0 views

  •  
    Our geography dissertation help allows you to examine the subject of the dissertation and construct a basic framework in your mind about the topic, and then converse with you to understand your point of views.
Antwak Short videos

Penetration Testing: How to perform Pen Test in Cybersecurity? - 0 views

  •  
    Penetration testing (PenTest) is the cycle to distinguish security weak points in an application by assessing the system or network with different malignant strategies. The weak areas of a system are exploited in this cycle through an approved simulated attack. The objective of this test is to get significant information from hackers who have unapproved access to the system or network. When the weak spot is distinguished it is used to misuse the system to access critical data. A penetration test is otherwise called the pen test and an outside contractor is likewise known as an Ethical hacker. The pen testing cycle can be divided into five phases: 1. Planning and Reconnaissance The first stage includes: Characterizing the scope and objectives of a test, involving the systems to be dealt with and the testing strategies to be used. 2. Scanning The subsequent stage is to see how the target application will react to different interruption endeavors. This is normally done using, Static analysis: Estimating an application's code to assess how it acts while running. These devices can check the whole of the code in a single pass Dynamic analysis: Inspecting an application's code in a running state. This is a more functional method of examining, as it gives an actual view into an application's execution 3. Getting Access This stage uses web application attacks, for example, cross-site scripting, SQL injection and backdoors, to reveal a network's weaknesses. Testers at that point attempt and misuse these weaknesses, commonly by escalating privileges, stealing information, intercepting traffic, and so on, to comprehend the harm they can cause. 4. Maintaining and securing access The objective of this stage is to check whether the weakness can be used to get a constant presence in the exploited system. The intention is to copy advanced persistent threats, which usually stay in a system for a long time to take an organisation's most critical information. 5
1 - 20 of 35 Next ›
Showing 20 items per page