Skip to main content

Home/ elearning 2.0/ Group items tagged examples

Rss Feed Group items tagged

Leo de Carvalho

eLearn: Case Studies - Group Discussion in Online Statistics Courses - 0 views

  • However, one main advantage about using discussion groups in the online environment is that the instructor can witness the full evolution of a group's discussion.
    • Leo de Carvalho
       
      uma das vantagens de grupos de discussao é que o instrutor fica consciente de toda a evolucao da discussao do grupo.
  •  
    In this article, Michelle Everson summarized her attempt to use small-group discussion assignments in an online introductory statistics course. She have found that these assignments can be successful, and they can lead to opportunities for students to reason more about statistical concepts and help each other learn important course material. When using such assignments, we would encourage instructors to (1) create assignments that do not have just one "right" answer so that students have ample opportunities to discuss different ideas and respond to what their group members post, (2) allow several days for students to work on the assignment, (3) provide students with clear guidelines for every assignment so they know exactly what they need to do as a group, (4) provide incentives for students to post not only their own thoughts, but respond to what their group members have said, and (5) provide students with examples of what it means to reflectively respond to their peers. Most of all, we would encourage instructors to make their presence known to the discussion group during every discussion. Assure students that you will be there in order to make sure everyone is on the right track, and take whatever opportunity you can to cheer the group on, highlight important ideas that different members of the group have posted, and question the group in order to get them to think more critically about the material.
Martin Burrett

App Inventor for Android - 0 views

  •  
    Help your students make their own Android apps with this useful tool from Google Labs. The site comes with some good tutorials and guides with example projects. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Martin Burrett

What makes you - Photo cube - 0 views

  •  
    Make a photo cube which can also play music and videos. Create and embed on your site. See my example at http://www.whatmakesme.com.au/whatmakesus/cube/3169 http://ictmagic.wikispaces.com/Photos+%26+Images
Martin Burrett

pageOrama - 0 views

  •  
    I love simple and functional sites and this is a good example. Post text, images tables and links to make an instant editable webpage with a customised url. Great for posting homework and lesson notes. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
John Onwuegbu

Special Report: Real-life Examples of Killer App Marketing | Questechie - 2 views

  •  
    Find your inspiration by looking at what leaders in the industry have done to drive revenue, engagement, and conversions from their apps.
tutorials-plane

codeigniter tutorials Archives - Tutorialsplane - 0 views

  •  
    Learn web development with easy step by step guidelines with complete Syntax and example. Live testing editor for testing your code
Martin Burrett

Non-Examples - 0 views

  •  
    "An online maths resource where you choose a topic than choose the old one out from the three options. Topic include angles, odds and evens, fractions, primes, shapes and more."
Martin Burrett

WW1 Coding Project ideas - 0 views

  •  
    8 Child-friendly coding projects with examples on Scratch
eidesign

4 Examples On How To Use Migration From Flash To HTML5 To Enhance The Impact Of Your eL... - 0 views

  •  
    As adoption of mLearning (or mobile learning) increases, organizations need to migrate their legacy Flash eLearning courses to HTML5. In this article, I highlight how you can use this opportunity to enhance the impact of your online training.
iamsuraj

Online learn tutorials for  PHP, Javascript, Laravel, Cakephp, Mysql tutorial... - 0 views

iamsuraj.in contains lot of live examples here so that students can easily to apply in their project and keep their knowledge up to date. So if you want to become a good developer here is the platf...

php laravel framework online learn programming

started by iamsuraj on 25 Feb 20 no follow-up yet
Martin Burrett

If Technology Fails, Use Basic Math Skills - Count Manually!! by @johnkaiser13 - 0 views

  •  
    "Technology has inevitably been inserted to nearly all aspects of our lives today. First and foremost, the use of computerised cash registers have been around for a few decades now. Trying to remember cash registers which operated without a digital display might be nearly impossible. The generation which might be able to do so has been replaced with a new generation who depend on technology to a large degree. The dependence on new technology is starting to 'show signs' of the effect of converting from our analogue counterparts. Below is an example that I recently experienced the effect of technology in a transaction at a doughnut shop."
Antwak Short videos

What is Cyber Threat Intelligence? - 0 views

  •  
    Cyber threats aimed at business are identified by Threat Intelligence. IT specialists and complex tools can read and analyze the threats. This information is utilized to plan, forestall, and recognize cyber threats hoping to exploit important organization's assets. Threat Intelligence collects and compiles the raw data about the threats emerging from different sources. Cyber threats can be truly terrifying. Cyber threat knowledge can help associations obtain important information about these threats, build successful defense equipment and relieve the threats that could harm their reputation. People often get confused with Cyber Security terms such as Threat Intelligence and Threat Data. Threat data is a list of likely threats. For instance, Facebook feeds are like a running list of possible issues. It is Threat Intelligence when IT specialists and exclusive complex tools can read and analyze the threats/attacks. Why is threat intelligence important for businesses? Threat Intelligence is a vital part of any cybersecurity. A cyber threat intelligence program sometimes called CTI, can: Prevent data loss With a very much organized CTI program set up, your organization can spot cyber threats and keep data breaches from leaking critical information. Give guidance on security measures By distinguishing and dissecting threats, CTI spots designs utilized by hackers. CTI assists organizations with setting up security standards to protect against future cyber assaults and threats. Educate others Hackers are smarter than before. To keep up, cybersecurity specialists share the strategies they've seen with the IT people group to make a communal database to battle cybercrimes and cybersecurity threats. Kinds of Threat Intelligence The four kinds of threat intelligence are strategic, tactical, technical, and operational Strategic cyber threat intelligence is generally dedicated to a non-technical audience. It utilizes nitty-gritty analyses of patterns and arising t
Antwak Short videos

Penetration Testing: How to perform Pen Test in Cybersecurity? - 0 views

  •  
    Penetration testing (PenTest) is the cycle to distinguish security weak points in an application by assessing the system or network with different malignant strategies. The weak areas of a system are exploited in this cycle through an approved simulated attack. The objective of this test is to get significant information from hackers who have unapproved access to the system or network. When the weak spot is distinguished it is used to misuse the system to access critical data. A penetration test is otherwise called the pen test and an outside contractor is likewise known as an Ethical hacker. The pen testing cycle can be divided into five phases: 1. Planning and Reconnaissance The first stage includes: Characterizing the scope and objectives of a test, involving the systems to be dealt with and the testing strategies to be used. 2. Scanning The subsequent stage is to see how the target application will react to different interruption endeavors. This is normally done using, Static analysis: Estimating an application's code to assess how it acts while running. These devices can check the whole of the code in a single pass Dynamic analysis: Inspecting an application's code in a running state. This is a more functional method of examining, as it gives an actual view into an application's execution 3. Getting Access This stage uses web application attacks, for example, cross-site scripting, SQL injection and backdoors, to reveal a network's weaknesses. Testers at that point attempt and misuse these weaknesses, commonly by escalating privileges, stealing information, intercepting traffic, and so on, to comprehend the harm they can cause. 4. Maintaining and securing access The objective of this stage is to check whether the weakness can be used to get a constant presence in the exploited system. The intention is to copy advanced persistent threats, which usually stay in a system for a long time to take an organisation's most critical information. 5
Martin Burrett

Webinar: Supporting Special Needs Students with eBooks & Audiobooks - 0 views

  •  
    In this webinar, expert in eBooks Meredith Wemhoff discusses ways to engage and support learners with special needs using eBooks and audio. Using the case-study of an independent all-boys school located in Surrey, the school provides special needs students an opportunity to succeed and thrive. Many arrive to the 80-year-old institution with low self-confidence, often due to struggles they faced in traditional educational institutions caused by learning and language difficulties. This means providing a collection that meets the individual learning needs of the school's 470 students, who range in age from 8-18. ​​​​​​​ During this eye-opening webinar, Meredith will share the story of selecting, launching and promoting a digital library service that helps address learning challenges. Attendees will come away with best practices for bringing ebooks and audiobooks to their school and real-life examples of these practices in action. Don't miss out, register today!
Antwak Short videos

The Future of Work - 0 views

  •  
    How are current socio technological changes impacting the future of work? New technology, global trends, and the effect of Covid-19 on the job force have fundamentally altered the way firms operate and the kinds of expertise their workers require to compete in this emerging period of employment. Despite the fact that we cannot foresee what the future has in store, certain adjustments are inevitable. You must brace for such developments as a forward-thinking professional or aspirant. Gig Economy Gig Economy: The term 'gig' refers to a job model in which contractors are recruited and paid on a project-by-project basis. Gone are the days of doing a strap task from 9 a.m. to 5 p.m. The gig economy helps people to save multiple hours per day to make the most of the one and only scarce asset that they have time. Employee Well-Being Employee Well-Being is the topmost priority: While more people are operating remotely for extended periods of time, organisations can concentrate on ways to improve relationships and reduce mental tension. As organizations adapt, building mentally healthy workplaces will become even more relevant and complex. Also, working remotely and loneliness could have a detrimental impact on workers' mental wellbeing. Employee morale will suffer if they are not in good health. Several anal believe that employers will put a stronger emphasis on mental wellbeing and employee welfare. Intuitive and Appropriate Strategy Intuitive and Appropriate Strategy: Although meetings through online platforms like Zoom and Google Meet have been a constant throughout the pandemic but this restricted mode of communication the essence of being connected to colleagues and friends has indeed been cruelly exposed. As a result, software companies often rose to the situation, implementing innovative methods to ensure workers involved when working remotely. Nvidia, for example, has prioritized human speech over the context of video calls, resulting in substantial data s
Antwak Short videos

What is Identity and Access Management? - 0 views

  •  
    IDENTITY AND ACCESS MANAGEMENT Identity and access management (IAM) is a collective term that covers merchandise, processes, and policies for managing user identities and regulating user access in the company. Access and User are two very important IAM theories. Access refers to the permission or authorization given to access a file (read, create or modify a doc). Users can be employers, auditors, suppliers, contractors or customers. How Identity and Access Management works IAM systems are intended to perform three key undertakings: identity, authenticate, and authorise. This means, just the right people ought to access PCs, equipment, software applications, any IT assets, or perform certain tasks. IAM components forming up an IAM system include: 1. A data set containing users identities and access privileges. 2. IAM instruments for creating, observing, modifying, and deleting access advantages. 3. A system for inspecting login and access history. 4. The list of access privileges needs to be updated including new entry users and for users whose roles are ever-changing. 5. IAM works generally fall under IT divisions or sectors that handle Cybersecurity and data management. Examples of Identity and Access management Here are instances of IAM at work. When a user tries to log in to the system, the system checks his identity with the data saved in the database. Once the user is identified after authentication as the right user, he's permitted to post his work. A person who works as a contributor to content management has full access to make changes in the database. A production operator can see an online work process however may not be permitted to modify it. Through IAM, specific clients in the association are permitted to access and deal with sensitive data. And if there's no IAM, anybody (like unauthorised ) could get to confidential organization records, prompting a potential data breach. In this viewpoint, IAM assists organizations with meeting rigid
poundmaster

educational webistes - 1 views

hey! very attractive website for students are online calculators or any converters, they are very useful, because they have explanation of problem with examples, that's why is very high possiblity ...

amazing converter measurement learning Elearning E-learning resources

started by poundmaster on 12 Jan 21 no follow-up yet
Nigel Coutts

Supporting students in uncovering complexity - The Learner's Way - 0 views

  •  
    One of the thinking moves that we hope our students will confidently engage with is centred around the disposition of uncovering complexity. As we endeavour to shift our students towards a deeper understanding, the capacity to uncover complexity is a vital step. However, the ability to uncover complexity is itself complex and an excellent example of a skill that is best achieved when considered as a disposition. 
Tesseract Learning

3 Training Scenarios Where Microlearning Fits Best With Examples - Tesseract Learning - 0 views

  •  
    Microlearning can be implemented as a pre-training solution to get familiar with the subject or as a post-training refresher. In this article, I will share 3 scenarios where microlearning fits best.
« First ‹ Previous 61 - 80 of 130 Next › Last »
Showing 20 items per page