Computer as a Catalyst for Change

In: Social Issues

Submitted By Mubarak121
Words 9206
Pages 37

Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Sara L. Dexter and Ronald E. Anderson University of Minnesota Henry Jay Becker University of California, Irvine This paper was published in the Journal of Research on Computing in Education. The citation for it is: Dexter, S., Anderson, R. E., & Becker, H. J. (1999). Teachers’ views of computers as catalysts for changes in their teaching practice. Journal of Research on Computing in Education, 31 (3), 221239. Abstract: In this study we examined the use of computers by teachers in their instructional practices and their perception of the impact of computers on changes they have made to their classroom practice. These data draw from 47 teachers from 20 K-12 schools across 3 states who each completed a questionnaire, participated in 3 semi-structured interviews, and allowed 3 observations of their classroom. The teachers who had adopted more progressive teaching practices over time felt computers helped them change but they did not acknowledge computers as the catalyst for change. Instead, they cited catalysts that included: reflection upon experience, classes taken, and the context or culture of the school. We conclude that in order for teachers to implement the use of educational technology in a constructivist manner, they must have opportunities to construct pedagogical knowledge in a supportive climate.

Research funded by the program of Research on Education Policy and Practice at the National Science Foundation and the Office of Educational Research and Improvement, U.S. Department of Education. NSF Grant # REC-9600614

Teachers’ views of computers as catalysts


Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Many educators and policy makers believe that technology can be a catalyst for educational reform (Collins, 1991; Means, Olson,…...

Similar Documents


...Accountability and Ethics Computer Addiction and Cyber Crime Nick Nykodym The University of Toledo Sonny Ariss The University of Toledo Katarina Kurtz The University of Toledo This research explores the relationship between computer addiction and cyber crime. There is evidence of computer addiction in medical settings, scholarly journals and legal proceedings. Reviewing the history of computer addiction has shown that computer addiction can be related to cyber crime. This paper will define computer addiction, show how various cyber crimes, especially those against businesses and organizations, can be motivated by computer addiction and propose further research on how managers can deal with cyber crime in a business, by recognizing addictive behaviors and computer addiction in their employees. HISTORY OF COMPUTER ADDICTION Computer addiction is an idea that has been in existence for years. Since the 1970s, avid computer programmers and hackers have been called “addicts” by both psychologists and the general public (Reed, 2002, p. 135). In 1976, Weizenbaum wrote about computer programmers who could sit and work at their computer terminals for twenty or thirty hours at a time. This behavior however, was viewed at the time as useful to technology and society. Computers, once seen as huge government machines that only very knowledgeable people could use, transformed into user-friendly tools that could be used by the everyday person. It became more common to see computers in......

Words: 3633 - Pages: 15

Computers: Communication and Education Catalyst or Inhibitor?

...Computers: Communication and Education Catalyst or Inhibitor? The introduction of computers to the educational system of present day launched a new era of both education and communication for high school students. What was once thought of as the future has been made today’s normality. However, with this new influx of technology and freedom of the net comes a change in the way that our brains process information in both education and communication. Computers are utilized as a tool for teaching high school students and the students in turn use this tool for communication on a world-wide base. At the core of this technological, educational, and communicational juggernaut is the realization that isolated facts and data that computers provide do not create meaning by themselves; as a result the education and communication skills of today’s high school students are suffering. High school students of today are utilizing computers today more than ever; this new fascination with a cyber spaced form of contact is leading to a lack of face-to-face communication skills through the effect of a shorter attention span. According to Greenblatt, “human beings have always found it hard to sit alone and remain focused,” and the internet has made this problem exponentially worse for many. He says that it is becoming a common occurrence for people to state that they are no longer able to concentrate on one thing for a significant amount of time. In a 2003 San Jose State University study, it...

Words: 1394 - Pages: 6


...Change. Some thrive on it, while others resist it. Why is it that two individuals can look at the same thing and think totally different thoughts? Half full, half empty so to speak. Some see possibilities and some see consequences, some see change as essential, while others fear the worst. Reluctance seems to predominate wherever changes require movement into the unknown, and is a very natural reaction. Proposed change signifies the loss of something familiar or comfortable, and it takes time to work through this process, but it's also important to move people forward and get them involved in the new change and working toward positive goals for the future. Understanding of resistance to change, most people are likely to put up several barriers to change, often without recognizing that they are forming these barriers. Emotion is always a part of change, both positive and negative. Attitudes towards change result from a complex interplay of emotions and cognitive processes. Because of this complexity everyone reacts to change differently. On the positive side, change is seen as a kin to opportunity, rejuvenation, progress, innovation, and growth. But just as legitimately, change can also be seen as a kin to instability, upheaval, unpredictability, threat, and disorientation. Whether employees perceive change with fear, anxiety and demoralization, or with excitement and confidence, or somewhere in between, depends partially on the individual's psychological makeup, partially......

Words: 898 - Pages: 4


...Title: Windows: How to manually remove a computer from the Princeton domain Synopsis: How to manually remove a computer from the Princeton domain Solution: Reasons why you should remove their Windows machine from the PRINCETON domain if you are leaving the University (for faculty, staff and all students): • Windows machines can only be joined to one domain at a time. After you leave Princeton, and you attempt to join your machine to another Windows domain, you would not be able to, unless the computer is first removed from the PRINCETON domain. Once joined to another domain other than Princeton, it becomes difficult to retrieve files or other information stored locally under your Princeton\netID domain account. • Once away from the Princeton network, your machine may at some point stop allowing you to log in with your PRINCETON windows credentials. This would additionally make it difficult to retrieve files or other information stored locally under your Princeton\netID domain account. • If you continue to attempt to log in to a domain profile and you one day forget your password, there is no way to reset that password (there is no local account associated with it). ________________________________________ Windows Manual Instructions The following is the process to manually remove your computer from the domain. Section One: Create a new user profile 1. Open the Start Menu and Right click Computer and Click Manage. 2. Expand Local Users and Groups......

Words: 1618 - Pages: 7

Office Technology and Management: a Catalyst for Students' Self-Reliance

...Office Technology and Management: A Catalyst for Students’ Self-reliance. ABSTRACT This paper discusses office technology and management as a catalyst for students’ self-reliance.  The core of the paper is that when students who are considered future leaders are empowered, it subsequently leads to the social, economic and political growth and stability of any nation.  Office technology and management formerly known as secretarial studies is proffered as the catalyst education for students’ self-reliance based on all spheres of human endeavour.  It guarantees prompt and decent employment for students who have competent secretarial skills.  Students, after graduation could also go entrepreneurial to establish small-scale businesses of different types. INTRODUCTION In the national development equation, education remains the fulcrum upon which other indices of national development revolve.  It is no doubt, that office technology and management education is one of the disciplines that train students for self-reliance and self-sufficiency.  The level and quality of education collectively attained in a given society determines the extent to which other factors of development are exploited for the advancement of that society.  Office technology and management creates awareness, develops the potentials in man to subdue and harness the resources in his environment for the betterment of himself and his society. Education according to Boladele (2002) is a process of acculturation......

Words: 3704 - Pages: 15

Catalysts and How They Work

...Catalysts and How They Work How do they work? A common misconception is that catalysts lower the activation energy of a reaction, whereas really, they are using an alternative route of the reaction in order for the bonds of the reactant to be broken with a lower activation energy. The way catalysts situate this ‘alternative route’ is by binding to the reactant molecule and changing the electron configuration so that there is high electron density near the bond that are trying to be broken. As electrons have a -1 charge, they repel when within close proximity. The electromagnetic force then causes these electrons to repel, therefore breaking the bond at a lower activation energy level by using an ‘alternative route.’ An effective, yet simple analogy can be used to describe the way catalysts work, for example, take a steep, curved hill like the shoddy one you see below. The hill has a road starting from the foot of the left side and finishing on the foot of the right side of the hill. There is also a tunnel running through the hill. A car can go over the hill, resulting in the same finishing point as the tunnel despite taking longer and using more energy. The car could use the alternative catalyst route, which enables it to get from one side to the other in a shorter time period, without using as much energy. The reactant, the car in this case will always have the tunnel, the catalyst to use, as during reactions catalysts remain unchanged throughout the......

Words: 562 - Pages: 3


...composite metric E.) Can load balance IP RIP is a distance vector protocol, it can load balance up to 4 equal cost paths and it's rating of trustworthiness is 120. The correct answer(s): A Which of the following is a layer 2 device? A.) Switch B.) Router C.) Repeater D.) Hub A Hub and Repeater are layer 1 devices. A Router is a layer 3 device. The correct answer(s): C Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises Demarcation is the point in which repsonsibility changes hands. The correct answer(s): B C E Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verify connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured CDP is used for 2 basic reasons; neighbor connectivity and layer 3 discovery if configured. It is proprietary and is on by default. The correct answer(s): A C E Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric IPX RIP is a distance vector routing protocol, it......

Words: 23850 - Pages: 96

A Computer

...A computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem. Conventionally, a computer consists of at least one processing element, typically a central processing unit (CPU), and some form of memory. The processing element carries out arithmetic and logic operations, and a sequencing and control unit can change the order of operations in response to stored information. Peripheral devices allow information to be retrieved from an external source, and the result of operations saved and retrieved. Contrary to popular belief, computers existed from antiquity. Any tool used for calculation could be referred to as a computer. The earliest computers were tally sticks in use since around 20,000 BC. Mechanical analog computers started appearing in first century and were used in medieval era for astronomical calculations. In World War II, mechanical analog computers were used for specialized military applications. During this time the first electronic digital computers were developed. Originally they were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to......

Words: 292 - Pages: 2

Pain&Suffering-a Catalyst for Faith

...LIBERTY UNIVERSITY THEOLOGICAL SEMINARY Pain and Suffering: A Catalyst for Faith Submitted to Dr. Donald Clark, in partial fulfillment of the requirement for the completion of this course. SEMI 500-B25 LUO Introduction to Seminary Studies by Randy Boyd September 28, 2014 Contents Introduction 1 Part 1. How Can Pain and Suffering be Necessary? 2 Chapter 1. Where pain comes from. 2 Chapter 2. Why pain and suffering are necessary. 3 Part 2. How Can We Respond to Pain and Suffering? 4 Chapter 3. Walking Through Pain and Suffering. 5 Chapter 4. Avoiding Pain and Suffering 6 Part 3. How Can Pain and Suffering Build Faith? 7 Chapter 5. Satan Uses Pain and Suffering to Create Doubt. 8 Chapter 6. God Uses Pain and Suffering to Build Faith. 8 Conclusion ...

Words: 3888 - Pages: 16

How Computers Change the Way We Think

...How Computers Change the Way We Think By SHERRY TURKLE The tools we use to think change the ways in which we think. The invention of written language brought about a radical shift in how we process, organize, store, and transmit representations of the world. Although writing remains our primary information technology, today when we think about the impact of technology on our habits of mind, we think primarily of the computer. My first encounters with how computers change the way we think came soon after I joined the faculty at the Massachusetts Institute of Technology in the late 1970s, at the end of the era of the slide rule and the beginning of the era of the personal computer. At a lunch for new faculty members, several senior professors in engineering complained that the transition from slide rules to calculators had affected their students' ability to deal with issues of scale. When students used slide rules, they had to insert decimal points themselves. The professors insisted that that required students to maintain a mental sense of scale, whereas those who relied on calculators made frequent errors in orders of magnitude. Additionally, the students with calculators had lost their ability to do "back of the envelope" calculations, and with that, an intuitive feel for the material. That same semester, I taught a course in the history of psychology. There, I experienced the impact of computational objects on students' ideas about their emotional lives. My class...

Words: 2653 - Pages: 11


... Vendor/Manufacturer | Model No. | Price | Available from (website) | Cisco | SG220-50P | 979.99 | | Cisco | SF220-48 | 290.32 | | Cisco | SG220-50 | 429.99 | | 4. Large enterprise of 5000 employees that uses a Class A address with subnets for each department and for each subdivision within each department (e.g., many subnets). Subdivisions must be able to communicate with each other; some departments need to communicate with each other. This company is located on a campus in several buildings. Vendor/Manufacturer | Model No. | Price | Available from (website) | Cisco | DS-X9448-768K9 | 18,900 | | Cisco | Catalyst 6900 | 9,999 | | Cisco | WS-X6904-40G-2T | 7,895 | | Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced or on this completed worksheet. Label your assignment Unit 5 Assignment 1. This assignment is due at the beginning of Unit 6....

Words: 340 - Pages: 2


...Computers, of course, can play a helpful role in an educational system of self-reliant independent learners. Over the next 20 years computers will significantly supplement books as a source of information. Computers will supplement teachers as a source of instruction, testing, and feedback. Computers will become individual tools, as pencil and paper are today, to aid in the learning and problem solving process. But the student as self-reliant and as an independent learner is not dependent on computers, and progress towards such goals can occur in the absence of computers. Thus, each reader of this essay can help to improve education. If you are a parent, interact with your children to help them become more self-reliant and independent learners. If you are an educator, stress this idea when working with students and other educators. And don't forget to do the same thing for yourself. If you feel the need to learn more about computers or some other topic, decide for yourself what you want to learn, why and how. Set your own standards for measuring whether you have gained the skills and knowledge you seek. For me a clear picture emerges from the type of analysis given above. The educational environment can be improved, and educational goals and requirements can be changed. Computers will play an increasing role as change agent as well as within the curriculum. But far bigger improvements are possible if we can help students to take increased responsibility for their own......

Words: 259 - Pages: 2


...ages before, when there were no computers or any other technologies. So much we have advanced that now every information is just a click away and is in your hands 24/7. All this advancement was possible only with the introduction of a small device called the “Computer”. Computers Image Curtsey: Basically, computer is a device that accepts the message by the imputer and processes this message and stores the information at the storage devices and later gives an output of the message through the output devices. A simple explanation of the computer. Normally, a computer consists of a processing unit called the Central Processing Unit or the CPU and a form of memory. In the years between 1940 and 1945 were the first electronic digital computers developed. The initial sizes were as big as a room and consumed power as much as today’s personal computers. Initially, computer was related to a person who carries out calculations or computations and as such the word computer was evolved in 1613 and continued till the end of 19th century. Later it as re-described as a machine that carries computations. The early computers were limited in their functions. It was the fusion of automatic calculation and programmability that produced the first computers that were recognized in 1837. Charles Babbage in 1837 was the first to introduce and design a fully programmed mechanical computer, his analytical engine. Due to......

Words: 999 - Pages: 4

Computer Ethics

...Computer Ethics-NDex Danielle E. Maire-Jackson IS535ON: Managerial Applications of Information Technology 12-5-10 Professor McElyea TABLE OF CONTENTS I. Definition of Computer Ethics 3 II. Background of NDex 4 III. Discussion of Business Issues 5 IV. Proposed Solution 6 V. Recommendations for the Executive Committee 8 VI. References 11 I. DEFINITION OF COMPUTER ETHICS “Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society”. (Brotman, 2001). Ethics vary from one individual to another. Laws are written rules that govern. Ethics and information services have become very important. Computer ethics are key in today's modernized world. Social rights and the computer. This is really saying or giving you rights. For example, right to privacy. This allows your personal information to be kept just what it is, personal. Right to computer access, right to computer skills, etc. (Gorniak-Kocikowska, 1996). Code of ethics states what conduct is allowed and what is not allowed. There must always be a plan on how to maintain ethical practices in the business world. Many times people have valuable information to be stored into computer systems and therefore we...

Words: 2376 - Pages: 10


...continually venture down the same road of unhappiness. Never willing to change. As you take a birds eye view of your current lifestyle, do you like what you see? Are your relationships, career choices, financial situation and other aspects of your life truly satisfying? Or do you feel there should be more? While most of us have moments of joy, they are usually overshadowed by hours, days and even years of affliction. Stress, depression, heartache and overall anxiety are human nature. But it doesn’t have to be the case for you. You deserve to have the best life possible. The good news? Change is also a part of human nature. In fact, I believe there is an unwritten rule of life stating that the only constant is change. Put in other words, nothing will ever stay the same. This is a huge concept. The reason this is significant for you? Your life is going to change. But it is completely up to you which direction you will take your life when these inevitable changes approach. Will you choose to stay on your current melancholy life direction? Or will you rise up and pursue a life of fulfillment and happiness? The ball is in your court. 1. Get Disturbed We must become the change we want to see. ~ Mahatma Gandhi Enough is enough! When deciding you want change in your life, you must truly get upset with your current situation. Your emotions are very powerful. And you’ll find that by using this energy as a catalyst for change, your desired life will be within your grasp. Whatever......

Words: 924 - Pages: 4