Free Essay

Hole in the Wall

In: Social Issues

Submitted By agrandey
Words 6338
Pages 26
Page 1
Acquisition of computing l iteracy on shared public computers:children and the “hole in the wall”
Sugata Mitra, Ritu Dangwal, Shiffon Chatterjee, Swati Jha, Ravinder S. Bisht and Preeti
Kapur
Centre for Research in Cognitive Systems
NIIT Limited
Synergy Building
IIT Campus
Haus Khas
New Delhi 110016
India
Webmaster’s e-mail: himanshut@niit.com
Website: www.niitholeinthewall.com
Abstract
Earlier work, often referred to as the "hole in the wall" experiments, has shown that groups of children can learn to use public computers on their own. This paper presents the method and results of an experiment conducted to investigate whether such unsupervised group learn ing in shared public spaces is universal. The experiment was conducted with "hole in the wall" (minimally invasive education, or
MIE) computers in 17 locations in rural India. Focus groups in each location were tested for computer literacy for 9 months.
Results, which are discussed in the paper, show that groups of children can learn to use computers and the Internet on their own, irrespective of who or where they are.
It is further observed that such group self -instruction is as effective as traditional classroom instruction.
At the same time, such learning is considerably less expensive and independent of teachers and schools.
The results point to a new pedagogy for children’s education in those circumstances where schools and teachers are either absent or not effective due to any reason.
Introduction
Current research on computers in education is, generally, on the influence and consequences of computers in the school settings that are characterized by direct instructional methods of the last century. These methods are effective in structured teaching systems where all students try to achieve a common goal. These methods consist of drill, practice, fixed ways of assessment, rote memory, passing
Page 2 on of established knowledge areas to students and examinations. While these methods are effective in the hands of good educators and schools, they have severe limitations of scalability and quality. Good schools are expensive, unviable and difficult to build in remote areas. Good teachers of computers and
Information Technology are unlikely to exist or move to rural and other remote areas. Good teachers are rare and expensive and this trend is likely to continue. At the same time, computers are, and will continue to be, more functional, cheaper and faster. It is necessary to assess how computers, as a pedagogic mechanism, can help provide equal opportunity and the required context to children from all types of socioeconomic and cultural backgrounds to learn and achieve basic levels of literacy and education. The present paper is about the acquisition of computer literacy in children in the age group of 6-14 years, it puts forward the following hypothesis, ‘if given appropriate access and connectivity, groups of children can learn to operate and use computers w ith none or minimal intervention from adults”.
The paper is in two sections:
- It evaluates the results of experiments carried out in 17 locations all over India, where 48 computers have been placed in urban slum and rural India. Findings indicate that computers can play an effective role in ensuring equal learning opportunity for the less advantaged children, thereby impacting the socio-economic development of any country in the world.
- It compares the computer literacy of self-taught children to students who gain formal computer education by conventional and structured classroom, teacher centric instruction delivery systems. The “hole in the wall” and Minimally Invasive Education
Many studies indicate that children benefit from exposure to computers as they use it for multiple purposes. Clement (1999) observed that computers give children opportunities that cannot be offered in the physical world. In other words, technology offers children unique intellectual experiences and opportunities. Children have the opportunity to complete a given task on their own thus they have the chance to develop their thinking skills (Papert, 1980).
Minimally Invasive Education (MIE) is a pedagogic method, and derives its name partly from the medical term minimally invasive surgery (Mitra and Rana 2001, Mitra 2003). The idea of MIE crystallized over a period of time based on observations and educational experiments conducted at NIIT.
The experiments were first conducted in Kalkaji, a suburb of New Delhi, India. A computer was connected to the Internet and embedded into a brick wall near a slum. The media often describes this experiment as “the hole in the wall”. It was reported that most of the slum children were able to use the computer to browse, play games, create documents and paint pictures within a few days. Thus, it was observed that, even in the absence of any direct input, mere curiosity led groups of children to explore, which resulted in learning. This, coupled with minimal input from peers, or from anyone familiar with computers, helped the children learn more.
This le ads us to believe that any learning environment that provides an adequate level of curiosity can cause learning among groups of children. Children's desire to learn, along with their curiosity and peer interaction, drives them to explore the environment in order to satisfy their inquisitiveness. As the children explore their environment, they relate their new experience with their previous experience and thereby new learning takes place (Frontline World 2002, Education Guardian 2000, Businessweek
Online 2000, Mitra 2000, Mitra 2003 and Wullenweber 2001). Hence, we define MIE as a pedagogic method that uses the learning environment to generate an adequate level of motivation to induce learning in groups of children, with none or minimal intervention from a teacher. In MIE, the role of the
Page 3 teacher is limited to providing, or guiding learners to, environments that generate adequate levels of interest. A known example of MIE is the type of learning that takes place when an appropriate puzzle is given to children with little or no input from others. The computer itself is capable of generating such intervention from time to time.
The original hole in the wall of 1999 has evolved into a brick structure with computers embedded in it.
In the rest of this paper we will refer to this arrangement as "Minimally Invasive Education Learning
Stations" (MIE learning stations). These have been set up in 22 rural and urban locations across India and similar results are reported through field observations as well as through a GUI Icon Association
Inventory test (Mitra 2003) administered to children. Observations across locations show a learning process of random exploration, collaboration, discovery, vocabulary construction, generalization, practice and peer tutoring (Inamdar, P. (2004).
Minimally Invasive Education (MIE) is based on a paper (Mitra, 1988) that speculated that children can learn to use a computer on their own. Empirical research for five years (Mitra, 1999; 2000, 2001, 2003,
2004) substantiated this speculation. It is an approach that promises to bridge the “digital divide” by helping diverse populations achieve computer literacy. MIE is also a concept of important consequences to the area of education in general. “Minimally invasive” refers to the least possible, negligible, or the minimum help required by the child to initiate and continue the process of learning basic computing skills. This minimal amount of help from other children at the MIE learning station is necessary and sufficient for the children to become computer literate. This “help”, which is the fundamental aspect of
MIE, could be from peers, siblings, friends, or any other child familiar with computers. Children are found to collaborate and support each other. The learning environment is characterized by its absence from adult intervention, openness and flexibility. Children are free to operate the computer at their convenience, they can consult and seek help from any other child/children, and are not dictated by any structured settings. It is observed that children tend to rely upon themselves to generate the necessary learning environment, and to organize themselves for learning. It is to be noted that MIE learning stations are located in safe, open public spaces and are easily accessible to children. They have been designed for use by children (Mitra 2004).
MIE experiments are located in urban slum and rural India. This has resulted in a design for MIE learning stations that address issues of access to technology, financial resources, and cost constraints.
India has problems of poverty, illiteracy, inadequate infra structure, diversity of socio-cultural communities, of varied socio-economic status, spread over a large geographical region.
Page 4
Figure1: A MIE learning station at Village D.Salhundi, Karnataka, India.
MIE experiments clearly indicate that children are able to learn to use computers and the Internet on their own, irrespective of their social, cultural or economic backgrounds (Mitra and Rana, 2001, Mitra
2004). The diversity of Indian conditions is, ironically, useful for applying these results anywhere in the world. Present study
Salient features of children at MIE learning station
The 22 locations where MIE learning stations exist range from the Himalayas to the tip of the Indian peninsula (North to South) and from the Rajasthan deserts to the Ganges Delta (West to East). Of the 22 locations studied in India, children frequenting MIE learning stations are in the age range of 6-14 years, with a mean of 10-11 years. Majority of these children study at the elementary school level (below grade 8). Most are students of government schools. They come from diverse ethnic and cultural backgrounds, and have different first languages such as Hindi, Tamil, Kannada, Marathi, and Bengali.
Most have a rudimentary understanding of the English language. They are typically Hindus, Muslims, and Christians. Within a given community, as is often the case in rural India, they are differentiated by caste. Page 5
The background of the parents is equally diverse; from daily wage labour to farmers, shop owners, autorickshaw drivers, working in cottage industries or in a government organization etc. Men are found to be more educated (8th grade), while the womenare mostly illiterate.
In order to study the impact of MIE learning stations on computer literacy amongst children, we have considered experimental or focus groups, frequent users and control groups from different states. We have clubbed the states into four zones, each zone consisting of a particular state.
South Zone 2 States – Karnataka & Tamil Nadu
North Zone 3 States – Uttaranchal, Jammu & Kashmir, Uttar Pradesh
East Zone 1 State- West Bengal
West Zone 2 States – Rajasthan & Maharashtra
a. Experimental or focus group s – 15 children from each location (except for one location, where the experimental group consisted of 10 children) were selected randomly to be part of this group. For this study, the experimental (focus) group consisted of a total of 250 children from
17 locations. The Icon Association Inventory (IAI), a measure of computer literacy (Mitra
2003, 2004 and described below ) was administered at regular intervals to the focus group.
b. Frequent users –This group consisted of 250 children from all the 17 locations and the IAI was administered on them, only in the ninth month, the last month of measurement. These children visit the MIE learning station frequently but are not part of the focus group.
Measurements on this group was made in order to check whether the focus group scores have any bias due to test familiarity (the Hawthorne effect).
c. Control groups -. Control groups are selected from nearby villages with similar socioeconomic features as the experimental group’s village. A total of 119 children (7 children per location) were selected for this study. These groups did not have access to MIE learning stations or to any other computers. We did not test the control group until at the end of the experimental period. This is important because computers generate such curiosity amongst children that even a hint of a nearby computer would encourage children to visit the MIE learning stations or other places where they may encounter computers.
Students following other learning systems
It is necessary to compare the results of children exposed to MIE learning stations with those of others who learn to use computers in other, more traditional, ways. We selected two groups of such learners:
a. The first group of traditional learners was of the same age group as MIE students, but enrolled as regular students in a school. They are taught computers in the classroom setting, with a prescribed curriculum along with computer laboratory facilities. The medium of instruction was
English and the Central Board of Secondary Education (CBSE) prescribes the syllabus. The
CBSE is a government body that decides the curriculum for primary and secondary education in Indian government schools. Computer education is an integral part of their formal curriculum and professionally trained teachers teach the course. For our study, 50 students in the age range from 10 to 13 years were randomly selected from the sixth grade of the Delhi Police Public
School located in New Delhi, India. Of these, 35 students were finally assessed over a period of
Page 6
5 months. The balance 15 children left the school due to transfer of parents, or were absent on the days when assessment was done.
b. The second group of traditional learners were students enrolled for a one-year Diploma in
Information Technology (DIT hereafter) at an NIIT Centre in New Delhi. NIIT is predominantly an education company and operates over 3000 education centres in 26 countries. These students were engaged in rigorous training on the fundamentals of computers as well as on certain programming languages. The content of the DIT course is varied and is taught by skilled professional Instructors. The pedagogy is “highly invasive” wherein the instructor follows instructions in structured and prescribed courseware followed by structured sessions in a computer lab. We selected a new batch of students and measured their IAI scores over a five month period. There were 27 students in the batch with an ages ranging from 18 to 21 years.
Most of the students were enrolled in college and some of them had already completed graduation. This group of students were older in age, educationally more qualified and had access to state-of-the-art technology.
The Icon Association Inventory
The experimental design (to be described in detail below) consisted mainly of periodic tests for computer literacy amongst focus groups of 15 children at each location over nine months. In order to do so, a test was required that could be:
1. Administered outdoors, since many locations did not have a facility where indoor testing could be conducted.
2. Administered in a short period of time, since it is difficult to assemble and retain the focus groups in outdoor environments for more than 30 minutes at a time.
3. Evaluated in a short time by different evaluators, since the number of tests to be evaluated were relatively large (around 300 results every month).
4. Administered and evaluated using paper and pencil alone, since other facilities or equipment may not be available at field locations. Also, we decided to have the test results sent to a central location (New Delhi) for evaluation by a group of trained evaluators to ensure consistency of evaluation. We could not find a test meeting these conditions and decided to develop one. While the design and validation of this test will be described in detail elsewhere, include below a brief account of the procedures we used to develop and validate the test.
In order to develop a test for computer literacy, we started with children who had taught themselves to use computers at some of our earliest playground facilities (Mitra and Rana, 2001). These children had developed their own vocabulary to describe icons in the Microsoft Windows environment. For example, they referred to the mouse cursor as “teer” or “sui”, Hindi words for arrow and needle, respectively. The folder symbol was described as a cupboard for keeping other objects. While the words used to describe the icons were chosen from their own language and experience, their description of the functionality of the icons were accurate.
We then constructed a list of the 77 icons present in the Microsoft Windows and Microsoft Office environment. The test (see Figure 2) consisted of a list of these common computer GUI (Graphical User
Interface) icons and persons taking the test are asked to describe the purpose of each icon. It is assumed that the number of correct descriptions of icons is correlated to the IT literacy level of the person taking the test. We decided to test this assumption.
Page 7
Figure 2: The GUI Icon Association Inventory, sample layout
Not all persons who are adept at using computers use icons. Indeed, many users do not use icons at all but prefer to use drop-down menus instead. It would, therefore, appear that the ability to identify the function of an icon may not correlate well with the ability of a respondent to use a computer.
We selected 74 users of computers in an urban environment and administered the IAI. These users were people who used the standard functions of MS-Windows and MS-Office such as word processing, spreadsheets, e-mail and so on. They consisted of a heterogeneous group of office administrative staff, students of Information Technology, research assistants and faculty. All were competent and experienced users.
The average score obtained was 49%, with a standard deviation of 18%. The maximum score obtained was 76%, while the minimum was 7%. The results seemed to indicate that users, irrespective of whether they used icons or not, could guess the function of an icon provided it was from software that they used frequently. For example, a secretary who uses a word processor often would be able to guess the function of the icons of word processing correctly, while, if his job does not involve using spreadsheets, would not be able to guess the functions of the icons used in spreadsheets.
Next, we identified two frequent users (Pawan, age 16 and Lalit, age 12) in a slum area of New Delhi, and asked them to study the icons, and write down their descriptions. These independent descriptions were then matched for consistency.
We then asked the two children to work together to resolve any inconsistencies and also describe the functions of the icons they had been unable to, when working independently. Over a period of a week they developed descriptions of most the icons they were shown.
The children could not identify the functions of the icons used in the spreadsheet program, MS-Excel, because this program was not available to them. This was done to check whether they could arrive at a correct functional description of an icon using guesswork and reasoning alone.
Page 8
At the end of this exercise, we matched the descriptions provided by the children with the descriptions given in the Windows and Office “Help” files.
Finally, we developed a scoring key for the IAI that listed the ‘correct’ descriptions for each of the 77 icons. An evaluator would compare these descriptions with those provided by a user in response to the test, and make a subjective evaluation of how closely the two matched for any icon and decide whether to award a correct score for that item.
We then administered the test to 9 children in Madangir, a slum area in New Delhi. These children had been exposed to playground computers for 15 days. The results showed that frequent user of computers took less time and identified more icons correctly than others.
It now became necessary to investigate two aspects of the test:
1. The evaluation of the IAI is dependent on the subjective judgment of the evaluator in deciding whether a child’s description of the function of an icon is adequately close to that given in the evaluation key. We need to find out if such subjective evaluation is sufficiently close to any other objective evaluation, so that the subjective evaluation method can be considered accurate.
2. Whether a score in the IAI, for instance 7 correct identifications out of 77, is a good measure of the computer literacy of the child concerned as compared with his score in any other, standard, test of computer literacy.
The IAI contains 77 icons and requires about 30 minutes to complete and about 10 minutes to evaluate.
Since the evaluation is both subjective and time consuming, an automated version of the test (see Figure
3) was developed by Batra, Dangwal and Ina mdar (NIIT 2003, unpublished). This test consists of the same 77 icons as in the IAI, along with 4 multiple-choice answers to describe each icon. The test is administered on a computer and then evaluated automatically. This eliminates any subjective element in the evaluation. We will call this software version of the IAI, the IAI-S
Page 9
Figure 3: The GUI Icon Association Inventory Software, a sample screen
It is to be noticed that while the IAI-S is an objective method for administering the IAI, its use is restricted to urban, English-speaking populations, where computers are available to all respondents.
A task based computer literacy (TBCL) test (see Figure 4) has been devised by “Outreach and
Extension”, University of Missouri and Lincoln University, USA
(http://outreach.missouri.edu/fcrp/evaluation/computerskills.htm). This test consists of tasks that a person is asked to perform on a computer and its subsequent evaluation.
Figure 4: Task-based computer skills assessment test. Some sample questions.
As such, the TBCL test is a literal test of computer literacy. It takes over an hour to complete the test and about 30 minutes to evaluate the results. While we could not find a validation study on the TBCL, we decided that the results of this test were a good benchmark for evaluating the effectiveness of the two versions of the IAI. This decision was based on the fact that a literal test, such as the TBCL, is close to how examinations are conducted in schools, and should be a good measure of actual performance.
It is important to mention here that we could not find a validated computer literacy test to measure the
IAI against. Hence, we had to rely on the self-consistency of the IAI to establish its validity.
We administered three tests, namely, the IAI, the IAI-S and the TBCL to a group of 18 students (all young adults) enrolled for a course in IT skills. These students consisted of an entire, randomly chosen,
“batch” of students taking these courses in a traditional computer training institute in New Delhi. There were 9 men and 9 women in the sample.
The results, to be reported in detail elsewhere, showed all three tests results to be highly correlated (in the region of 0.95 with a very low probability of error).
We concluded that the GUI Icon Association Inventory in either of its two versions is an effective instrument for measuring computer literacy.
Page 10
The measurement of computer literacy of children at MIE learning stations was, therefore, done using the Icon Association Inventory, a test created and validated for this purpose.
Of the 77 icons in the IAI, 26 icons (in the Excel and Text Format categories) are not present in the computers as configured for use by children at MIE learning stations. Measurements were, therefore, carried out using 51 of the 77 icons. The children are also tested on the remaining 26 icons, as a check of the effectiveness of the IAI in measuring computing skills (there should be an uniformly low score on these icons throughout the testing period).
Measurement Schedule of the IAI
The IAI was administered to all the three groups- children at MIE learning stations, traditional learners in school and students pursuing professional training in Information Technology (DIT), in the following manner. Figure 5: Time intervals for testing
Figure 5 shows the time intervals at which the IAI was administered. It was administered for the first time on the day the MIE learning stations were commissioned for the village children. For the other two groups of formal learners it was first administered on the day of the start of the respective courses. The test was then administered on the 3rd day, the 7th day and every 30 days for a nine month period. The total duration of the testing spanned 248 days, as shown in the figure.
Due to unavoidable circumstances, data for students pursuing professional IT course (DIT) could be collected for a period of 8months and for the regular school students, 5months.
Results
We report the results in two sections. The first section reports the results of the measurements on children using MIE learning stations in 17 locations. The second section reports the results of the measurements on the two learner groups in New Delhi, namely, school students and students at NIIT.
Section I
MIE Learning Station Users
Figure 6 shows the learning curve for children using MIE learning stations.
Figure 6: National level - Performance of MIE LS users in Icon Association Inventory
1 3 7 31 62 93 124 155 186 217 248
Time in Days
1st month 2nd month 5th month 9th month
Page 11
Icon test - National Average with Standard Deviations (9 months)
13.85%
22.84%
27.71%
32.42%
35.45%
41.59%
44.80%
48.42%
51.50%
55.24%
61.34%
-0.55%
1.34%
4.33% 4.52%
8.79%
11.69%
13.64%
16.88%
19.90% 21.12%
24.80%
6.65%
12.09%
16.02%
18.47%
22.12%
26.64%
29.36%
32.65%
35.70%
38.18%
43.07%
R2 = 0.9952
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
40.00%
45.00%
50.00%
55.00%
60.00%
65.00%
1 3 7 31 62 93 124 155 186 217 248
Implemention of icon test over Days
Average Performance (in %)
Avg+Stdev Avg-Stdev Average Linear (Average)
1st month 2nd month 5th month 9th month
The average scores increased from 6.65% to 43.07% over the experimental period of nine months. A high standard deviation is observed throughout. Indeed, this high standard deviation is observed at all individual locations as well.
Figure 7 compares the average scores for the focus, control and frequent user groups over the experimental period. Figure 7: National level Performance in Icon Association Inventory
Page 12
The focus group score is seen to rise from 6.65% to 43.07% while the control group score on the 9th month is seen to be 6.94%. The frequent users score an average of 43.73% in the ninth month. We observe that: There is a significant difference in the performance of the experimental (focus) group on the day of inauguration as compared to their performance on the 9th month. There is a significant difference in the performance of the experimental (focus) group and the control group in the ninth month. There is negligible difference between the focus and frequent user group scores in the ninth month. The Hawthorne effect has not been observed. There is a significant difference between the Control group and the frequent users group scores in the ninth month.
Section II
Results from formal learning systems
a. Regular/Conventional school Children - The data for this group is available for 5 months.
Figure 8 shows the performance in the IAI (without excel and text format icons). It is seen that the IAI average scores rise from 10.44 to 35.96 in the first five months.
Figure 8: Performances of Regular School Children in Icon Association Inventory
Average Performance of Regular School Children
21.05
23.3
25.68
29.1
33.94
39.38
-0.17
4.26
8.7
11.34
14.2
17.88
25.16
46.76
35.96
28.63
24.07
20.22
17.19
13.78
10.44
R2 = 0.9755
-5
0
5
10
15
20
25
30
35
40
45
50
1 3 7 31 62 93 124
Average performance in %
Avg+std Avg-std Average Linear (Average)
1st month 2nd month 5th month
Implementation of IAI over days
b. Students of a professional IT course – The data for this group is available for 8 months. Figure 9 shows the performance in the IAI (without excel and text format icons). It is seen that the IAI average scores rise from 11.96 to 49.17 in the first eight months.
Page 13
Figure 9: Performances of Professional Course Students (DIT) in Icon Association Inventory
Average Performance of IT Professional Course Students in IAI
22.70
24.78 25.57
30.22
34.24
39.86
45.59
49.85 51.22 51.21
1.18
5.55
9.46 10.99
13.23
17.00
23.62
35.09
43.46
47.13
11.96
15.17
17.52
20.60
23.73
28.43
34.60
42.47
47.34
49.17
R2 = 0.9722
0
5
10
15
20
25
30
35
40
45
50
55
Average performance in %
Avg+std Avg-std Average Linear (Average)
1 3 7 31 62 93 124 155 186 217
1st month 2nd month 5th month 8th month
IAI implementation over days
Discussion
Table 1.0 Comparative analysis of the general attributes, learning environment and cost for the three groups studied
a) General attributes of the three groups studied
MIE learning stations Regular School IT Professional school
Age Ranging from 7 - 14 years.
Average age 10-11 years
Ranging from age 10-13 years Ranging from 18 – 21 years
Gender Males and Females Males and Females Males and Females
Background Majority from economically weaker sections
Lower to middle income groups Middle to upper income groups
Education Primary to middle Middle Under graduates to graduates.
[All students have completed
12th grade]
Access to computers Shared Public MIE learning stations Classroom instruction and computer lab
Classroom instruction and computer lab
Assessment Through the IAI Assignments, examstheory, practicals and projects. IAI
Assignments, projects,
Assessments and practicals. IAI
Teaching
Method
Self, Collaborative, little or no intervention from adults
Teacher dependent approach Faculty dependent approach
Time Spent No time restriction 2.5 – 4 hours per week 6 hours per week
b) The Learning Environment
MIE Group Regular School IT Professional group
Page 14
Context Shared public MIE learning stations Classroom instruction and computer laboratory
Classroom instructions and computer laboratory
Access to computers during working hours - On an average, the usage is between 10am-4 pm [MIE learning stations remain open from 9am -5.30pm, beyond which they are shut down]
- no time restriction , children can access computers as long as the learning station is open
- accessible to all children
- visit MIE learning station before going to school or on return or on holidays, nearly the whole day
- 2.4 – 4 hours per week
- attend class at fixed time
- accessible only to students of a given class
- 6 hours per week
- attend class at fixed time - accessible only to students of allotted batch Teaching
Method
- children organize themselves into small groups. Each child is both student (learns from others) and teacher
(teaches children who have less knowledge than him/her). Hence, studentteacher boundaries are blurred. - peers, siblings, friends& others -absence of adult intervention -absence of formal teaching
- teacher centric approach
- entire class taught by one teacher - children not allowed to interact or consult each other during class time.
- teacher centric approach - faculty dependent
- entire class taught by one teacher
- students not allowed to interact or consult each other during class time.
Qualifications Mainly primary school children Teachers are professionally trained and qualified and have teaching experience
Teachers are professionally trained and qualified and have teaching experience
Learning
methods/strategy
Mainly collaborative learning through the methods of observation, modeling, trial & error & self discovery
Individual based learning Individual based learning
Assessment/
Evaluation
No evaluation except IAI which is not seen as assessment. No examination.
Assignments, tests and final examination for both theory and practicals, and projects Assignments, periodic assessment and practicals . Final examination. c) Cost of learning (1 US$= Rs. 44, April 2005)
MIE Group Regular School IT Professional group
Rupee 1 per child per day, based on an estimate of an average of
200 children using each learning station. Annual cost Rs. 365/- per child
Rs. 1250/- per month per child
Annual cost Rs. 15000/-
Rs. 17000/- per semester per student. Annual cost Rs. 34000/-
Page 15
Table 2.0 Comparative analysis of performance on IAI for the three study groups: MIE learning station users, regular school students and IT Professional course students
MIE Group Regular School IT Professional group
Inauguration (1st day) 6.65 10.44 11.96
3rd month (62 days) 22.12 24.01 23.73
5th month (124 days) 29.36 35.96 34.6
8th month (217 days) 38.18 Not available 49.17
Table 1.0 provides a comparative analysis of the three groups on the basis of general attributes, learning environment and financial costs. There is a significant difference in the age ranges of MIE learning station users and Regular School Students (10-11years) versus IT professionals (18-21 years). Also, the
MIE learning station users are from an economically disadvantaged group in contrast to the other groups. Regarding the learning environment in which all the three groups accomplish computer literacy, the differences between MIE learning station users and others is significant. The learning method used by
MIE learning station users, draws upon the expertise of peers, siblings and friends. Each learner is both a learner and a trainer.
Table 2.0 provides the performance on IAI for the three groups studied. The MIE learning station users begin at the lowest level of performance – 6.65%, in comparison to regular school students (10.44%) and the IT professional course students (11.96%).By the third month, the three groups are at par. By the eighth month, the IT professional group of students stands at 49% in comparison to MIE le arning station users at 38.18%. So, the IT professional group of students performed the best, to begin with, which was perhaps not surprising, given their background. However, the other groups caught up with them by the eighth month. In this connection, it may be noted that office secretaries score between 30% and 50% in the IAI, as seen from an independent (as yet unpublished) study.
The unstructured, open and flexible environment of the MIE learning station seems to produce comparable levels of computer literacy amongst learners as compared to formal methods. It does so at a considerably lower cost.
Conclusions
We conclude that groups of children can learn to use computers on their own, irrespective of who or where they are. This will happen if computers are provided to them in safe, public locations.
This method of acquisition of computer literacy does not depend on the existence of schools or teachers.
It is also considerably less expensive than traditional methods of computer education. Therefore, in those circumstances where schools and teachers are absent, MIE learning stations are an adequate substitute. Places affected by natural disasters, such as the recent Tsunami in the Indian Ocean, or places affected by war, such as Afghanistan or Iraq, or places affected by economic or social problems such as poverty or HIV/AIDS in Africa are likely to benefit quickly and reliably through such self-learning methods. While this paper is about the acquisition of computer literacy, there are indications that MIE learning stations produce other changes in children’s social and educational achievements. Such changes
(Inamdar, 2004, and others to be published) are described elsewhere.
Page 16
Acknowledgements
An experiment of this nature involves many people, much traveling, data analysis and discussion.
Special acknowledgements are due to Vikram Kumar, Dinesh Mehta, Nitin Sharma, Ashoo Dubey, and the 17 field observers at the villages. It is with their help that the villages were identified and the learning stations constructed. Sanjay Gupta, Vivek Rana, Meera Dutta, Himanshu Tayal and Shailender
Minz’s contributions to the hardware and software development aspects of the experiment were invaluable to the development of the learning stations. We wish to acknowledge the contributions of
Marmar Mukhopadhyay (NIEPA), Kenneth Kenniston (MIT), Bruno Bondet de la Bernardie (IFC), Anil
Inamdar (The Aquarians), Manas Chakrabarti and Suneeta Kulkarni (Soham), in advising the research effort. Financial assistance from the International Finance Corporation, the Government of Delhi, the ICICI bank and NIIT Limited is gratefully acknowledged.
References
Bathla, G (2002); Self-development through collaborative learning: A constructivist approach, an unpublished project report, D.R College, University of Delhi.
Cappelle Van F, Evers, V, & Mitra S (2004): Investigating the effects of unsupervised computer use on educationally disadvantaged children’s knowledge and understanding of computers. Proceedings of
CATaC 2004,Karlstad, Sweden, ( www.it.murdoch.edu.au/catac)
Clement, D.H. (1999) “ Young children and technology”, In Dialogue on early childhood science, mathematics and technology education. Washington D.C: American Association for the Advancement of science Project 2061.
Inamdar, P. (2004): Computer skills development by children using 'hole in the wall' facilities in rural
India. Australasian Journal of Educational Technology, 20(3), 337-350. http://www.ascilite.org.au/ajet/ajet20/inamdar.html Mitra Sugata (1988), A computer assisted learning strategy for computer literacy programmes. presented at the Annual Convention of the All-India Association for Educational Technology, December
1988, Goa, India.
Mitra, Sugata (2000), Minimally invasive education for mass computer literacy, presented at CRIDALA
2000 Conference, Hong Kong, 21-25.
Mitra, Sugata & Rana, Vivek (2001): Children and the Internet: experiments with minimally invasive education in India. British Journal of Educational Technology 32 (2), 221-232.
Mitra, S, Minimally Invasive Education (2003): A progress report on the “Hole -in-the-wall” experiments, The British Journal of Educational Technology, 34, 3, pp367-371.
Mitra, S., The Hole In The Wall, Dataquest, September 23 (2004), http://www.dqindia.com/content/industrymarket/2004/104092301.asp#interact Page 17
MIE Users Manual (2003): Copyright Hole-in-the-wall Education Limited (HiWEL), NIIT Ltd. New
Delhi, India. Contact www.niitholeinthewall.com
Papert, S. (1980). Mindstorms: Children, Microcomputers and powerful ideas. New York Basic Books.
Wullenweber, Walter, (2001), Das loch in der wand, Stern Magazine, No. 42, October 11, pp 97-102.

Similar Documents

Free Essay

Hole in the Wall

...Jessica Garcia Eng 60, CRN 30663 Assignment-Essay 1 Mr. Silva 1 July, 2013 Hole In The Wall The weekend prior to finals, on May 23, 2013 my boyfriend , Christian, took me to a movie theatre called Four Star Cinemas. It was a small, hole- in- the- wall, movie theatre. As we sat down on our individual pillow-like reclining seats, Christian had no difficulty at six- feet- tall reaching the black hardwood floor. On the contrary, I sunk slowly in between the seat like if I had sat in quicksand. Christian just laughed until he eventually helped me. Although the seats weren’t fit for a petite person, we continued to return because of their fantastic prices and consistent showing of new movies. On an early Sunday morning I received a call from Christian at nine o’clock. I rolled back and forth putting my universe-themed blanket over my head: enormous star struck, Saturn-like planets, Dreamworks –like- crescent moon, and a Teletubbies Sun baby. Refusing to answer, but after his persistence I gave in. “Hey,” I said. “Get ready,”he replied with a tone of urgence. I immediately repeated the same routine daily, except today was a different day. Excited for what was awaiting, I felt butterflies in my stomach as if it was our very first date, nearly taking me two hours to prepare myself I was running late not knowing what to wear! Even though Christian pressured me, he was trying to make up for the time I took by speed driving like the excelerater at Six Flags. We arrived......

Words: 671 - Pages: 3

Free Essay

Cabling Factors and Tools Discussion

...any unsightly holes in the future. Outlet boxes can be purchased at any hardware store and should be fastened to the wall stud in the location that you want at the same height as existing electrical outlets. It is recommended to install the outlet box in the adjacent wall stud cavity. Any wiring system should have a suitable ground and wiring for your cable TV needs is no exception. When planning your wiring layout always take the point of grounding under initial consideration. This is where most cable companies prefer to enter your house with their service and is where all wires leading to various outlets throughout the house should originate.... point of origin. This is almost invariably where the main power service enters the residence. The most popular method of prewiring your house is called the "home run method" in which each run of wire for each outlet is ran separate back to the point of origin. This type of wiring is preferred for ease of troubleshooting in case of any problem. Also in the future possibility of apartments etc., separation and security of services are more easily maintained. This method of wiring also ensures obtaining the least amount of signal attenuation for each run of cable. So now that you have your wiring route all planned out it's time to drill your holes in the floor and joists. This assumes, of course, you have an open basement or crawl space to work in. Otherwise you may have to look at routing your wiring up through the walls, across......

Words: 988 - Pages: 4

Free Essay

Portals

...I was walking one day and noticed something about the path had changed. I looked around and saw that a piece of the right side wall had disappeared. Nobody had ever been on the other side of the wall. There had also never been a hole in the wall. I wanted to investigate but I also had to go to school first so I covered up the hole with ivy growing on the 30 foot wall. Then I ran off to school. On my way home from school I went to the hole in the wall and peeked out. It was all darkness except for one tiny light in the distance. I finally gathered up the courage to step out into the darkness. Covering the hole behind me I slowly made my way to the light. It took me what seemed to be ten minutes to get there. The light seemed to be a portal of some kind. I had read about them in stories but never thought they actually existed. Stepping through the portal I covered my eyes the light was so bright. The brightness suddenly disappeared and I was standing in a round circular room with thousands or maybe millions of portals lining the wall. You could look up and as far as the eye could see were portals. There were platforms so I stepped on one and it said to me which way you would like to go. Up I replied. So the platform started to move up, it was getting so high I was starting to get dizzy from the never ending sight of portals. On the other side of the room (if you could even call it that) I saw something that caught my attention....

Words: 291 - Pages: 2

Free Essay

Stonehenge

...developed during the Middle Neolithic period, around 2950 BC (Ruggles et al). The monument originally comprised of a ring made of 56 pits, known as the Aubrey holes, named after the antiquarian and scholar, John Aubrey who first discovered and recorded the holes in 1666 (Jack). These holes erected Bluestones that came from the Preseli Mountain in South wales, about 250 kilometers away (Pearson). These Bluestones were around 2 meters long and weigh several tons each (Ruggles et al). It took a lot of effort for prehistoric people to transport the heavy Bluestones from Whales to England; this suggests that the people who first created the monument placed significant importance on the Bluestones. The Station Stones and Heelstone (with a missing companion) were also put at about the same time. The Station stone is a rectangular arrangement of four stones found near the Aubrey Holes and the Heelstones are located outside the northeast entrance (Ruggles et al). The sarsens were then brought to the Stonehenge around 2450BC, these are the huge sandstone blocks that are up to 7 meters tall that we see today. The sarsens are topped with lintels that are linked together forming a circle in an arc that faces northeast and surround five trilithon archways (Ruggles et al). In around 2550 BC, the Bluestones were removed from the Aubrey holes and rearranged among the sarsens; it was placed into a partial circle with an “altar” stone facing the southwest (Ruggles et al). Another part of......

Words: 3526 - Pages: 15

Free Essay

Pest Insect

...small fingernail. • Rodent droppings are brown, the size and shape of rice grains. 2 Chew marks in woodwork, walls, and food containers. 4 Leaky faucets and pipes or leaks in ceilings and walls. 3 Gaps, cracks, and holes in walls, along baseboards and windows, and around pipes and wires, and drains. • Cockroaches can squeeze through cracks as small as 1/8 of an inch. • Mice can get through holes as small as 1/4 inch. 5 Open food packages, sticky surfaces, pet food left out and garbage cans that don’t close tightly. Cockroach droppings Leaky pipe Gaps and chewmarks Chew marks and clutter Pet food left out 3 How to Control Pests Safely Make it harder for roaches and rodents to get in, move freely, and find food, water, and shelter. Step 1: Clean Up To get rid of pests and keep them from coming back, these steps are key. Reduce Clutter • Recycle piles of newspapers, paper bags, cardboard, and bottles, especially around stoves and refrigerators. • Store clothing and linens you don’t use in sealed plastic boxes or bags. Vacuum Thoroughly • Use a vacuum with a hose and crevice tool. Special filter vacuums, known as HEPA or allergen-reducing vacuums, work best. • Vacuum behind and under refrigerators and stoves. • Empty cabinets, throwing away old food and items with signs of pests. • Vacuum inside gaps and holes in walls and in and behind cabinets. Start high and work down. • When you’re done, seal the vacuum bag in plastic and......

Words: 2459 - Pages: 10

Free Essay

Marketing

...If you plan on covering the exterior with stucco, siding or some other material then OSB will work well. (1) – 2x6 you will only need 3’ in length so buy the shortest length available (3 bundles) – shingles – typically 3 bundles of shingles will cover 100 sq. ft which will be more than enough, you only need about 80 sq ft. for the roof and the top of the nest boxes (1 roll) – roofing felt (you only need about 80 sq. ft) (30) – 1x2 furring strips (for a ‘board and batton’ exterior and trim) (4) – Hex Block 4 or Pier w/hot dip galvanized bracket (These are approximately 1’x1’x1’ blocks that form the foundation to set your 4 posts on. With the Hex Block, the posts rest in a 4”x4” square hole in the block. With the Pier w/bracket style, the block has a bracket that has two holes so you can drill a hole through the center of your posts and attach the posts to the bracket with a bolt) (2) – 1¼” x 4’ wooden dowels (4) – 2x2’s in 8’ lengths (5) – oil rubbed bronze sash lock (twist lock) (4) – black tee hinge 3.5” (6) – oil rubbed bronze hinge 3” (4) – 4”x12’ aluminum fascia (optional) (4) – 12”x12’ aluminum vented soffit (optional) (4) – 1½”x12’ aluminum drip edge (2) – 16”x6” (or 16”x8”) face on vent (2) – 2’x2’ windows (6) – H1 hurricane ties (to attach the roof trusses) (1 roll) – 3’x15’ hardware cloth net, black PVC (for window screens) 16d 3¼” nails for framing 8d ring shank nails 2½” Roofing nails for the shingles 3” wood screws (you will only be using 18-20 of these) Trim......

Words: 7632 - Pages: 31

Premium Essay

Supply Chain Management-Checkers

...Dependability Flexibility Flexibility Speed Speed Hole in the Wall Checkers Figure 3: Polar Diagram (Source: Pycraft et al., 2010: 544) The small retailer chosen is “Hole in the wall” it is a small supermarket base in Tanzania in the Moshi region (Solanky, 2013). When comparing checkers which have a lot of supermarkets across South Africa and “Hole in the Wall” which have only one small supermarket many distinct differences can be made. Checkers is a big company and ‘Hole in the Wall’ is a small company, the cost of buying goods for Checkers will be cheaper (Pycraft et al., 2010: 544-545). For example, Checkers buy goods in bulk which will allow him to get better price on those goods as they get discounts. However, ‘Hole in the Wall’ is a small retailer and do not have a lot of customers (Solanky, 2013). They must buy goods in smaller quantities. Therefore, the cost of buying in big quantities allows the retailer to have better price then small retailers. Furthermore, the quality is higher in the small retailers then the big one (Pycraft et al., 2010: 544-545). For example, Hole in the Wall is easier to manage and the manager spends more time with the customers to makes sure that they are happy with the services that they are getting. In comparison, as Checkers is bigger, it is difficult for them to make sure that every single customer is satisfied at one hundred percent. In addition, Hole in the Wall offers a special service system where the......

Words: 3649 - Pages: 15

Free Essay

Tars

...install the shelf and may include new cable hole drilling. Remove vertical stand and mask any damage on the teller wall. pics CWP widen QST cable holes to 1 inch or larger on front and/or back of backsplash to accommodate QST, ferrite bead prior to the QST cable management pic Carl - fyi There is an empty power cord plugged into the server UPS pics Cwp to be on site night of install to assist with qst cable management due to bandit barriers along teller row pic(s) 20,24,11. FYII QST cables are at 1 inch. Cwp to be on site night of install to assist with false walls pic(s) SV3 tech drill QST cable holes to 1 inch or larger on front and/or back of backsplash to accommodate QST, ferrite bead prior to QST cable management pic(s) 9,10. Mount QST on customer right on horizontal shelf. SV3 Tech existing vertical QST will move to the new horizontal stand pic This will be the new TAR to change the vertical qst to a horizontal shelf. Include picture references. CWP to be onsite in support of QST installation. Work may include, but is not limited to, false wall removal, drilling, cable routing, etc. Also, assist with mounting of the QST wall shelf and removal of the QST vertical stands, if applicable. This will be the new TAR to have CWP remove false walls, drill, cable management, etc. Include picture references. CWP to be onsite in support of QST installation. Work may include, but is not limited to, false wall removal, drilling, cable routing, etc.......

Words: 3539 - Pages: 15

Free Essay

Concrete vs. Hurricane

...expensive to do. The most common way of adding reinforcements involves cutting out the face of the blocks in a vertical column at the wall corner, on one side of each window of door opening, and at a spacing of 4 to 8 feet along the wall when there is no opening. Steel reinforcing rods are then epoxy grouted into the bond beam at the top and the foundation with an overlap of at least 25 inches where they meet. The cells are then filled with grout and the wall finish re-applied. Another method of retrofitting is chipping out of the block at the bond beam and a rod is epoxy grouted horizontally into the bond beam. Grout is poured in through the top hole and once it begins to flow out of the bottom hole, the bottom hole is blocked and grout is added until it flows out of the top hole. The top of the cable is hooked around the rod in the bond beam and cable clamps are tightened so that the cable is pulled tightly around the rod. Grout is than added until both the top hole and the side of the bond beam is filled. This hole is then blocked and the grout is allowed to harden. Critical damage to buildings in high winds is usually due to uplift of the roof. Reinforced concrete masonry is well suited to resist theses loads due to it’s relatively large mass available to resist the large uplift and overturning forces. Grout and reinforcing steel tie the walls into a strong cohesive unit that minimizes the number of connectors needed and reducing the margin for error, as a......

Words: 997 - Pages: 4

Premium Essay

Emperor Qin Shi Huang

...Asian 160L Shanrui Yong 12/08/2015 Emperor Qin Shi Huang Emperor Qin Shi Huang was the first emperor of what would come to be known in the Western world as China. He unified the warring states of China and kept them together by means of a centralized bureaucracy and a standardized and codified law system. In his 35-year reign, he managed to create magnificent and enormous construction projects such as the Great Wall of China and the Terracotta Army. He standardized all weights and measures used in China, and it was during his reign that the Chinese system of written characters became used throughout the land. Today’s Chinese characters are written differently, but are direct descendants of those used during Qin Shi Huang’s reign. Despite his good intentions in unifying China, he did many things that were deemed ruthless. With Li Si’s advice, he banning and burning of many books and the execution of recalcitrant scholars. At the same time, many slaves were sacrificed during the construction of the Great Wall of China. Many scholars have argued that Emperor Qin Shi Huang was a brutal Emperor and disregard his contributions to China. However, his contributions far surpassed his unmerciful action. Therefore, Emperor Qin Shi Huang was the one of the greatest reformer and pioneer in China history and left behind many legacies that has made China what it is today. Emperor Qin named himself “Qin Shi Huangdi,” which means the first great emperor of China. "Qin was for his......

Words: 1564 - Pages: 7

Premium Essay

Agriculture

...propagation phase, and the container design which affects root growth and architecture (Moore 2001). Kinked roots/ J-rooting: Angular distortions of more than 90 degrees in the main roots, just below the surface. This type of root distortion occurs due to lack of care when inserting a struck cutting or seedling into a dibbled hole. It can have serious structural consequences, such as the weakening of the trunk/root interface, increasing the tree’s susceptibility to wind breakage. In extreme cases J-roots can cause the tree trunk to lie in the soil whereby the stem can fall out several years after planting (Moore 2001; Thomas et al. 2008). J-rooting contributes economic loss due to the low quality of resultant wood products, as well as reduced growth rates etc. (Thomas et al. 2008) Circling roots: Circling begins in the nursery container and have the potential to girdle the trunk or major roots once the tree is transplanted. Circling of roots occur due to poor production and transplantation methods used in nurseries. This includes the use of containers with smooth, rigid plastic walls, and transplanting the trees in holes with structurally restrictive walls (Appleton 1995). Figure 1: Root circling in container (Appleton 1995) Figure 2: Girdling tree roots visible above ground (Appleton 1995) NOTE to Jeel Beybe’: I suspect the pictures and the captions don’t match here ^ Nursery production systems/methods for......

Words: 1288 - Pages: 6

Free Essay

The Israeli Frontier by Banksy

...towards 1992-1994. His age might be around 30 years (he was born in 1974) The context Since Israel creation in 1948, a lot of conflicts took place between Israel and Palestine and some others Middle East countries. In 2002, Israel decided to build a wall to protect the country from the Palestinian attacks. The aim was to separate Israeli and Palestinian population. The wall became the symbol of a closed and militarized frontier. Description This graffti represents two children playing as if they were on a beach, with sceau and pelles. We can see that these two characters have been stenciled on the wall. They seem happy to be playing on the sand. They are represented in black and white in contrast with the sceau which is yellow. The two children are shirtless, but we don’t know if it is to evoke heat or poverty. Above the 2 children, we see like a hole, in which there is a paradisiac and sunny landscape, with palmiers, cocotiers, turquoise water, white sand and a beach. The wall seems broken. Interpretation Through this graffiti, Bansky tries to criticize war stupidity. It is why he decided to paint on this specific wall: because it represents the conflict between Israelis and Palestinians. The hole in the wall maybe represents the idées reçues broken, and replaced by a better reality. Also thanks to the paradisiac landscape, Banksy maybe wants to show us that after the frontier, the other side isn’t the enfer, that it is not filled with enemies, but it......

Words: 319 - Pages: 2

Free Essay

Same Sex Marriage

...Living/dining room Paint/basement door/etc. * April 29, 2015 9am-5pm Kitchen Paint/etc. (ceiling will be charged to tenant) 1. Bathroom floor was repaired, removed damaged floor, replaced wood and installed vinyl flooring, walls and ceiling painted, new bathroom door, new baseboards, caulked and silicone, foam insulation used for cracks and crevices, and fire alarm was inspected and is in operative service. 2. Living and dining room was painted and foam insulation was used for crack and crevices, floors was cleared of all paint, holes were repaired, vestibule was painted along with entry doors, foam insulation used for cracks and crevices, and fire and carbon monoxide alarm above the stairwell was inspected and is in operative service. 3. Kitchen a replacement refrigerator was installed, loose ceiling repaired, holes repaired, walls and ceiling painted, all paint was removed from floors, entry door was painted, repaired loose molding around window, foam insulation used for cracks and crevices and the fire and carbon monoxide alarm was inspected and is in operative service. Notice that drain pipe in kitchen needs repaired. 4. Hallway was prepped for repairs such as cracks and crevices, holes were repaired, and the wall going down stairwell was painted. We greatly appreciate your cooperation in this renovation of 2230 Watkins St. Sincerely, Howard Lloyd/Freshn Start Inc....

Words: 393 - Pages: 2

Premium Essay

Castles

...surrounding a castle that is used to prevent attackers from digging tunnels under the castle walls. They were usually 5 to 15 feet deep and either filed with water or kept dry. They put dangerous things in the moat such as wooden stakes, alligators, and dangerous fish. a drawbridge is one of the most important parts of a castle. It is a wooden bridge that crosses the moat and leads to a gateway. Using metal chains it is capable of being raised or lowered. In early castles the drawbridge was designed t be broken or taken off in attack. A gatehouse was a strengthened structure built over the gateway that was used as the main entrance to the castle. It sometimes has a guard house in it. On the sides there are murder-holes and arrow loops. Sometimes the chapel was put right next to the gatehouse because if you attacked the chapel you were believed to be attacking god. The portcullis is a wooden gate with metal spikes at the bottom That was hung from the gatehouse ceiling. When under attack guards would rapidly drop the door, impaling the attackers with the metal spikes. There were often two portcullises in a castles entrance. Guards would try to trap the attackers in between them so that the guards could shoot arrows, drop burning wood, and drop hot oil on to the trapped attackers. The curtain walls are the stone outer walls surrounding the castle. The purpose of the walls was to protect the castle from invaders. They were usually connected by towers and......

Words: 728 - Pages: 3

Free Essay

Quotation

...motorized gate at new location Electric fance above the normal fence Includes supply and installation of a new electric fence Installation of the motor at new entarance location Includes supply and installation Fill the gap between the new access road and the the TX building platform with G5 material and compaction to spec. 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 3.14 Generator building renovation Fix and joind cracks in wall Replace damaged ceiling panels 5mm fibre cement sheets Sand down and paint ceiling strips Paint ceiling Clean floor slab, de-oil, deconteminate, strip and paint Replace missing barge and fascia board panels Exterior, strip, clean repaint ( including bonding liquid) Remove gutters and down pipes Close finish disused holes in walls Louvre panel to close large hole ex genset as Wispeco LD Including frame mounted on outside Remove gas pipes, fix and finish . (Disused gas covers, fit new Clean, strip and paint chequer plate floor trench installation) chequer plate covers where missing. Stop holes etc in walls and make good and paint Clean out trenches and dump to hazardous waste. m2 144 14.20 N$ 2 044.80 Unit Quantity Unit Price TOTAL Sum Sum m m3 Sum Sum 1 1 6 2 304.35 2173.91 480.87 1200.00 35000.00 5500.00 N$ 304.35 N$ 2 173.91 N$ 2 885.22 N$ 2 400.00 N$ 35 000.00 N$ 5 500.00 2 Sum Each m 2 m 2 m m 2 m Sum m2 Sum Sum m2 Sum Sum 2 25 144 144 48 142 2 500.00 245.00 13.00 25.00 28.00 49.00 38.00 150.00 800.00 3250.00......

Words: 500 - Pages: 2