Premium Essay

Read-Only Participants

In: English and Literature

Submitted By CWinfrey1
Words 871
Pages 4
Summary
Read-Only Participants: A case for student communication in online classes.

Online learning is conducive to that of the traditional onsite learning facilities. There are some students who fully participate in the experience as well as those who take their learning environments for granted. A summary of the required reading “Read-only participants: a case for student communication in online classes” will support the noted claim. The study was completed to measure the various behaviors of the online learner. The research gathered the behaviors of students participating the in a Master’s degree web-based curriculum through the University of Pretoria. Beaudoin is noted as one of the greatest contributors to this case study. The study was broken into various parts. To support the introduction and conclusion of the study, the body included: Background, Literature, Context of this study, Methodology, and the Discussion. A breakdown of each subtopic of this study will be discussed in this summary. I have taken several online classes prior to reading this study and I found it to be very supportive to my conclusive evaluation of the practice. Although this study was completed in 2009, I can relate that my prior experiences in online classes were parallel to the researcher’s findings. The introduction made the reader aware that there are challenges to online learning and that “the establishment of an online community is widely held as the most important prerequisite for successful course completion and depends on an interaction between a peer group and a facilitator” (Niagel, Blignaut, & Cronje, 2009). I found the opening statement of the author drew my attention to this study with this profound statement. Those words, in particular, made me realize that online learning is a 2-way street and is what we make it. In laymen’s terms “you get out of...

Similar Documents

Free Essay

Read Only Participants

..."Read-Only Participants: A Case for Student Communication in Online Classes" In the article titled "Read-only participants; a case for student communication in online classes" impairs the importance of community and communication in online courses. It also discusses the reason students succeed or fail in online classes. To discover the concerns listed above, a study of eight weeks was conducted on students. The study monitored classroom activity as well as communication among students coming from diverse backgrounds. Such examples are geographical location, race, gender and age. The study resulted in both success and failure. Both were discovered and documented. With the results of success the following findings were noted: firstly online courses that had discussions where students and teachers would interact had a positive effect on introverted individuals. In a traditional classroom these students would have participated less but now found a voice in the virtual classroom. Secondly, the skills necessary in an online classroom can improve higher order thinking as well as critical thinking. This was done by the discussion forums and posts that required students to apply and create learned knowledge. Thirdly, a professor that had great involvement with his class became a positive feature by providing encouragement and support through posts. As a result of the instructors involvement students were eager to become more involved in the discussions. In addition to......

Words: 334 - Pages: 2

Premium Essay

Read Only Participant

...ALLAN KAMIRI KAHURO P.O. Box 67-00900, Kiambu. Tel: +254710492672 Email: kahuroallan@gmail.com I am a talented, enthusiastic, self-motivated and passionate Telecommunication and Information Engineering student knowledgeable in; operation of electrical devices and machines, making domestic wiring connections, computer programming using programming languages like C, Java and MATLAB, troubleshooting software and hardware computer complications as well as computer program installations. Personal Details * Date of Birth: August 22nd, 1991. * Marital Status: Single Education & Professional Qualifications: * Bachelor of Science Telecommunication and Information Engineering, May 2011 to Date * Kenya Certificate of Secondary Education, Kagumo High School , 2006-2009  * Kenya Certificate of Primary Education, Githunguri Township Primary School, 1997-2005 Key Skills & Competencies: * Outstanding knowledge of governmental Information Technology and Electricity generating schemes. * Good relationship management with other members of staff and colleagues. * Ability to achieve strong grasp of operations of various departments within the organization in a short time * Strong and excellent written and verbal communication skills. * Ability to maintain composure and sense of humor in the face of heavy workload and a tight schedule. PROFESSIONAL EXPERIENCE Intern- I.T and Electrical Engineering: Farmer’s Choice Limited (Feb. to May)......

Words: 418 - Pages: 2

Premium Essay

Summary- Read Only Participants

...Canyon University: UNV 501 6/25/2012 A Case for Participation in Online Courses Online computer courses/degrees are becoming more frequent as technology improves and the availability of technology is greater. This article “Read-only participants: a case for student communication in online classes” (Nagel, Blignaut, Cronje 2007) analyzes data from several studies and suggests that active participation, as opposed to non-active participation, is directly correlated to student achievement. Read-Only Participants The term Read-only participants refers to online students who log into a specific classroom website, read the material provided or student post’s but do not get actively involved in the discussion. Buedouin (2002) suggested that read-only participants can learn and succeed in an online setting without participating (Nagel, Blinaught, & Cronje, 2007). However research by: Nagel, Blinaught, & Cronje (2007); Klemm (1998); Rovai & Barnum (2003); Swan, Shea, Frederickson, Pickett, & Pelz (2000), indicate that participation is essential to be a successful online student. Read-only students also have the tendency to create a negative environment within an online learning environment, with other having the perception that the read-only student does not care and does not want to contribute. This is extremely evident when they are in a collaborative learning environment and participation in a project by all involved is essential for the group’s success. ......

Words: 636 - Pages: 3

Premium Essay

Utjugfhjfr

...Klara Abou Fadel Use the internet to find out: 1- Types of storage devices and their strorage capacity + PICTURES (5 minimum) 2- The main advantages and disadvantages of each device (2 minimum) 3- Types of access and speed of access 4- The cost of storage device (IN LEBANON) 1A) Floppy Disk – 1.44MB 1B) USB 2/3/4 GB (depends on how much storage you want) 1C)Drop box 10GB limit 1D) iCloud 25000 photos per month and 10000 videos and pictures combined per day 1E)CD rom: 700MB 2) USB: Advantage: very affordable and costs less per megabyte than the floppy disk. Disadvantage: can be misplaced or lost easily because of size. Icloud: Advantage: unlimited storage capability. Disadvantage: security and privacy might be accessed by unauthorized users. 3) Floppy Disk: obsolete USB: you access it by plugging it into a computer of device. It can be slow or fast depending on the USB. Drop Box: You can download it on your laptop or phone. Its speed depends on your wifi. iCloud: You access it from your itunes account. Its saves everything on your devices that are connected to it. Its fast since its automatic. CD Rom: Access it by putting it in a CD player. If it’s a 50x CD then the speed would be 10,000 r/min. 4) Floppy Disk: not available anymore. USB: depends on how much GB (25 dollars maximum) Drop Box: free (unless you want more storage space) iCloud: free (unless you want more storage......

Words: 257 - Pages: 2

Free Essay

Gpu Flashing

...I will not take any responsibility for damages caused by flashing the BIOS. Use the guide and the BIOS files at your own risk, this will void your warranty. What you need: GPU-Z, Nvflash The following guide is for single GPUs. If you wish to flash multiple cards please do so one at a time or see the Nvflash readme for further instructions on how to use the commands to properly flash multiple card systems. Don't type in the bracket but type in the info in the brackets. The commands are case sensitive and you need to include the spaces, please be accurate. 1. Backup your old BIOS (GPU-Z, BIOS version field, button on the right allows you to save the current bios). Keep the old bios in the event that something happens during the flash. 2. Download the new BIOS you'll be flashing to, it should be a.rom file, otherwise the flash will not work. 3. Browse to your Nvflash folder 4. Transfer the new BIOS file into the Nvflash folder 5. Close all unnecessary programs 6. Shift + right-click the Nvflash folder 7. choose the open in command line option 8. Type in the command: Nvflash --protectoff (case sensitive, please be accurate) 9. Type in the command: Nvflash -4 -5 -6 [yourbiosnamehere].rom 10. If the flash is a cross vendor one you might have to type in y a couple of times when asked to 11. Nvflash will work for a while and close the 2nd command prompt after finishing 12. Reboot 13. Your card should now be flashed, test with......

Words: 554 - Pages: 3

Premium Essay

Nt1210 Computer Basics Chapter Review

...Chapter Review Activities 1. C: Represents one binary digit 2. D: Kilobyte 3. C: 64 bits per quadruple word 4. A: Used for short-term memory C: Used to process data 5. A: The CPU tells the RAM which address holds the data that the CPU wants to read. 6. C: Character set 7. D: The binary equivalent of decimal 123456789 8. A: An actuator arm 9. B: Provides a convenient way to name a set of data for easier operations like copying and moving C: Name give users an easy way to reference the data D: Gives the CPU an easy way to identify the data it wants to read from RAM 10. C: By reading the files and auto generating directory structure for the files, for use on your classmate’s local computer 11. C: Changing the disk’s surface so that later the light will reflect differently for 0 or 1 12. B: Used for long-term memory D: Connects to the CPU over a bus using a cable 13. A: Actuator arm C: Platters 14. A: RAM D:USB flash drive 15. D: The binary equivalent of decimal 123456789 16. D: By closing an electrical circuit connected to the key when the key is pressed 17. B: Two dimensions: movement as two numbers: one in the direction of the X axis of an X,Y graph and the other on the y axis. 18. C: Input of commands that control the computer 19. A: 1280 is the number of items top to bottom in a grid on the screen. D: 1024 is the number of items top to bottom in a grid on the screen. 20. A:......

Words: 647 - Pages: 3

Premium Essay

It 105

...Computer Hardware Servicing 1/Network Design & Mngt. Laboratory Exercises Republic of the Philippines MINDORO STATE COLLEGE OF AGRICULTURE AND TECHNOLOGY Main Campus Alcate, Victoria, Oriental Mindoro Name: ______________________________ Course & Year: _____________ Laboratory Exercises No. 1 Identifying Parts/Components of Personal Computers Objectives: o o o o o o Identify the components of a PC Identify the desktop components Explain the PC Start up processes Familiarize with the computer Identify the elements of the computer system Identify the first tasks to be performed while troubleshooting PCs Date: _____________ Score:____________ General Directions     Read and understand each statement carefully. Write the questions and your answers on your activity sheet. Avoid unnecessary erasures. Use black or blue pen only. Answer the following: 1. What is computer? Give its characteristics, capabilities, and limitations? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________......

Words: 12098 - Pages: 49

Premium Essay

Introduction to Operating System

...Let’s start by looking at one of the first computer operating system MS-DOS was and still is a single tasking operating system which created in 1980 and used up until 1990 when windows 3.0 came out which was considered a multi tasking but very slow the first pc was introduced August 12, 1981. It was the size of a portable typewriter and contained 40K of read-only memory and 16K of user memory, as well as a built-in speaker for generating music. But in time over the years the pc has developed smaller and faster by 1000’s fold. The task manager manages one program or many programs within a computer system simultaneously. A task management program in an operating system provides each task and interrupts the CPU operations to manage tasks efficiently. When you use the task manager to see all of the processes that are running you may see a process that is using a large amount of the CPU process and you can end the process in the task manager, the control over the CPU varies with each process some demand more power than others. There are many ways for a person to increase the power and capability of a computer for example one can upgrade the memory to a higher amount or upgrade the memory to a higher amount also. You can also use various programs that can improve the speed and performance of a computer, References Uknown, (2012, June 4). operating system. Retrieved from......

Words: 299 - Pages: 2

Free Essay

Computer Information

...surveyor to use a recording with this device allowing for less use of man labor, making it far more cost effective, accurate and faster. The voice recognition software stores the information directly into a computer hard disk. This approach assures accuracy by eliminating the potential for human recording errors. Translation errors may occur however, if the voice recognition software is not adjusted for the speech of the interviewees. When using this method of data input we should always keep in mind that some people only respond to live operators. As for bank checks the most accurate method is the MICR, Magnetic Ink Character Recognition, developed by the bank industry. “Data is placed on the bottom of a check or other form using a special magnetic ink. Data printed with this ink using a special character set can be read by both people and computers” (Stair, R. & Reynolds, W.G., 2006, p.37). For retail tags it would be the barcode scanner uses a laser to read the barcode label accurately. Long documents should be inputted into a computer using OCR, Optical Character Recognition, which scan handwriting and typed documents converting them into digital data. Output is another important part in computer information management; for hand held computers the best method of output is the LCD, Liquid Crystal Display because even...

Words: 715 - Pages: 3

Premium Essay

Computer Memory

...that hackers can use when RAM hacking, which include several programs and utilities. The most common tools of RAM hacking is Nmap and Metasploit. Nmap, also referred to as the swiss army knife of RAM hacking or any other hacking, is one of the best effective port scanner tool numerous functions. In its hacking, Nmap is used in a footprinting phase to scan the ports of the remote computer, where it finds out which ports are open in order to compromise their access. Metasploit, on the other hand, is also an effective tool in RAM hacking as it commands a large database of exploits. In addition, it offers thousands of exploits codes that are useful on attacking web servers and computers (Levy, 2010, p.28). This is a hacking tool that hacks not only the RAM, but the almost entire part of a computer. Hackers always attack and succeed where they see weaknesses. In this case, there are various practices that can be used as precautionary measures to prevent any eventuality of being hacked. In this case, three crucial practices will be discussed in this context. These practices include; performing required software updates for web browsers and operating system, installing a firewall on the computer, and installing of anti-spyware or...

Words: 628 - Pages: 3

Premium Essay

A Trip Through Panama

...Chapter 1 - IT Essentials - PC Hardware & Software 1 Which CPU architecture uses a small set of instructions that are designed to be executed rapidly? CISC RAID RISC RISK SCSI 2 Which type of memory is primarily used as cache memory? DRAM RAM ROM SRAM 3 Which three devices are considered output devices? (Choose three.) fingerprint scanner headphones keyboard monitor mouse Printer 4 Which type of ROM can be reprogrammed with software while it is still physically installed in the computer? EEPROM EPROM PROM ROM 5 Which two characteristics are determined by the chip set on a motherboard? (Choose two.) maximum amount of memory that can be installed operating system compatibility type of connectors that will be on the motherboard keyboard layout 6 Refer to the exhibit. Which type of cable is shown in the graphic? FireWire Parallel Serial USB 7 Which important feature is offered by the USB standard? A single USB connection to a computer can support up to 255 separate devices. It offers rates of around 580 Mb/sec in low-speed mode. It allows up to 920 Mb/sec in the 2.0 version. It can supply power from the computer to devices. 8 What are the two connector types for the 1394a interface? (Choose two.) 2-pin 4-pin 6-pin 8-pin 9-pin 15-pin 9 Which type of memory is unable to have the contents modified? DRAM RAM ROM SRAM 10 Refer to the exhibit. What is the maximum length of the cable presented in the graphic, which is commonly used for connecting a......

Words: 630 - Pages: 3

Free Essay

Technical

...between the computer's operating system and attached devices such as the hard disk , video adapter , keyboard , mouse , and printer . BIOS is an integral part of your computer and comes with it when you bring it home. (In contrast, the operating system can either be pre-installed by the manufacturer or vendor or installed by the user.) BIOS is a program that is made accessible to the microprocessor on an erasable programmable read-only memory (EPROM) chip. When you turn on your computer, the microprocessor passes control to the BIOS program, which is always located at the same place on EPROM. When BIOS boots up (starts up) your computer, it first determines whether all of the attachments are in place and operational and then it loads the operating system (or key parts of it) into your computer's random access memory (RAM) from your hard disk or diskette drive. With BIOS, your operating system and its applications are freed from having to understand exact details (such as hardware addresses) about the attached input/output devices. When device details change, only the BIOS program needs to be changed. Sometimes this change can be made during your system setup. In any case, neither your operating system or any applications you use need to be changed. Although BIOS is theoretically always the intermediary between the microprocessor and I/O device control information and data flow, in some cases, BIOS can arrange for data to flow directly to memory from devices (such as video......

Words: 821 - Pages: 4

Premium Essay

Different Kinds of Methods

...method for printed questionnaires is the optical data reader. It is easier to read, and it is more accurate reading. Just put the answer you choice to be in the bubble. When the reader is place in a machine, it reads what you put. If the answer is wrong, it will put a red mark. The best method for the telephone survey is the operator data entry. With this method, any survey will be more accurate. Because, the operate will be able to give a clear question to the caller, and the caller will be able to respond to the question with no confusion. As this is happening the operator will enter the caller answer to the system with no errors. The best method for the bank checks is the automatic teller machine. This system is more communing use around the world. It is fast and simple to use. Just swipe the card and it will automatic deduct from the checking account. Every card has a security code. Only the card holder will be able to do the transaction. The best method for the retail tags is the bar code scanner. Every items that has a tag on it, has to have bar code scanner. It is easier to tack on the system. On how many items goes out and how many are on stock. The best method for the long documents is the optical data reader. Any long documents can be converting to a small data. Later on when it is necessary to read it. Put the data in to a optical, it will be able to read it. Best Method for Output: The best method for hand held......

Words: 934 - Pages: 4

Premium Essay

Adsxfg

...1) You purchase a new computer system that doesn’t have wireless capability, and then you decide that you want to use a wireless connection to the internet. What are the least expensive way (pick up two) to upgrade your system to wireless? A. Purchase a wireless expansion card and install in in your system. B. Purchase a USB wireless adapter and connect it to your pc by way of a USB port. 2) When working on a computer, which of the following best protect against ESD? WHY? A. Always wear a ground bracelet clipped to the side of the case. 3) List five type of video port? A. VGA B. DVI C. HDMI D. Display Port and Thunderbolt 4) What device can you use to make sure a computer is protected against power surges? A. The best protection is an uninterruptible power supply. That will protect you against both surges and brown out. 5) What are the three purposes accomplished by the motherboard BIOS? A. To manage simple devices (system BIOS) to start the computer (startup BIOS) to change setting on the motherboard (CMOS setup). 6) What is the purpose is of raised of screw holes or “standoff” installed between the motherboard and case? A. Motherboard is installed so that the bottom of the board does not touch the case. If the fine traces or lines on the bottom of the board were to touch the case, a short would result when the system is running. 7) Which one component in a high-end gaming computer is likely to draw the most......

Words: 341 - Pages: 2

Premium Essay

Bshs 352 Week 2 Dq 2

...BSHS 352 Week 2 DQ 2 To Buy This material Click below link http://www.uoptutors.com/BSHS-352/BSHS-352-Week-2-DQ-2 Think back to when you first started using computers; for some of you that was when you were in elementary school, for others of us, computers were not part of the mainstream until after graduate school! Some of you probably fall in between. Regardless, we learned about technical terms in various methods along the way. Look at the following list of terms related to computers and technology. Please choose 5 of the terms below; answer the questions that are asked as if you were explaining it to one of your clients who either does not own a computer, has never used one, or if s/he has, s/he doesn’t really don’t know how it works. * What is RAM & ROM? Which designates the amount of space available in the memory of your computer’s CPU? * What does the term “megs” stand for? * What is a CD-ROM? What is now replacing the CD-ROM as a storage medium and why? * What are newsgroups? How do you find them? Examples? * Operating systems — What do they do? Examples? * Internet and Web Browsers – What is a web browser? Examples? What is uploading and downloading? What are crawlers or spiders? What is a bookmark? * What is a domain? * HTML? * Netiquette – What is shouting? What is flaming? * Viruses – What is a virus? How do you protect yourself from a virus? What do you do if you get a virus? * Search engines – What can you do......

Words: 331 - Pages: 2