FLIPPED CLASSROOM
In a traditional classroom student's engagements are limited to activities done by individually or by small groups as per the instruction of the teacher as well as the contents are delivered in a lecture-style. To overcome this problem of traditional classroom another method is implemented ie, FLIPPED CLASSROOM.
Flipped classroom is a type of blended learning. It is an instructional strategy by delivering content online. Students watch online lectures, collaborate in online discussions, done their research work on the topic at home and engage in concepts in the classroom with the guidance of a mentor. Short videos about the topic are given to students in advance and class timings are utilized for further discussions.
It is a learner centered approach in which class time explores in depth and meaningful activities with the help of educational technologies. Content delivery may be done by various methods as video lessons, online discussions, text reading, digital research etc.
It is considered as an activity based learning which includes skill development and concept practice, project-based learning, content analysis, mathematical techniques, laboratory experiments, current event discussions, peer reviewing etc.
It is a differentiated instruction method which enhances the student's higher order thinking skill and problem solving skill by practicing tackling difficult problems, work in groups, make research and construct knowledge with the help of teachers .
Teachers can enhance personalized interaction with students which will help them to acquire knowledge and content as well as self evaluation. The common approach flipped class is video lecturing but sometimes it may be recorded audios or podcasts.
In this method classroom is converted into a workshop where students can inquire about lecture session, test their skills in applying knowledge and participate in group discussions.
The teacher's role only as a coach or advisor or a mentor.
Features
= ACIVE LEARNING
= STUDENTS ENGAGEMENTS
= HYBRID COURSE DESIGN
= COURSE PODCASTING
EDUCATIONAL IMPLICATIONS
1. Teachers change their role to a coach advisor on mentor
2. Teaching process become more collaborative and co-operative.
3. The role of students are become active.
4. The responsibility of learning on the shoulders of students
5. Communication skill among students can be enhanced.
6. Interaction among students also increased through group discussions and workshop sessions.
Students are leaded the activities and they achieve mastery in subject.
LMS (LEARNING MANAGEMENT SYSTEM)
It is a global term of computer system specifically developed for managing online courses, distributing course materials and allowing collaboration between students and teachers.
LMS has two parts-
1.Server Component:
Performs core functions such as creating ,managing and delivering courses, authenticating users, serving data and notifications .
2.User Interface:
that runs inside your browser as a web( like Facebook , Gmail etc.) used by administrators, instructors and students.
It is the backbone of every e-learning activities built in various platforms of PHP,.NET or JAVA
And it has a large database such as 35 POSTGRE SQL,MY SQL or SQL server.
LMS allows to mange every aspect of course ie, from registration to store test result. It also have a reporting system that help to gather your own information.
FEATURES
1.It is a GUI package
2.Language options
3.Enrolment
4.Virtual classroom
5.Integrate with social media
6.communication
7.Course pathways
8.Reports
9.Content creation
10.Testing
CONTENT MANAGEMENT SYSTEM(CMS)
It is a software application that are used to create and manage digital content. There are ECM and WCM.
ECM means Enterprise Content Management and WCM means Web Content Management.
MOODLE
It is a free and open source software learning management system. It was originally developed by Martin Dougiamas and the first version was released on 20th august 2002.Nowdays this was led by MOODLE HQ an Australian company.
It is a leading virtual learning environment used in various fields such as education, training and development and business settings.
It is a free and open software learning management system written in PHP and distributed under the GNU General Public License.
It is developed on the pedagogical principles, Moodle is used for blended learning, distance education, flipped classrooms and other e=learning projects in schools, universities , work places and other sectors.
It is a learning platform designed to provide educators, administrators and learners with a single robust, secure and integrated system to create a personalized learning environment.
FEATURES
1. I t is used to create private website with online courses for educators and trainers to achieve their learning goals.
2. It helps to extend learning environment using community based plug-in
3. It has a feature of calendar and grade book.
4. It is suitable for all categories of learners all over the world.
5. It is usually used online but also used on an intranet system of the organization.
6. It is useful to programmers and education theorists.
7. It is a powerful tool of learner centered approach and collaborative learning environment that empower both teaching and learning.
8. It is a constructivist and social constructivist approach
9. Without any licensing fees anyone can adapt, extend or modify MOODLE for both commercial and non commercial projects. So it is cost effective and flexible.
Configure MOODLE by enabling or disabling core features and easily integrate everything needed for a course with external tools such as forums, wikis, chats and blogs.
CYBER CRIMES AND CYBER ETHICS
CYBER CRIME
It is the illegal or unauthorized use of computer technology with the intention of damaging or deleting the data in the system without the permission of the user.
TYPES OF CYBER CRIME
1. PLAGIARISM:
Plagiarism is the taking of the ideas, writings, drawings, words, or other similar intellectual property created by others and presenting it as your own.
2. PIRACY:
The illegal copying of software is called piracy.
3. PUBLIC DOMAIN:
Some software is free to use, copy, and/or change, but only do so if there is written notice that the software is in the public domain.
4. SHAREWARE:
Using shareware programs is free, but it is illegal to copy or modify them without permission since they are copyrighted. Most shareware programs versions Of the software, which must be paid for after the trial period has expired.
5. HACKING & CRACKLING:
Hacking is an attempt to exploit a computer system or a private network inside a computer. There are three types of hackers, ie, ELITES, KIDDIES and Malicious
ELITE hackers are innovative hackers who have a true grasp of system
Kiddies are hackers who use the tools created by elites to hack the system.
Malicious hackers are the persons who likes getting into other people's system.
6.To access, upload, download, or distribute pornographic, obscene or sexually explicit material.
7.To transmit or receive obscene, abusive or sexually explicit language.
8.To violate any local, state or federal statute.
9.To vandalize, damage or disable the property of another person or organization.
10. To access another person's materials, information, or files without the implied or direct permission of that person
11.To violate copyright laws, or otherwise use another person's property without the person's prior approval or proper citation, including the downloading or exchanging of pirated software or copying software to or from any school computer.
12.Unauthorized commercial use or financial gain.
COMPUTER ETHICS
Computer ethics is a term used to describe the ethical principles and moral dilemmas that you encounter in
today' s computer-based society.
The Ten Commandments for Computer Ethics
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people's computer work.
3. Thou shall not snoop around in other people's files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people's computer resources without authorization or proper com pensation.
8. Thou shall not appropriate other people's intellectual output.
9. Thou shall think about the social consequences of the program you write or the system you design.
10. Thou shall use a computer in ways that show consideration and respect for your fellow humans.
Johnson's 3 P's of Technology Ethics:
1. Privacy I will protect my privacy and respect the privacy of others.
2. Property - I will protect my property and respect the property of others.
3. a(P)propriate Use - I will use technology in consructive ways and in ways which do not break the rules of my family, church, school, or government.
Seven essential components of a personal code of computer ethics:
1. Honesty
2. Respect
3. Confidentiality
4. Professionalism
5. Responsibility
6. Communication
0 Comments