Browse
Assessing Learning
Posted on: #iteachmsu
Assessing Learning
Creativity to Support Student Learning in a Digital Learning Env
Posted by:
Rupali Jagtap

Posted on 1: #iteachmsu
Creativity to Support Student Learning in a Digital Learning Env
ASSESSING LEARNING
Posted by:
Rupali Jagtap

Posted on: #iteachmsu
ASSESSING LEARNING
Different terminology used in Computer Security.
Different terminology used in Computer Security.
Unauthorized access − An unauthorized access is when someone gains access to a server, website, or other sensitive data using someone else's account details.
Hacker − Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
Threat − Is an action or event that might compromise the security.
Vulnerability − It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.
Attack − Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.
Antivirus or Antimalware − Is a software that operates on different OS which is used to prevent from malicious software.
Social Engineering − Is a technique that a hacker uses to stole data by a person for different for purposes by psychological manipulation combined with social scenes.
Virus − It is a malicious software that installs on your computer without your consent for a bad purpose.
Firewall − It is a software or hardware which is used to filter network traffic based on rules.
Unauthorized access − An unauthorized access is when someone gains access to a server, website, or other sensitive data using someone else's account details.
Hacker − Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
Threat − Is an action or event that might compromise the security.
Vulnerability − It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.
Attack − Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.
Antivirus or Antimalware − Is a software that operates on different OS which is used to prevent from malicious software.
Social Engineering − Is a technique that a hacker uses to stole data by a person for different for purposes by psychological manipulation combined with social scenes.
Virus − It is a malicious software that installs on your computer without your consent for a bad purpose.
Firewall − It is a software or hardware which is used to filter network traffic based on rules.
Posted by:
Rupali Jagtap
Posted on: #iteachmsu
Different terminology used in Computer Security.
Different terminology used in Computer Security.
Unauthorized acc...
Unauthorized acc...
Posted by:
ASSESSING LEARNING
Monday, Oct 18, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Deep Learning with Keras
Deep Learning essentially means training an Artificial Neural Network (ANN) with a huge amount of data. In deep learning, the network learns by itself and thus requires humongous data for learning. In this tutorial, you will learn the use of Keras in building deep neural networks. We shall look at the practical examples for teaching.
Audience
This tutorial is prepared for professionals who are aspiring to make a career in the field of deep learning and neural network framework. This tutorial is intended to make you comfortable in getting started with the Keras framework concepts.
Prerequisites
Before proceeding with the various types of concepts given in this tutorial, we assume that the readers have basic understanding of deep learning framework. In addition to this, it will be very helpful, if the readers have a sound knowledge of Python and Machine Learning.
Audience
This tutorial is prepared for professionals who are aspiring to make a career in the field of deep learning and neural network framework. This tutorial is intended to make you comfortable in getting started with the Keras framework concepts.
Prerequisites
Before proceeding with the various types of concepts given in this tutorial, we assume that the readers have basic understanding of deep learning framework. In addition to this, it will be very helpful, if the readers have a sound knowledge of Python and Machine Learning.
Authored by:
Komal Rupali

Posted on: #iteachmsu

Deep Learning with Keras
Deep Learning essentially means training an Artificial Neural Netwo...
Authored by:
ASSESSING LEARNING
Friday, Oct 8, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Engages students and creates active learners
Engages students and creates active learners.
Using a computer, tablet, or other device encourages self-directed learning and creates an active participant in the learning process, rather than the passive learners found in a lecture environment. Interactive lesson plans can help turn “boring” conceptual subjects like math and science into fun, engaging, and educational activities for students.The availability of appropriate software for the technology being integrated is also problematic in terms of software accessibility to students and educators. Another issue identified with technology integration is the lack of long-range planning for these tools within the educative districts they are being used.
Using a computer, tablet, or other device encourages self-directed learning and creates an active participant in the learning process, rather than the passive learners found in a lecture environment. Interactive lesson plans can help turn “boring” conceptual subjects like math and science into fun, engaging, and educational activities for students.The availability of appropriate software for the technology being integrated is also problematic in terms of software accessibility to students and educators. Another issue identified with technology integration is the lack of long-range planning for these tools within the educative districts they are being used.
Posted by:
Rupali Jagtap

Posted on: #iteachmsu

Engages students and creates active learners
Engages students and creates active learners.
Using a computer, tab...
Using a computer, tab...
Posted by:
ASSESSING LEARNING
Thursday, Sep 30, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Technology integration
Technology integration is the use of technology tools in general content areas in education in order to allow students to apply computer and technology skills to learning and problem-solving. Generally speaking, the curriculum drives the use of technology and not vice versa.
Reasons to Incorporate Technology into Your Classroom
Engages students and creates active learners.. Using a computer, tablet, or other device encourages self-directed.
Encourages individual learning and growth.. No one learns in the same way or at the same pace, but technology can..
Facilitates peer collaboration.. In a research project conducted by the U.S. Department of Education, many educators.
Prepares students for the real world.
Technology is an integral part of how we work and live.
The availability of appropriate software for the technology being integrated is also problematic in terms of software accessibility to students and educators. Another issue identified with technology integration is the lack of long-range planning for these tools within the educative districts they are being used.
Reasons to Incorporate Technology into Your Classroom
Engages students and creates active learners.. Using a computer, tablet, or other device encourages self-directed.
Encourages individual learning and growth.. No one learns in the same way or at the same pace, but technology can..
Facilitates peer collaboration.. In a research project conducted by the U.S. Department of Education, many educators.
Prepares students for the real world.
Technology is an integral part of how we work and live.
The availability of appropriate software for the technology being integrated is also problematic in terms of software accessibility to students and educators. Another issue identified with technology integration is the lack of long-range planning for these tools within the educative districts they are being used.
Posted by:
Rupali Jagtap

Posted on: #iteachmsu

Technology integration
Technology integration is the use of technology tools in general co...
Posted by:
ASSESSING LEARNING
Thursday, Sep 23, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
XSLT
Before learning XSLT, we should first understand XSL which stands for EXtensible Stylesheet Language. It is similar to XML as CSS is to HTML.
Need for XSL
In case of HTML document, tags are predefined such as table, div, and span; and the browser knows how to add style to them and display those using CSS styles.
But in case of XML documents, tags are not predefined.
In order to understand and style an XML document, World Wide Web Consortium (W3C) developed XSL which can act as XML based Stylesheet Language. An XSL document specifies how a browser should render an XML document.
4. Following are the main parts of XSL −
XSLT − used to transform XML document into various other types of document.
XPath − used to navigate XML document.
XSL-FO − used to format XML document.
What is XSLT
5. XSLT, Extensible Stylesheet Language Transformations, provides the ability to transform XML data from one format to another automatically.
How XSLT Works
6. An XSLT stylesheet is used to define the transformation rules to be applied on the target XML document. XSLT stylesheet is written in XML format. XSLT Processor takes the XSLT stylesheet and applies the transformation rules on the target XML document and then it generates a formatted document in the form of XML, HTML, or text format. This formatted document is then utilized by XSLT formatter to generate the actual output which is to be displayed to the end-user.
Advantages
Here are the advantages of using XSLT −
Independent of programming. Transformations are written in a separate xsl file which is again an XML document.
Output can be altered by simply modifying the transformations in xsl file. No need to change any code. So Web designers can edit the stylesheet and can see the change in the output quickly.
Need for XSL
In case of HTML document, tags are predefined such as table, div, and span; and the browser knows how to add style to them and display those using CSS styles.
But in case of XML documents, tags are not predefined.
In order to understand and style an XML document, World Wide Web Consortium (W3C) developed XSL which can act as XML based Stylesheet Language. An XSL document specifies how a browser should render an XML document.
4. Following are the main parts of XSL −
XSLT − used to transform XML document into various other types of document.
XPath − used to navigate XML document.
XSL-FO − used to format XML document.
What is XSLT
5. XSLT, Extensible Stylesheet Language Transformations, provides the ability to transform XML data from one format to another automatically.
How XSLT Works
6. An XSLT stylesheet is used to define the transformation rules to be applied on the target XML document. XSLT stylesheet is written in XML format. XSLT Processor takes the XSLT stylesheet and applies the transformation rules on the target XML document and then it generates a formatted document in the form of XML, HTML, or text format. This formatted document is then utilized by XSLT formatter to generate the actual output which is to be displayed to the end-user.
Advantages
Here are the advantages of using XSLT −
Independent of programming. Transformations are written in a separate xsl file which is again an XML document.
Output can be altered by simply modifying the transformations in xsl file. No need to change any code. So Web designers can edit the stylesheet and can see the change in the output quickly.
Authored by:
St.john
Posted on: #iteachmsu
XSLT
Before learning XSLT, we should first understand XSL which stands f...
Authored by:
ASSESSING LEARNING
Thursday, Sep 23, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Encryption is a security method
Encryption is a security method in which information is encoded in such a way that only authorized user can read it. It uses encryption algorithm to generate ciphertext that can only be read if decrypted.
AES is an iterative rather than Feistel cipher. It is based on ‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treats the 128 bits of a plaintext block as 16 bytes.Types of Encryption
There are two types of encryptions schemes as listed below:
Symmetric Key encryption
Public Key encryptionData Encryption is encouraged, as it keeps a company’s data secure and safe from unauthorized hands or in the event of a data breach. For example, if you send an email, you can use encryption technology to convert your mail contents into scrambled data so that no one other than the receiver will understand the mail. 1. Symmetric key encryption algorithm uses same cryptographic keys for both encryption and decryption of cipher text.2. Public key encryption algorithm uses pair of keys, one of which is a secret key and one of which is public. These two keys are mathematically linked with each other.
AES is an iterative rather than Feistel cipher. It is based on ‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treats the 128 bits of a plaintext block as 16 bytes.Types of Encryption
There are two types of encryptions schemes as listed below:
Symmetric Key encryption
Public Key encryptionData Encryption is encouraged, as it keeps a company’s data secure and safe from unauthorized hands or in the event of a data breach. For example, if you send an email, you can use encryption technology to convert your mail contents into scrambled data so that no one other than the receiver will understand the mail. 1. Symmetric key encryption algorithm uses same cryptographic keys for both encryption and decryption of cipher text.2. Public key encryption algorithm uses pair of keys, one of which is a secret key and one of which is public. These two keys are mathematically linked with each other.
Authored by:
Hubert Blaine Wolfeschlegelsteinhausenbergerdorff Sr.Hube...
Posted on: #iteachmsu
Encryption is a security method
Encryption is a security method in which information is encoded in ...
Authored by:
ASSESSING LEARNING
Wednesday, Sep 22, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Health Knowledge
We may think we understand what health is, but is there a single, clear definition? And how has the notion of what is ‘healthy’ changed over time?
It may seem an obvious question: ‘Do you know what “health” means?’ But there is much debate over the definition.
The World Health Organization (WHO) defines health as ‘a state of complete physical, mental and social wellbeing and not merely the absence of disease or infirmity’. But how accurate is this? Consider a person who has diabetes and manages it with medication, or someone who has back pain that they manage with physiotherapy. These people are clearly not in a state of complete physical wellbeing. But does that make them unhealthy?
Health: all or nothing?
Perhaps infirmity and disease can coexist with health. This would mean that there is not a binary ‘healthy’ or ‘unhealthy’ state, but rather a spectrum. In our lifetimes, we all experience periods of good and bad health. And we may even experience the two states at the same time.
Huber and colleagues suggest that the problem with the WHO definition is the absoluteness of ‘complete’ wellbeing. This, they suggest, inadvertently contributes to the ‘over-medicalisation’ of the population. It allows a platform for industry, medical technologies and professionals to redefine our health status. In effect, it could imply that no one is ‘healthy’ any of the time, and everyone needs some level of treatment for any given condition. It doesn’t allow the individual to define their own health, and their own health goals.
Recent blogs
Investment in tailored care for adolescents with rare diseases is essential for their health and wellbeing
14 Sep 2021
READ MORE
Lockdown babies and being a first-time parent during the pandemic
26 Aug 2021
READ MORE
Under threat: healthcare in conflict zones
13 Aug 2021
READ MORE
The absoluteness of ‘complete’ wellbeing may inadvertently contribute to the over-medicalisation of the population.
Resilience and management
When the WHO defined health in 1948, it was revolutionary in its notion that health means more than the absence of disease. However, Huber et al. suggest that, owing to our ageing population and the increasing focus on management of communicable diseases, this definition is no longer fit for purpose. They propose shifting the emphasis of health towards the ability to adapt and self-manage in the face of social, physical and emotional challenges.
This echoes the concept of resilience, which has been defined as ‘the capacity for populations to endure, adapt and generate new ways of thinking and functioning in the context of change, uncertainty or adversity’.
Your life, your health
Thanks to medical advances and disease management, the concept of health now encompasses more than traditional definitions encapsulate. There is a level of health that each of us can aspire to attain. Every person is exposed to a unique selection of beneficial and adverse circumstances over the life course. Ultimately, it is how we manage – and adapt to – these circumstances that defines our health status.
Sandra Evans is a former Researcher for The Health Policy Partnership.
The opinions expressed in this blog are those of the author and do not necessarily represent the views of The Health Policy Partnership.
It may seem an obvious question: ‘Do you know what “health” means?’ But there is much debate over the definition.
The World Health Organization (WHO) defines health as ‘a state of complete physical, mental and social wellbeing and not merely the absence of disease or infirmity’. But how accurate is this? Consider a person who has diabetes and manages it with medication, or someone who has back pain that they manage with physiotherapy. These people are clearly not in a state of complete physical wellbeing. But does that make them unhealthy?
Health: all or nothing?
Perhaps infirmity and disease can coexist with health. This would mean that there is not a binary ‘healthy’ or ‘unhealthy’ state, but rather a spectrum. In our lifetimes, we all experience periods of good and bad health. And we may even experience the two states at the same time.
Huber and colleagues suggest that the problem with the WHO definition is the absoluteness of ‘complete’ wellbeing. This, they suggest, inadvertently contributes to the ‘over-medicalisation’ of the population. It allows a platform for industry, medical technologies and professionals to redefine our health status. In effect, it could imply that no one is ‘healthy’ any of the time, and everyone needs some level of treatment for any given condition. It doesn’t allow the individual to define their own health, and their own health goals.
Recent blogs
Investment in tailored care for adolescents with rare diseases is essential for their health and wellbeing
14 Sep 2021
READ MORE
Lockdown babies and being a first-time parent during the pandemic
26 Aug 2021
READ MORE
Under threat: healthcare in conflict zones
13 Aug 2021
READ MORE
The absoluteness of ‘complete’ wellbeing may inadvertently contribute to the over-medicalisation of the population.
Resilience and management
When the WHO defined health in 1948, it was revolutionary in its notion that health means more than the absence of disease. However, Huber et al. suggest that, owing to our ageing population and the increasing focus on management of communicable diseases, this definition is no longer fit for purpose. They propose shifting the emphasis of health towards the ability to adapt and self-manage in the face of social, physical and emotional challenges.
This echoes the concept of resilience, which has been defined as ‘the capacity for populations to endure, adapt and generate new ways of thinking and functioning in the context of change, uncertainty or adversity’.
Your life, your health
Thanks to medical advances and disease management, the concept of health now encompasses more than traditional definitions encapsulate. There is a level of health that each of us can aspire to attain. Every person is exposed to a unique selection of beneficial and adverse circumstances over the life course. Ultimately, it is how we manage – and adapt to – these circumstances that defines our health status.
Sandra Evans is a former Researcher for The Health Policy Partnership.
The opinions expressed in this blog are those of the author and do not necessarily represent the views of The Health Policy Partnership.
Authored by:
Hubert Blaine Wolfeschlegelsteinhausenbergerdorff Sr.Hube...
Posted on: #iteachmsu
Health Knowledge
We may think we understand what health is, but is there a single, c...
Authored by:
ASSESSING LEARNING
Wednesday, Sep 22, 2021
