Browse

Incorporating Technologies

Posted on: #iteachmsu
Incorporating Technologies
Tuesday, May 3, 2022
5G
5G is the Fifth Generation technology. It has many advanced features potential enough to solve many of the problems of our mundane life. It is beneficial for the government, as it can make the governance easier; for the students, as it can make available the advanced courses, classes, and materials online; it is easier for the common people as well, as it can facilitate them the internet everywhere. So, this tutorial is divided into various chapters and describes the 5G technology, its applications, challenges, etc., in detail.
Authored by: Sharon
Loading..
Posted on 1: #iteachmsu
5G
5G is the Fifth Generation technology. It has many advanced features potential enough to solve many of the problems of our mundane life. It is beneficial for the government, as it can make the governance easier; for the students, as it can make available the advanced courses, classes, and materials online; it is easier for the common people as well, as it can facilitate them the internet everywhere. So, this tutorial is divided into various chapters and describes the 5G technology, its applications, challenges, etc., in detail.
INCORPORATING TECHNOLOGIES
Authored by: Sharon
Tuesday, May 3, 2022
Loading..
Posted on: #iteachmsu
Incorporating Technologies
Tuesday, May 3, 2022
Home-School Reinforcement System
Home-School Reinforcement System: One of the most reinforcement effective
strategies is collaboration with students’ parents. Communicate as frequently as
possible (daily is optimal) about the amount and quality of work, as well as the
increase or decrease in appropriate behavior to help parents coordinate their
reinforcement system with the school’s system.

A simple checklist consisting of a list of the desired behaviors and a place for assignments that can be checked off, along with space for special notes, works best.
Authored by: Admin
Loading..
Posted on 1: #iteachmsu
Home-School Reinforcement System
Home-School Reinforcement System: One of the most reinforcement effective
strategies is collaboration with students’ parents. Communicate as frequently as
possible (daily is optimal) about the amount and quality of work, as well as the
increase or decrease in appropriate behavior to help parents coordinate their
reinforcement system with the school’s system.

A simple checklist consisting of a list of the desired behaviors and a place for assignments that can be checked off, along with space for special notes, works best.
INCORPORATING TECHNOLOGIES
Authored by: Admin
Tuesday, May 3, 2022
Loading..
Posted on: #iteachmsu
Incorporating Technologies
Thursday, Apr 28, 2022
Students and Classroom
https://education.wm.edu/centers/ttac/documents/packets/adhd.pdf


The culture of the classroom can either support or create barriers to student success (Piffner,
2011).

Factors that foster attention, positive behavior, and academic and social success include
establishing positive relationships with students, adopting classroom management techniques,
and creating a physical arrangement that facilitates learning.
Authored by: Admin
Loading..
Posted on 1: #iteachmsu
Students and Classroom
https://education.wm.edu/centers/ttac/documents/packets/adhd.pdf


The culture of the classroom can either support or create barriers to student success (Piffner,
2011).

Factors that foster attention, positive behavior, and academic and social success include
establishing positive relationships with students, adopting classroom management techniques,
and creating a physical arrangement that facilitates learning.
INCORPORATING TECHNOLOGIES
Authored by: Admin
Thursday, Apr 28, 2022
Loading..
Posted on: #iteachmsu
Incorporating Technologies
Thursday, Apr 28, 2022
ADHD Students and Classroom Considerations
https://education.wm.edu/centers/ttac/documents/packets/adhd.pdf


The culture of the classroom can either support or create barriers to student success (Piffner,
2011).

Factors that foster attention, positive behavior, and academic and social success include
establishing positive relationships with students, adopting classroom management techniques,
and creating a physical arrangement that facilitates learning.

It is often a positive relationship with one teacher that facilitates school success for a student
with ADHD (Piffner, 2011).
Authored by: Admin
Loading..
Posted on 1: #iteachmsu
ADHD Students and Classroom Considerations
https://education.wm.edu/centers/ttac/documents/packets/adhd.pdf


The culture of the classroom can either support or create barriers to student success (Piffner,
2011).

Factors that foster attention, positive behavior, and academic and social success include
establishing positive relationships with students, adopting classroom management techniques,
and creating a physical arrangement that facilitates learning.

It is often a positive relationship with one teacher that facilitates school success for a student
with ADHD (Piffner, 2011).
INCORPORATING TECHNOLOGIES
Authored by: Admin
Thursday, Apr 28, 2022
Loading..
Posted on: #iteachmsu
Incorporating Technologies
Thursday, Apr 21, 2022
Cryptography
Human being from ages had two inherent needs − (a) to communicate and share information and (b) to communicate selectively. These two needs gave rise to the art of coding the messages in such a way that only the intended people could have access to the information. Unauthorized people could not extract any information, even if the scrambled messages fell in their hand.

The art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography.

The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing.

Authored by: Admin
Loading..
Posted on 1: #iteachmsu
Cryptography
Human being from ages had two inherent needs − (a) to communicate and share information and (b) to communicate selectively. These two needs gave rise to the art of coding the messages in such a way that only the intended people could have access to the information. Unauthorized people could not extract any information, even if the scrambled messages fell in their hand.

The art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography.

The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing.

INCORPORATING TECHNOLOGIES
Authored by: Admin
Thursday, Apr 21, 2022
Loading..
Posted on: #iteachmsu
Thursday, Apr 14, 2022
Advanced Excel
The Format pane is a new entry in Excel 2013. It provides advanced formatting options in clean, shiny, new task panes and it is quite handy too.
Step 1 − Click on the Chart.
Step 2 − Select the chart element (e.g., data series, axes, or titles).
Step 3 − Right-click the chart element.
Step 4 − Click Format <chart element>. The new Format pane appears with options that are tailored for the selected chart element.
Format Axis
Step 1 − Select the chart axis.
Step 2 − Right-click the chart axis.
Step 3 − Click Format Axis. The Format Axis task pane appears as shown in the image below.

You can move or resize the task pane by clicking on the Task Pane Options to make working with it easier.

The small icons at the top of the pane are for more options.

Step 4 − Click on Axis Options.

Step 5 − Select the required Axis Options. If you click on a different chart element, you will see that the task pane automatically updates to the new chart element.
Step 6 − Select the Chart Title.

Step 7 − Select the required options for the Title. You can format all the Chart Elements using the Format Task Pane as explained for Format Axis and Format Chart Title.
Provision for Combo Charts
There is a new button for combo charts in Excel 2013.

The following steps will show how to make a combo chart.
Step 1 − Select the Data.
Step 2 − Click on Combo Charts. As you scroll on the available Combo Charts, you will see the live preview of the chart. In addition, Excel displays guidance on the usage of that particular type of Combo Chart as shown in the image given below.

Step 3 − Select a Combo Chart in the way you want the data to be displayed. The Combo Chart will be displayed.
Authored by: Khushi
post image
Posted on: #iteachmsu
Incorporating Technologies
Friday, Apr 8, 2022
Computer Programming
Computer programming is the act of writing computer programs, which are a sequence of instructions written using a Computer Programming Language to perform a specified task by the computer.

Computer Programming is fun and easy to learn provided you adopt a proper approach. This tutorial attempts to cover the basics of computer programming using a simple and practical approach for the benefit of novice learners.

Posted by: Chathuri Super admin..
Loading..
Posted on 1: #iteachmsu
Computer Programming
Computer programming is the act of writing computer programs, which are a sequence of instructions written using a Computer Programming Language to perform a specified task by the computer.

Computer Programming is fun and easy to learn provided you adopt a proper approach. This tutorial attempts to cover the basics of computer programming using a simple and practical approach for the benefit of novice learners.

INCORPORATING TECHNOLOGIES
Posted by: Chathuri Super admin..
Friday, Apr 8, 2022
Loading..
Posted on: #iteachmsu
Thursday, Mar 31, 2022
Cloud Computing
Cloud Computing provides us means of accessing the applications as utilities over the Internet. It allows us to create, configure, and customize the applications online.
What is Cloud?
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over public and private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM) execute on cloud.
What is Cloud Computing?
Cloud Computing refers to manipulating, configuring, and accessing the hardware and software resources remotely. It offers online data storage, infrastructure, and application.

Cloud computing offers platform independency, as the software is not required to be installed locally on the PC. Hence, the Cloud Computing is making our business applications mobile and collaborative.
Basic Concepts
There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:

Deployment Models
Service Models

Deployment Models
Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: Public, Private, Hybrid, and Community.

Public Cloud
The public cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness.
Private Cloud
The private cloud allows systems and services to be accessible within an organization. It is more secured because of its private nature.
Community Cloud
The community cloud allows systems and services to be accessible by a group of organizations.
Hybrid Cloud
The hybrid cloud is a mixture of public and private cloud, in which the critical activities are performed using private cloud while the non-critical activities are performed using public cloud.
Service Models
Cloud computing is based on service models. These are categorized into three basic service models which are -

Infrastructure-as–a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)

Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service.
The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each of the service models inherit the security and management mechanism from the underlying model, as shown in the following diagram:

Infrastructure-as-a-Service (IaaS)
IaaS provides access to fundamental resources such as physical machines, virtual machines, virtual storage, etc.
Platform-as-a-Service (PaaS)
PaaS provides the runtime environment for applications, development and deployment tools, etc.
Software-as-a-Service (SaaS)
SaaS model allows to use software applications as a service to end-users.
History of Cloud Computing
The concept of Cloud Computing came into existence in the year 1950 with implementation of mainframe computers, accessible via thin/static clients. Since then, cloud computing has been evolved from static clients to dynamic ones and from software to services. The following diagram explains the evolution of cloud computing:

Benefits
Cloud Computing has numerous advantages. Some of them are listed below -


One can access applications as utilities, over the Internet.


One can manipulate and configure the applications online at any time.


It does not require to install a software to access or manipulate cloud application.


Cloud Computing offers online development and deployment tools, programming runtime environment through PaaS model.


Cloud resources are available over the network in a manner that provide platform independent access to any type of clients.


Cloud Computing offers on-demand self-service. The resources can be used without interaction with cloud service provider.


Cloud Computing is highly cost effective because it operates at high efficiency with optimum utilization. It just requires an Internet connection


Cloud Computing offers load balancing that makes it more reliable.



Risks related to Cloud Computing
Although cloud Computing is a promising innovation with various benefits in the world of computing, it comes with risks. Some of them are discussed below:
Security and Privacy
It is the biggest concern about cloud computing. Since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to cloud service providers.
Although the cloud computing vendors ensure highly secured password protected accounts, any sign of security breach may result in loss of customers and businesses.
Lock In
It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It results in dependency on a particular CSP for service.
Isolation Failure
This risk involves the failure of isolation mechanism that separates storage, memory, and routing between the different tenants.
Management Interface Compromise
In case of public cloud provider, the customer management interfaces are accessible through the Internet.
Insecure or Incomplete Data Deletion
It is possible that the data requested for deletion may not get deleted. It happens because either of the following reasons


Extra copies of data are stored but are not available at the time of deletion


Disk that stores data of multiple tenants is destroyed.


Characteristics of Cloud Computing
There are four key characteristics of cloud computing. They are shown in the following diagram:

On Demand Self Service
Cloud Computing allows the users to use web services and resources on demand. One can logon to a website at any time and use them.
Broad Network Access
Since cloud computing is completely web based, it can be accessed from anywhere and at any time.
Resource Pooling
Cloud computing allows multiple tenants to share a pool of resources. One can share single physical instance of hardware, database and basic infrastructure.
Rapid Elasticity
It is very easy to scale the resources vertically or horizontally at any time. Scaling of resources means the ability of resources to deal with increasing or decreasing demand.
The resources being used by customers at any given point of time are automatically monitored.
Measured Service
In this service cloud provider controls and monitors all the aspects of cloud service. Resource optimization, billing, and capacity planning etc. depend on it.



 
Authored by: Komal
post image
icon busy for category details