We found 53 results that contain "users"
Posted on: #iteachmsu

CICS stands for Customer Information Control System. CICS was developed in 1968 by IBM
CICS is a DB/DC system which is used in online applications. CICS was developed because batch operating system can execute only batch programs. CICS programs can be written in COBOL, C, C++, Java, etc. These days, users want information within seconds and in real time. To provide such quick service, we need a system which can process information online. CICS allows users to communicate with the back-end system to get the desired information. Examples of online programs include online banking system, flight reservation, etc. Following image shows the components of CICS and how they are inter-related −
CICS Overview
Functions of CICS
The main functions performed by CICS in an application are as follows −
CICS manages requests from concurrent users in an application.
Although, multiple users are working on CICS system but it gives a feel to user that he is the single user only.
CICS gives the access to data files for reading or updating them in an application.
Features of CICS
The features of CICS are as follows −
CICS is an operating system in itself, as it manages its own processor storage, has its own task manager which handles execution of multiple programs, and provides its own file management functions.
CICS provides online environment in batch operating system. Jobs submitted are executed immediately.
CICS is a generalized transaction processing interface.
It is possible to have two or more CICS regions at the same time, as CICS runs as a batch job in the operating system at the back-end.
CICS is a DB/DC system which is used in online applications. CICS was developed because batch operating system can execute only batch programs. CICS programs can be written in COBOL, C, C++, Java, etc. These days, users want information within seconds and in real time. To provide such quick service, we need a system which can process information online. CICS allows users to communicate with the back-end system to get the desired information. Examples of online programs include online banking system, flight reservation, etc. Following image shows the components of CICS and how they are inter-related −
CICS Overview
Functions of CICS
The main functions performed by CICS in an application are as follows −
CICS manages requests from concurrent users in an application.
Although, multiple users are working on CICS system but it gives a feel to user that he is the single user only.
CICS gives the access to data files for reading or updating them in an application.
Features of CICS
The features of CICS are as follows −
CICS is an operating system in itself, as it manages its own processor storage, has its own task manager which handles execution of multiple programs, and provides its own file management functions.
CICS provides online environment in batch operating system. Jobs submitted are executed immediately.
CICS is a generalized transaction processing interface.
It is possible to have two or more CICS regions at the same time, as CICS runs as a batch job in the operating system at the back-end.
CICS is a DB/DC system which is used in online applications. CICS was developed because batch operating system can execute only batch programs. CICS programs can be written in COBOL, C, C++, Java, etc. These days, users want information within seconds and in real time. To provide such quick service, we need a system which can process information online. CICS allows users to communicate with the back-end system to get the desired information. Examples of online programs include online banking system, flight reservation, etc. Following image shows the components of CICS and how they are inter-related −
CICS Overview
Functions of CICS
The main functions performed by CICS in an application are as follows −
CICS manages requests from concurrent users in an application.
Although, multiple users are working on CICS system but it gives a feel to user that he is the single user only.
CICS gives the access to data files for reading or updating them in an application.
Features of CICS
The features of CICS are as follows −
CICS is an operating system in itself, as it manages its own processor storage, has its own task manager which handles execution of multiple programs, and provides its own file management functions.
CICS provides online environment in batch operating system. Jobs submitted are executed immediately.
CICS is a generalized transaction processing interface.
It is possible to have two or more CICS regions at the same time, as CICS runs as a batch job in the operating system at the back-end.
CICS Overview
Functions of CICS
The main functions performed by CICS in an application are as follows −
CICS manages requests from concurrent users in an application.
Although, multiple users are working on CICS system but it gives a feel to user that he is the single user only.
CICS gives the access to data files for reading or updating them in an application.
Features of CICS
The features of CICS are as follows −
CICS is an operating system in itself, as it manages its own processor storage, has its own task manager which handles execution of multiple programs, and provides its own file management functions.
CICS provides online environment in batch operating system. Jobs submitted are executed immediately.
CICS is a generalized transaction processing interface.
It is possible to have two or more CICS regions at the same time, as CICS runs as a batch job in the operating system at the back-end.
CICS is a DB/DC system which is used in online applications. CICS was developed because batch operating system can execute only batch programs. CICS programs can be written in COBOL, C, C++, Java, etc. These days, users want information within seconds and in real time. To provide such quick service, we need a system which can process information online. CICS allows users to communicate with the back-end system to get the desired information. Examples of online programs include online banking system, flight reservation, etc. Following image shows the components of CICS and how they are inter-related −
CICS Overview
Functions of CICS
The main functions performed by CICS in an application are as follows −
CICS manages requests from concurrent users in an application.
Although, multiple users are working on CICS system but it gives a feel to user that he is the single user only.
CICS gives the access to data files for reading or updating them in an application.
Features of CICS
The features of CICS are as follows −
CICS is an operating system in itself, as it manages its own processor storage, has its own task manager which handles execution of multiple programs, and provides its own file management functions.
CICS provides online environment in batch operating system. Jobs submitted are executed immediately.
CICS is a generalized transaction processing interface.
It is possible to have two or more CICS regions at the same time, as CICS runs as a batch job in the operating system at the back-end.
CICS is a DB/DC system which is used in online applications. CICS was developed because batch operating system can execute only batch programs. CICS programs can be written in COBOL, C, C++, Java, etc. These days, users want information within seconds and in real time. To provide such quick service, we need a system which can process information online. CICS allows users to communicate with the back-end system to get the desired information. Examples of online programs include online banking system, flight reservation, etc. Following image shows the components of CICS and how they are inter-related −
CICS Overview
Functions of CICS
The main functions performed by CICS in an application are as follows −
CICS manages requests from concurrent users in an application.
Although, multiple users are working on CICS system but it gives a feel to user that he is the single user only.
CICS gives the access to data files for reading or updating them in an application.
Features of CICS
The features of CICS are as follows −
CICS is an operating system in itself, as it manages its own processor storage, has its own task manager which handles execution of multiple programs, and provides its own file management functions.
CICS provides online environment in batch operating system. Jobs submitted are executed immediately.
CICS is a generalized transaction processing interface.
It is possible to have two or more CICS regions at the same time, as CICS runs as a batch job in the operating system at the back-end.
NAVIGATING CONTEXT
Posted on: #iteachmsu

Student Assessment in Teaching and Learning
Much scholarship has focused on the importance of student assessment in teaching and learning in higher education. Student assessment is a critical aspect of the teaching and learning process. Whether teaching at the undergraduate or graduate level, it is important for instructors to strategically evaluate the effectiveness of their teaching by measuring the extent to which students in the classroom are learning the course material.
REf. :https://www.nuteacher.com/groups/trial-users/dashboard
REf. :https://www.nuteacher.com/groups/trial-users/dashboard
PEDAGOGICAL DESIGN
Posted on: #iteachmsu

Mobile app compatibility testing
Pick Popular Phones: Figure out which phones most people use and focus on testing your app on those.
Use Fake Phones: You can use computer programs that act like different phones to test your app without needing the actual devices.
Try Real Phones: Test your app on actual phones to make sure everything looks and works right.
Make Sure Everything Fits: Check that your app's design adjusts properly to fit on screens of different sizes. You don't want things to look weird or cut off.
Make Sure It Works Right: Test all the features of your app to make sure they do what they're supposed to on different phones.
Check If It's Fast: See if your app runs smoothly and doesn't drain the phone's battery too quickly, no matter what kind of phone it's on.
Make Sure It Works with Different Phone Systems: Test your app on different versions of Android and iOS to make sure it works on all of them.
Test It with Bad Internet: Try using your app on slow or spotty internet connections to make sure it still works okay.
Check It in Different Languages: Test your app with different languages and writing styles to make sure everything looks right.
Make Sure It's Easy to Use: See if people who aren't familiar with your app can figure out how to use it without any problems.
Make Sure Everyone Can Use It: Check if your app is accessible for people who might have trouble seeing or hearing things on their phones.
Keep Testing as You Make Changes: Every time you update your app, test it again to make sure you didn't accidentally break anything.
Ask People to Try It: Get feedback from real users to see if there are any problems or things that could be better.
Use Fake Phones: You can use computer programs that act like different phones to test your app without needing the actual devices.
Try Real Phones: Test your app on actual phones to make sure everything looks and works right.
Make Sure Everything Fits: Check that your app's design adjusts properly to fit on screens of different sizes. You don't want things to look weird or cut off.
Make Sure It Works Right: Test all the features of your app to make sure they do what they're supposed to on different phones.
Check If It's Fast: See if your app runs smoothly and doesn't drain the phone's battery too quickly, no matter what kind of phone it's on.
Make Sure It Works with Different Phone Systems: Test your app on different versions of Android and iOS to make sure it works on all of them.
Test It with Bad Internet: Try using your app on slow or spotty internet connections to make sure it still works okay.
Check It in Different Languages: Test your app with different languages and writing styles to make sure everything looks right.
Make Sure It's Easy to Use: See if people who aren't familiar with your app can figure out how to use it without any problems.
Make Sure Everyone Can Use It: Check if your app is accessible for people who might have trouble seeing or hearing things on their phones.
Keep Testing as You Make Changes: Every time you update your app, test it again to make sure you didn't accidentally break anything.
Ask People to Try It: Get feedback from real users to see if there are any problems or things that could be better.
PEDAGOGICAL DESIGN
Posted on: #iteachmsu

Data Science in Digital Marketing
The digital revolution is now sweeping small towns and villages perhaps driven by increased accessibility at affordable data costs? The whole world is in our hands and the increase in the usage of digital in rural India, where more than two-thirds of active internet users are present is a great opportunity and a win-win situation for both. They are trying to meet their entertainment and communication needs and we can help them provide the best of service in addition to winning their hearts and pocket.
ASSESSING LEARNING
Posted on: Software testing
Importance of Software Testing
It’s common for many startups to skip testing. They might say that their budget is the reason why they overlook such an important step. They think it would lead to no major consequences. But to make a strong and positive first impression, it needs to be top-notch. And for that, testing the product for bugs is a must.
To really understand why software testing is important, we need to correlate it with real world examples, which has caused serious issues in the past, a few examples include:
In October 2014, Flipkart an e-commerce in India company had an offer called the “Big Billion Sale.” When it was launched it had a lot of traffic and as a result, its website couldn’t handle the enormous load of traffic leading to the website downtime, cancellation of orders etc. The reputation of the organization was badly impacted by this issue.
In 2015, the Royal Bank of Scotland, due to a bug, couldn’t process about 600,000 payments. Because of this, they were fined 66 million pounds
Yahoo in September 2016, had a major data breach where 500 million users’ credentials got compromised.
To really understand why software testing is important, we need to correlate it with real world examples, which has caused serious issues in the past, a few examples include:
In October 2014, Flipkart an e-commerce in India company had an offer called the “Big Billion Sale.” When it was launched it had a lot of traffic and as a result, its website couldn’t handle the enormous load of traffic leading to the website downtime, cancellation of orders etc. The reputation of the organization was badly impacted by this issue.
In 2015, the Royal Bank of Scotland, due to a bug, couldn’t process about 600,000 payments. Because of this, they were fined 66 million pounds
Yahoo in September 2016, had a major data breach where 500 million users’ credentials got compromised.
Posted on: #iteachmsu

Software-as-a-Service (SaaS)
Software-as-a-Service (SaaS) :
Software-as-a-Service (SaaS) is a software licensing model in which access to the software is provided on a subscription basis, with the software being located on external servers rather than on servers located in-house. Software-as-a-Service is typically accessed through a web browser, with users logging into the system using a username and password. Instead of each user having to install the software on their computer, the user is able to access the program via the internet.
SaaS has many business applications, including file sharing, email, calendars, customer retention management, and human resources.
Software-as-a-Service (SaaS) is a software licensing model in which access to the software is provided on a subscription basis, with the software being located on external servers rather than on servers located in-house. Software-as-a-Service is typically accessed through a web browser, with users logging into the system using a username and password. Instead of each user having to install the software on their computer, the user is able to access the program via the internet.
SaaS has many business applications, including file sharing, email, calendars, customer retention management, and human resources.
Posted on: #iteachmsu

Five-second testing%
In a five-second test, you present your users with a design and give them five seconds to look at it, then ask them questions. This method can be used to test landing page copy, UI content, and more. You’re testing to see if the information on your page can be quickly absorbed, perceived, or understood.
The questions you ask can range from broad, like “What do you think of the page?” or “What do you remember seeing?” to more specific ones, like “Which of the items are on sale?”.
It’s best to start the test with broad questions to get general feedback and thoughts from your participants, then asking more specific questions to see what information stuck with them.
Preference testing
Preference testing consists of showing research participants two to three versions of your design—in this case, with variations in the content—to get an idea of which they prefer and why. It can help you understand the user’s perception of your content, how it makes them thin
The questions you ask can range from broad, like “What do you think of the page?” or “What do you remember seeing?” to more specific ones, like “Which of the items are on sale?”.
It’s best to start the test with broad questions to get general feedback and thoughts from your participants, then asking more specific questions to see what information stuck with them.
Preference testing
Preference testing consists of showing research participants two to three versions of your design—in this case, with variations in the content—to get an idea of which they prefer and why. It can help you understand the user’s perception of your content, how it makes them thin
NAVIGATING CONTEXT
Posted on: #iteachmsu

Five-second testing%
In a five-second test, you present your users with a design and give them five seconds to look at it, then ask them questions. This method can be used to test landing page copy, UI content, and more. You’re testing to see if the information on your page can be quickly absorbed, perceived, or understood.
The questions you ask can range from broad, like “What do you think of the page?” or “What do you remember seeing?” to more specific ones, like “Which of the items are on sale?”.
It’s best to start the test with broad questions to get general feedback and thoughts from your participants, then asking more specific questions to see what information stuck with them.
Preference testing
Preference testing consists of showing research participants two to three versions of your design—in this case, with variations in the content—to get an idea of which they prefer and why. It can help you understand the user’s perception of your content, how it makes them thin
The questions you ask can range from broad, like “What do you think of the page?” or “What do you remember seeing?” to more specific ones, like “Which of the items are on sale?”.
It’s best to start the test with broad questions to get general feedback and thoughts from your participants, then asking more specific questions to see what information stuck with them.
Preference testing
Preference testing consists of showing research participants two to three versions of your design—in this case, with variations in the content—to get an idea of which they prefer and why. It can help you understand the user’s perception of your content, how it makes them thin
NAVIGATING CONTEXT
Posted on: #iteachmsu

Graphical user interface
graphical user interface:
The graphical user interface (GUI is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicators such as primary notation, instead of text-based user interfaces, typed command labels, or text navigation. GUIs were introduced in reaction to the perceived steep learning curve of command-line interfaces (CLIs), which require commands to be typed on a computer keyboard.
The actions in a GUI are usually performed through direct manipulation of the graphical elements. Beyond computers, GUIs are used in many handheld mobile devices such as MP3 players, portable media players, gaming devices, smartphones, and smaller household, office, and industrial controls. The term GUI tends not to be applied to other lower-display resolution types of interfaces, such as video games ), or not including flat screens, like volumetric displays.
User interface and interaction design:
Designing the visual composition and temporal behavior of a GUI is an important part of software application programming in the area of human-computer interaction. Its goal is to enhance the efficiency and ease of use for the underlying logical design of a stored program, a design discipline named usability. Methods of user-centered design are used to ensure that the visual language introduced in the design is well-tailored to the tasks.
The visible graphical interface features of an application are sometimes referred to as chrome or GUI (pronounced gooey) Typically, users interact with information by manipulating visual widgets that allow for interactions appropriate to the kind of data they hold. The widgets of a well-designed interface are selected to support the actions necessary to achieve the goals of users.
The graphical user interface (GUI is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicators such as primary notation, instead of text-based user interfaces, typed command labels, or text navigation. GUIs were introduced in reaction to the perceived steep learning curve of command-line interfaces (CLIs), which require commands to be typed on a computer keyboard.
The actions in a GUI are usually performed through direct manipulation of the graphical elements. Beyond computers, GUIs are used in many handheld mobile devices such as MP3 players, portable media players, gaming devices, smartphones, and smaller household, office, and industrial controls. The term GUI tends not to be applied to other lower-display resolution types of interfaces, such as video games ), or not including flat screens, like volumetric displays.
User interface and interaction design:
Designing the visual composition and temporal behavior of a GUI is an important part of software application programming in the area of human-computer interaction. Its goal is to enhance the efficiency and ease of use for the underlying logical design of a stored program, a design discipline named usability. Methods of user-centered design are used to ensure that the visual language introduced in the design is well-tailored to the tasks.
The visible graphical interface features of an application are sometimes referred to as chrome or GUI (pronounced gooey) Typically, users interact with information by manipulating visual widgets that allow for interactions appropriate to the kind of data they hold. The widgets of a well-designed interface are selected to support the actions necessary to achieve the goals of users.
Authored by: Rupali
Posted on: #iteachmsu

A class is a user-defined blueprint or prototype from which objects are created. -- Edited
A class is a user-defined blueprint or prototype from which objects are created. It represents the set of properties or methods that are common to all objects of one type. Using classes, you can create multiple objects with the same behavior instead of writing their code multiple times. This includes classes for objects occurring more than once in your code. https://www.javatpoint.com/microprocessor-introduction In general, class declarations can include these components in order:
Modifiers: A class can be public or have default access (Refer to this for details).
Class name: The class name should begin with the initial letter capitalized by convention.
Superclass (if any): The name of the class’s parent (superclass), if any, preceded by the keyword extends. A class can only extend (subclass) one parent.
Interfaces (if any): A comma-separated list of interfaces implemented by the class, if any, preceded by the keyword implements. A class can implement more than one interface.
Body: The class body is surrounded by braces, { }.
An object is a basic unit of Object-Oriented Programming that represents real-life entities. A typical Java program creates many objects, which as you know, interact by invoking methods. The objects are what perform your code, they are the part of your code visible to the viewer/user. An object mainly consists of:
State: It is represented by the attributes of an object. It also reflects the properties of an object.
Behavior: It is represented by the methods of an object. It also reflects the response of an object to other objects.
Identity: It is a unique name given to an object that enables it to interact with other objects.
Method: A method is a collection of statements that perform some specific task and return the result to the caller. A method can perform some specific task without returning anything. Methods allow us to reuse the code without retyping it, which is why they are considered time savers. In Java, every method must be part of some class, which is different from languages like C, C++, and Python.
Modifiers: A class can be public or have default access (Refer to this for details).
Class name: The class name should begin with the initial letter capitalized by convention.
Superclass (if any): The name of the class’s parent (superclass), if any, preceded by the keyword extends. A class can only extend (subclass) one parent.
Interfaces (if any): A comma-separated list of interfaces implemented by the class, if any, preceded by the keyword implements. A class can implement more than one interface.
Body: The class body is surrounded by braces, { }.
An object is a basic unit of Object-Oriented Programming that represents real-life entities. A typical Java program creates many objects, which as you know, interact by invoking methods. The objects are what perform your code, they are the part of your code visible to the viewer/user. An object mainly consists of:
State: It is represented by the attributes of an object. It also reflects the properties of an object.
Behavior: It is represented by the methods of an object. It also reflects the response of an object to other objects.
Identity: It is a unique name given to an object that enables it to interact with other objects.
Method: A method is a collection of statements that perform some specific task and return the result to the caller. A method can perform some specific task without returning anything. Methods allow us to reuse the code without retyping it, which is why they are considered time savers. In Java, every method must be part of some class, which is different from languages like C, C++, and Python.
Authored by: Vijayalaxmi Mhetre
Disciplinary Content
Posted on: #iteachmsu
Android task monitoring
This project is exclusively designed to simplify the tracking and monitoring of day-to-day activities of the busy modern life. We are so busy in our daily lives right now that it becomes impossible to keep track of our daily events, meetings, and appointments. To address this issue, this project focuses on developing a Weekly Task Alerting System for Android devices that can alert users of the tasks/appointments that are scheduled for each day in a week.
The project is primarily a reminder app powered by an AI chatbot that reminds users of all the tasks that are due daily. Users can use this application to set goals and achieve them, thereby increasing productivity and simplifying their lives.
The project is primarily a reminder app powered by an AI chatbot that reminds users of all the tasks that are due daily. Users can use this application to set goals and achieve them, thereby increasing productivity and simplifying their lives.
Authored by: Divya Sawant
Posted on: #iteachmsu

Online Education
Even when things like ticket booking, watching TV shows, ordering food is becoming online, education is still behind in terms of online education delivery. Due to the easy availability of internet, the number of internet users is increasing rapidly. The increasing number of Smartphone users is providing a good opportunity to deliver education online.
Online education which includes online courses and online examinations are slowly and surely becoming popular due to the interest shown by the working professionals to learn new things and expand their knowledge about technology. More number of organizations like Byju’s is emerging to target online education for students.
https://www.youtube.com/watch?v=kyJnjO8cG30&ab_channel=BankPro
Online education which includes online courses and online examinations are slowly and surely becoming popular due to the interest shown by the working professionals to learn new things and expand their knowledge about technology. More number of organizations like Byju’s is emerging to target online education for students.
https://www.youtube.com/watch?v=kyJnjO8cG30&ab_channel=BankPro
Authored by: Divya Sawant
Assessing Learning
Posted on: #iteachmsu
Human trafficking-considered modern-day slavery- is a global problem and is becoming increasingly pr
Human trafficking-considered modern-day slavery- is a global problem and is becoming increasingly prevalent across the World. Types and venues of trafficking in the United States Identifying victims of trafficking in healthcare settings Identifying warning signs of trafficking in healthcare settings for minors and adults Identifying resources for reporting suspected victims of human trafficking. The training requirement dictates a timeline beginning with the first renewal cycle for the period of 2017-2022. Let's talk more and research many areas, So join us by registering The timeline for the training of individuals who are seeking initial nursing licensure - is 5 or more years of experience.
Posted by: Vijayalaxmi Vishavnathkam Santosh Mali
Posted on: #iteachmsu

TAM Model
Technology acceptance model
Based on the theory of reasoned Action, Davis ( 1986 ) developed the Technology Acceptance Model which deals more specifically with the prediction of the acceptability of an information system. The purpose of this model is to predict the acceptability of a tool and to identify the modifications which must be brought to the system in order to make it acceptable to users. This model suggests that the acceptability of an information system is determined by two main factors: perceived usefulness and perceived ease of use.
Perceived usefulness is defined as being the degree to which a person believes that the use of a system will improve his performance. Perceived ease of use refers to the degree to which a person believes that the use of a system will be effortless. Several factorial analyses demonstrated that perceived usefulness and perceived ease of use can be considered as two different dimensions (Hauser et Shugan, 1980 ; Larcker et Lessig, 1980 ; Swanson, 1987).
As demonstrated in the theory of reasoned Action, the Technology Acceptance Model postulates that the use of an information system is determined by the behavioral intention, but on the other hand, that the behavioral intention is determined by the person’s attitude towards the use of the system and also by his perception of its utility. According to Davis, the attitude of an individual is not the only factor that determines his use of a system, but is also based on the impact which it may have on his performance. Therefore, even if an employee does not welcome an information system, the probability that he will use it is high if he perceives that the system will improve his performance at work. Besides, the Technology Acceptance Model hypothesizes a direct link between perceived usefulness and perceived ease of use. With two systems offering the same features, a user will find more useful the one that he finds easier to use (Dillon and Morris, on 1996).
Based on the theory of reasoned Action, Davis ( 1986 ) developed the Technology Acceptance Model which deals more specifically with the prediction of the acceptability of an information system. The purpose of this model is to predict the acceptability of a tool and to identify the modifications which must be brought to the system in order to make it acceptable to users. This model suggests that the acceptability of an information system is determined by two main factors: perceived usefulness and perceived ease of use.
Perceived usefulness is defined as being the degree to which a person believes that the use of a system will improve his performance. Perceived ease of use refers to the degree to which a person believes that the use of a system will be effortless. Several factorial analyses demonstrated that perceived usefulness and perceived ease of use can be considered as two different dimensions (Hauser et Shugan, 1980 ; Larcker et Lessig, 1980 ; Swanson, 1987).
As demonstrated in the theory of reasoned Action, the Technology Acceptance Model postulates that the use of an information system is determined by the behavioral intention, but on the other hand, that the behavioral intention is determined by the person’s attitude towards the use of the system and also by his perception of its utility. According to Davis, the attitude of an individual is not the only factor that determines his use of a system, but is also based on the impact which it may have on his performance. Therefore, even if an employee does not welcome an information system, the probability that he will use it is high if he perceives that the system will improve his performance at work. Besides, the Technology Acceptance Model hypothesizes a direct link between perceived usefulness and perceived ease of use. With two systems offering the same features, a user will find more useful the one that he finds easier to use (Dillon and Morris, on 1996).
Authored by: chathuri
Pedagogical Design
Posted on: #iteachmsu

TAM Model 2
Technology acceptance model
Based on the theory of reasoned Action, Davis ( 1986 ) developed the Technology Acceptance Model which deals more specifically with the prediction of the acceptability of an information system. The purpose of this model is to predict the acceptability of a tool and to identify the modifications which must be brought to the system in order to make it acceptable to users. This model suggests that the acceptability of an information system is determined by two main factors: perceived usefulness and perceived ease of use.
Perceived usefulness is defined as being the degree to which a person believes that the use of a system will improve his performance. Perceived ease of use refers to the degree to which a person believes that the use of a system will be effortless. Several factorial analyses demonstrated that perceived usefulness and perceived ease of use can be considered as two different dimensions (Hauser et Shugan, 1980 ; Larcker et Lessig, 1980 ; Swanson, 1987).
As demonstrated in the theory of reasoned Action, the Technology Acceptance Model postulates that the use of an information system is determined by the behavioral intention, but on the other hand, that the behavioral intention is determined by the person’s attitude towards the use of the system and also by his perception of its utility. According to Davis, the attitude of an individual is not the only factor that determines his use of a system, but is also based on the impact which it may have on his performance. Therefore, even if an employee does not welcome an information system, the probability that he will use it is high if he perceives that the system will improve his performance at work. Besides, the Technology Acceptance Model hypothesizes a direct link between perceived usefulness and perceived ease of use. With two systems offering the same features, a user will find more useful the one that he finds easier to use (Dillon and Morris, on 1996).
Based on the theory of reasoned Action, Davis ( 1986 ) developed the Technology Acceptance Model which deals more specifically with the prediction of the acceptability of an information system. The purpose of this model is to predict the acceptability of a tool and to identify the modifications which must be brought to the system in order to make it acceptable to users. This model suggests that the acceptability of an information system is determined by two main factors: perceived usefulness and perceived ease of use.
Perceived usefulness is defined as being the degree to which a person believes that the use of a system will improve his performance. Perceived ease of use refers to the degree to which a person believes that the use of a system will be effortless. Several factorial analyses demonstrated that perceived usefulness and perceived ease of use can be considered as two different dimensions (Hauser et Shugan, 1980 ; Larcker et Lessig, 1980 ; Swanson, 1987).
As demonstrated in the theory of reasoned Action, the Technology Acceptance Model postulates that the use of an information system is determined by the behavioral intention, but on the other hand, that the behavioral intention is determined by the person’s attitude towards the use of the system and also by his perception of its utility. According to Davis, the attitude of an individual is not the only factor that determines his use of a system, but is also based on the impact which it may have on his performance. Therefore, even if an employee does not welcome an information system, the probability that he will use it is high if he perceives that the system will improve his performance at work. Besides, the Technology Acceptance Model hypothesizes a direct link between perceived usefulness and perceived ease of use. With two systems offering the same features, a user will find more useful the one that he finds easier to use (Dillon and Morris, on 1996).
Authored by: chathuri
Pedagogical Design
Posted on: #iteachmsu
The most widely-used Agile methodologies include:
The main principles of the Lean methodology include:
Eliminating Waste
Amplifying Learning
Deciding as Late as Possible
Delivering as Fast as Possible
Empowering the Team
Building Integrity In
Seeing the Whole
Lean development eliminates waste by asking users to select only the truly valuable features for a system, prioritize those features, and then work to deliver them in small batches. It relies on rapid and reliable feedback between programmers and customers, emphasizing the speed and efficiency of development workflows. Lean uses the idea of a work product being “pulled” via customer request. It gives decision-making authority to individuals and small teams since this has been proven to be a faster and more efficient method than a hierarchical flow of control. Lean also concentrates on the efficient use of team resources, trying to ensure that everyone is as productive as possible for the maximum amount of time. It strongly recommends that automated unit tests be written at the same time the code is written.
Eliminating Waste
Amplifying Learning
Deciding as Late as Possible
Delivering as Fast as Possible
Empowering the Team
Building Integrity In
Seeing the Whole
Lean development eliminates waste by asking users to select only the truly valuable features for a system, prioritize those features, and then work to deliver them in small batches. It relies on rapid and reliable feedback between programmers and customers, emphasizing the speed and efficiency of development workflows. Lean uses the idea of a work product being “pulled” via customer request. It gives decision-making authority to individuals and small teams since this has been proven to be a faster and more efficient method than a hierarchical flow of control. Lean also concentrates on the efficient use of team resources, trying to ensure that everyone is as productive as possible for the maximum amount of time. It strongly recommends that automated unit tests be written at the same time the code is written.
Authored by: Chathuri
Pedagogical Design
Posted on: #iteachmsu
Graphical user interface design principles conform to the model–view–controller software pattern, which separates internal representations of information from the manner in which information is presented to the user, resulting in a platform where users are shown which functions are possible rather than requiring the input of command codes. Users interact with information by manipulating visual widgets, which are designed to respond in accordance with the type of data they hold and support the actions necessary to complete the user’s task.
Posted by: Chathuri Super admin..
Assessing Learning
Posted on: #iteachmsu
Management Information Systems is of paramount importance to reach effective decisions in an organization. The literature presented in this study explained the significant role of MIS in the decision-making process enhancement in an organization. MIS is deemed to be an integrated user-machine system that provides information to support operations, management, and decision-making functions at various levels of an organization. Organizations are aware that MIS is a special-purpose system useful for management objectives. The study has highlighted that MIS should be accessible in supplying appropriate and high-quality information from its generation to its users. To MIS, to be vital and effective, a carefully conceived, designed, and executed database should exist to communicate the adaptive decisions.
Posted by: Rupali Jagtap
Assessing Learning
Posted on: #iteachmsu

Interest-based Advertising:
This type of advertisement tries to capture and understand the interest of the users. It is targeted on the basis of the visitor and not the content. So, if I am surfing Myntra for clothes and then I switch to Facebook, I will see the advertisement for Myntra there. The website comes up with ads based on Interest-based Advertising.
This type of advertisement tries to capture and understand the interest of the users. It is targeted on the basis of the visitor and not the content. So, if I am surfing Myntra for clothes and then I switch to Facebook, I will see the advertisement for Myntra there. The website comes up with ads based on Interest-based Advertising.
Posted by: Rupali Jagtap
Posted on: #iteachmsu

Software-as-a-Service (SaaS) is a software licensing model in which access to the software is provided on a subscription basis, with the software being located on external servers rather than on servers located in-house. Software-as-a-Service is typically accessed through a web browser, with users logging into the system using a username and password.
Posted by: Rupali Jagtap
Assessing Learning
Posted on: What are the 12 Agi...

Edited: The Agile Alliance defines 12 lightness principles for those who need to attain agility:
Our highest priority is to satisfy the client through early and continuous delivery of valuable computer software.
Welcome dynamic necessities, even late in development. Agile Processes harness modification for the customer’s competitive advantage.
Deliver operating computer software often, from a pair of weeks to a couple of months, with a preference to the shorter timescale.
Business individuals and developers should work along daily throughout the project.
The build comes around actuated people. offer them the setting and support they have, and trust them to urge the task done.
the foremost economical and effective methodology of conveyancing info to and among a development team is face-to-face speech.
Working with computer software is the primary life of progress.
Agile processes promote property development. The sponsors, developers, and users will be able to maintain a relentless pace indefinitely.
Continuous attention to technical excellence and smart style enhances nimbleness.
Simplicity—the art of maximizing the number of work not done—is essential.
the most effective architectures, necessities, and styles emerge from self–organizing groups.
At regular intervals, the team reflects on a way to become simpler, then tunes and adjusts its behavior consequently.
Our highest priority is to satisfy the client through early and continuous delivery of valuable computer software.
Welcome dynamic necessities, even late in development. Agile Processes harness modification for the customer’s competitive advantage.
Deliver operating computer software often, from a pair of weeks to a couple of months, with a preference to the shorter timescale.
Business individuals and developers should work along daily throughout the project.
The build comes around actuated people. offer them the setting and support they have, and trust them to urge the task done.
the foremost economical and effective methodology of conveyancing info to and among a development team is face-to-face speech.
Working with computer software is the primary life of progress.
Agile processes promote property development. The sponsors, developers, and users will be able to maintain a relentless pace indefinitely.
Continuous attention to technical excellence and smart style enhances nimbleness.
Simplicity—the art of maximizing the number of work not done—is essential.
the most effective architectures, necessities, and styles emerge from self–organizing groups.
At regular intervals, the team reflects on a way to become simpler, then tunes and adjusts its behavior consequently.
Posted by: Chathuri Super admin..
Assessing Learning
Posted on: #iteachmsu
Edited: The Agile Alliance defines 12 lightness principles for those who need to attain agility:
Our highest priority is to satisfy the client through early and continuous delivery of valuable computer software.
Welcome dynamic necessities, even late in development. Agile Processes harness modification for the customer’s competitive advantage.
Deliver operating computer software often, from a pair of weeks to a couple of months, with a preference to the shorter timescale.
Business individuals and developers should work along daily throughout the project.
The build comes around actuated people. offer them the setting and support they have, and trust them to urge the task done.
the foremost economical and effective methodology of conveyancing info to and among a development team is face-to-face speech.
Working with computer software is the primary life of progress.
Agile processes promote property development. The sponsors, developers, and users will be able to maintain a relentless pace indefinitely.
Continuous attention to technical excellence and smart style enhances nimbleness.
Simplicity—the art of maximizing the number of work not done—is essential.
the most effective architectures, necessities, and styles emerge from self–organizing groups.
At regular intervals, the team reflects on a way to become simpler, then tunes and adjusts its behavior consequently.
Our highest priority is to satisfy the client through early and continuous delivery of valuable computer software.
Welcome dynamic necessities, even late in development. Agile Processes harness modification for the customer’s competitive advantage.
Deliver operating computer software often, from a pair of weeks to a couple of months, with a preference to the shorter timescale.
Business individuals and developers should work along daily throughout the project.
The build comes around actuated people. offer them the setting and support they have, and trust them to urge the task done.
the foremost economical and effective methodology of conveyancing info to and among a development team is face-to-face speech.
Working with computer software is the primary life of progress.
Agile processes promote property development. The sponsors, developers, and users will be able to maintain a relentless pace indefinitely.
Continuous attention to technical excellence and smart style enhances nimbleness.
Simplicity—the art of maximizing the number of work not done—is essential.
the most effective architectures, necessities, and styles emerge from self–organizing groups.
At regular intervals, the team reflects on a way to become simpler, then tunes and adjusts its behavior consequently.
Posted by: Chathuri Super admin..
Justice and Belonging
Posted on: #iteachmsu

Computer is an advanced electronic device that takes raw data as an input from the user and processes it under the control of a set of instructions (called program), produces a result (output), and saves it for future use.
Posted by: Rupali Jagtap
Posted on: #iteachmsu
Embedded systems make the environment alive with little computations and automated processes, from computerized cooking appliances to lighting and plumbing fixtures to window blinds to automobile braking systems to greeting cards. The expected difference in the future is the addition of networked communications that will allow many of these embedded computations to coordinate with each other and with the user
Posted by: Rupali Jagtap
Assessing Learning
Host: MSU Libraries
Zotero Workshop (Online)
An introduction to the free open source citation management program Zotero. In this workshop, participants will learn how to:
Download references from MSU's article databases and websites
Format citations and bibliographies in a Word document
Create groups and share references with other users
Registration for this event is required.
You will receive a link to join a Zoom meeting before the workshop. Please install the Zotero software and Zotero browser connector on your computer before the session begins. More information is available from https://libguides.lib.msu.edu/zotero/setup.
Questions or need more information? Contact the MSU Libraries Zotero training team at lib.dl.zotero@msu.edu.
To schedule a separate session for your class or research group, please contact the Zotero team at lib.dl.zotero@msu.edu.
Navigating Context
Host: #iteachmsu

Computer Fundamentals
Computer is an advanced electronic device that takes raw data as an input from the user and processes it under the control of a set of instructions (called program), produces a result (output), and saves it for future use. This tutorial explains the foundational concepts of computer hardware, software, operating systems, peripherals, etc. along with how to get the most value and impact from computer technology.