Consider the four definitions of information presented in this chapter. The problem with the first definition, “knowledge derived from data,” is that it merely substitutes one word we don’t know the meaning of (information) for a second word we don’t know the meaning of (knowledge). The problem with the second definition, “data presented in a meaningful context,” is that it is too subjective. Whose context? What makes a context meaningful? The third definition, “data processed by summing, ordering, averaging, etc.,” is too mechanical. It tells us what to do, but it doesn’t tell us what information is. The fourth definition, “a difference that makes a difference,” is vague and unhelpful.
Also, none of these definitions helps us to quantify the amount of information we receive. What is the information content of the statement that every human being has a navel? Zero—you already know that. In contrast, the statement that someone has just deposited $50,000 into your checking account is chock-full of information. So, good information has an element of surprise.
Considering all of these points, answer the following questions:
a. What is information made of?
b. If you have more information, do you weigh more? Why or why not?
c. When you give a copy of your transcript to a prospective employer, how is information produced? What part of that information production process do you control? What, if anything, can you do to improve the quality of information that the employer conceives?
d. Give your own best definition of information.
e. Explain how you think it is possible that we have an industry called the information technology industry, but we have great difficulty defining the word information.
In: Finance
Program C You are given some data from an animal shelter, listing animals that they currently have. They have asked you to write a program to sort the dogs and cats in age in ascending order, respectively, and write them in separate files. Assume the input file has the format of name (one word), species (one word), gender (one word), age (int), weight (double), with each animal on a separate line:
Hercules cat male 3 13.4
Toggle dog female 3 48
Buddy lizard male 2 0.3 ….
Example input/output:
Enter the file name: animals.txt
Output file name: sorted_dogs.txt sorted_cats.txt
1. Name your program animals.c.
2. The output file name should be sorted_dogs.txt and sorted_cats.txt. Assume the input file name is no more than 100 characters.
3. The program should be built around an array of animal structures, with each animal containing information of name, species, gender, age, and weight. Assume that there are no more than 200 items in the file. Assume the name of an animal is no more than 100 characters.
4. Use fscanf and fprintf to read and write data.
5. Your program should include a sorting function so that it sorts the animals in age. You can use any sorting algorithms such as selection sort and insertion sort. void sort_animals(struct animal list[], int n);
6. Output files should be in the format of name gender age weight, with 2 decimal digits for weight.
For example,
Toggle female 3 48.01
Rocky male 5 52.32
In: Computer Science
Nearby is a main() function demonstrating the use of the function earliest_word. Implement this function according to the documentation given. My solution is about 25 lines plus some closing curly braces.
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
char *earliest_word(char *fname, int *nwords);
// Opens the file fname and reads words from it
// until the end of file is reached then closes
// the file. If the file to be opened doesn't
// exist, returns NULL and sets nwords to
// -1. Tracks the alphabetic "earliest" word that
// is read in as indicated by strcmp(). Tracks how
// many words in total are read and sets nwords to
// that value. Allocates a block of memory and
// copies the earliest word found into the block
// using strcpy(). Returns a pointer to the
// freshly allocated block.
//
// ASSUMPTIONS: Words are no longer than 127
// characters so will fit in an array of size
// 128. Files have at least one word in them.
int main(){
int count; char *file; char *early;
file = "vegetables.txt";
// pumpkin carrot beet squash cucumber
early = earliest_word(file, &count);
printf("%s: %d words, %s earliest\n",
file,count,early);
// vegetables.txt: 5 words, beet earliest
free(early);
file = "fruits.txt";
// banana peach orange apple pineapple strawberry
early = earliest_word(file, &count);
printf("%s: %d words, %s earliest\n",
file,count,early);
// fruits.txt: 6 words, apple earliest
free(early);
file = "not-there.txt";
early = earliest_word(file, &count);
if(early==NULL){
printf("%s not found\n",file);
// not-there.txt not found
}
return 0;
}
C programming
In: Computer Science
| Command | Function |
| info cat | |
| Demonstrate 'cat' in use | |
| man cp | |
| Demonstrate 'cp' in use | |
| man touch | |
| Demonstrate 'touch' in use | |
| man mv | |
| Demonstrate 'mv' in use | |
| man rm | |
| Demonstrate 'rm' in use | |
| info wc | |
| Demonstrate 'wc' in use | |
| man find | |
| Demonstrate 'find' in use | |
| man chmod | |
| Demonstrate 'chmod' in use | |
| man chown | |
| Demonstrate 'chown' in use | |
| Lookup append ">>" operator online | |
| Demonstrate '>>' in use | |
| Lookup redirection ">" operator online | |
| Demonstrate '>' in use | |
| Lookup another command not previously covered | |
| Use that command | |
PART B (50 total pts) - File Operations (Windows)
| Command | Function |
| help type | |
| Demonstrate 'type' in use | |
| help copy | |
| Demonstrate 'copy' in use | |
| help xcopy | |
| Demonstrate 'xcopy' in use | |
| help move | |
| Demonstrate 'move' in use | |
| help del | |
| Demonstrate 'del' in use | |
| Demonstrate 'find' in use | |
| Demonstrate 'find' with parameters to get Word Count | |
| help attrib | |
| Demonstrate 'attrib' with parameters to get Word Count | |
| help rmdir | |
| Demonstrate 'rmdir' with parameters to get Word Count | |
| Look append ">>" operator online | |
| Demonstrate '>>' in use | |
| Look redirection ">" operator online | |
| Demonstrate '>' in use | |
| help whoami | |
| Demonstrate 'whoami' in use | |
| Lookup another command not previously covered | |
| Use that command |
In: Computer Science
Assignment 3C: Answer the following questions
Question 1.
a. Declare a 32-bit signed integer variable and initialize it with the smallest possible negative decimal value.
b. Declare an uninitialized array of 100 16-bit unsigned integers.
c. Declare a string variable containing the word “DVC” repeated 20 times, and terminated with the null char.
Question 2
For the following declarations, assuming that the address of I is 404000h
What are the addresses of J, K, and L?
What is the total number of allocated bytes?
Show the content of the individual bytes allocated in memory in hexadecimal
.DATA
I SBYTE 1, -1
J SWORD 10FFh, -256
K DWORD 23456h
L BYTE 'DVC'
Question 3
Given the following definitions:
.DATA
wval LABEL WORD
barray BYTE 10h, 20h, 30h, 6 DUP (0Ah)
ALIGN 4
warray WORD 5 DUP (1000h)
pressKey EQU <"Press any key to continue ...", 0>
darray DWORD 5 DUP (56789ABh), 7 DUP (12345678h)
dval LABEL DWORD
prompt BYTE pressKey
What will be the value of EAX, AX, and AL after executing each of the following instructions? Assume that the address of barray is 404000h.
a. mov eax, TYPE warray
b. mov eax, LENGTHOF barray
c. mov eax, SIZEOF darray
d. mov eax, OFFSET warray
e. mov eax, OFFSET darray
f. mov eax, OFFSET prompt
g. mov eax, DWORD PTR barray
h. mov al, BYTE PTR darray
i. mov ax, wval
j. mov eax, dval
In: Computer Science
1. Lets start by creating a traditional random password composed of numbers, letters, and a few special characters.
letters = "abcdefghijklmnopqrstuvwxyz"
caps = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
numbers = "1234567890"
# Make an 8 letter password by combining characters from the
three strings
2. Next you follow the XKCD model of selecting four random words and concatenating them together to for our password.
nouns = ['tissue', 'processor', 'headquarters', 'favorite',
'cure', 'ideology', 'funeral', 'engine', 'isolation', 'perception',
'hat', 'mountain', 'session', 'case', 'legislature', 'consent',
'spread', 'shot', 'direction', 'data', 'tragedy', 'illness',
'serving', 'mess', 'resistance', 'basis', 'kitchen', 'mine',
'temple', 'mass', 'dot', 'final', 'chair', 'picture', 'wish',
'transfer', 'profession', 'suggestion', 'purse', 'rabbit',
'disaster', 'evil', 'shorts', 'tip', 'patrol', 'fragment',
'assignment', 'view', 'bottle', 'acquisition', 'origin', 'lesson',
'Bible', 'act', 'constitution', 'standard', 'status', 'burden',
'language', 'voice', 'border', 'statement', 'personnel', 'shape',
'computer', 'quality', 'colony', 'traveler', 'merit', 'puzzle',
'poll', 'wind', 'shelter', 'limit', 'talent']
verbs = ['represent', 'warm', 'whisper', 'consider', 'rub',
'march', 'claim', 'fill', 'present', 'complain', 'offer',
'provoke', 'yield', 'shock', 'purchase', 'seek', 'operate',
'persist', 'inspire', 'conclude', 'transform', 'add', 'boast',
'gather', 'manage', 'escape', 'handle', 'transfer', 'tune', 'born',
'decrease', 'impose', 'adopt', 'suppose', 'sell', 'disappear',
'join', 'rock', 'appreciate', 'express', 'finish', 'modify',
'keep', 'invest', 'weaken', 'speed', 'discuss', 'facilitate',
'question', 'date', 'coordinate', 'repeat', 'relate', 'advise',
'arrest', 'appeal', 'clean', 'disagree', 'guard', 'gaze', 'spend',
'owe', 'wait', 'unfold', 'back', 'waste', 'delay', 'store',
'balance', 'compete', 'bake', 'employ', 'dip', 'frown',
'insert']
adjs = ['busy', 'closer', 'national', 'pale', 'encouraging',
'historical', 'extreme', 'cruel', 'expensive', 'comfortable',
'steady', 'necessary', 'isolated', 'deep', 'bad', 'free',
'voluntary', 'informal', 'loud', 'key', 'extra', 'wise',
'improved', 'mad', 'willing', 'actual', 'OK', 'gray', 'little',
'religious', 'municipal', 'just', 'psychological', 'essential',
'perfect', 'intense', 'blue', 'following', 'Asian', 'shared',
'rare', 'developmental', 'uncomfortable', 'interesting',
'environmental', 'amazing', 'unhappy', 'horrible', 'philosophical',
'American']
# Make a four word password by combining words from the list of nouns, verbs and adjs
3. Of course that does not make the IT department of most colleges
and businesses happy. They still want you to have at least one
capital letter and a number in your password. We’ll learn more
about this in a couple of chapters but it is easy to replace parts
of a string with a different string using the replace method. For
example "pool".replace('o', 'e') gives us peel Once you have your
final password you can replace some letters with number
substitutions. For example its common to replace the letter l with
the number 1 or the letter e with the number 3 or the o with a 0.
You can get creative. You can also easily capitalize a word using
"myword".capitalize() Once you feel confident that you understand
the code below you can use this activecode to make your password
comply with standard procedures to include special characters.
word = "pool"
word = word.replace('o', 'e')
print(word)
word = word.capitalize()
print(word)
4.
Challenge
This last part goes beyond what you have covered in the book so far, but I’ll give you the extra code you need. You will probably be able to figure out what it does and this is kind of a fun preview of things to come.
Lets suppose you DO have a 4 character password composed only of lower case letters. How many guesses would it take you to guess the password? You can actually write a program to create a four character string and compare it to the known password. If we put this process inside a loop we can keep track and see how many guesses it takes us to find the matching password.
import random
import sys
sys.setExecutionLimit(60000) # 60 seconds
my_password = "abcd"
guess_num = 0
done = False
while not done:
guessed_pw = ""
# your code here
if guessed_pw == my_password:
print("found it after ", guess_num, " tries")
done = True
In: Computer Science
Write in java
The submission utility will test your code against a different input than the sample given.
When you're finished, upload all of your .java files to Blackboard.
Grading:
Each problem will be graded as follows:
0 pts: no submission
1 pts: submitted, but didn't compile
2 pts: compiled, but didn't produce the right output
5 pts: compiled and produced the right output
Problem 1: "Letter index"
Write a program that inputs a word and an unknown number of indices and prints the letters of the word corresponding to those indices. If the index is greater than the length of the word, you should break from your loop
Sample input:
apple 0 3 20
Sample output:
a
l
Problem 2: "Matching letters"
Write a program that compares two words to see if any of their letters appear at the same index. Assume the words are of equal length and both in lower case. For example, in the sample below, a and e appear in both words at the same index.
Sample input:
apple andre
Sample output
a
e
Problem 3: "Word count"
You are given a series of lowercase words separated by spaces and ending with a . , all one on line. You are also given, on the first line, a word to look up. You should print out how many times that word occured in the first line.
Sample input:
is
computer science is no more about computers than astronomy is about telescopes .
Sample output:
2
Problem 4: "Treasure Chest"
The input to your program is a drawing of a bucket of jewels. Diamonds are represented as @, gold coins as $, rubies as *. Your program should output the total value in the bucket, assuming diamonds go for $1000, gold coins for $500, and rubies for $300. Note that the bucket may be wider or higher than the bucket in the example below.
Sample input:
|@* @ |
| *@@*|
|* $* |
|$$$* |
| *$@*|
-------
Sample output:
$9900
Problem 5: “Speed Camera”
Speed cameras are devices that monitor traffic and automatically issue tickets to cars going above the speed limit. They work by comparing two pictures of a car at a known time interval. If the car has traveled more than a set distance in that time, the car is given a citation.
The input are two text representations of a traffic picture with a car labeled as letters “c” (the car is moving upwards. These two pictures are shot exactly 1 second apart. Each row is 1/50 of a mile. The car is fined $10 for each mile per hour over 30 mph, rounded down to the nearest mph. Print the fine amount.
Sample input:
|.|
|.|
|.|
|.|
|c|
---
|.|
|c|
|.|
|.|
|.|
Sample output:
$1860
Problem 6. Distance from the science building
According to Google Maps, the DMF science building is at GPS coordinate 41.985 latitude, -70.966 longitude. Write a program that will read somebody’s GPS coordinate and tell whether that coordinate is within one-and-a-half miles of the science building or not.
Sample input:
-70.994
41.982
Sample output:
yes
At our position, 1 1/2 miles is about .030 degrees longitude, but about .022 degrees latitude. That means that you should calculate it as an ellipse, with the east and west going from -70.936 to -70.996, and the north and south going from 41.963 to 42.007.
Hint: Use the built in Ellipse2D.Double class. Construct a Ellipse2D.Double object using the coordinates given, and then use its "contains" method.
Problem 7: "Palindrome Numbers"
A palindrome is a word that reads the same forwards and backwards, such as, for example, "racecar", "dad", and "I". A palindrome number is the same idea, but applied to digits of a number. For example 1, 121, 95159 would be considered palindrome numbers.
The input to your program are two integers start and end. The output: all of the palindrome numbers between start and end (inclusive), each on a new line.
Sample input:
8 37
Sample output:
8
9
11
22
33
Hints:
1. Start by writing and testing a function that takes a number and returns true/false if the number is a palindrome. Then call that function in a for loop.
2. To see if a number is a palindrome, try turning it into a string. Then use charAt to compare the first and last digits, and so on.
In: Computer Science
Item 1
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
While solitary negative reactions or unjustified suggestions for change have the potential to dissipate discourse rather than build it, the pattern analysis shows that the anonymous condition seemed to provide a safe explorative space for learners to try out more reasons for their multiple solutions. Teachers will rarely give anonymous feedback, but the experience of giving anonymous feedback may open a social space where learners can try out the reasons for their suggestions. References: |
Teachers don't often provide feedback anonymously, but the ability to provide feedback anonymously may create a context where the rationale associated with specific suggestions can be more safely explored (Howard, Barrett, & Frick, 2010). However, we cannot assume that all anonymous online spaces will serve as safe social spaces. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 2
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
But what are reasonable outcomes of the influence of global processes on education? While the question of how global processes influence all aspects of education (and who controls these forces) is multidimensional and not completely testable, there appear to be some theories of globalization as it relates to education that can be empirically examined. References: |
The authors are not alone in asking “what are reasonable outcomes of the influence of global processes on education?” (p. 138). In fact, this same question provides the basis for the discussion that follows. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 3
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Merck, in fact, epitomizes the ideological nature--the pragmatic idealism--of highly visionary companies. Our research showed that a fundamental element in the "ticking clock" of a visionary company is a core ideology--core values and a sense of purpose beyond just making money--that guides and inspires people throughout the organization and remains relatively fixed for long periods of time. References: |
Research conducted by Collins and Porras (2002) highlights the importance of establishing and committing to an ideology comprised of two parts: (1) core values; (2) a core purpose. In my personal experience it seems easier to define a core ideology than to live it consistently. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 4
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
The concept of systems is really quite simple. The basic idea is that a system has parts that fit together to make a whole; but where it gets complicated - and interesting - is how those parts are connected or related to each other.There are many kinds of systems: government systems, health systems, military systems, business systems, and educational systems, to name a few. References: |
The fundamental idea of systems, such as corporations and schools, is actually very simple. Each system has components which interact. What is important is how those components are connected together. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 5
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Other major issues involve the accepted methods by which fidelity is measured. There are two major methods described in the literature for fidelity measurement. The first is through mathematical measurement that calculates the number of identical elements shared between the real world and the simulation; the greater the number of shared identical elements, the higher the simulation fidelity. A second method to measure fidelity is through a trainees' performance matrix. References: |
Liu et al. (2009) identified two major methods for measuring fidelity. The first is a mathematical (objective) method that requires counting "the number of identical elements shared between the real world and the simulation; the greater the number of shared identical elements, the higher the simulation fidelity" (p. 62). The second method involves a performance matrix that compares a human's performance in the simulation with that person's real-world performance, producing an indirect measure of fidelity. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 6
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
I accept the point that whenever learning occurs, some medium or mix of media must be present to deliver instruction. However, if learning occurs as a result of exposure to any media, the learning is caused by the instructional method embedded in the media presentation. Method is the inclusion of one of a number of possible representations of a cognitive process or strategy that is necessary for learning but which students cannot or will not provide for themselves. References: |
Media do not influence learning. Learning takes place because of the instructional methods represented in the medium which are used, rather than medium itself. It is the instructional methods which influence learning. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 7
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Learning is a complex set of processes that may vary according to the developmental level of the learner, the nature of the task, and the context in which the learning is to occur. As already indicated, no one theory can capture all the variables involved in learning. References: A learning theory, there, comprises a set of constructs linking observed changes in performance with what is thought to bring about those changes. References: |
A learning theory is made up of "a set of constructs linking observed changes in performance with whatever is thought to bring about those changes" (Driscoll, 2000). Therefore, since "learning is a complex set of processes that may vary according to the developmental level of the learner, the nature of the task, and the context in which the learning is to occur, it is apparent that no one theory can capture all the variables involved in learning" (Gredler, 2001). |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 8
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
The concept of systems is really quite simple. The basic idea is that a system has parts that fit together to make a whole; but where it gets complicated - and interesting - is how those parts are connected or related to each other. There are many kinds of systems: government systems, health systems, military systems, business systems, and educational systems, to name a few. References: |
Systems, including both business systems, and educational systems, are actually very simple. The main idea is that systems have parts that fit together to make a whole. What is interesting is how those parts are connected together. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 9
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
In examining the history of the visionary companies, we were struck by how often they made some of their best moves not by detailed strategic planning, but rather by experimentation, trial and error, opportunism, and--quite literally--accident. What looks in hindsight like a brilliant strategy was often the residual result of opportunistic experimentation and "purposeful accidents." References: |
When I look back on the decisions I've made, it's clear that I made some of my best choices not through a thorough analytical investigation of my options, but instead by trial and error and, often, simply by accident. The somewhat random aspect of my success or failure is, at the same time, both encouraging and scary. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 10
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version (written in 2002) |
|
The technological tools available today for creating computer-based learning materials are incredibly more powerful than those introduced just a few years ago. We can make our own movies with camcorders in our homes; we can publish our own books. Soon teachers and students will be able to use computer-video technology to produce their own learning materials. All it takes is time, know-how, and some funds. References: |
Frick (1991) claimed that computers would become so powerful that K-12 educators and students would be able to produce their own multimedia and Web-based learning materials. He predicted that teachers and students would soon be able to use computer-video technology to produce their own learning materials. All it would require is time, know-how, and some funds.
|
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
In: Accounting
Item 1
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
The study of learning derives from essentially two sources. Because learning involves the acquisition of knowledge, the first concerns the nature of knowledge and how we come to know things.... The second source in which modern learning theory is rooted concerns the nature and representation of mental life. References: |
The depiction and essence of mental life, the essential qualities of knowledge, and explanations for how knowledge is created provide for the origins of modern learning theory. Disagreement between theories of learning can often be traced to differences in one or more of these areas. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 2
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
From reading educator-authors' revisions, and experiencing confusion myself surrounding how performance measures fit into a design case, I feel the problem arises from how new authors view design cases in relation to scientific experimental studies in education. A designer who is also a researcher must recognize the difference in perspective between a design case and an experimental study which uses a design for teaching and learning. References: |
Seeing the differences in viewpoint between a study that reports experimental results and a design case is a must for an individual who is both a designer and a researcher. Howard identifies this change of perspective as being critical to new authors of design cases. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 3
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
While solitary negative reactions or unjustified suggestions for change have the potential to dissipate discourse rather than build it, the pattern analysis shows that the anonymous condition seemed to provide a safe explorative space for learners to try out more reasons for their multiple solutions. Teachers will rarely give anonymous feedback, but the experience of giving anonymous feedback may open a social space where learners can try out the reasons for their suggestions. References: |
Teachers don't often provide feedback anonymously, but the ability to provide feedback anonymously may create a context where the rationale associated with specific suggestions can be more safely explored (Howard, Barrett, & Frick, 2010). However, we cannot assume that all anonymous online spaces will serve as safe social spaces. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 4
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
The new paradigm of education requires the student, teacher, and parents to be informed of what the student has actually learned at any point in time, to assure that progress is continuous and personalized, and to make good decisions about what to learn next. The recordkeeping tool of an information-age LMS will replace the current report card. References: |
Some have suggested approaches for replacing the current report card. For example, Reigeluth and colleagues (2008) suggest a recording-keeping tool that could inform key stake holders of the current state of a student's knowledge to facilitate good decision-making about what a student should study next. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 5
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
It is when all our forces can move freely in us. In nature, this quality is almost automatic, because there are no images to interfere with natural processes of making things. But in all of our creations, the possibility occurs that images can interfere with the natural, necessary order of a thing. And, most of all, this way that images distort the things we make, is familiar in ourselves. References: |
When Alexander (1979) says that "in all of our creations, the possibility occurs that images can interfere with the natural, necessary order of a thing" (p. 48) he seems to imply that there is one unique right way possible to design a solution to a problem. While this perspective could be considered elitist, some of the most successful products are based on this premise. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 6
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
In examining the history of the visionary companies, we were struck by how often they made some of their best moves not by detailed strategic planning, but rather by experimentation, trial and error, opportunism, and--quite literally--accident. What looks in hindsight like a brilliant strategy was often the residual result of opportunistic experimentation and "purposeful accidents." References: |
The variety of projects that Google undertakes, from Internet search to cars that drive themselves, could be considered lack of focus. However, perhaps Google recognizes that successful moves that looked like the result of "a brilliant strategy was often the residual result of opportunistic experimentation" (Collins & Porras, 2002, p. 141). References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 7
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Merck, in fact, epitomizes the ideological nature--the pragmatic idealism--of highly visionary companies. Our research showed that a fundamental element in the "ticking clock" of a visionary company is a core ideology--core values and a sense of purpose beyond just making money--that guides and inspires people throughout the organization and remains relatively fixed for long periods of time. References: |
While some have identified Merck as a visionary company dedicated to a "core values and a sense of purpose beyond just making money" (Collins & Porras, 2002, p. 48), others point out corporate misdeeds perpetrated by Merck (e.g., its role in establishing a dubious medical journal that republished articles favorable to Merck products) as contradictory evidence. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 8
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Modifications that increase task difficulty are also presented to assist instructors in structuring developmental progressions for activities that reflect various net/wall games. For example, game modifications that require participants to strike a ball with a hand after a bounce are introduced before requiring participants to strike a ball with a racquet or with a hand without a bounce. References: |
One strategy for changing a task to decrease difficulty comes from physical education where "game modifications that require participants to strike a ball with a hand after a bounce are introduced before requiring participants to strike a ball with a racquet or with a hand without a bounce" (Mandigo & Anderson, 2003, p. 9). A participant may then be able to focus on other aspects of the game (e.g., strategy) or find that their anxiety about playing has decreased. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 9
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
While solitary negative reactions or unjustified suggestions for change have the potential to dissipate discourse rather than build it, the pattern analysis shows that the anonymous condition seemed to provide a safe explorative space for learners to try out more reasons for their multiple solutions. Teachers will rarely give anonymous feedback, but the experience of giving anonymous feedback may open a social space where learners can try out the reasons for their suggestions. References: |
It is clear that "solitary negative reactions or unjustified suggestions for change have the potential to dissipate discourse" (Howard, Barrett, & Frick, 2010, p. 103). However, anonymity may give learners a context in which they can try providing solutions that are more thoroughly supported by an accompanying rational (Howard, Barrett, & Frick, 2010). Clearly, the positive and negative consequences that anonymity has on peer feedback must be considered. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 10
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
It should be apparent that technology will play a crucial role in the success of the information-age paradigm of education. It will enable a quantum improvement in student learning, and likely at a lower cost per student per year than in the current industrial-age paradigm. Just as the electronic spreadsheet made the accountant's job quicker, easier, and less expensive, the kind of LMS described here will make the teacher's job quicker, easier, and less expensive. References: |
Introducing technology into the workplace does not automatically improve job performance. While managers may dream of lower costs, the introduction of technology may increase costs (especially in the short term) if using/learning the technology makes the individual's job harder. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
In: Psychology
Item 1
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Many students graduate from college not knowing what they want to do with their lives. We propose that students should be encouraged to think about life goals (not just career goals) from an early age and be encouraged to be constantly on the lookout for better goals. References: |
Unfortunately, I was not encouraged to think about life goals (not just career goals) from an early age or encouraged to be on the lookout for better goals (Reigeluth et al., 2008, p.34). Instead, my parents and teachers seemed to care more about trivial details like showing up to class on time. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 2
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Obviously, it is vitally important in the war of attrition that individuals should give no inkling of when they are going to give up. Anybody who betrayed, by the merest flicker of a whisker, that he was beginning to think of throwing in the sponge, would be at an instant disadvantage. References: |
In the game of survival between individuals in nature, indicating in any way that tossing in the towel is being seriously considered can be exploited by an adversary (Dawkins, 1989). |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 3
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
We shall take the simpleminded view that a theory is just a model of the universe, or a restricted part of it, and a set of rules that relate quantities in the model to observations that we make. It exists only in our minds and does not have any other reality (whatever that might mean). A theory is a good theory if it satisfies two requirements. It must accurately describe a large class of observations on the basis of a model that contains only a few arbitrary elements, and it must make definite predictions about the results of future observations. References: |
A theory can be thought to exist only in our brains and lack any other form of tangible reality. This does not mean that theories are just fleeting thoughts, since they are comprised of a specific model of how things work and rules that associate model attributes to what we observe in the universe. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 4
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
There is a desperate need for theorists and researchers to generate and refine a new breed of learning-focused instructional design theories that help educators and trainers to meet those needs, (i.e., that focus on learning and that foster development of initiative, teamwork, thinking skills, and diversity). The health of instructional-design theory also depends on its ability to involve stakeholders in the design process. Reference 1: Original Source Material 2
|
Driscoll (2000) defines instruction broadly as "any deliberate arrangement of events to facilitate a learner's acquisition of some goal" (p. 25). In order to increase the effectiveness of instruction, there is a critical need for the creation and refinement of instructional design theories to aid those who seek to promote learning. According to Reigeluth (1999), "The health of instructional-design theory also depends on its ability to involve stakeholders in the design process" (p. 27). References: Reigeluth, C. M. (1999). What is instructional-design theory and how is it changing? In C. M. Reigeluth (Ed.), Instructional-design theories and models: A new paradigm of instructional theory(Vol. II, pp. 5-29). Mahwah, NJ: Lawrence Erlbaum Associates. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 5
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
The philosophical position known as constructivism views knowledge as a human construction. The various perspectives within constructivism are based on the premise that knowledge is not part of an objective, external reality that is separate from the individual. Instead, human knowledge, whether the bodies of content in public disciplines (such as mathematics or sociology) or knowledge of the individual learner, is a human construction. References: |
Does knowledge exist outside of, or separate from, the individual who knows? Constructivists hold that human knowledge, whether the bodies of content in public disciplines (such as mathematics or sociology) or knowledge of the individual learner, is a human construction (Gredler, 2001).
|
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 6
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Pei is popularly known for the controversy surrounding his Grand Louvre Pyramid (1988), constructed in the courtyard of the Louvre (fig. 25.21). The Pyramid deliberately turns the tradition and concept of pyramid inside out. A pyramid is supposed to be solid, dark, and solitary--a mesmerizing symbol of the exotic world beyond the streets and cultures of Europe. References: |
We saw one of the highlights of the architectural tour of Paris as we approached the Louvre. The guide told us that Pei's Grand Louvre Pyramid deliberately turns the tradition and concept of pyramid inside out. When we got off the bus we were able to get a closer look at the glass pyramid and what was below it. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 7
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
As a further example, APT queries and their results may be used to form rules for expert systems that become part of an intelligent computer-based instructional system. Such a system theoretically can optimize student learning by recommending instructional sequences (i.e., temporal patterns) that have high probabilities of resulting in student mastery. In other words, APT-based decision making by a computer program can provide an empirical foundation for artificial intelligence. References: |
One way that learning can be personalized is through the use of computers to aid in "recommending instructional sequences (i.e., temporal patterns) that have high probabilities of resulting in student mastery" (Frick, 1990, p. 202). However, the ability for computers to make appropriate decisions about instructional strategies is limited, in part, by the quality of information they have access to. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 8
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
But what are reasonable outcomes of the influence of global processes on education? While the question of how global processes influence all aspects of education (and who controls these forces) is multidimensional and not completely testable, there appear to be some theories of globalization as it relates to education that can be empirically examined. References: |
The authors are not alone in asking “what are reasonable outcomes of the influence of global processes on education” (p.138). In fact, this same question provides the basis for the discussion that follows. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 9
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Suppose you study a group of successful companies and you find that they emphasize customer focus, or quality improvement, or empowerment; how do you know that you haven't merely discovered the management practice equivalent of having buildings? How do you know that you've discovered something that distinguishes the successful companies from other companies? You don't know. You can't know--not unless you have a control set, a comparison group. References: |
Attributes of rigorous research can be shared across subjects of study. For example, Collins and Porras (2002) highlight the importance of having a control group when comparing companies in any effort to identify what specific company characteristics are able to distinguish the successful from the ordinary. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 10
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
Merck, in fact, epitomizes the ideological nature--the pragmatic idealism--of highly visionary companies. Our research showed that a fundamental element in the "ticking clock" of a visionary company is a core ideology--core values and a sense of purpose beyond just making money--that guides and inspires people throughout the organization and remains relatively fixed for long periods of time. References: |
Several factors can contribute to long-term organizational success. One is the establishment of a core ideology that Collins and Porras (2002) describe as "core values and sense of purpose beyond just making money" (p. 48). Also, the importance of a visionary leader that guides and inspires people throughout the organization and remains relatively fixed for long periods of time is hard to over emphasize. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
In: Psychology