Nt1310 Unit 2 Research Paper

Improved Essays
2. Why did you decide to become a teacher?
Both of my parents are teachers, so growing up there was one thing that I knew for sure: that I was not going to follow in their footsteps. I had dreams of dressing up and working in an office. When I got to college this idea for my future led me to get a degree in communication, with the hopes of working in marketing or public relations. After graduating, my dream of an office job was realized, but it didn’t make me happy. I didn’t feel like I was doing anything of substance, that, in the end, my work didn’t really have an impact. It took almost three years of this before I accepted that the path that would make me happy was the one thing that I was sure I didn’t want: a career in teaching. Since starting on this path I feel that I have found what I am meant to do. I feel connected to my work in a way that I never have
…show more content…
However, I think evaluation of practice should be based on completion and effort, not correctness, since it is meant to be an opportunity for learning and growth. This method of grading makes it clear to students that it is okay to make mistakes during practice, that it is the time to try new approaches, ask questions, and get clarification on content that will help them moving forward. Performance evaluation should be based on correctness and individual knowledge and will be done in a number of different ways. Although there are those who may be against it, I think traditional testing (i.e. multiple choice, short answer, etc.) still has a place in the classroom. To supplement this method, and to allow students to demonstrate learning in multiple ways, performance assessments will also take the form of projects and presentations. These will be done both individually and as groups throughout the year, with students or groups having an opportunity to choose their method of presentation or the type of project they’d like to

Related Documents

  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The Aegis Secure Key 3.0 has military grade full disk AES 256-bit XTS hardware encryption and is FIPS 140-2 Level 3 validated. You unlock the drive by entering your 7-16 digit PIN before you connect it to your device that way hackers cannot use software on your device to capture your password, and it automatically locks when you unplug it. If an incorrect password is typed 20 consecutive times all the data and the encryption key are erased. It is also dust and water resistant as well as a wear resistant keypad to hide key usage and to help prevent hackers from knowing the commonly used keys. This USB is a Super Speed USB 3.0 that has data transfer rates of 195 for read and 162 for write.…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    1. Maintains an exact replica of one disk on another offering 100% fault tolerance. 2. Data redundancy - If one disk fails, data can be recovered from the other. 3.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    GUI (Graphical User Interface), Wireshark allows a live view of the network traffic on the network card it is listening to. 2.9 Our approach to improving the throughput of QoS with SDN: 2.9.1 Setup and run Mininet and controller The first step installs Mininet in Ubuntu operation system, we are don't using a virtual machine and then install Ryu controller in OS. 2.9.2 Create custom network…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 1 Final Paper

    • 456 Words
    • 2 Pages

    ii. Give the id the absolute minimum privileges necessary to host the site on the web server. For example, it’s more likely than not read access to the website itself, write access only to folders updated by the web site, etc. iii. Change IIS so that the domain account is utilized to run the application.…

    • 456 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 1 Test Paper

    • 311 Words
    • 2 Pages

    \noindent According to Tabels \ref{4-tb7}-\ref{4-tb12}, we can get the following conclusions, which will correspond with Corollary \ref{4-cl7} (d)-(f). Note that $e^{exp}_{\alpha,\beta}/\rho(X)$ is denoted as the 2-parameter expectile when $X\sim Exp(100)$ and $e^{pareto}_{\alpha,\beta}/\rho(X)$ is denoted as the 2-parameter expectile when $X\sim Pareto(3,200)$. \begin{enumerate} \item[(i)] Table \ref{4-tb7}-\ref{4-tb9} and Tabel \ref{4-tb10}-\ref{4-tb12} illustrates that the 2-parameter expectiles increase as $\alpha$ increases for any fixed $\beta\geq \alpha$, $\rho$ and $X$. For example, $$e^{exp}_{0.8,0.9}/E[X]=166.33 \leq 204.01…

    • 311 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 354 Words
    • 2 Pages

    HIE provides the capability to electronically move clinical information among disparate healthcare information systems, and maintain the meaning of the information being exchanged. (HIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition) 11)) 1) 1. What sorts of HIEs are there? 2. How are protection and security of patient wellbeing data guaranteed?…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Paper

    • 521 Words
    • 3 Pages

    The rational for having Rouge One communications data centralize on a file server using a Distributed File System (DFS) is simple. When the data is centralized, instead of being spread out and existing on multiple computers will make it be easier to manage. The way this is going to be solve is a backup of the user data will be taken. This is to ensure that nothing will be lost. Then a Distributed File System (DFS) will be setup on the Rouge One communications file server.…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2. Explain how the submission engine plan will handle submissions in other languages, including Portuguese and Mandarin. When the data is submit through the submission engine using the web form, email, Twitter, Facebook, Internet crawler and other data input, Google translate API will start the translation from the other languages using it data-driven approach of millions of multilingual documents into English, then to the target language of the user. When the source text is short, the submission will use rule-based machine translations, for better accurately on the translation. If the language does not have direct translation, Google will translate to a closely related language that maybe more spoken in that area.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays