Nt1310 Unit 2 Research Paper

Improved Essays
2. Why did you decide to become a teacher?
Both of my parents are teachers, so growing up there was one thing that I knew for sure: that I was not going to follow in their footsteps. I had dreams of dressing up and working in an office. When I got to college this idea for my future led me to get a degree in communication, with the hopes of working in marketing or public relations. After graduating, my dream of an office job was realized, but it didn’t make me happy. I didn’t feel like I was doing anything of substance, that, in the end, my work didn’t really have an impact. It took almost three years of this before I accepted that the path that would make me happy was the one thing that I was sure I didn’t want: a career in teaching. Since starting on this path I feel that I have found what I am meant to do. I feel connected to my work in a way that I never have
…show more content…
However, I think evaluation of practice should be based on completion and effort, not correctness, since it is meant to be an opportunity for learning and growth. This method of grading makes it clear to students that it is okay to make mistakes during practice, that it is the time to try new approaches, ask questions, and get clarification on content that will help them moving forward. Performance evaluation should be based on correctness and individual knowledge and will be done in a number of different ways. Although there are those who may be against it, I think traditional testing (i.e. multiple choice, short answer, etc.) still has a place in the classroom. To supplement this method, and to allow students to demonstrate learning in multiple ways, performance assessments will also take the form of projects and presentations. These will be done both individually and as groups throughout the year, with students or groups having an opportunity to choose their method of presentation or the type of project they’d like to

Related Documents

  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The Aegis Secure Key 3.0 has military grade full disk AES 256-bit XTS hardware encryption and is FIPS 140-2 Level 3 validated. You unlock the drive by entering your 7-16 digit PIN before you connect it to your device that way hackers cannot use software on your device to capture your password, and it automatically locks when you unplug it. If an incorrect password is typed 20 consecutive times all the data and the encryption key are erased. It is also dust and water resistant as well as a wear resistant keypad to hide key usage and to help prevent hackers from knowing the commonly used keys. This USB is a Super Speed USB 3.0 that has data transfer rates of 195 for read and 162 for write.…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    We want the neural network to predict the stock price at a future date using stock price, EMA, RSI and MACD data of today and the last few days. The neural network can be configured to have a specified number of hidden layers. In addition to hidden layers the neural network has an input layer and an output layer. In the input layer we give the input that is stock price, EMA, RSI and MACD data of today and the last few days. The hidden layer comes between the input layer and the output layer.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Homework 4 Elaine Le Hawaii Pacific University Part A: Textbook p293 Exercises 9.4 Consider the interrupt that occurs at the completion of a disk transfer. a. Direct memory access (DMA) is an alternative method that avoids the use of the CPU by allowing direct data transfers between memory and I/O devices or peripherals. Once the data is transferred the CPU is notified of the transfer completion and able to resume access of the main memory. It is able to do this with interrupts; are signals that are generated once an action is completed. Normally it suspends the execution of the running program and jumps to a special interrupt service routine.…

    • 568 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    1. Maintains an exact replica of one disk on another offering 100% fault tolerance. 2. Data redundancy - If one disk fails, data can be recovered from the other. 3.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 1312 Words
    • 6 Pages

    a.) Describe the establishments you visited (include location/ major intersection), the waiting-line model in use, and your overall experience. State the wait times for each line you were in. Store 1: I visited the nearest Costco store. The store is located at 71 Colossus Drive, Woodbridge, ON L4L 9J8, In the city of Vaughan.…

    • 1312 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    GUI (Graphical User Interface), Wireshark allows a live view of the network traffic on the network card it is listening to. 2.9 Our approach to improving the throughput of QoS with SDN: 2.9.1 Setup and run Mininet and controller The first step installs Mininet in Ubuntu operation system, we are don't using a virtual machine and then install Ryu controller in OS. 2.9.2 Create custom network…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 1 Test Paper

    • 311 Words
    • 2 Pages

    \noindent According to Tabels \ref{4-tb7}-\ref{4-tb12}, we can get the following conclusions, which will correspond with Corollary \ref{4-cl7} (d)-(f). Note that $e^{exp}_{\alpha,\beta}/\rho(X)$ is denoted as the 2-parameter expectile when $X\sim Exp(100)$ and $e^{pareto}_{\alpha,\beta}/\rho(X)$ is denoted as the 2-parameter expectile when $X\sim Pareto(3,200)$. \begin{enumerate} \item[(i)] Table \ref{4-tb7}-\ref{4-tb9} and Tabel \ref{4-tb10}-\ref{4-tb12} illustrates that the 2-parameter expectiles increase as $\alpha$ increases for any fixed $\beta\geq \alpha$, $\rho$ and $X$. For example, $$e^{exp}_{0.8,0.9}/E[X]=166.33 \leq 204.01…

    • 311 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 1 Paper

    • 521 Words
    • 3 Pages

    The rational for having Rouge One communications data centralize on a file server using a Distributed File System (DFS) is simple. When the data is centralized, instead of being spread out and existing on multiple computers will make it be easier to manage. The way this is going to be solve is a backup of the user data will be taken. This is to ensure that nothing will be lost. Then a Distributed File System (DFS) will be setup on the Rouge One communications file server.…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cybersecurity is vital to improving the security and reliability of the Western Interconnection power grid. As one of the most complex and critical infrastructures, the importance of prioritizing the continued security of the power grid should be at the top of the list. There are many different options that can improve security levels of both a physical and logical nature, such as disk drive encryption, digital certificates, Transport Layer Security (TLS), and Virtual Private Networks. Recommendation: Implement Full Disk Encryption Full disk encryption is the ability to convert data into unreadable code that can only be deciphered by authorized people. The encryption can include almost everything on the system such as temporary files and swap files.…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2. Explain how the submission engine plan will handle submissions in other languages, including Portuguese and Mandarin. When the data is submit through the submission engine using the web form, email, Twitter, Facebook, Internet crawler and other data input, Google translate API will start the translation from the other languages using it data-driven approach of millions of multilingual documents into English, then to the target language of the user. When the source text is short, the submission will use rule-based machine translations, for better accurately on the translation. If the language does not have direct translation, Google will translate to a closely related language that maybe more spoken in that area.…

    • 577 Words
    • 3 Pages
    Improved Essays