SlideShare a Scribd company logo
1 of 23
OPEN AND DISTANCE LEARNING
Unit-II
TEACHING AT A DISTANCE
2019-2021 (IV Semester )
Dr.N.Sasikumar
Department of Education
Alagappa University
Karaikudi
ICT and Distance Education
• Today’s society is said to have entered into the
age of a new social revolution, i.e. ‘information
revolution’. 21st century has witnessed the
explosion of information technologies.
• Open and distance learning is getting more
dependent on information and communication
technology (ICT) and has been playing an
important role in the delivery strategies of
distance learning.
• Educational technologies (information and
communication technology) are replacing direct
teacher-student interaction.
• By digital revolution, technologies in computers,
audio-visual devices, and communications are
integrated into a powerful technology-information
technology.
• The global era is characterized by rapid advances in
technology and expansion of knowledge.
• The application of new technologies in the
distance education context provides an
appropriate starting point for delineating the
knowledge base required of expert teachers in
today’s global society.
• Teaching the distance learners requires different
skills to prepare relevant learning materials to
facilitate the construction of knowledge and
learning.
• The effective integration of ICT into the
educational system is a complex, multifaceted
process that involves not just technology-
indeed given enough initial capital, getting the
technology is the easiest part- but also
curriculum and pedagogy, institutional
readiness, teacher competencies and long term
financing, among others.
• The technology which can be integrated into the
distance education system, based on our
experiences, the following factors should be
considered:
 Accessibility
Cost effectiveness
Human acceptance
Pedagogical suitability
ICT in Open Distance Learning
• Faster and flexible course delivery: ICT technologies have made it possible to
deliver lessons/courses in a faster and easier manner in distance education by using
computer-based or internet-based technologies.
• Improved and increased access: ICTs have the capable to expand access for higher
education as well as secondary education among people. ICTs enables distance
education institutions to provide knowledge within reach of all. ICTs provide the
opportunity of conducting thousands of classes on hundreds of subjects and courses
available anytime, at any place, as per the need and convenience of learners.
• Enhanced pedagogical and course design skills: Pedagogy is the art and science
of teaching. Pedagogical knowledge is essential while using ICTs in course delivery
at any stage of education. ICTs offer flexibility in an organization and design of
courses in a suitable and effective manner that facilitates development of
knowledge, skills and competences among learners.
• Educational administration and management: Various areas of educational
administration and management require ICT help at different levels. At school and
colleges, at universities, there are different programmes available for registration,
digital record keeping of staff and students. Academic Management Information
System (MIS), Financial Management Information System, Student or staff database
and Examination data base are some examples.
• Enhanced collaboration and interaction: Usage of ICTs encourages interaction and collaboration
between teachers and learners, and among learners in distance education. Collaboration and
interaction among students creates environment for learning. Communication tools like telephones,
cell phone, SMS, online forums, chat, blogs, social media platforms and e-mail etc. can made
communication and discussion for meaningful learning experience among learners.
• Preparation of teaching learning materials: With the use of word processing programmes ICTs are
helpful for teachers in preparing their own instructional and visual materials. Programmes like Power
Point, Paint and Photoshop help teachers to prepare various instructional materials. Internet provides a
lot of material and information in searching required subject matter or helping aid.
• Library and information service: Library and information services are very essential for academic
process of an educational institution. Majority of educational institutions arrange ICT facilities in
library services for teachers and students accessibility. Bibliographical searches for instructions,
learning and research work, accessing online database and repositories. Internet has made library
services easier, faster and more efficient.
• Evaluation: Sending online assignment, questionnaires and submitting responses online, participating
in discussion, blogs are modern approaches of evaluations which are being applied successfully with
the help of ICTs. MOOCs are one of the best examples for this kind of online learning and evaluation.
• Research: Research includes Formulation of hypothesis, Preparation of objectives, Data collection,
Interpretation and analysis and Reporting as important areas. E-mail, computer programs like MS
Word, MS Excel, and Statistical Package for Social Sciences (SPSS) are very useful technologies in
the research. Literature review can be performed easily by using online search engines and Meta
search engines.
Network infrastructure
• Network infrastructure comprises hardware and
software, systems and devices, and it enables computing
and communication between users, services, applications
and processes. Anything involved in the network, from
servers to wireless routers, comes together to make up a
system's network infrastructure.
• Network infrastructure is the hardware and software
resources of an entire network that enable network
connectivity, communication, operations and
management of an enterprise network. It provides the
communication path and services between users,
processes, applications, services and external
networks/the internet.
Computing Infrastructure
• Computing Infrastructure provides management and support
for end-user computers, servers, storage systems, operating
systems, databases, middleware and ERP systems. There are
three groups that make up the Computing Infrastructure team:
• Database and ERP Administration
• End-User Computing
• Server & Storage Services
• The Computing Infrastructure team has a vast collective set of
skills and expertise in areas such as data center management,
Storage Area Networks, desktop and server imaging, database
administration and general troubleshooting skills, that can be
leveraged by other groups at the University for advice and
consultation.
Stable system and application software
• Software that is intended for the public to use is usually
“stable”. It is released, and following the release no new
features are added apart from the odd bug fix. To get new
functionality users eventually need to upgrade to the next
version.
• System stability is the measurement of overall system
performance, accessibility and usability.
• It includes ensuring uptime in components such as Web
and database servers, sure, but it goes beyond that.
• It's also about maintaining end-to-end reliability from the
user's point of view.
• Taking into account the user's experience, it is important
to measure individual server statistics.
Internet Service Provider (ISP)
• Internet service provider (ISP), company that
provides Internet connections and services to
individuals and organizations.
• In addition to providing access to the Internet,
ISPs may also provide software packages (such as
browsers), e-mail accounts, and a personal Web
site or home page.
• ISPs can host Web sites for businesses and can also
build the Web sites themselves. ISPs are all
connected to each other through network access
points, public network facilities on the Internet
backbone.
Internet Bandwidth
• The maximum amount of data transmitted over
an internet connection in a given amount of
time. Bandwidth is often mistaken for internet
speed when it's actually the volume of
information that can be sent over a connection
in a measured amount of time – calculated in
megabits per second (Mbps).
Security infrastructure
• Computer security can take two forms.
• Software security provides barriers and other
cyber-tools that protect programs, files, and the
information flow to and from a computer.
• Hardware security protects the machine and
peripheral hardware from theft and from
electronic intrusion and damage.
Service compatibility: Computer
hardware and software
• Software compatibility is a characteristic of software
components or systems which can operate satisfactorily
together on the same computer, or on different
computers linked by a computer network. It is possible
that some software components or systems may be
compatible in one environment and incompatible in
another.
• Compatibility of Hardware and Software means the
components those can be replaced because they have
the same properties and mostly the same or similar
design.
Scalability issues- ensure data
compatibility
• Scalability problems: the hidden challenges of
growing a system. ... The trouble with scaling any
system is that, once we actually start down the
path of growing it, inevitably run into some
hidden complexities.
• Database scalability is the ability of a database
to handle changing demands by dding/removing
resources. Databases have adopted a host of
techniques to cope.
• Scalability is the measure of a system's ability to
increase or decrease in performance and cost in
response to changes in application and system
processing demands. Enterprises that are growing
rapidly should pay special attention to scalability
when evaluating hardware and software.
• Scalability is an essential component of enterprise
software. Prioritizing it from the start leads to
lower maintenance costs, better user experience,
and higher agility. Software design is a balancing
act where developers work to create the best
product within a client's time and budget
constraints.
Security in distance learning
• Cyber security exists to protect computer
systems and shared data from theft or damage
by any presence that plans to do harm. Security
is a constant issue as technology changes and
criminals circumvent existing safety measures.
• Flexible learning technologies will continue to
appeal to all classes of learners in the post-Covid
world
• Many of the devices which are used for distance
learning are often unprotected and unpatched
Network Service
• In computer networking, a network service is an application
running at the network application layer and above, that provides
data storage, manipulation, presentation, communication or other
capability which is often implemented using a client-server or
peer-to-peer architecture based on application layer network
• Types of Networking Services
• Network (WAN) Optimization. Latency and bandwidth
constraints often cause enterprise WANs to suffer from
performance issues. ...
• Interconnection. ...
• Software Defined WAN (SD-WAN) ...
• Multi-Protocol Label Switching (MPLS) ...
• Ethernet Private Line Network.
Hackers
• Computer hackers are unauthorized users who
break into computer systems in order to steal,
change or destroy information, often by installing
dangerous malware without your knowledge or
consent.
• Their clever tactics and detailed technical
knowledge help them access the information you
really don't want them to have.
Service software
• With computer software, a service is software
that performs automated tasks, responds to
hardware events, or listens for data requests
from other software.
• In a user's operating system, these services
are often loaded automatically at startup, and
run in the background, without user
interaction.
Design and coding of hosted software
• Hosted software means having your software
installed in a datacentre, providing online access
to the application.
• It differs from Software-as-a-Service (SaaS) as it
is essentially an owned and licensed product,
whereas SaaS just provides rented access to the
software, in a Pay-As-You-Go model.
Passwords
• A password is a string of characters used to verify the
identity of a user during the authentication process.
• Passwords are typically used in conjuncture with a
username; they are designed to be known only to the
user and allow that user to gain access to a device,
application or website.
• So to recap, a password must be at least 12 characters
long (ideally, even 15 characters) and should consist of
a seemingly random collection of uppercase and
lowercase letters, numbers and special characters, like
punctuation. With that in mind, here are some good
examples of strong passwords: X5j13$#eCM1cG@Kdc
Social engineering operational controls
• Social engineering is the term used for a broad range of
malicious activities accomplished through human
interactions. It uses psychological manipulation to trick
users into making security mistakes or giving away
sensitive information. Social engineering attacks
happen in one or more steps.
• Operational controls are security controls that are
primarily implemented and executed by people (as
opposed to systems). These controls are put in place to
improve the security of a particular system (or group of
systems).
Thank

More Related Content

Similar to ODL_Unit_II_2021.ppt

Functions., Need, importance and advantages of Information & Communication Te...
Functions., Need, importance and advantages of Information & Communication Te...Functions., Need, importance and advantages of Information & Communication Te...
Functions., Need, importance and advantages of Information & Communication Te...PoojaWalia6
 
Y3 ssp 12 13 l12
Y3 ssp 12 13 l12Y3 ssp 12 13 l12
Y3 ssp 12 13 l12Miles Berry
 
E learning a versatile tool for knowledge management
E learning a versatile tool for knowledge managementE learning a versatile tool for knowledge management
E learning a versatile tool for knowledge managementKishor Satpathy
 
Jnv vizianagaram technology vision plan
Jnv vizianagaram technology vision planJnv vizianagaram technology vision plan
Jnv vizianagaram technology vision planSheeza Muzaffar
 
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITSAN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITSijistjournal
 
Information Technology in CA Educatation
Information Technology in CA EducatationInformation Technology in CA Educatation
Information Technology in CA EducatationGaurav Rathi
 
Long range plan for technology
Long range plan for technologyLong range plan for technology
Long range plan for technologyMaritza Villa
 
งานนำเสนอนวัตกรรมบทที่ 6
งานนำเสนอนวัตกรรมบทที่ 6งานนำเสนอนวัตกรรมบทที่ 6
งานนำเสนอนวัตกรรมบทที่ 6Le Yuan Siriamatatham
 
Module1 Integrating Technologyin Curriculum
Module1 Integrating Technologyin CurriculumModule1 Integrating Technologyin Curriculum
Module1 Integrating Technologyin Curriculumsunnshine2k
 
Nottinghamshire computing framework 2014
Nottinghamshire computing framework 2014Nottinghamshire computing framework 2014
Nottinghamshire computing framework 2014Craig Evans
 
Flexible Curricula Viewpoints cards - Anytime anywhere learning
Flexible Curricula Viewpoints cards - Anytime anywhere learningFlexible Curricula Viewpoints cards - Anytime anywhere learning
Flexible Curricula Viewpoints cards - Anytime anywhere learningbalham
 
National policy of ICT in School Education
National policy of ICT in School EducationNational policy of ICT in School Education
National policy of ICT in School EducationVanita Anand
 

Similar to ODL_Unit_II_2021.ppt (20)

Functions., Need, importance and advantages of Information & Communication Te...
Functions., Need, importance and advantages of Information & Communication Te...Functions., Need, importance and advantages of Information & Communication Te...
Functions., Need, importance and advantages of Information & Communication Te...
 
Y3 ssp 12 13 l12
Y3 ssp 12 13 l12Y3 ssp 12 13 l12
Y3 ssp 12 13 l12
 
E learning a versatile tool for knowledge management
E learning a versatile tool for knowledge managementE learning a versatile tool for knowledge management
E learning a versatile tool for knowledge management
 
ict.pptx
ict.pptxict.pptx
ict.pptx
 
Ict
IctIct
Ict
 
Jnv vizianagaram technology vision plan
Jnv vizianagaram technology vision planJnv vizianagaram technology vision plan
Jnv vizianagaram technology vision plan
 
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning EnvironmentRavi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
 
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITSAN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
 
module 4.pptx
module 4.pptxmodule 4.pptx
module 4.pptx
 
Information Technology in CA Educatation
Information Technology in CA EducatationInformation Technology in CA Educatation
Information Technology in CA Educatation
 
Long range plan for technology
Long range plan for technologyLong range plan for technology
Long range plan for technology
 
CWN By Arup
CWN By ArupCWN By Arup
CWN By Arup
 
งานนำเสนอนวัตกรรมบทที่ 6
งานนำเสนอนวัตกรรมบทที่ 6งานนำเสนอนวัตกรรมบทที่ 6
งานนำเสนอนวัตกรรมบทที่ 6
 
Module1 Integrating Technologyin Curriculum
Module1 Integrating Technologyin CurriculumModule1 Integrating Technologyin Curriculum
Module1 Integrating Technologyin Curriculum
 
NMEICT
NMEICTNMEICT
NMEICT
 
Nottinghamshire computing framework 2014
Nottinghamshire computing framework 2014Nottinghamshire computing framework 2014
Nottinghamshire computing framework 2014
 
Digital_Education
Digital_EducationDigital_Education
Digital_Education
 
Flexible Curricula Viewpoints cards - Anytime anywhere learning
Flexible Curricula Viewpoints cards - Anytime anywhere learningFlexible Curricula Viewpoints cards - Anytime anywhere learning
Flexible Curricula Viewpoints cards - Anytime anywhere learning
 
National policy of ICT in School Education
National policy of ICT in School EducationNational policy of ICT in School Education
National policy of ICT in School Education
 
Ten trends 2011
Ten trends 2011Ten trends 2011
Ten trends 2011
 

More from Sasi Kumar

Value Education_Unit_V.pptx
Value Education_Unit_V.pptxValue Education_Unit_V.pptx
Value Education_Unit_V.pptxSasi Kumar
 
VALUE EDUCATION_Unit_IV.pptx
VALUE EDUCATION_Unit_IV.pptxVALUE EDUCATION_Unit_IV.pptx
VALUE EDUCATION_Unit_IV.pptxSasi Kumar
 
Value Education_Unit_II.ppt
Value Education_Unit_II.pptValue Education_Unit_II.ppt
Value Education_Unit_II.pptSasi Kumar
 
Value Education_Unit_III.ppt
Value Education_Unit_III.pptValue Education_Unit_III.ppt
Value Education_Unit_III.pptSasi Kumar
 
Value Education_Unit_I.ppt
Value Education_Unit_I.pptValue Education_Unit_I.ppt
Value Education_Unit_I.pptSasi Kumar
 
UNIT –III_ET_Instructional Desgin.ppt
UNIT –III_ET_Instructional Desgin.pptUNIT –III_ET_Instructional Desgin.ppt
UNIT –III_ET_Instructional Desgin.pptSasi Kumar
 
Research_Methods_Unit_II_2021.pptx
Research_Methods_Unit_II_2021.pptxResearch_Methods_Unit_II_2021.pptx
Research_Methods_Unit_II_2021.pptxSasi Kumar
 
Unit_1_MPhil.Research methodology.pptx
Unit_1_MPhil.Research methodology.pptxUnit_1_MPhil.Research methodology.pptx
Unit_1_MPhil.Research methodology.pptxSasi Kumar
 
Unit_4_AV_Media_Education.ppt
Unit_4_AV_Media_Education.pptUnit_4_AV_Media_Education.ppt
Unit_4_AV_Media_Education.pptSasi Kumar
 
PSYCHOLOGY_Unit_II.ppt
PSYCHOLOGY_Unit_II.pptPSYCHOLOGY_Unit_II.ppt
PSYCHOLOGY_Unit_II.pptSasi Kumar
 
PSYCHOLOGY_Unit_III.ppt
PSYCHOLOGY_Unit_III.pptPSYCHOLOGY_Unit_III.ppt
PSYCHOLOGY_Unit_III.pptSasi Kumar
 
PSYCHOLOGY_Unit_I.ppt
PSYCHOLOGY_Unit_I.pptPSYCHOLOGY_Unit_I.ppt
PSYCHOLOGY_Unit_I.pptSasi Kumar
 
Research_Methods_Unit_1_2021.ppt
Research_Methods_Unit_1_2021.pptResearch_Methods_Unit_1_2021.ppt
Research_Methods_Unit_1_2021.pptSasi Kumar
 
PSYCHOLOGY_NME__Unit_II.ppt
PSYCHOLOGY_NME__Unit_II.pptPSYCHOLOGY_NME__Unit_II.ppt
PSYCHOLOGY_NME__Unit_II.pptSasi Kumar
 
PSYCHOLOGY_NME__Unit_I.ppt
PSYCHOLOGY_NME__Unit_I.pptPSYCHOLOGY_NME__Unit_I.ppt
PSYCHOLOGY_NME__Unit_I.pptSasi Kumar
 
PLANNING OF ECONOMY_Unit_III.ppt
PLANNING OF ECONOMY_Unit_III.pptPLANNING OF ECONOMY_Unit_III.ppt
PLANNING OF ECONOMY_Unit_III.pptSasi Kumar
 
PLANNING OF ECONOMY_Unit_IV.ppt
PLANNING OF ECONOMY_Unit_IV.pptPLANNING OF ECONOMY_Unit_IV.ppt
PLANNING OF ECONOMY_Unit_IV.pptSasi Kumar
 

More from Sasi Kumar (20)

Value Education_Unit_V.pptx
Value Education_Unit_V.pptxValue Education_Unit_V.pptx
Value Education_Unit_V.pptx
 
VALUE EDUCATION_Unit_IV.pptx
VALUE EDUCATION_Unit_IV.pptxVALUE EDUCATION_Unit_IV.pptx
VALUE EDUCATION_Unit_IV.pptx
 
Value Education_Unit_II.ppt
Value Education_Unit_II.pptValue Education_Unit_II.ppt
Value Education_Unit_II.ppt
 
Value Education_Unit_III.ppt
Value Education_Unit_III.pptValue Education_Unit_III.ppt
Value Education_Unit_III.ppt
 
Unit_II.ppt
Unit_II.pptUnit_II.ppt
Unit_II.ppt
 
Unit_IV.ppt
Unit_IV.pptUnit_IV.ppt
Unit_IV.ppt
 
Unit_III.pptx
Unit_III.pptxUnit_III.pptx
Unit_III.pptx
 
Value Education_Unit_I.ppt
Value Education_Unit_I.pptValue Education_Unit_I.ppt
Value Education_Unit_I.ppt
 
UNIT –III_ET_Instructional Desgin.ppt
UNIT –III_ET_Instructional Desgin.pptUNIT –III_ET_Instructional Desgin.ppt
UNIT –III_ET_Instructional Desgin.ppt
 
Research_Methods_Unit_II_2021.pptx
Research_Methods_Unit_II_2021.pptxResearch_Methods_Unit_II_2021.pptx
Research_Methods_Unit_II_2021.pptx
 
Unit_1_MPhil.Research methodology.pptx
Unit_1_MPhil.Research methodology.pptxUnit_1_MPhil.Research methodology.pptx
Unit_1_MPhil.Research methodology.pptx
 
Unit_4_AV_Media_Education.ppt
Unit_4_AV_Media_Education.pptUnit_4_AV_Media_Education.ppt
Unit_4_AV_Media_Education.ppt
 
PSYCHOLOGY_Unit_II.ppt
PSYCHOLOGY_Unit_II.pptPSYCHOLOGY_Unit_II.ppt
PSYCHOLOGY_Unit_II.ppt
 
PSYCHOLOGY_Unit_III.ppt
PSYCHOLOGY_Unit_III.pptPSYCHOLOGY_Unit_III.ppt
PSYCHOLOGY_Unit_III.ppt
 
PSYCHOLOGY_Unit_I.ppt
PSYCHOLOGY_Unit_I.pptPSYCHOLOGY_Unit_I.ppt
PSYCHOLOGY_Unit_I.ppt
 
Research_Methods_Unit_1_2021.ppt
Research_Methods_Unit_1_2021.pptResearch_Methods_Unit_1_2021.ppt
Research_Methods_Unit_1_2021.ppt
 
PSYCHOLOGY_NME__Unit_II.ppt
PSYCHOLOGY_NME__Unit_II.pptPSYCHOLOGY_NME__Unit_II.ppt
PSYCHOLOGY_NME__Unit_II.ppt
 
PSYCHOLOGY_NME__Unit_I.ppt
PSYCHOLOGY_NME__Unit_I.pptPSYCHOLOGY_NME__Unit_I.ppt
PSYCHOLOGY_NME__Unit_I.ppt
 
PLANNING OF ECONOMY_Unit_III.ppt
PLANNING OF ECONOMY_Unit_III.pptPLANNING OF ECONOMY_Unit_III.ppt
PLANNING OF ECONOMY_Unit_III.ppt
 
PLANNING OF ECONOMY_Unit_IV.ppt
PLANNING OF ECONOMY_Unit_IV.pptPLANNING OF ECONOMY_Unit_IV.ppt
PLANNING OF ECONOMY_Unit_IV.ppt
 

Recently uploaded

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

ODL_Unit_II_2021.ppt

  • 1. OPEN AND DISTANCE LEARNING Unit-II TEACHING AT A DISTANCE 2019-2021 (IV Semester ) Dr.N.Sasikumar Department of Education Alagappa University Karaikudi
  • 2. ICT and Distance Education • Today’s society is said to have entered into the age of a new social revolution, i.e. ‘information revolution’. 21st century has witnessed the explosion of information technologies. • Open and distance learning is getting more dependent on information and communication technology (ICT) and has been playing an important role in the delivery strategies of distance learning. • Educational technologies (information and communication technology) are replacing direct teacher-student interaction.
  • 3. • By digital revolution, technologies in computers, audio-visual devices, and communications are integrated into a powerful technology-information technology. • The global era is characterized by rapid advances in technology and expansion of knowledge. • The application of new technologies in the distance education context provides an appropriate starting point for delineating the knowledge base required of expert teachers in today’s global society. • Teaching the distance learners requires different skills to prepare relevant learning materials to facilitate the construction of knowledge and learning.
  • 4. • The effective integration of ICT into the educational system is a complex, multifaceted process that involves not just technology- indeed given enough initial capital, getting the technology is the easiest part- but also curriculum and pedagogy, institutional readiness, teacher competencies and long term financing, among others. • The technology which can be integrated into the distance education system, based on our experiences, the following factors should be considered:  Accessibility Cost effectiveness Human acceptance Pedagogical suitability
  • 5. ICT in Open Distance Learning • Faster and flexible course delivery: ICT technologies have made it possible to deliver lessons/courses in a faster and easier manner in distance education by using computer-based or internet-based technologies. • Improved and increased access: ICTs have the capable to expand access for higher education as well as secondary education among people. ICTs enables distance education institutions to provide knowledge within reach of all. ICTs provide the opportunity of conducting thousands of classes on hundreds of subjects and courses available anytime, at any place, as per the need and convenience of learners. • Enhanced pedagogical and course design skills: Pedagogy is the art and science of teaching. Pedagogical knowledge is essential while using ICTs in course delivery at any stage of education. ICTs offer flexibility in an organization and design of courses in a suitable and effective manner that facilitates development of knowledge, skills and competences among learners. • Educational administration and management: Various areas of educational administration and management require ICT help at different levels. At school and colleges, at universities, there are different programmes available for registration, digital record keeping of staff and students. Academic Management Information System (MIS), Financial Management Information System, Student or staff database and Examination data base are some examples.
  • 6. • Enhanced collaboration and interaction: Usage of ICTs encourages interaction and collaboration between teachers and learners, and among learners in distance education. Collaboration and interaction among students creates environment for learning. Communication tools like telephones, cell phone, SMS, online forums, chat, blogs, social media platforms and e-mail etc. can made communication and discussion for meaningful learning experience among learners. • Preparation of teaching learning materials: With the use of word processing programmes ICTs are helpful for teachers in preparing their own instructional and visual materials. Programmes like Power Point, Paint and Photoshop help teachers to prepare various instructional materials. Internet provides a lot of material and information in searching required subject matter or helping aid. • Library and information service: Library and information services are very essential for academic process of an educational institution. Majority of educational institutions arrange ICT facilities in library services for teachers and students accessibility. Bibliographical searches for instructions, learning and research work, accessing online database and repositories. Internet has made library services easier, faster and more efficient. • Evaluation: Sending online assignment, questionnaires and submitting responses online, participating in discussion, blogs are modern approaches of evaluations which are being applied successfully with the help of ICTs. MOOCs are one of the best examples for this kind of online learning and evaluation. • Research: Research includes Formulation of hypothesis, Preparation of objectives, Data collection, Interpretation and analysis and Reporting as important areas. E-mail, computer programs like MS Word, MS Excel, and Statistical Package for Social Sciences (SPSS) are very useful technologies in the research. Literature review can be performed easily by using online search engines and Meta search engines.
  • 7. Network infrastructure • Network infrastructure comprises hardware and software, systems and devices, and it enables computing and communication between users, services, applications and processes. Anything involved in the network, from servers to wireless routers, comes together to make up a system's network infrastructure. • Network infrastructure is the hardware and software resources of an entire network that enable network connectivity, communication, operations and management of an enterprise network. It provides the communication path and services between users, processes, applications, services and external networks/the internet.
  • 8. Computing Infrastructure • Computing Infrastructure provides management and support for end-user computers, servers, storage systems, operating systems, databases, middleware and ERP systems. There are three groups that make up the Computing Infrastructure team: • Database and ERP Administration • End-User Computing • Server & Storage Services • The Computing Infrastructure team has a vast collective set of skills and expertise in areas such as data center management, Storage Area Networks, desktop and server imaging, database administration and general troubleshooting skills, that can be leveraged by other groups at the University for advice and consultation.
  • 9. Stable system and application software • Software that is intended for the public to use is usually “stable”. It is released, and following the release no new features are added apart from the odd bug fix. To get new functionality users eventually need to upgrade to the next version. • System stability is the measurement of overall system performance, accessibility and usability. • It includes ensuring uptime in components such as Web and database servers, sure, but it goes beyond that. • It's also about maintaining end-to-end reliability from the user's point of view. • Taking into account the user's experience, it is important to measure individual server statistics.
  • 10. Internet Service Provider (ISP) • Internet service provider (ISP), company that provides Internet connections and services to individuals and organizations. • In addition to providing access to the Internet, ISPs may also provide software packages (such as browsers), e-mail accounts, and a personal Web site or home page. • ISPs can host Web sites for businesses and can also build the Web sites themselves. ISPs are all connected to each other through network access points, public network facilities on the Internet backbone.
  • 11. Internet Bandwidth • The maximum amount of data transmitted over an internet connection in a given amount of time. Bandwidth is often mistaken for internet speed when it's actually the volume of information that can be sent over a connection in a measured amount of time – calculated in megabits per second (Mbps).
  • 12. Security infrastructure • Computer security can take two forms. • Software security provides barriers and other cyber-tools that protect programs, files, and the information flow to and from a computer. • Hardware security protects the machine and peripheral hardware from theft and from electronic intrusion and damage.
  • 13. Service compatibility: Computer hardware and software • Software compatibility is a characteristic of software components or systems which can operate satisfactorily together on the same computer, or on different computers linked by a computer network. It is possible that some software components or systems may be compatible in one environment and incompatible in another. • Compatibility of Hardware and Software means the components those can be replaced because they have the same properties and mostly the same or similar design.
  • 14. Scalability issues- ensure data compatibility • Scalability problems: the hidden challenges of growing a system. ... The trouble with scaling any system is that, once we actually start down the path of growing it, inevitably run into some hidden complexities. • Database scalability is the ability of a database to handle changing demands by dding/removing resources. Databases have adopted a host of techniques to cope.
  • 15. • Scalability is the measure of a system's ability to increase or decrease in performance and cost in response to changes in application and system processing demands. Enterprises that are growing rapidly should pay special attention to scalability when evaluating hardware and software. • Scalability is an essential component of enterprise software. Prioritizing it from the start leads to lower maintenance costs, better user experience, and higher agility. Software design is a balancing act where developers work to create the best product within a client's time and budget constraints.
  • 16. Security in distance learning • Cyber security exists to protect computer systems and shared data from theft or damage by any presence that plans to do harm. Security is a constant issue as technology changes and criminals circumvent existing safety measures. • Flexible learning technologies will continue to appeal to all classes of learners in the post-Covid world • Many of the devices which are used for distance learning are often unprotected and unpatched
  • 17. Network Service • In computer networking, a network service is an application running at the network application layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client-server or peer-to-peer architecture based on application layer network • Types of Networking Services • Network (WAN) Optimization. Latency and bandwidth constraints often cause enterprise WANs to suffer from performance issues. ... • Interconnection. ... • Software Defined WAN (SD-WAN) ... • Multi-Protocol Label Switching (MPLS) ... • Ethernet Private Line Network.
  • 18. Hackers • Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. • Their clever tactics and detailed technical knowledge help them access the information you really don't want them to have.
  • 19. Service software • With computer software, a service is software that performs automated tasks, responds to hardware events, or listens for data requests from other software. • In a user's operating system, these services are often loaded automatically at startup, and run in the background, without user interaction.
  • 20. Design and coding of hosted software • Hosted software means having your software installed in a datacentre, providing online access to the application. • It differs from Software-as-a-Service (SaaS) as it is essentially an owned and licensed product, whereas SaaS just provides rented access to the software, in a Pay-As-You-Go model.
  • 21. Passwords • A password is a string of characters used to verify the identity of a user during the authentication process. • Passwords are typically used in conjuncture with a username; they are designed to be known only to the user and allow that user to gain access to a device, application or website. • So to recap, a password must be at least 12 characters long (ideally, even 15 characters) and should consist of a seemingly random collection of uppercase and lowercase letters, numbers and special characters, like punctuation. With that in mind, here are some good examples of strong passwords: X5j13$#eCM1cG@Kdc
  • 22. Social engineering operational controls • Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Social engineering attacks happen in one or more steps. • Operational controls are security controls that are primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems).
  • 23. Thank