SlideShare a Scribd company logo
1 of 13
Alice software 
BS(H) Botany 3rd M 
Introduction to computer 
1005 
Maha tariq 
UniversityOf Education Okara
Table of contents 
• Introduction to Alice 
• Demo 
• The Alice Approach 
• Key features 
• How Alice is used 
• Related Questions 
• References
Alice 
software 
)
Alice is a solution to the 
current big problem in 
Computer Science Education: 
Attracting and Retaining Students
Alice is: 
Software + a Book
The Alice Software 
• A 3D interactive animation environment 
• A tool for teaching fundamental 
programming concepts 
– object oriented 
• System developed at Carnegie Mellon
A Demo of Alice…
The Alice Approach 
• Uses 3D graphics to engage students 
• Has a “smart” drag-and-drop editor that prevents 
syntax errors 
• Appeals to wide audience 
– Storytelling 
• (young women, minority students) 
– Interactive computer games 
• (young men) 
– Not threatening; Alice builds students’ confidence
Key Alice Features 
• Makes objects something students 
can see and relate to 
• Has a java syntax mode to ease the 
transition to C++/Java/VB.net
How Alice is being used 
• In pre-CS1 
– course for majors and students considering a CS 
major 
• As conceptual introduction in CS1, followed 
by a transition to Java/C++/VB 
• Introduction to programming course 
– non-majors (in business schools, for example) 
– attract students to become CS majors 
• Computer literacy 
– problem-solving component 
• Pre-AP in high schools
Commonly Asked Questions 
• How much does the Alice software cost? 
– It is free! (and open source) 
• Does Alice run on the Macintosh? 
– Yes! Download Mac version from www.alice.org 
• Where can I go for instructor support materials? 
– www.aliceprogramming.net 
• Is Alice hard to install? 
– Just copy files to the hard drive; no “install”
Commonly Asked Questions, Cont. 
• Isn’t Alice just a toy? (it looks so “Fisher-Price”!) 
– No -- Alice contains all the features of “real” languages 
– Students can write 3,000 line programs in Alice 
• How do students go from Alice to Java? 
– They have learned the concepts in Alice, then learn syntax in Java 
– They have built confidence and are more persistent 
• Is there any “hard evidence” that Alice works? 
– Yes! An NSF study on “at risk” CS1 students who used Alice… 
• Increased grades from C to B 
• Retention (into CS2) went from 47% to 88%
References 
• Wanda Dann 
(wpdann@ithaca.e 
du) 
• Randy Pausch 
(pausch@cmu.edu 
• Stephen Cooper 
(scooper@sju.edu

More Related Content

What's hot

Communication in Library and Information Science by Dorcas Krubu
Communication in Library and Information Science by Dorcas KrubuCommunication in Library and Information Science by Dorcas Krubu
Communication in Library and Information Science by Dorcas Krubudkrubu
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSMITRE ATT&CK
 
Categorization: Library of Congress Classification System
Categorization: Library of Congress Classification SystemCategorization: Library of Congress Classification System
Categorization: Library of Congress Classification SystemLilia Murray
 
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)RUTVIPAREKH
 
Introduction to archival research 2015
Introduction to archival research 2015Introduction to archival research 2015
Introduction to archival research 2015Humphrey Southall
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...CloudVillage
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 
WHAT IS A DIGITAL LIBRARY? EXPLAIN NDLI AND ITS CONTRIBUTION.
WHAT IS A DIGITAL LIBRARY? EXPLAIN NDLI AND ITS CONTRIBUTION.WHAT IS A DIGITAL LIBRARY? EXPLAIN NDLI AND ITS CONTRIBUTION.
WHAT IS A DIGITAL LIBRARY? EXPLAIN NDLI AND ITS CONTRIBUTION.`Shweta Bhavsar
 
Internship in library
Internship in libraryInternship in library
Internship in libraryAditya Ranjan
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Library orientation 2017 ssus
Library orientation 2017 ssusLibrary orientation 2017 ssus
Library orientation 2017 ssusAjith Jose
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseInfosec
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 

What's hot (20)

Communication in Library and Information Science by Dorcas Krubu
Communication in Library and Information Science by Dorcas KrubuCommunication in Library and Information Science by Dorcas Krubu
Communication in Library and Information Science by Dorcas Krubu
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
 
Categorization: Library of Congress Classification System
Categorization: Library of Congress Classification SystemCategorization: Library of Congress Classification System
Categorization: Library of Congress Classification System
 
Koha
KohaKoha
Koha
 
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
CATEGORIES OF USERS & THEIR NEEDS (IN CONTEXT OF LIBRARY)
 
Introduction to archival research 2015
Introduction to archival research 2015Introduction to archival research 2015
Introduction to archival research 2015
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
WHAT IS A DIGITAL LIBRARY? EXPLAIN NDLI AND ITS CONTRIBUTION.
WHAT IS A DIGITAL LIBRARY? EXPLAIN NDLI AND ITS CONTRIBUTION.WHAT IS A DIGITAL LIBRARY? EXPLAIN NDLI AND ITS CONTRIBUTION.
WHAT IS A DIGITAL LIBRARY? EXPLAIN NDLI AND ITS CONTRIBUTION.
 
Deterioration of Library Materials
Deterioration of Library Materials Deterioration of Library Materials
Deterioration of Library Materials
 
Internship in library
Internship in libraryInternship in library
Internship in library
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Library orientation 2017 ssus
Library orientation 2017 ssusLibrary orientation 2017 ssus
Library orientation 2017 ssus
 
ALA.pptx
ALA.pptxALA.pptx
ALA.pptx
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
ISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdfISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdf
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 

Viewers also liked

Viewers also liked (9)

Week1 Objectives
Week1 ObjectivesWeek1 Objectives
Week1 Objectives
 
Week 4 Objectives
Week 4 ObjectivesWeek 4 Objectives
Week 4 Objectives
 
Week 2 Objectives
Week 2 ObjectivesWeek 2 Objectives
Week 2 Objectives
 
Download alice
Download aliceDownload alice
Download alice
 
Week 3 Objectives
Week 3 ObjectivesWeek 3 Objectives
Week 3 Objectives
 
201003 Alice (part 1/15)
201003 Alice (part 1/15)201003 Alice (part 1/15)
201003 Alice (part 1/15)
 
Alice ppt ch01
Alice ppt ch01Alice ppt ch01
Alice ppt ch01
 
Alice 3
Alice 3Alice 3
Alice 3
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Alice Software

Sigcse Tea Party 2007
Sigcse Tea Party 2007Sigcse Tea Party 2007
Sigcse Tea Party 2007Janek Wagner
 
OCWC Global Conference 2013: Open Educational Resources in Action: Beyond the...
OCWC Global Conference 2013: Open Educational Resources in Action: Beyond the...OCWC Global Conference 2013: Open Educational Resources in Action: Beyond the...
OCWC Global Conference 2013: Open Educational Resources in Action: Beyond the...The Open Education Consortium
 
Social Nets in Education Workshop Talk
Social Nets in Education Workshop TalkSocial Nets in Education Workshop Talk
Social Nets in Education Workshop TalkCharles Severance
 
Edtech Without a Budget
Edtech Without a BudgetEdtech Without a Budget
Edtech Without a BudgetJustin Keel
 
How to Listen to and Involve your Faculty
How to Listen to and Involve your FacultyHow to Listen to and Involve your Faculty
How to Listen to and Involve your FacultyDavid Melone
 
Monet banksy may2014
Monet banksy may2014Monet banksy may2014
Monet banksy may2014GailStrachan
 
ATLIS 2016 - Collaborating with Developers to Create New Tools
ATLIS 2016 - Collaborating with Developers to Create New ToolsATLIS 2016 - Collaborating with Developers to Create New Tools
ATLIS 2016 - Collaborating with Developers to Create New ToolsSwift Education Systems
 
Massively Open Online Courses - Beyond the Hype
Massively Open Online Courses - Beyond the HypeMassively Open Online Courses - Beyond the Hype
Massively Open Online Courses - Beyond the HypeCharles Severance
 
Cyber securityeducation may2015
Cyber securityeducation may2015Cyber securityeducation may2015
Cyber securityeducation may2015Mark Guzdial
 
Massively Open Online Courses (MOOCs)
Massively Open Online Courses (MOOCs)Massively Open Online Courses (MOOCs)
Massively Open Online Courses (MOOCs)Charles Severance
 
Building effective outreach programs in STEM
Building effective outreach programs in STEMBuilding effective outreach programs in STEM
Building effective outreach programs in STEMAnnie Cheng, PMP
 
Digital Skills for Early Teacher Courses
Digital Skills for Early Teacher CoursesDigital Skills for Early Teacher Courses
Digital Skills for Early Teacher CoursesMarisa Constantinides
 
iDo or iDon't ‐ Using Tablets in the Classroom - Course Technology Computing ...
iDo or iDon't ‐ Using Tablets in the Classroom - Course Technology Computing ...iDo or iDon't ‐ Using Tablets in the Classroom - Course Technology Computing ...
iDo or iDon't ‐ Using Tablets in the Classroom - Course Technology Computing ...Cengage Learning
 

Similar to Alice Software (20)

Get to know Alice3
Get to know Alice3 Get to know Alice3
Get to know Alice3
 
Sigcse Tea Party 2007
Sigcse Tea Party 2007Sigcse Tea Party 2007
Sigcse Tea Party 2007
 
OCWC Global Conference 2013: Open Educational Resources in Action: Beyond the...
OCWC Global Conference 2013: Open Educational Resources in Action: Beyond the...OCWC Global Conference 2013: Open Educational Resources in Action: Beyond the...
OCWC Global Conference 2013: Open Educational Resources in Action: Beyond the...
 
Social Nets in Education Workshop Talk
Social Nets in Education Workshop TalkSocial Nets in Education Workshop Talk
Social Nets in Education Workshop Talk
 
Edtech Without a Budget
Edtech Without a BudgetEdtech Without a Budget
Edtech Without a Budget
 
How to Listen to and Involve your Faculty
How to Listen to and Involve your FacultyHow to Listen to and Involve your Faculty
How to Listen to and Involve your Faculty
 
Monet banksy may2014
Monet banksy may2014Monet banksy may2014
Monet banksy may2014
 
ATLIS 2016 - Collaborating with Developers to Create New Tools
ATLIS 2016 - Collaborating with Developers to Create New ToolsATLIS 2016 - Collaborating with Developers to Create New Tools
ATLIS 2016 - Collaborating with Developers to Create New Tools
 
TinCan in the Wild
TinCan in the Wild TinCan in the Wild
TinCan in the Wild
 
Massively Open Online Courses - Beyond the Hype
Massively Open Online Courses - Beyond the HypeMassively Open Online Courses - Beyond the Hype
Massively Open Online Courses - Beyond the Hype
 
Cyber securityeducation may2015
Cyber securityeducation may2015Cyber securityeducation may2015
Cyber securityeducation may2015
 
Massively Open Online Courses (MOOCs)
Massively Open Online Courses (MOOCs)Massively Open Online Courses (MOOCs)
Massively Open Online Courses (MOOCs)
 
Building effective outreach programs in STEM
Building effective outreach programs in STEMBuilding effective outreach programs in STEM
Building effective outreach programs in STEM
 
Visual programming
Visual programmingVisual programming
Visual programming
 
Digital Skills for Early Teacher Courses
Digital Skills for Early Teacher CoursesDigital Skills for Early Teacher Courses
Digital Skills for Early Teacher Courses
 
TimDavis
TimDavisTimDavis
TimDavis
 
Cunningham_One to One iPad Supporting Listening, Speaking, Reading, and Writing
Cunningham_One to One iPad Supporting Listening, Speaking, Reading, and WritingCunningham_One to One iPad Supporting Listening, Speaking, Reading, and Writing
Cunningham_One to One iPad Supporting Listening, Speaking, Reading, and Writing
 
iDo or iDon't ‐ Using Tablets in the Classroom - Course Technology Computing ...
iDo or iDon't ‐ Using Tablets in the Classroom - Course Technology Computing ...iDo or iDon't ‐ Using Tablets in the Classroom - Course Technology Computing ...
iDo or iDon't ‐ Using Tablets in the Classroom - Course Technology Computing ...
 
Embracing AI In Assessment
Embracing AI In AssessmentEmbracing AI In Assessment
Embracing AI In Assessment
 
Cs faculty newsletter jan 20
Cs faculty newsletter jan 20Cs faculty newsletter jan 20
Cs faculty newsletter jan 20
 

More from university of education,Lahore

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Alice Software

  • 1. Alice software BS(H) Botany 3rd M Introduction to computer 1005 Maha tariq UniversityOf Education Okara
  • 2. Table of contents • Introduction to Alice • Demo • The Alice Approach • Key features • How Alice is used • Related Questions • References
  • 4. Alice is a solution to the current big problem in Computer Science Education: Attracting and Retaining Students
  • 6. The Alice Software • A 3D interactive animation environment • A tool for teaching fundamental programming concepts – object oriented • System developed at Carnegie Mellon
  • 7. A Demo of Alice…
  • 8. The Alice Approach • Uses 3D graphics to engage students • Has a “smart” drag-and-drop editor that prevents syntax errors • Appeals to wide audience – Storytelling • (young women, minority students) – Interactive computer games • (young men) – Not threatening; Alice builds students’ confidence
  • 9. Key Alice Features • Makes objects something students can see and relate to • Has a java syntax mode to ease the transition to C++/Java/VB.net
  • 10. How Alice is being used • In pre-CS1 – course for majors and students considering a CS major • As conceptual introduction in CS1, followed by a transition to Java/C++/VB • Introduction to programming course – non-majors (in business schools, for example) – attract students to become CS majors • Computer literacy – problem-solving component • Pre-AP in high schools
  • 11. Commonly Asked Questions • How much does the Alice software cost? – It is free! (and open source) • Does Alice run on the Macintosh? – Yes! Download Mac version from www.alice.org • Where can I go for instructor support materials? – www.aliceprogramming.net • Is Alice hard to install? – Just copy files to the hard drive; no “install”
  • 12. Commonly Asked Questions, Cont. • Isn’t Alice just a toy? (it looks so “Fisher-Price”!) – No -- Alice contains all the features of “real” languages – Students can write 3,000 line programs in Alice • How do students go from Alice to Java? – They have learned the concepts in Alice, then learn syntax in Java – They have built confidence and are more persistent • Is there any “hard evidence” that Alice works? – Yes! An NSF study on “at risk” CS1 students who used Alice… • Increased grades from C to B • Retention (into CS2) went from 47% to 88%
  • 13. References • Wanda Dann (wpdann@ithaca.e du) • Randy Pausch (pausch@cmu.edu • Stephen Cooper (scooper@sju.edu