Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Science and Educational Software Design: A Resource for Multidisciplinary Work in Technology Enhanced Learning

Buy

Developing educational software requires thinking, problematizing, representing, modeling, implementing and analyzing pedagogical objectives and issues, as well as conceptual models and software architectures. Computer scientists face the difficulty of understanding the particular issues and phenomena to be taken into account in educational software projects and of avoiding a naïve technocentered perspective. On the other hand, actors with backgrounds in human or social sciences face the difficulty of understanding software design and implementation issues, and how computer scientists engage in these tasks.

Tchounikine argues that these difficulties cannot be solved by building a kind of “general theory” or “general engineering methodology” to be adopted by all actors for all projects: educational software projects may correspond to very different realities, and may be conducted within very different perspectives and with very different matters of concern. Thus the issue of understanding each others’ perspectives and elaborating some common ground is to be considered in context, within the considered project or perspective. To this end, he provides the reader with a framework and means for actively taking into account the relationships between pedagogical settings and software, and for working together in a multidisciplinary way to develop educational software.

His book is for actors engaged in research or development projects which require inventing, designing, adapting, implementing or analyzing educational software. The core audience is Master’s and PhD students, researchers and engineers from computer science or human and social sciences (e.g., education, psychology, pedagogy, philosophy, communications or sociology) interested in the issues raised by educational software design and analysis and in the variety of perspectives that may be adopted.
(HTML tags aren't allowed.)

LinkedIn For Dummies
LinkedIn For Dummies

Relationships matter. Ever since the dawn of time, when caveman Fred asked caveman Barney whether there was any work down at the quarry, human beings have always networked. We’re social creatures who like to reach out and talk to someone. As the Internet developed and grew in popularity, people rapidly took advantage of this new...

Computing System Reliability: Models and Analysis
Computing System Reliability: Models and Analysis
Computing has been the fastest developing technology during the last century. Computing systems are widely used in many areas, and they are desired to achieve various complex and safety-critical missions. The applications of the computing systems have now crossed many different fields and can be found in different products, for example, air traffic...
My iPad
My iPad

Covers iPad Wi-Fi and 3G

 

Step-by-step

instructions with callouts to iPad photos that show you exactly what to do.

 

Help

...

Learning Shell Scripting with Zsh
Learning Shell Scripting with Zsh

Your one-stop guide to reading, writing, and debugging simple and complex Z shell scripts

Overview

  • A step-by-step guide that will show you how to use Zsh and its repertoire of powerful features to improve the efficiency of your daily tasks
  • Learn how to configure and use Zsh
  • ...
Play for Scala: Covers Play 2
Play for Scala: Covers Play 2

Summary

Play for Scala shows you how to build Scala-based web applications using the Play 2 framework. This book starts by introducing Play through a comprehensive overview example. Then, you'll look at each facet of a typical Play application both by exploring simple code snippets and by adding to a...

Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy