Go to the link for UNESCO's work in Education
http://portal.unesco.org/education/en/ev.php-URL_ID=40218&URL_DO=DO_TOPIC&URL_SECTION=201.html
Wednesday, March 18, 2009
Revised time table of B.Ed. exam
follow the link given bellow for revised time table of B.Ed. exam 08-09 due to Election
http://www.unipune.ernet.in/indexout.html
http://www.unipune.ernet.in/indexout.html
Netiquette
In the past, the population of people using the Internet had "grown up" with the Internet, were technically minded, and understood the nature of the transport and the protocols. Today, the community of Internet users includes people who are new to the environment. These "Newbies" are unfamiliar with the culture and don't need to know about transport and protocols. In order to bring these new users into the Internet culture quickly, this Guide offers a minimum set of behaviors which organizations and individuals may take and adapt for their own use. Individuals should be aware that no matter who supplies their Internet access, be it an Internet Service Provider through a private account, or a student account at a University, or an account through a corporation, that those organizations have regulations about ownership of mail and files, about what is proper to post or send, and how to present yourself. Be sure to check with the local authority for specific guidelines.
For mail:
Unless you have your own Internet access through an Internet provider, be sure to check with your employer about ownership of electronic mail. Laws about the ownership of electronic mail vary from place to place.
Unless you are using an encryption device (hardware or software), you should assume that mail on the Internet is not secure. Never put in a mail message anything you would not put on a postcard.
Respect the copyright on material that you reproduce. Almost every country has copyright laws.
If you are forwarding or re-posting a message you've received, do not change the wording. If the message was a personal message to you and you are re-posting to a group, you should ask permission first. You may shorten the message and quote only relevant parts, but be sure you give proper attribution.
Never send chain letters via electronic mail. Chain letters are forbidden on the Internet. Your network privileges will be revoked. Notify your local system administrator if your ever receive one.
A good rule of thumb: Be conservative in what you send and liberal in what you receive. You should not send heated messages (we call these "flames") even if you are provoked. On the other hand, you shouldn't be surprised if you get flamed and it's prudent not to respond to flames.
In general, it's a good idea to at least check all your mail subjects before responding to a message. Sometimes a person who asks you for help (or clarification) will send another message which effectively says "Never Mind". Also make sure that any message you respond to was directed to you. You might be cc:ed rather than the primary recipient.
Make things easy for the recipient. Many mailers strip header information which includes your return address. In order to ensure that people know who you are, be sure to include a line or two at the end of your message with contact information. You can create this file ahead of time and add it to the end of your messages. (Some mailers do this automatically.) In Internet parlance, this is known as a ".sig" or "signature" file. Your .sig file takes the place of your business card. (And you can have more than one to apply in different circumstances.)
Be careful when addressing mail. There are addresses which may go to a group but the address looks like it is just one person. Know to whom you are sending.
Watch cc's when replying. Don't continue to include people if the messages have become a 2-way conversation.
In general, most people who use the Internet don't have time to answer general questions about the Internet and its workings. Don't send unsolicited mail asking for information to people whose names you might have seen in RFCs or on mailing lists.
Remember that people with whom you communicate are located across the globe. If you send a message to which you want an immediate response, the person receiving it might be at home asleep when it arrives. Give them a chance to wake up, come to work, and login before assuming the mail didn't arrive or that they don't care.
Verify all addresses before initiating long or personal discourse. It's also a good practice to include the word "Long" in the subject header so the recipient knows the message will take time to read and respond to. Over 100 lines is considered "long".
Know whom to contact for help. Usually you will have resources close at hand. Check locally for people who can help you with software and system problems. Also, know whom to go to if you receive anything questionable or illegal. Most sites also have "Postmaster" aliased to a knowledgeable user, so you can send mail to this address to get help with mail.
Remember that the recipient is a human being whose culture, language, and humor have different points of reference from your own. Remember that date formats, measurements, and idioms may not travel well. Be especially careful with sarcasm.
Use mixed case. UPPER CASE LOOKS AS IF YOU'RE SHOUTING.
Use symbols for emphasis. That *is* what I meant. Use underscores for underlining. _War and Peace_ is my favorite book.
Use smileys to indicate tone of voice, but use them sparingly. :-) is an example of a smiley (Look sideways). Don't assume that the inclusion of a smiley will make the recipient happy with what you say or wipe out an otherwise insulting comment.
Wait overnight to send emotional responses to messages. If you have really strong feelings about a subject, indicate it via FLAME ON/OFF enclosures. For example:FLAME ON:This type of argument is not worth the bandwidth it takes to send it. It's illogical and poorly reasoned. The rest of the world agrees with me.FLAME OFF
Do not include control characters or non-ASCII attachments in messages unless they are MIME attachments or unless your mailer encodes these. If you send encoded messages make sure the recipient can decode them.
Be brief without being overly terse. When replying to a message, include enough original material to be understood but no more. It is extremely bad form to simply reply to a message by including all the previous message: edit out all the irrelevant material.
Limit line length to fewer than 65 characters and end a line with a carriage return.
Mail should have a subject heading which reflects the content of the message.
If you include a signature keep it short. Rule of thumb is no longer than 4 lines. Remember that many people pay for connectivity by the minute, and the longer your message is, the more they pay.
Just as mail (today) may not be private, mail (and news) are (today) subject to forgery and spoofing of various degrees of detectability. Apply common sense "reality checks" before assuming a message is valid.
If you think the importance of a message justifies it, immediately reply briefly to an e-mail message to let the sender know you got it, even if you will send a longer reply later.
"Reasonable" expectations for conduct via e-mail depend on your relationship to a person and the context of the communication. Norms learned in a particular e-mail environment may not apply in general to your e-mail communication with people across the Internet. Be careful with slang or local acronyms.
The cost of delivering an e-mail message is, on the average, paid about equally by the sender and the recipient (or their organizations). This is unlike other media such as physical mail, telephone, TV, or radio. Sending someone mail may also cost them in other specific ways like network bandwidth, disk space or CPU usage. This is a fundamental economic reason why unsolicited e-mail advertising is unwelcome (and is forbidden in many contexts).
Know how large a message you are sending. Including large files such as Postscript files or programs may make your message so large that it cannot be delivered or at least consumes excessive resources. A good rule of thumb would be not to send a file larger than 50 Kilobytes. Consider file transfer as an alternative, or cutting the file into smaller chunks and sending each as a separate message.
Don't send large amounts of unsolicited information to people.
If your mail system allows you to forward mail, beware the dreaded forwarding loop. Be sure you haven't set up forwarding on several hosts so that a message sent to you gets into an endless loop from one computer to the next to the next.
2.1.2 For talk:Talk is a set of protocols which allow two people to have an interactive dialogue via computer.
Use mixed case and proper punctuation, as though you were typing a letter or sending mail.
Don't run off the end of a line and simply let the terminal wrap; use a Carriage Return (CR) at the end of the line. Also, don't assume your screen size is the same as everyone else's. A good rule of thumb is to write out no more than 70 characters, and no more than 12 lines (since you're using a split screen).
Leave some margin; don't write to the edge of the screen.
Use two CRs to indicate that you are done and the other person may start typing. (blank line).
Always say goodbye, or some other farewell, and wait to see a farewell from the other person before killing the session. This is especially important when you are communicating with someone a long way away. Remember that your communication relies on both bandwidth (the size of the pipe) and latency (the speed of light).
Remember that talk is an interruption to the other person. Only use as appropriate. And never talk to strangers.
The reasons for not getting a reply are many. Don't assume that everything is working correctly. Not all versions of talk are compatible.
If left on its own, talk re-rings the recipient. Let it ring one or two times, then kill it.
If a person doesn't respond you might try another tty. Use finger to determine which are open. If the person still doesn't respond, do not continue to send.
Talk shows your typing ability. If you type slowly and make mistakes when typing it is often not worth the time of trying to correct, as the other person can usually see what you meant.
Be careful if you have more than one talk session going!
2.2 Administrator Issues
Be sure you have established written guidelines for dealing with situations especially illegal, improper, or forged traffic.
Handle requests in a timely fashion - by the next business day.
Respond promptly to people who have concerns about receiving improper or illegal messages. Requests concerning chain letters should be handled immediately.
Explain any system rules, such as disk quotas, to your users. Make sure they understand implications of requesting files by mail such as: Filling up disks; running up phone bills, delaying mail, etc.
Make sure you have "Postmaster" aliased. Make sure you have "Root" aliased. Make sure someone reads that mail.
Investigate complaints about your users with an open mind. Remember that addresses may be forged and spoofed
taken as it is from,
with thanks,
Author's Address
Sally Hambridge
Intel Corporation
2880 Northwestern Parkway
SC3-15
Santa Clara, CA 95052
For mail:
Unless you have your own Internet access through an Internet provider, be sure to check with your employer about ownership of electronic mail. Laws about the ownership of electronic mail vary from place to place.
Unless you are using an encryption device (hardware or software), you should assume that mail on the Internet is not secure. Never put in a mail message anything you would not put on a postcard.
Respect the copyright on material that you reproduce. Almost every country has copyright laws.
If you are forwarding or re-posting a message you've received, do not change the wording. If the message was a personal message to you and you are re-posting to a group, you should ask permission first. You may shorten the message and quote only relevant parts, but be sure you give proper attribution.
Never send chain letters via electronic mail. Chain letters are forbidden on the Internet. Your network privileges will be revoked. Notify your local system administrator if your ever receive one.
A good rule of thumb: Be conservative in what you send and liberal in what you receive. You should not send heated messages (we call these "flames") even if you are provoked. On the other hand, you shouldn't be surprised if you get flamed and it's prudent not to respond to flames.
In general, it's a good idea to at least check all your mail subjects before responding to a message. Sometimes a person who asks you for help (or clarification) will send another message which effectively says "Never Mind". Also make sure that any message you respond to was directed to you. You might be cc:ed rather than the primary recipient.
Make things easy for the recipient. Many mailers strip header information which includes your return address. In order to ensure that people know who you are, be sure to include a line or two at the end of your message with contact information. You can create this file ahead of time and add it to the end of your messages. (Some mailers do this automatically.) In Internet parlance, this is known as a ".sig" or "signature" file. Your .sig file takes the place of your business card. (And you can have more than one to apply in different circumstances.)
Be careful when addressing mail. There are addresses which may go to a group but the address looks like it is just one person. Know to whom you are sending.
Watch cc's when replying. Don't continue to include people if the messages have become a 2-way conversation.
In general, most people who use the Internet don't have time to answer general questions about the Internet and its workings. Don't send unsolicited mail asking for information to people whose names you might have seen in RFCs or on mailing lists.
Remember that people with whom you communicate are located across the globe. If you send a message to which you want an immediate response, the person receiving it might be at home asleep when it arrives. Give them a chance to wake up, come to work, and login before assuming the mail didn't arrive or that they don't care.
Verify all addresses before initiating long or personal discourse. It's also a good practice to include the word "Long" in the subject header so the recipient knows the message will take time to read and respond to. Over 100 lines is considered "long".
Know whom to contact for help. Usually you will have resources close at hand. Check locally for people who can help you with software and system problems. Also, know whom to go to if you receive anything questionable or illegal. Most sites also have "Postmaster" aliased to a knowledgeable user, so you can send mail to this address to get help with mail.
Remember that the recipient is a human being whose culture, language, and humor have different points of reference from your own. Remember that date formats, measurements, and idioms may not travel well. Be especially careful with sarcasm.
Use mixed case. UPPER CASE LOOKS AS IF YOU'RE SHOUTING.
Use symbols for emphasis. That *is* what I meant. Use underscores for underlining. _War and Peace_ is my favorite book.
Use smileys to indicate tone of voice, but use them sparingly. :-) is an example of a smiley (Look sideways). Don't assume that the inclusion of a smiley will make the recipient happy with what you say or wipe out an otherwise insulting comment.
Wait overnight to send emotional responses to messages. If you have really strong feelings about a subject, indicate it via FLAME ON/OFF enclosures. For example:FLAME ON:This type of argument is not worth the bandwidth it takes to send it. It's illogical and poorly reasoned. The rest of the world agrees with me.FLAME OFF
Do not include control characters or non-ASCII attachments in messages unless they are MIME attachments or unless your mailer encodes these. If you send encoded messages make sure the recipient can decode them.
Be brief without being overly terse. When replying to a message, include enough original material to be understood but no more. It is extremely bad form to simply reply to a message by including all the previous message: edit out all the irrelevant material.
Limit line length to fewer than 65 characters and end a line with a carriage return.
Mail should have a subject heading which reflects the content of the message.
If you include a signature keep it short. Rule of thumb is no longer than 4 lines. Remember that many people pay for connectivity by the minute, and the longer your message is, the more they pay.
Just as mail (today) may not be private, mail (and news) are (today) subject to forgery and spoofing of various degrees of detectability. Apply common sense "reality checks" before assuming a message is valid.
If you think the importance of a message justifies it, immediately reply briefly to an e-mail message to let the sender know you got it, even if you will send a longer reply later.
"Reasonable" expectations for conduct via e-mail depend on your relationship to a person and the context of the communication. Norms learned in a particular e-mail environment may not apply in general to your e-mail communication with people across the Internet. Be careful with slang or local acronyms.
The cost of delivering an e-mail message is, on the average, paid about equally by the sender and the recipient (or their organizations). This is unlike other media such as physical mail, telephone, TV, or radio. Sending someone mail may also cost them in other specific ways like network bandwidth, disk space or CPU usage. This is a fundamental economic reason why unsolicited e-mail advertising is unwelcome (and is forbidden in many contexts).
Know how large a message you are sending. Including large files such as Postscript files or programs may make your message so large that it cannot be delivered or at least consumes excessive resources. A good rule of thumb would be not to send a file larger than 50 Kilobytes. Consider file transfer as an alternative, or cutting the file into smaller chunks and sending each as a separate message.
Don't send large amounts of unsolicited information to people.
If your mail system allows you to forward mail, beware the dreaded forwarding loop. Be sure you haven't set up forwarding on several hosts so that a message sent to you gets into an endless loop from one computer to the next to the next.
2.1.2 For talk:Talk is a set of protocols which allow two people to have an interactive dialogue via computer.
Use mixed case and proper punctuation, as though you were typing a letter or sending mail.
Don't run off the end of a line and simply let the terminal wrap; use a Carriage Return (CR) at the end of the line. Also, don't assume your screen size is the same as everyone else's. A good rule of thumb is to write out no more than 70 characters, and no more than 12 lines (since you're using a split screen).
Leave some margin; don't write to the edge of the screen.
Use two CRs to indicate that you are done and the other person may start typing. (blank line).
Always say goodbye, or some other farewell, and wait to see a farewell from the other person before killing the session. This is especially important when you are communicating with someone a long way away. Remember that your communication relies on both bandwidth (the size of the pipe) and latency (the speed of light).
Remember that talk is an interruption to the other person. Only use as appropriate. And never talk to strangers.
The reasons for not getting a reply are many. Don't assume that everything is working correctly. Not all versions of talk are compatible.
If left on its own, talk re-rings the recipient. Let it ring one or two times, then kill it.
If a person doesn't respond you might try another tty. Use finger to determine which are open. If the person still doesn't respond, do not continue to send.
Talk shows your typing ability. If you type slowly and make mistakes when typing it is often not worth the time of trying to correct, as the other person can usually see what you meant.
Be careful if you have more than one talk session going!
2.2 Administrator Issues
Be sure you have established written guidelines for dealing with situations especially illegal, improper, or forged traffic.
Handle requests in a timely fashion - by the next business day.
Respond promptly to people who have concerns about receiving improper or illegal messages. Requests concerning chain letters should be handled immediately.
Explain any system rules, such as disk quotas, to your users. Make sure they understand implications of requesting files by mail such as: Filling up disks; running up phone bills, delaying mail, etc.
Make sure you have "Postmaster" aliased. Make sure you have "Root" aliased. Make sure someone reads that mail.
Investigate complaints about your users with an open mind. Remember that addresses may be forged and spoofed
taken as it is from,
with thanks,
Author's Address
Sally Hambridge
Intel Corporation
2880 Northwestern Parkway
SC3-15
Santa Clara, CA 95052
Sunday, March 1, 2009
links for virtual learning
http://en.wikipedia.org/wiki/Virtual_education
http://jme.sagepub.com/cgi/content/abstract/24/2/213
http://portal.acm.org/citation.cfm?id=62266.62289
http://www.questia.com/googleScholar.qst?docId=5000117383
http://www.digitallearning.in/jan06/learninglab.asp
http://ieeexplore.ieee.org/search/wrapper.jsp?arnumber=538749
http://www.elearning-india.com/
http://jme.sagepub.com/cgi/content/abstract/24/2/213
http://portal.acm.org/citation.cfm?id=62266.62289
http://www.questia.com/googleScholar.qst?docId=5000117383
http://www.digitallearning.in/jan06/learninglab.asp
http://ieeexplore.ieee.org/search/wrapper.jsp?arnumber=538749
http://www.elearning-india.com/
links for Web based learning
http://www.e-learningguru.com/articles/art1_9.htm
http://www.cdac.in/html/pdf/Session2.2.pdf
http://www.tatainteractive.com/casestudies/McGrawHill_Learning_Portals_mhln.pdf
http://en.wikipedia.org/wiki/Web-based_learning
http://www.cdac.in/html/pdf/Session2.2.pdf
http://www.tatainteractive.com/casestudies/McGrawHill_Learning_Portals_mhln.pdf
http://en.wikipedia.org/wiki/Web-based_learning
Web Linkages for Computer Assisted Learning
http://www.pcmag.com/encyclopedia_term/0,2542,t=computer-assisted+learning&i=40184,00.asp
http://encyclopedia2.thefreedictionary.com/computer-assisted+learning
http://home.ubalt.edu/ntsbarsh/opre640c/partX.htm
http://en.wikipedia.org/wiki/Computer-assisted_learning
http://www.erudium.polymtl.ca/html-eng/glossaire.php
http://www.health-informatics.org/HC2007/Post6-Guo2.pdf
Subscribe to:
Posts (Atom)