Sunday, November 1, 2009

Tips for exam

Solve all questions.
Be precise, follow the word limit.
Highlight the main points with same pen or pencil.
Don't use sketch pen/red/green etc. colour pens.
Carefully give numbers to answers according to questions.
Do proper time management.
Keep water bottle, chocolates etc. as an energy booster.
Don't think after writing think before.
Don't calculate marks after, it may affect your next paper.
So ALL THE BEST TO ALL OF YOU.

First Term Exam

ALL THE BEST FOR FIRST TERM EXAM

Thursday, October 29, 2009

SOME IMPORTANT POINTS FOR STUDY OF IT CEP


CLASSIFICATION OF HARDWARE


LOTUS SMART SUITE


ALGORITHEM

FLOW CHART


BASIC


GENERATION OF COMPUER


MS EXCEL


INTERNET

Friday, September 18, 2009

Portion for first CEP test for IT

The portion for first Cep test will be
std 8th and std. 9th syllabus.
So, refer text books of IT subject (work experience.)
Test will be conducted immediate after Diwali vacation.
It is all about Self study.

Sunday, August 30, 2009

Web links forT.B.T.practicals

www.intel.com/education/teach/

www.intel.com/education/teach/teachers_schools.htm

http://www.intel.com/cd/corporate/education/apac/eng/in/239067.htm


Saturday, August 8, 2009

LINK FOR B.ED. SYLLABUS

follow the link for B.Ed. syllabus of University of Pune.
http://www.unipune.ernet.in/indexout.html

SYLLABUS OF IT METHOD

INFORMATION TECHNOLOGY (IT) EDUCATION

Unit - I Information & Communication Technology subject and its
nature
1.1 Meaning & Nature of Information Technology
1.2 Place of Information Technology in school curriculum
1.3 Importance of Information Technology in daily life and in
education
1.4 Correlation – concept and nature
1.5 Limitations of Information Technology.

Unit - II Methods of learning and teaching of Information
Technology (Basic, concept, advantages, limitation)
2.1 Computer assisted instruction
2.2 Project based learning
2.3 Technology aided learning
2.4 Demonstration
2.5 Online learning / Teaching
2.6 Offline learning / Teaching
2.7 Web based learning / Teaching

Unit – III Content cum Methodology in teaching learning of ICI (4hrs)
3.1 Concept and nature of Content cum Methodology
3.2 Importance and need of Content cum Methodology
3.3 Step of Content cum Methodology

Unit - IV Pedagogical analysis of Information Technology
4.1 Structural component of Information Technology
4.2 Methods of curriculum construction in Information
Technology concentric, linear, eclectic
4.3 Objectives of teaching Information Technology
a) General objectives b) Objectives at secondary
and Higher secondary levels c) Instructional objectives
of Information Technology d) 21st Century skills
4.4 Analysis of Information syllabus
4.5 Characteristics of good Information Technology text book
4.6 Content analysis of Information Technology

Unit- V Core elements and values in teaching learning of Information Technology (as per Maharashtra state syllabus) (4 hrs)
5.1 Concept
5.2 Objectives
5.3 Application

Unit -VI Tools in Information Technology (6 hrs)
6.1 Hardware Tools – Computers, Printers, OHP, Screen,
Image, Projectors.
6.2 Information Technology lab – Features, Problems,
Maintenance,
6.3 Educational software – Types, characteristics, uses and
evaluation
6.4 Communication tools- (uses) Email, chatting, Blogs,
Wike’s, Newsgroups, Mobiles, Video conferencing

Unit – VII Information Technology and non formal Education (Role
and importance (4 hrs )
7.1 Distance learning
7.2 Adult Education
7.3 On line tutoring
7.4 Guidance and core selling
7.5 Health Education

Unit - VIII Evaluation in Information Technology (5 hrs)
8.1 Types of evaluation – Yormative and summative
8.2 Tools of evaluation of power point presentation,
Publications, Blogs, Wikes, Website
8.3 Evaluation of Information Technology skills of students
through oral written and practical test
8.4 Online examinations – Importance, uses and limitations

PRACTICAL
1. Structure of the subject.
2. Analysis of the syllabus.
3. Evaluation of text book.
4. Content Analysis of a unit.
5. Prepare a word document on the Internet research conducted on
the unit.
6. Preparation a C.A.I. program for the unit.
7. Conduct / Show case C.A.T. program.

Strike

We all teachers in higher education Maharashtra state(MFUCTO); are on strike since 14th july.
Still we dont have any positive solution from Minister, Secrtery, Director of higher education.
We shall continue the strike unless the positive agreement with Govt of Maharashtra.

Wednesday, July 8, 2009

Placement

For ex-students
Please submitt your C.V. to placement dept. of our Tilak College of Education, OR send on the e-mail - sgisave@gamil.com or tilakcollege1941@vsnl.net
so we can provide you an appropriate opportunuty.!
ALL THE BEST!

Thursday, June 25, 2009

B.Ed. 08-09 result


Dear Students

the result of B.Ed. 2008-09 result has been declared on 25 th june 2009!

Please come and collect your marklist from college.

Register your name to the Placement Cell of College.

CONGRATULATIONS!

Wednesday, March 18, 2009

UNESCO link

Go to the link for UNESCO's work in Education

http://portal.unesco.org/education/en/ev.php-URL_ID=40218&URL_DO=DO_TOPIC&URL_SECTION=201.html

Revised time table of B.Ed. exam

follow the link given bellow for revised time table of B.Ed. exam 08-09 due to Election
http://www.unipune.ernet.in/indexout.html

Netiquette

In the past, the population of people using the Internet had "grown up" with the Internet, were technically minded, and understood the nature of the transport and the protocols. Today, the community of Internet users includes people who are new to the environment. These "Newbies" are unfamiliar with the culture and don't need to know about transport and protocols. In order to bring these new users into the Internet culture quickly, this Guide offers a minimum set of behaviors which organizations and individuals may take and adapt for their own use. Individuals should be aware that no matter who supplies their Internet access, be it an Internet Service Provider through a private account, or a student account at a University, or an account through a corporation, that those organizations have regulations about ownership of mail and files, about what is proper to post or send, and how to present yourself. Be sure to check with the local authority for specific guidelines.
For mail:
Unless you have your own Internet access through an Internet provider, be sure to check with your employer about ownership of electronic mail. Laws about the ownership of electronic mail vary from place to place.
Unless you are using an encryption device (hardware or software), you should assume that mail on the Internet is not secure. Never put in a mail message anything you would not put on a postcard.
Respect the copyright on material that you reproduce. Almost every country has copyright laws.
If you are forwarding or re-posting a message you've received, do not change the wording. If the message was a personal message to you and you are re-posting to a group, you should ask permission first. You may shorten the message and quote only relevant parts, but be sure you give proper attribution.
Never send chain letters via electronic mail. Chain letters are forbidden on the Internet. Your network privileges will be revoked. Notify your local system administrator if your ever receive one.
A good rule of thumb: Be conservative in what you send and liberal in what you receive. You should not send heated messages (we call these "flames") even if you are provoked. On the other hand, you shouldn't be surprised if you get flamed and it's prudent not to respond to flames.
In general, it's a good idea to at least check all your mail subjects before responding to a message. Sometimes a person who asks you for help (or clarification) will send another message which effectively says "Never Mind". Also make sure that any message you respond to was directed to you. You might be cc:ed rather than the primary recipient.
Make things easy for the recipient. Many mailers strip header information which includes your return address. In order to ensure that people know who you are, be sure to include a line or two at the end of your message with contact information. You can create this file ahead of time and add it to the end of your messages. (Some mailers do this automatically.) In Internet parlance, this is known as a ".sig" or "signature" file. Your .sig file takes the place of your business card. (And you can have more than one to apply in different circumstances.)
Be careful when addressing mail. There are addresses which may go to a group but the address looks like it is just one person. Know to whom you are sending.
Watch cc's when replying. Don't continue to include people if the messages have become a 2-way conversation.
In general, most people who use the Internet don't have time to answer general questions about the Internet and its workings. Don't send unsolicited mail asking for information to people whose names you might have seen in RFCs or on mailing lists.
Remember that people with whom you communicate are located across the globe. If you send a message to which you want an immediate response, the person receiving it might be at home asleep when it arrives. Give them a chance to wake up, come to work, and login before assuming the mail didn't arrive or that they don't care.
Verify all addresses before initiating long or personal discourse. It's also a good practice to include the word "Long" in the subject header so the recipient knows the message will take time to read and respond to. Over 100 lines is considered "long".
Know whom to contact for help. Usually you will have resources close at hand. Check locally for people who can help you with software and system problems. Also, know whom to go to if you receive anything questionable or illegal. Most sites also have "Postmaster" aliased to a knowledgeable user, so you can send mail to this address to get help with mail.
Remember that the recipient is a human being whose culture, language, and humor have different points of reference from your own. Remember that date formats, measurements, and idioms may not travel well. Be especially careful with sarcasm.
Use mixed case. UPPER CASE LOOKS AS IF YOU'RE SHOUTING.
Use symbols for emphasis. That *is* what I meant. Use underscores for underlining. _War and Peace_ is my favorite book.
Use smileys to indicate tone of voice, but use them sparingly. :-) is an example of a smiley (Look sideways). Don't assume that the inclusion of a smiley will make the recipient happy with what you say or wipe out an otherwise insulting comment.
Wait overnight to send emotional responses to messages. If you have really strong feelings about a subject, indicate it via FLAME ON/OFF enclosures. For example:FLAME ON:This type of argument is not worth the bandwidth it takes to send it. It's illogical and poorly reasoned. The rest of the world agrees with me.FLAME OFF
Do not include control characters or non-ASCII attachments in messages unless they are MIME attachments or unless your mailer encodes these. If you send encoded messages make sure the recipient can decode them.
Be brief without being overly terse. When replying to a message, include enough original material to be understood but no more. It is extremely bad form to simply reply to a message by including all the previous message: edit out all the irrelevant material.
Limit line length to fewer than 65 characters and end a line with a carriage return.
Mail should have a subject heading which reflects the content of the message.
If you include a signature keep it short. Rule of thumb is no longer than 4 lines. Remember that many people pay for connectivity by the minute, and the longer your message is, the more they pay.
Just as mail (today) may not be private, mail (and news) are (today) subject to forgery and spoofing of various degrees of detectability. Apply common sense "reality checks" before assuming a message is valid.
If you think the importance of a message justifies it, immediately reply briefly to an e-mail message to let the sender know you got it, even if you will send a longer reply later.
"Reasonable" expectations for conduct via e-mail depend on your relationship to a person and the context of the communication. Norms learned in a particular e-mail environment may not apply in general to your e-mail communication with people across the Internet. Be careful with slang or local acronyms.
The cost of delivering an e-mail message is, on the average, paid about equally by the sender and the recipient (or their organizations). This is unlike other media such as physical mail, telephone, TV, or radio. Sending someone mail may also cost them in other specific ways like network bandwidth, disk space or CPU usage. This is a fundamental economic reason why unsolicited e-mail advertising is unwelcome (and is forbidden in many contexts).
Know how large a message you are sending. Including large files such as Postscript files or programs may make your message so large that it cannot be delivered or at least consumes excessive resources. A good rule of thumb would be not to send a file larger than 50 Kilobytes. Consider file transfer as an alternative, or cutting the file into smaller chunks and sending each as a separate message.
Don't send large amounts of unsolicited information to people.
If your mail system allows you to forward mail, beware the dreaded forwarding loop. Be sure you haven't set up forwarding on several hosts so that a message sent to you gets into an endless loop from one computer to the next to the next.
2.1.2 For talk:Talk is a set of protocols which allow two people to have an interactive dialogue via computer.
Use mixed case and proper punctuation, as though you were typing a letter or sending mail.
Don't run off the end of a line and simply let the terminal wrap; use a Carriage Return (CR) at the end of the line. Also, don't assume your screen size is the same as everyone else's. A good rule of thumb is to write out no more than 70 characters, and no more than 12 lines (since you're using a split screen).
Leave some margin; don't write to the edge of the screen.
Use two CRs to indicate that you are done and the other person may start typing. (blank line).
Always say goodbye, or some other farewell, and wait to see a farewell from the other person before killing the session. This is especially important when you are communicating with someone a long way away. Remember that your communication relies on both bandwidth (the size of the pipe) and latency (the speed of light).
Remember that talk is an interruption to the other person. Only use as appropriate. And never talk to strangers.
The reasons for not getting a reply are many. Don't assume that everything is working correctly. Not all versions of talk are compatible.
If left on its own, talk re-rings the recipient. Let it ring one or two times, then kill it.
If a person doesn't respond you might try another tty. Use finger to determine which are open. If the person still doesn't respond, do not continue to send.
Talk shows your typing ability. If you type slowly and make mistakes when typing it is often not worth the time of trying to correct, as the other person can usually see what you meant.
Be careful if you have more than one talk session going!
2.2 Administrator Issues
Be sure you have established written guidelines for dealing with situations especially illegal, improper, or forged traffic.
Handle requests in a timely fashion - by the next business day.
Respond promptly to people who have concerns about receiving improper or illegal messages. Requests concerning chain letters should be handled immediately.
Explain any system rules, such as disk quotas, to your users. Make sure they understand implications of requesting files by mail such as: Filling up disks; running up phone bills, delaying mail, etc.
Make sure you have "Postmaster" aliased. Make sure you have "Root" aliased. Make sure someone reads that mail.
Investigate complaints about your users with an open mind. Remember that addresses may be forged and spoofed


taken as it is from,
with thanks,

Author's Address
Sally Hambridge
Intel Corporation
2880 Northwestern Parkway
SC3-15
Santa Clara, CA 95052

Sunday, March 1, 2009

links for virtual learning

http://en.wikipedia.org/wiki/Virtual_education

http://jme.sagepub.com/cgi/content/abstract/24/2/213

http://portal.acm.org/citation.cfm?id=62266.62289

http://www.questia.com/googleScholar.qst?docId=5000117383

http://www.digitallearning.in/jan06/learninglab.asp

http://ieeexplore.ieee.org/search/wrapper.jsp?arnumber=538749

http://www.elearning-india.com/

links for EduSat

http://www.isro.org/Edusat/Page2.htm

http://www.efytimes.com/efytimes/fullnews.asp?edid=25549

links for collaborative learning

http://halshs.archives-ouvertes.fr/docs/00/19/02/40/PDF/Dillenbourg-Pierre-1999.pdf

http://www.jstor.org/pss/328890

http://www.jstor.org/pss/1466820

links for Web based learning

http://www.e-learningguru.com/articles/art1_9.htm

http://www.cdac.in/html/pdf/Session2.2.pdf

http://www.tatainteractive.com/casestudies/McGrawHill_Learning_Portals_mhln.pdf

http://en.wikipedia.org/wiki/Web-based_learning

Links for Project Based Learning

http://www.educationinindia.co.in/

http://www.edutopia.org/project-learning/

http://pbl.online.org/

http://pblmm.k12.ca.us/PBLGuide/Why PBL.htm

http://en.wikipedia.org/wiki/Projectbased-learning/

Web Linkages for Computer Assisted Learning

http://www.pcmag.com/encyclopedia_term/0,2542,t=computer-assisted+learning&i=40184,00.asp

http://encyclopedia2.thefreedictionary.com/computer-assisted+learning

http://home.ubalt.edu/ntsbarsh/opre640c/partX.htm

http://en.wikipedia.org/wiki/Computer-assisted_learning

http://www.erudium.polymtl.ca/html-eng/glossaire.php

http://www.health-informatics.org/HC2007/Post6-Guo2.pdf

Saturday, January 17, 2009

Net Safety

Net Safety Education
- S.G.Isave
Lecturer,
Tilak College of
Education
Pune – 30
sgisave@gmail.com
----------------------------------------------------------------------------

@ Background @ Meaning @ Need

@ Threats @ Solution @ Conclusion
----------------------------------------------------------------------------
Background –
Internet is growing source of knowledge. India is forth in the no. of internet users. So we should understand better use of it. People from all ages, religions, classes have sterted the use of internet in offices, houses, educational institutes and cyber cafes.
Since there is no one single controller of this huge huge network it becomes vulnerable. Here safety is on priority. We should aware of risk of the cyber space! Adults can take appropriate net safty precautions, but children are easy target for cyber criminals.

Meaning –
‘Net-Safety’ contains two terms- net means mainly internet. It is safety of user who takes the advantage of internet.
“An application of knowledge of internet threats, it’s prevention, treatment and all kinds of management is called Net-safety.”










There are economical, psychological, physical, technological and legal threats ruled on the net. Those can be identified and solved. But our children are not so safe as we are.so we should give priorty to our chidren. It is not advisable to keep away them from net, but use it wisely.

Need -
Data and user, no one is safe on the internet. If we lost data we may retrive/regenerate it ; but if we lost our small user very difficult to recover him/her.
There are so many software are in market to protect data; but there is no readymade package to protect our child, because Net-safety is continuous process. We need to be alert ready each and every time.
So it is the best thing to do that the net safety of our children. Make them aware of the threats of internet. So they can use internet neat-safely.

Threats -
Possible Risks of using internet can classified into some classes. All risks are for all users; but here our focus will be on children.
1.Economical Threat –
Now it is very easy to have money transaction through internet. E-shopping, e-governance, e-payment, e-booking,e-banking etc. Each of these facility needs username, password, e-cards. It is not very difficult for a child in home to observe card numbers, passwords, usernames of e-accounts. They can keep an eye on parents, they can use saved username password in login window or they may check e-mail. Also they may see the left print on printer.If child use or share this information with anyone; economical disaster will be on our doorstep.
Tools may be used - login window, e-mail, history in the browser, chatting, e-shopping, e-banking etc.

2. Psychological Threat –
All types of information is available on the net. All information is not useful for the betterment. Some exclusive information topics like sex, drugs, crimes, violence, terrorism are expected to restrict for children. But on the net it is available very easily. Children have curiosity and thrill like feeling about these issues. So they try for it avoiding parents’ restrictions.
Search engines are very helpful to them to search information like this. if they fail to tolerate the unwanted information psychologically they will be insecure. They may try for those things which are not expected from their ages. At the same time some criminal minds are finding soft targets for their use via e-mail, chatting, advertise, gifts, cartoons, clip arts etc. if the child is trapped criminal may invite them to involve in drugging, theft, blackmailing, breaking privacy of others and so many other criminal activities.
Some time criminals asks children to share information like photo of family members, phone nos, address, card no.s etc. first they send fake info to child so he/she can trust, then they asks to do so. Children can involve in these kind of criminal activity for the sake of money, thrill, gift,prestige, self recognition. Here the mean to trap the ‘ginipig’ is internet.
Now a days ‘dating ‘ is also socio-cultural issue in India. Teenagers wants to grow faster. They want to live like the young one. Dating is very easy online. So many sites are there providing such facility. So our children can seat in there bedroom and can fix date with the stranger without the knowledge and permission of parent.
When the excitement is over then child comes to know what mistake he/she has done; then the psychological crises arises. He/she feel guilty, isolated, helpless; it changes innocence of their life.
Due to over use of internet i.e. computer, children involves in virtual world of games, surfing, chatting, blogging; than the real world. They feel impatience, unsecured and unmatched in the real people. Because real people do not work on his/her ‘mouse-click’, not respond 100% according to the command given, as his/her computer does.
If children are engaging with the e-society only, they may not have the proper communication skills, etiquettes, respect to others etc. Their personality would be day-dreamer, intro- ward, attacking, careless etc. because on the net know one wants to teach them, it may for misuse or for time pass. That’s why they don’t want parental interference between their interaction.
Due to isolated personality children may have lack of knowledge of social manners, respect, customs. They are more interested in netiquettes than etiquettes.
Tools may be used- search engines, e-mailing, chatting, blogging, conferencing, games, cartoons, sharing photos-docs etc.



3.Physical Threat -
Children likes to play games, to chat, conferencing, downloading etc. These activities take hour. If there is no parental control, they play only with the computer and they forget to play. They also have like packet food, cold drinks with it. It may create health problem, back problems, overweight, knee, nutrition problem. Because of improper seating poster eyesight, knee, overweightness, may to noticed.
Overuse of computer ,less exercise, seating in problematic posture, proportion of chair-table, screen brightness, contrast, resolution, size of screen are some of the reason physical threats take place.

4.Technological Threat -
Due to lack of proper knowledge children open your computer for virus, Trojan horse, worms. These are elements which affects your computer system and lost some file, whole data and hardware also. These malware also send confidential information hackers. That will be misused.

5.Legal Threat –
Because of chatting , emailing, your child may involve in some criminal activity may be for thrill, fun, money. She /he may involve in it or for money / gift. The information may be disclosed by user child. Cyber criminal may use this information for terrorist activities and the illegal use.
Sometime your child may place give e- purchasing order or download some software that is restricted under copyright act. Then legal issues will be faced.

Safety Solutions

Economical
- Give and change the password frequently. Password can be given for to start computer, to start computer account, to connect the internet, to login all types of accounts. Donot on save user name and password.
- Keep records on offline , transaction and check it offline and keep away from children reach.
- Do not show credit cards, like important documents information of a/c no. etc.
-Don’t discuss economical issue in front of children.

Psychological -
-Keep computer from where you can observe child using internet..
-Check history of computer regularly.
- Check safety settings in search engine on your computer.
- Type your children’s name in search engine bar and find out the matter related your children.
-Discuss with your child friendly about his/her e-friends, e-mail, e-chat, e-conferencing etc.
-Tell them not to trust strangers.
-Have ‘child lock’ software from which you can lock unwanted content, websites.
-Do settings of search engine properly.
- Observe the use of pen drive, CD/DVD, recordable devices of children.
-Don’t have the web camera always on. Don’t allow children to use it in privacy.
-Continuously observe children behavior. Any suspicious consistent change should considered seriously and should be tested its relation with internet use.
-Enjoy free time with family. Give them social experiences and relation. Get them have a fun with friends, discussion. Give proper exposure to social development; look after their art and craft work, interesting games.
Be in touch with teacher. Discuss his/ her behavior with teacher. Also his/her use of computer in school.
- Give the demo of proper use of computer. Net. Show them good and educational, interesting , value based websites.
“Don’t you do, that, you will not allow your child.”
Physical—
-Give time bound access on internet.
-Insist on play exercises by setting example.
-show them webs related to health and hygiene.
-Have the proper posture of seating in front of computer.
-Surfing and eating should not go simultaneously.

Technological -
-Have computer antivirus suit in our computer and update it regularly. So there will be proper virus prevention, detection and eradication. There should be supervised use of DVD/CD/ROM.

Legal -
-Give guidelines for downloading the games, files, make them aware of free/demo versions.
- Discuss how the cyber criminals can damage them and their family. Show some news regarding this.
In this way we need to prevent our family from threats of internet. We should use internet positively by taking care of risk.
Should discuss all the issues with children according their age.
Conclusion -
It doesn’t mean that we should not use the internet or we should discourage our children to use internet. Most of appliances like bike, car, gas stove, water heater have their own threats but still we are using those by taking proper care. Like that we should open this huge huge storage of information to our children. They should become alert wise net savy. Let us pledge that our children will become efficient and good citizen as well as nettizens.