The confessions of an educational heretic



Download 0.79 Mb.
Page1/15
Date19.10.2016
Size0.79 Mb.
#3743
  1   2   3   4   5   6   7   8   9   ...   15


INSTRUCTIONAL FACILITIES AND TECHNOLOGIES FOR EDUCATION:

TRANSFORMING A RURAL SECONDARY SCHOOL INTO THE INFORMATION AGE TOWARD TECHNOLOGICAL UBIQUITY

or

THE CONFESSIONS OF AN EDUCATIONAL HERETIC


by
Jozef Hand-Boniakowski
Dissertation

Submitted to the Faculty of

Greenwich University

in partial fulfillment of the requirement

for the degree of

DOCTOR OF PHILOSOPHY

in

Information Technology and Distance Education



March 31, 2000



TABLE OF CONTENTS

FORWARD and ACKNOWLEDGMENTS……..………..…………….……..vii


ABSTRACT……………………………………………………………………. ix
Chapter
I. INTRODUCTION…………………………………………………….. 1

Chiding……………………….……………………………………….. 2

More Time…………………………………………………………….. 4

Self-Education……………………………………………………….... 6

In this Book………………………………………………………...…. 7

Monumental Change……………………………………………….…. 9

Intention……………………………………………………..……..… 11

Questions………………………………………………………..….... 11

Purpose………………………………………………………..…….... 12

Linchpin………………………………………………………..…….. 12

Globalization…………………………………………………………. 13

Neo-liberalism……………………………………………...……..…..14

Promise of the Internet………………………………………...……... 16

II. THE STARTING GATE………………………………..………...…. 17


Kits…………………………………………..………………...…..…. 18

Schools as Tools by Design…………………………………...…..…. 20

Like Other Schools…..……………………………………......……... 21

Corporate Recognition………………………………………….……. 23

Channel One…………………………………………………...…..… 24

Example……………...………………………………………....……. 26 Hearing………………………………………………………….……. 27

Buy Nothing Day………………………………………...……..……. 28

A Peek………………….…………………………………….....……. 29

No VHF TV Channel One………………………………………..….. 30

What is It?………………………………………………………...….. 32





  1. A SHORT PERSONAL AND

INSTITUTIONAL COMPUTER HISTORY…………………….… 35

Homebrewing……………………………………………………..… 35

In the Beginning………………………………………………....…… 36

Newbie………………………………………………….……………. 38

The PET as Teaching Tool………………………………….……….. 39

Techno-person…………………………………………….…….…….40

Transference……………………………………………….…….…… 42

A Biology Class Project…………………………………….……….. 43

Flow Charts…………………………………………………..……… 44


Attention Span…………………………………………….…..……… 45

Attention Deficit Disorder…………………………………….……… 46


Modifying and Adjusting………………………………………….......… 47

The Way It Was…………………………………………………......…. 48


Infrastructure…………………………………………………….……. 49

IV TECHNOLOGY PLATFORM……………………………………….. 51

Original State of Affairs………………………………………………. 53

Business Department………………………………………………….. 55

Guidance Department…………………………………………………. 57

Library………………………………………………………………… 57

Remaining Computers………………………………………………… 59

V. COMPUTER NETWORKS…………………………………………... 61

The Structure of a Network…………………………………………… 62

Geometry……………………………………………………………… 63

Broadcasting…………………………………………………………... 65

Distinction…………………………………………………………….. 66


VI. NETWORK TOPOLOGIES………………………………………….. 67

Star……………………………………………………………………. 67

Ring…………………………………………………………………… 68

Loop…………………………………………………………………… 70

Bus…………………………………………………………………….. 70

Tree…………………………………………………………………….71


VII. NETWORK ARCHITECTURE……………………………………… 73

Physical Layer………………………………………………………… 73

Data Link Layer………………………………………………………. 75

Network Layer………………………………………………………… 76

Transport Layer……………………………………………………….. 77

Session Layer…………………………………………………………. 78

Presentation Layer……………………………………………………. 79

Application Layer…………………………………………………….. 80

VIII. TOPOLOGY EXPERIMENT………………………………………… 82

Hardwiring……………………………………………………………. 82

Making the Data Link Play…………………………………………… 84

A Few Problems……………………………………………………… 85

Complications………………………………………………………… 88

Hands On……………………………………………………………… 88

Typical Connection…………………………………………………… 88

Initial Implementation………………………………………………… 89

Two-Year Growth…………………………………………………….. 91

IX. INVESTIGATING TECHNOLOGY USAGE……………………….. 94

Internet Access………………………………………………………... 94

Major Weakness………………………………………………………. 95

Latest Technology…………………………………………………….. 95

Library and Classrooms………………………………………………. 96

Student Complaints…………………………………………………… 97

Glare…………………………………………………………….…….. 98


Training……………………………………………………………….. 99

Staff Comparison……………………………………………………… 99


Questions…………………………………………………………….. 101


Survey………………………………………………………………... 102

Cursory Conclusions……………………………………………….... 102

Conversations………………………………………………………… 103

Mathematics Department…………………………………………….. 104

Requirements………………………………………………………… 106

Mirrored Results……………………………………………….…….. 107

A Local Study………………………………………………….…….. 108

Attention Span……………………………………………………….. 108

More Assessment…………………………………………………….. 109

Lack of Department Technology Usage………………………………110

Another Mathematics Experiment…………………………………… 110

On Their Own………………………………………………………... 112

Results……………………………………………………………….. 113

Time Intensity……………………………………………………….. 114


Merrow Report (NPR)……………………………………………….. 115


The Latter Approach…………………………………………………. 116

Present Push………………………………………………………….. 117

Assessment…………………………………………………………… 118

Mathematics Conclusion……………………………………….…..… 119

Internal Wiring……………………………………………………….. 120
X. RESTRICTIONS TO ACCESS……………………………………… 123

Staff Email…………………………………………………………… 124

Filtering………………………………………………………………. 125

Ideology……………………………………………………………… 126

Big Brother and Privacy…………………………………………….. 127

Critical Thinking…………………………………………………….. 129

Library……………………………………………………………….. 131

Funding and Access…………………………………………………. 132

COPA………………………………………………………………… 133

Tactic………………………………………………………………… 134

XI. INTERNET RELAY CHAT…………………………………………. 136

Potential and Possibility……………………………………………… 137

Case-in-Point……………………………………………………….....137

IRC Popularity……………………………………………………….. 138

Aversion to IRC……………………………………………………… 139

Numbers……………………………………………………………… 140


XII. STUDENT WORLD WIDE WEB USAGE…………………………. 141

Student Opinions…………………………………………………….. 142

Email Revisited………………………………………………………. 143

Recommendation…………………………………………………….. 143

Video…………………………………………………………………. 144

Integration……………………………………………………………. 145

Potential………………………………………………………...……. 146

Caveat…………………………………………………………….…. 147

Intrusion……………………………………………………………… 148

Not Needed………………………………………...………………… 149

XIII. WORKS IN PROGRESS……………………………………………. 151

Publications Studio……………………………………...…………… 151



Download 0.79 Mb.

Share with your friends:
  1   2   3   4   5   6   7   8   9   ...   15




The database is protected by copyright ©ininet.org 2024
send message

    Main page