![](images/graphics/blank.gif)
Authentic assessments
-
Implementation of authentic assessment on mathematics teaching: Study on junior high school teachers
This study aimed at analyzing the implementation of authentic assessments and constraints faced by junior high schools' teachers in mathematics teaching. A qualitative approach was applied in the study.
12p
viarnault
25-04-2024
2
1
Download
-
Ebook Multimedia forensics & security - Part 1 includes contents: Chapter I: Authentication watermarkings for binary images; Chapter II: Secure multimedia content distribution based on watermarking technology; Chapter III: Digital watermarking in the transform domain with emphasis on SVD; Chapter IV: Digital video watermarking and the collusion attack; Chapter V: A survey of current watermarking synchronization techniq; Chapter VI: On the necessity of finding content before watermark retrieval: active search strategies for localising watermarked media on the internet; Chapter VII: Statistic...
183p
longtimenosee05
31-03-2024
3
0
Download
-
Ebook Computer network security part 1 includes contents: Chapter 1 computer network fundamentals; chapter 2 understanding network security; chapter 3 security threats to computer networks; chapter 4 computer network vulnerabilities; chapter 5 cyber crimes and hackers; chapter 6 hostile scripts; chapter 7 security assessment, analysis, and assurance; chapter 8 access control and authorization; chapter 9 authentication; chapter 10 cryptography.
300p
haojiubujain06
05-09-2023
6
3
Download
-
Ebook "Lectures: Learning listening and note-taking skills" has ten chapters covering the key skills for listening to lectures and taking notes. There are also five authentic lectures to give you realistic practice. You will learn how to: prepare for a lecture; recognise different lecture structures; follow the key points of a lecture; understand lecturers' accents and speaking styles; take notes and use them for assessments; evaluate your listening ability.
194p
tichhythan
17-08-2023
11
6
Download
-
Ebook Performance management: Putting research into action – Part 2 includes contents: Chapter 9: managing contextual performance; chapter 10: using performance management as a learning tool; chapter 11: diagnosing, understanding, and dealing with counterproductive work behavior; chapter 12: forced rankings: pros, cons, and practices; chapter 13: technology and performance management; chapter 14: authentic performance; chapter 15: assessing performance management programs and policies; chapter 16: performance management of the future; chapter 17: best practices in performance management.
373p
haojiubujain03
24-07-2023
7
6
Download
-
Portfolios, one of three types of authentic assessments, have been increasingly popular in the education field to help teachers and students assess the achievement.Some research has been done to evaluate the application of portfolio assessment in writing.
3p
vipriyankagandhi
27-07-2022
6
3
Download
-
This book "CompTIA® Security+: Guide to Network Security Fundamentals" is designed to meet the needs of students and professionals who want to master basic information security. Part 2 of book provide students with knowledge about: networking threats, assessments, and defenses; network security appliances and technologies ; cloud and virtualization security; wireless network security; authentication; incident preparation, response, and investigation; cyber security resilience; risk management and data privacy;...
336p
britaikridanik
05-07-2022
32
11
Download
-
"CompTIA® Security+: Security+ Guide to Network Security Fundamentals (Sixth edition)" is designed to equip learners with the knowledge and skills needed to be information security professionals. Part 2 of book provide students with knowledge about: client and application security; mobile and embedded device security; authentication and account management; access management; vulnerability assessment and data security; business continuity; risk mitigation;...
388p
britaikridanik
05-07-2022
23
6
Download
-
Bài viết giới thiệu một số nghiên cứu về đánh giá xác thực (Authentic Assessment), từ đó đề xuất quy trình, xây dựng mẫu đánh giá xác thực trong môn Toán cấp Trung học cơ sở, góp phần đổi mới cách đánh giá trong dạy, học Toán ở Việt Nam.
5p
vilouispasteur
11-03-2022
22
2
Download
-
The automated reconstruction of genome sequences in ancient genome analysis is a multifaceted process. Results: Here we introduce EAGER, a time-efficient pipeline, which greatly simplifies the analysis of large-scale genomic data sets. EAGER provides features to preprocess, map, authenticate, and assess the quality of ancient DNA samples. Additionally, EAGER comprises tools to genotype samples to discover, filter, and analyze variants.
14p
viaristotle
29-01-2022
7
0
Download
-
The main objectives of the work were to assess the chemical profiles of Samar and Talh honey produced in the GCC region from Acacia spp. In addition to verifying the authenticity based on the botanical origin and identification of the most effective characteristics influencing the discrimination of both types of honey using Multivariate Data Analysis.
7p
schindler
30-12-2021
10
0
Download
-
This research aims to determine the readiness of the teachers of the building construction department of vocational high schools (SMK) in Yogyakarta in designing and implementing the teaching and assessment processes of Curriculum 2013 implementation.
9p
inception36
30-11-2021
8
1
Download
-
Ebook "Implementing and administering security in a Microsoft Windows server 2003 network" present the content planning and configuring an authentication strategy; planning and configuring an authorization strategy; deploying and troubleshooting security templates; hardening computers for specific roles; planning an update management infrastructure; assessing and deploying a patch management infrastructure; installing, configuring, and managing certification services; planning and configuring IPSec; deploying and troubleshooting IPSec; planning and implementing security for wireless network...
900p
kethamoi8
10-10-2020
34
2
Download
-
Royal jelly (RJ) consumption has grown significantly during the last few decades due to its high nutritional value and unique components. The price of pure RJ is much higher than other bee products making it susceptible to adulteration with drone brood (DB) and honey. The aim of the present paper is to characterize the sugar composition of RJ samples adulterated with DB and honey in order to find out possible descriptors for adulterated RJ samples. The information obtained is important for practical purposes in order easily and efficiently to assess the RJ authenticity.
6p
kethamoi4
16-04-2020
6
1
Download
-
Agriculture is said to be a gamble with the vagaries of Monsoon. Most of the farmers face a lot of risky and uncertain situation in which they have to make decisions. Traditionally agricultural information is provided by state development departments, ICAR institutions, commodity boards and NGOs. The recent trend is private extension for high value crops. Farmer needs authentic information to make agriculture a viable and profitable venture. In this context, a study was planned to know the willingness of farmers to pay for better agricultural information.
10p
cothumenhmong3
22-02-2020
13
0
Download
-
Despite being a phenomenon unique to girls, this has always been surrounded by secrecy and myths in many societies. Taboos surrounding menstruation exclude women and girls from many aspects of social and cultural life. Some of these are helpful, but others have potentially harmful implications (Kaiser, 2008). The main objective of the present study was to assess the myths associated with menarche and menstruation among tribal females of Kargil.
8p
chauchaungayxua3
07-02-2020
18
1
Download
-
Wheat is qualitatively a vital source of macromolecule, energy and fiber for human nutrition since decades hence, used as a staple food grain for community and as well a major source of fodder for animal feeding. Assessment of genetic diversity using molecular markers is used for characterization of different genotypes with reliable and authentic results. RAPD is a PCR based molecular technique for identification of genetic variability in similar genotypes. It usually preferred for the initiation of this kind of work as this technique is simple, versatile and relatively inexpensive.
12p
nguathienthan2
19-12-2019
15
0
Download
-
This study aims to provide a procedure and specific measures that can be used in the authentic assessment of English-majored undergraduates’ English proficiency in order to increase the validity, reliability and comprehensiveness of assessment activities.
27p
slimzslimz
18-12-2019
40
3
Download
-
Chapter 11 - Information security and computer fraud. After reading this chapter, you should be able to: Describe the risks related to information security and systems integrity, understand the concepts of encryption and authentication, describe computer fraud and misuse of AIS and corresponding risk-mitigation techniques, define vulnerabilities, and explain how to manage and assess vulnerabilities.
17p
shiwo_ding8
26-06-2019
31
4
Download
-
Malva sylvestris is traditionally used for the treatment of liver diseases, but sufficient pharmacological-based scientific literature is not available online to authenticate its use in liver ailments. We aimed to assess the hepatoprotective effects of Malva sylvestris against paracetamol-induced hepatotoxicity in mice.
7p
sony2711
01-02-2019
12
1
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)