0% found this document useful (0 votes)
11 views47 pages

Ece 3155 - L-03

Uploaded by

ROKSTAR Raktim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views47 pages

Ece 3155 - L-03

Uploaded by

ROKSTAR Raktim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Information and Communication

Technology
ECE 3155
E-Learning: ICT in Education 2
 Emergence of Internet has influenced various fields of education.
 Can you identify any application of Internet in the teaching-learning process or in other
activities of education?
 As an extension of Internet technology, a new concept called e-learning has come into
existence.
 There exist different definitions for E-learning.
 E-learning is a broad term, encompassing a wide variety of electronic technologies used for
educational purposes, and a wide variety of educational formats and designs (Bates and Poole,
2005; OECD, 2005; and Allen and Seamen, 2008).
 E-learning comprises all forms of electronically supported teaching and learning.
 E-learning helps learners learn at their own pace anytime and anywhere with the help of
computers, LCD projectors, TV, CD ROMs, electronic storage devices, web based tools, virtual
classrooms, etc.
 If a teacher uses such devices in teaching-learning, it is termed as E-learning.
E-Learning 3
 There are several variations of E-learning.
 These are:
 Computer-Based Training (CBT),
 Technology-Enhanced Learning (TEL),
 Computer-Supported Collaborative learning (CSC),
 Internet-Based Training (IBT) or Web-Based Training (WBT).
Goals of E-Learning 4
 The broad goals of E-learning are as follows:
 It increases learners’ access to learning and flexibility in learning;
 It enhances the quality and efficiency of teaching-learning process;
 Skills and competencies required for different subject areas are developed with e-
learning strategies;
 E-learning techniques meet the learning styles of different students;
 The burden of cost of education can be minimized using e-learning. Hence, the
education system becomes cost-effective.
E-learning and 21st Century Skills and Competencies 5
 Various skills and competencies are required to lead successful life in the twenty first century.
 E-learning strategies help build up in the learners necessary skills needed for the twenty first century.
 The following skills are of great importance to future generation to succeed in life.
 Good communication skills (reading, writing, speaking, listening)
 Ability to learn independently
 Social skills (ethics, positive attitude, responsibility)
 Teamwork skills (collaborative learning, networking)
 Ability to adapt to changing circumstances
 Thinking skills (problem-solving, critical, logical, numerical skills)
 Knowledge navigation
 Entrepreneurship (taking initiative, seeing opportunities)
 Digital literacy
Communication Technologies Used in E-Learning 6
Communication technologies are generally categorized into asynchronous or
synchronous.
Asynchronous:
 As the name indicates, the participants are not in synchronous (same time) with
each other in Asynchronous mode of communication.
 The participants mentioned here are mainly the students and teachers.
 Students and teachers move at their own pace to transfer information.
 The information to be passed on to the students may be posted on any website
medium such as wikis, blog, etc., which can be retrieved by students at a later time.
 Similarly, postings of students can be retrieved by teachers and be given feedback.
Communication Technologies Used in E-Learning 7
Asynchronous (contd.):
 Hence in asynchronous communication, interaction between students and teachers
occur at different times.
 Examples for asynchronous communication
technology are blogs, wikis, video-blog (vlog),
forum, discussion boards, and
electronic mail (E-mail).

Various Communication Technologies used in E-Learning


E-Learning Strategies (Asynchronous) 8
Discussion Groups:
Discussion Groups
 A discussion group is a collection of conversations that occur over time.
Electronic mail
Podcasting  It allows for comments to be posted and viewed by students and teachers as per
their convenience.
Online Video
Blogs  Other names for discussion groups are message boards, bulletin boards and
discussion forums.
Vlog
Webcasting
Wiki
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 9
Electronic mail:
Discussion Groups
 It is one of the most popular tools used in E-learning.
Electronic mail
Podcasting  By definition, it is mail delivered through electronic means.
Online Video  Today, e-mail is primarily known as communication from one person to another
Blogs or many others through the use of computer and networks.
Vlog
Webcasting
Wiki
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 10
Podcasting:
Discussion Groups
 Podcasts (Personal on Demand Broadcast) are digital audio or video files
Electronic mail
containing meaningful content for learning that are available in websites.
Podcasting
 And podcasting is the process of creating and distributing such learning material.
Online Video
Blogs
Vlog
Webcasting
Wiki
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 11
Online Video:
Discussion Groups
 Online videos are video files containing learning contents available in the
Electronic mail
Internet.
Podcasting
 Educational online videos are available in YouTube, Mytechclassroom, and
Online Video
Google Video etc.
Blogs
Vlog
Webcasting
Wiki
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 12
Blogs:
Discussion Groups
 Blog is a personal website that contains content organized like a journal or diary.
Electronic mail
Podcasting  Each entry is dated, and the entries are displayed on the webpage in reverse
chronological order, so that the most recent entry is posted at the top.
Online Video
Blogs  Readers catch up with blogs by starting at the top and reading down until they
encounter material they have read.
Vlog
 Usually blog is the work of an individual but blogs combine contributions of
Webcasting
several people make “group blogs”.
Wiki
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 13
Collaborative Video (Vlog):
Discussion Groups
 A video-blog or vlog is simply a blog that uses video as its primary medium in
Electronic mail
each post.
Podcasting
 And vlogging is the act of publishing video to a blog.
Online Video
Blogs
Vlog
Webcasting
Wiki
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 14
Webcasting:
Discussion Groups
 Webcasting is defined as the dissemination (broadcasting) of recorded or live
Electronic mail
content over the Internet.
Podcasting
Online Video
Blogs
Vlog
Webcasting
Wiki
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 15
Wiki:
Discussion Groups
 Wikis are open, dynamic websites with collaboratively constructed knowledge,
Electronic mail
information, and resources, which are freely available to any Internet user.
Podcasting
 Wikis allow users virtually from anywhere to create and contribute to any wiki
Online Video
of their choice.
Blogs
 At the same time, wikis enable users of the technology to critically review and
Vlog
collaboratively revise the wiki they use.
Webcasting
 As a result, users can quickly and frequently update information, fix errors, and
Wiki
constantly extend the knowledge network.
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 16
Interactive Whiteboard:
Discussion Groups
 It is a large interactive display that connects to a computer and a projector.
Electronic mail
Podcasting  A projector is used to display a computer’s video output onto the whiteboard,
which then acts as a huge touch screen, where users control the computer using a
Online Video
pen, finger, or other device (SMART technologies, 2006).
Blogs
 Interactive whiteboard are usually equipped with four digital writing utensils that
Vlog
use digital ink replacing the traditional whiteboard markers.
Webcasting
Wiki
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 17

Discussion Groups
Self-Paced Courses:
Electronic mail  The obvious advantage of a self-paced course is convenience.
Podcasting  People can get the training they need at any time.
Online Video  This can include just-in-time training where a person gets exactly the training he
Blogs or she needs to perform a task.
Vlog  Self-paced courses are created with E-learning authoring tools.
Webcasting  Self-paced courses can be delivered in many ways including Internet, Intranet or
Wiki Local Area Networks, CD-ROM or DVD.
Interactive Whiteboard
Self-Paced Courses
LMS
E-Learning Strategies (Asynchronous) 18
Learning Management System (LMS):
Discussion Groups
 In order to provide online courses and programs on World Wide Web (www), we
Electronic mail
require a software system called Learning Management System (LMS).
Podcasting
 An LMS is an integrated set of software / programs that automate the
Online Video
administration, tracking and reporting of online courses / programs.
Blogs
 It provides a centralized organizational approach to learning for scheduling of
Vlog
courses and registration of learners, and assessment of their learning outcomes.
Webcasting
 Some of the examples of LMS are Moodle, SkyPrep, ProProfs LMS,
Wiki
TalentLMS, Black-Board etc.
Interactive Whiteboard
 Google classroom is also a cloud-based LMS that is a part of Google Apps for
Self-Paced Courses
Education.
LMS
Communication Technologies Used in E-Learning 19
Synchronous:
 In synchronous communication, interaction between teacher and students occur at
the same period of time.
 Synchronous mode helps students acquire information within no time, since both
are engaged in the process of conversation at the same time.
 Compared with asynchronous mode, synchronous communication is better for
teaching –learning process.
 Earlier asynchronous mode was prevalent in teaching –learning process, but after
the advent of information technology, the process of sending information became
much easier, with the use of Internet and related applications of e-learning.
Communication Technologies Used in E-Learning 20
Synchronous (contd.):
 The simplest form of synchronous communication occur with the participation of two
persons i.e. teacher and student, while in advance synchronous communication a large
number of people can join to share their ideas like students belonging to different classes,
students of the same classes, teachers of the same school, etc.
 Examples of synchronous communication are
face to face talk through online, online chat,
phone calls, video chat, virtual classrooms,
video conferencing and audio conferencing.

Various Forms of Synchronous Communication


E-Learning Strategies (Synchronous) 21

Online Learning
Online Learning:
Virtual Classroom  Online learning is an Internet or Intranet-based teaching and learning system
designed for web-based delivery, without face-to-face contact between teacher
A & V Conferencing
and learners.
Online Chat
 Internet is the main tool used in online learning.
Instant Messaging
 The other different tools used in online learning are either asynchronous (email,
Shared Whiteboard
mailing lists, bulletin boards) or synchronous (text-based chat, audio chat,
Application Sharing
videoconferencing) in nature.
E-Learning Strategies (Synchronous) 22

Online Learning
Virtual Classroom:
Virtual Classroom  A virtual classroom duplicates the context of a real classroom.
A & V Conferencing  In virtual classroom students and teachers use their computers to go to a virtual
Online Chat
meeting place instead of a classroom.
Instant Messaging  Students can indicate when they want to speak.
Shared Whiteboard  Teachers can let students speak through audio and video conferencing.
Application Sharing  Teachers and students can use instant messaging and chat.
 Teachers can choose from a variety of synchronous technologies for interaction
between them and students.
E-Learning Strategies (Synchronous) 23

Online Learning
Audio and Video Conferencing:
Virtual Classroom  These are two type of strategies used in E-learning.
A & V Conferencing  In audio conferencing conversation happens between students and teachers
Online Chat
without both of them seeing each other.
Instant Messaging  While in video conferencing students and teachers can see each other.
Shared Whiteboard
Application Sharing
E-Learning Strategies (Synchronous) 24

Online Learning
Online Chat:
Virtual Classroom  Chat allows several people to communicate with each other.
A & V Conferencing  Each participant uses a computer to type his/her comments.
Online Chat  The other participants can see the name of the persons and their comments.
Instant Messaging
Shared Whiteboard
Application Sharing
E-Learning Strategies (Synchronous) 25

Online Learning
Instant Messaging:
Virtual Classroom  Instant messaging is similar to chat.
A & V Conferencing  One person communicates to another through typing.
Online Chat  Instant messaging also provides some additional features.
Instant Messaging  With instant messaging, you can keep a list of people that you might like to chat
Shared Whiteboard with.
Application Sharing  The list will indicate if they are online, offline, available for chat or busy.
E-Learning Strategies (Synchronous) 26

Online Learning
Shared Whiteboard:
Virtual Classroom  A shared whiteboard lets a group of people communicate by typing comments,
drawing, highlighting and pointing.
A & V Conferencing
 A shared whiteboard is a common feature within virtual classroom software
Online Chat
packages.
Instant Messaging
Shared Whiteboard
Application Sharing
E-Learning Strategies (Synchronous) 27

Online Learning
Application Sharing:
Virtual Classroom  You can demonstrate how to use software applications to remote learners with
application sharing.
A & V Conferencing
 A teacher can also let learners take control of the application to practice
Online Chat
performing tasks.
Instant Messaging
Shared Whiteboard
Application Sharing
E-Learning and Traditional Learning 28
 The emergence of online teaching has made learning a learner centered and an
active process. The major differences between traditional classroom and online
classroom are listed in the following Table.
Traditional Classroom Online Classroom
It is teacher focused. Teacher is the central component of It is learner focused. Learner is the central focus of
teaching-learning process. teaching –learning process.
Learning is more passive; there are fewer roles for Learning is more active and role of learners is more in
learners in the instructional process. the instructional process
Teacher concentrates on delivering knowledge and Teacher helps in construction of knowledge
subject content
Instructional strategy is verbal oriented and is based on Less focus on verbal instruction. Instructional strategies
traditional methods of teaching make use of different styles and methods of teaching
Multimedia may be used, but delivery of instruction is Multimedia are used in a variety of ways
mainly verbal
Students’ interaction with technology is Less Students’ interaction with technology is more
E-Learning and Traditional Learning 29
Traditional Classroom Online Classroom
Focus on face-to-face interaction between teacher and Opportunity of face-to-face interaction between teacher
learners and learners is less
Less chance for motivation and self learning It gives learners chances for self learning and motivation
More use of traditional styles of teaching Makes use of innovative techniques of instruction
Use of technological instruments is less. Use of technological instruments is more
Opportunity of interaction between students and teacher Opportunity of interaction between teacher and student
is limited is more
Duration and period of study is fixed Duration and period of study is not fixed
Rigid in character Flexible in nature
Internet in Education 30
 Internet is one of the innovations of technological era.
 Internet is a means of connecting a computer to any other computer located
anywhere in the world via dedicated routers and servers.
 When two computers are connected over the Internet, they can send and receive all
kinds of information such as text, graphics, voice, video, and computer programs.
 The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to serve billions of users worldwide.
 It is a network of networks that consists of millions of private, public, academic,
business, and government networks, of local to global, that are linked by a broad
array of electronic, wireless and optical networking technologies.
 The Internet carries a vast range of information resources and services, such as the
interlinked hypertext documents of the World Wide Web (WWW) and the
infrastructure to support e-mail.
Internet in Education 31
 Suppose you are opening Internet with Google website, its home page will appear as
shown in Figure.
 There is option to search for Web Pages, images, maps, etc.
 Similarly, you will get option ‘save the page’, to save the website which you have
visited more
frequently and so on.
 There are plenty of options
in Internet which may be used
for your educational purposes.
Advantages of Internet in Education 32
 For the last many years Internet has influenced every walk of human life.
 This can be observed in the educational sector also.
 Many educational institutions are using Internet in admission, teaching-learning
process, educational evaluation and administration, etc.
 Some advantages of Internet in education are as follows:
 It is easy to get connected and obtain information.
 It acts as a source of information and a platform to share information.
 It helps to get latest and updated information.
 It is used as a medium for online learning.
 It acts as a multimedia for learning.
 It is a fast medium of communication.
 It provides learners opportunity to work from home and other spaces.
Application of Internet in Education 33
 Internet has its applications in the following areas of educational institutions:
1. student admission,
2. academic evaluation,
3. classroom teaching-learning activities,
4. administration, and
5. management.
 Moreover, it is used as:
1. a teaching machine,
2. a source of information,
3. a communication tool,
4. a support to teacher and students, and
5. an artificial intelligence tool.
Application of Internet in Education 34
To understand the use of Internet in teaching–learning process, a case of using Internet
in teaching-learning process is explained below.
 Rakibul Bari, a faculty member of a University, assigned students to work on a
project titled “types of pollutions”.
 Students were asked to collect the relevant materials from the web to prepare the project
report.
 Students found the relevant materials from different websites.
 Some of these were as follows:
 https://www.nationalgeographic.org/encyclopedia/pollution/
 https://en.wikipedia.org/wiki/Pollution
 https://www.britannica.com/science/pollution-environment
 https://www.sciencedirect.com/topics/earth-and-planetary-sciences/environmental-pollution
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 35
CHAPTER VI: Offence and Punishment
17. Punishment for illegal access to any critical information infrastructure, etc.
18. Illegal access to computer, digital device, computer system, etc. and punishment.
19. Damage of computer, computer system, etc. and punishment.
20. Offence and punishment related to modification of computer source code.
21. Punishment for making any kind of propaganda or campaign against liberation war, spirit of liberation war,
father of the nation, national anthem or national flag.
22. Digital or electronic forgery.
23. Digital or electronic fraud.
24. Identity fraud or personation.
25. Transmission, publication, etc. of offensive, false or threatening data information.
26. Punishment for unauthorized collection, use etc. of identity information.
27. Offence and punishment for committing cyber terrorism.

[1] https://www.cirt.gov.bd/wp-content/uploads/2020/02/Digital-Security-Act-2020.pdf (Accessed on January 24, 2022)


DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 36
CHAPTER VI: Offence and Punishment
28. Publication, broadcast, etc. of information in website or in any electronic format that hurts the religious values
or sentiment.
29. Publication, transmission, etc. of defamatory information.
30. Offence and punishment for e-transaction without legal authority.
31. Offence and punishment for deteriorating law and order, etc.
32. Offence and punishment for breaching secrecy of the Government.
33. Punishment for holding, transferring data-information illegally, etc.
34. Offence related to hacking and punishment thereof.
35. Abetment of committing an offence and punishment thereof.
36. Offence committed by a company.
37. Power to issue order for compensation.
38. The service provider not to be responsible.

[1] https://www.cirt.gov.bd/wp-content/uploads/2020/02/Digital-Security-Act-2020.pdf (Accessed on January 24, 2022)


DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 37
CHAPTER VI: Offence and Punishment
17. Punishment for illegal access to any critical information infrastructure, etc.-
(1) If any person, intentionally or knowingly,--
a) makes illegal access to any critical information infrastructure; or
b) by means of illegal access, causes or tries to cause harm or damage to it, or makes or
tries to make it inactive, then such act of the person shall be an offence.
(2) If any person-
a) commits an offence under clause (a) of sub-section (1), he shall be punished with
imprisonment for a term not exceeding 7 (seven) years, or with fine not exceeding Taka
25 (twenty five) lac, or with both; and
b) commits an offence under clause (b) of sub-section (1), he shall be punished with
imprisonment for a term not exceeding 14 (fourteen) years, or with fine not exceeding
Taka 1 (one) crore, or with both.
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 38
CHAPTER VI: Offence and Punishment
17. Punishment for illegal access to any critical information infrastructure, etc.-
(3) If any person commits the offence referred to in sub-section (1) for the second time
or repeatedly, he shall be punished with imprisonment for life, or with fine not
exceeding Taka 5 (five) crore, or with both.
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 39
CHAPTER VI: Offence and Punishment
18. Illegal access to computer, digital device, computer system, etc. and punishment.-
(1) If any person intentionally-
a) makes or abets to make illegal access to any computer, computer system or computer network;
or
b) makes or abets to make illegal access with intent to commit an offence,
then such act of the person shall be an offence.
(2) If any person-
a) commits an offence under clause (a) of sub-section (1), he shall be punished with imprisonment
for a term not exceeding 6 (six) months, or with fine not exceeding Taka 2 (two) lac, or with
both;
b) commits an offence under clause (b) of sub-section (1), he shall be punished with imprisonment
for a term not exceeding 3 (three) years, or with fine not exceeding Taka 10 (ten) lac, or with
both.
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 40
CHAPTER VI: Offence and Punishment
18. Illegal access to computer, digital device, computer system, etc. and punishment.-
(3) If any offence under sub-section (1) is committed to a protected computer or computer system or
computer network, he shall be punished with imprisonment for a term not exceeding 3 (three) years, or
with fine not exceeding Taka 10 (ten) lac, or with both.
(4) If any person commits an offence under this section for the second time or repeatedly, he shall be
liable to double of the punishment provided for that offence.
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 41
CHAPTER VI: Offence and Punishment
21. Punishment for making any kind of propaganda or campaign against liberation war,
spirit of liberation war, father of the nation, national anthem or national flag. -
(1) If any person, by means of digital medium, makes or instigates to make any
propaganda or campaign against the liberation war of Bangladesh, spirit of liberation
war, father of the nation, national anthem or national flag, then such act of the person
shall be an offence.
(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 10 (ten) years, or with fine not exceeding Taka
1 (one) crore, or with both.
(3) If any person commits the offence referred to in sub-section (1) for the second time
or repeatedly, he shall be punished with imprisonment for life, or with fine of Taka 3
(three) crore, or with both.
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 42
CHAPTER VI: Offence and Punishment
24. Identity fraud or personation. -
(1) If any person, intentionally or knowingly, by using any computer, computer
programme, computer system, computer network, digital device, digital system or
digital network-
a) holds the identity of another person or exhibits the personal information of another
person as his own in order to deceive or cheat; or
b) holds the personal identity of any person, alive or dead, as his own by forgery in order
to-
i. get or cause to get benefit for himself or for any other person;
ii. acquire any property or any interest therein;
iii. cause harm to a natural person or individual by personating another,
then such act of the person shall be an offence.
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 43
CHAPTER VI: Offence and Punishment
24. Identity fraud or personation. -
(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 5 (five) years, or with fine not exceeding Taka
5 (five) lac, or with both.
(3) If any person commits the offence referred to in sub-section (1) for the second time
or repeatedly, he shall be punished with imprisonment for a term not exceeding 7
(seven) years, or with fine not exceeding Taka 10 (ten) lac, or with both.
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 44
CHAPTER VI: Offence and Punishment
26. Punishment for unauthorized collection, use etc. of identity information. -
(1) If any person collects, sells, possesses, provides or uses identity information of any
other person without lawful authority, then such act of the person shall be an offence.
(2) If any person commits any offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 5 (five) years, or with fine not exceeding Taka
5 (five) lac, or with both.
(3) If any person commits the offence referred to in sub-section (1) for the second time
or repeatedly, he shall be punished with imprisonment for a term not exceeding 7
(seven) years, or with fine not exceeding Taka 10 (ten) lac, or with both.
DIGITAL SECURITY ACT, 2018 (Act No. XLVI of 2018) [1] 45
CHAPTER VI: Offence and Punishment
26. Punishment for unauthorized collection, use etc. of identity information. -
Explanation:
 For carrying out the purposes of this section, “identity information” means: any
external, biological or physical information or any other information which singly or jointly
can identify a person or a system, such as:
 name, photograph, address, date of birth, mother’s name, father’s name, signature,
national identity card, birth and death registration number, finger print, passport number,
bank account number, driving license, e-TIN number, electronic or digital signature,
username, credit or debit card number, voice print, retina image, iris image, DNA
profile, security related question or any other identification which are available for
advance technology.
Course Contents 46

 https://drive.google.com/drive/folders/1jijgZNi7mj0-
oikiTzQ2UoEaXJF_DYoH?usp=share_link
48

Thank
you
all

You might also like