The Association for Authentic, Experiential and Evidence-Based Learning (AAEEBL.org) is nearly 7 years old. It is the North American professional association for the global eportfolio community of practice and research field. “ePortfolio” is an idea about how technology can be implemented to best advantage in our world today. The eportfolio idea is that the learner is the anchor and center for the record of learning — the eportfolio is owned by the learner and the eportfolio stays with the learner between courses, between institutions and into life. It is a powerful idea and the growth of eportfolio technology in higher education around the world suggests educators understand that power.
At the Conference at the University of Georgia November 9-10, you will attend sessions that demonstrate how 10 different institutions have deployed eportfolio technology in ways appropriate to initiatives on their campuses. Kathleen Yancey of Florida State University, a founder of the U. S. eportfolio movement, is keynote.
AAEEBL is writing The Field Guide to ePortfolio to be published by AAC&U in 2016. This is a timely publication. Each conference and each webinar that AAEEBL holds contributes to the ideas in the Field Guide, being created by a team of 60 AAEEBL members. You can find out more about this project at this conference.
Eales-Reynolds, L., Gillham, D., Grech, C., Clarke, C., & Cornell, J. (2012). A study of the development of critical thinking skills using an innovative web 2.0 tool. Nurse Education Today, 32(7), 752-756. doi:10.1016/j.nedt.2012.05.017
finding ways to capture meaningful informal learning experiences by explicitly linking these to formal structures, and providing frameworks within which informal learning can then be validated and accredited (Cedefop Report 2007).
Education is clearly a social process but it is probably much closer to an ongoing discussion or debate than an extended celebration with an ever-expanding network of friends (p. 179, Ravenscroft et al.)
the community of inquiry (COI) model developed by Garrison and Anderson (2003) and social network analysis (SNA). European Commission-funded integrated
project called MATURE (Continuous Social Learning in Knowledge Networks), which is investigating how technology-mediated informal learning leads to improved knowledge practices in the digital workplace
Key to using socialmedia is the ability to stand back and evaluate the credibility of a source of information, apart from the actual content. While developing this critical attitude toward traditional media is important, the attitude is even more crucial in the context of using socialmedia because information didn’t go through the vetting process of formal publication. Can the student corroborate the information from multiple sources? How recent is this information? Are the author’s credentials appropriate? In other words, the ability to step back, to become aware of the metatext or metacontext is more important than ever.
Coad, D. T. (2013). Developing Critical Literacy and Critical Thinking through Facebook. Kairos: A Journal Of Rhetoric, Technology, And Pedagogy, 18(1).
Many instructors believe that writing on social networking sites undermines the rhetorical skills students learn in class because of the slang and abbreviations often used on these sites; such instructors may believe that social networks are the end of students’ critical awareness when they communicate. Johndan Johnson-Eilola and Stuart A. Selber (2009) contended that electronic writing forms actually require “sophisticated skills of understanding concrete rhetorical situations, analyzing audiences (and their goals and inclinations), and constructing concise, information-laden texts, as a part of a dynamic, unfolding, social process” (p. 18). It is this dynamic process that makes social networking a perfect match for the composition classroom and for teaching rhetorical skills: It helps students see how communication works in real, live rhetorical situations. Many students do not believe that communication in these media requires any kind of valuable literacy skills because they buy into the myth of how the news media portray social networks as valueless forms of communication that are decaying young people’s minds. This is why I introduced students to the passage from Invisible Man: to get them thinking about what kinds of skills they learn on Facebook. I found the text useful for helping them acknowledge the skills they are building in these writing spaces.
Stuart A. Selber (2004) in Multiliteracies for a Digital Age criticized so-called computer literacy classes for having “focused primarily on data representations, numbering systems, operating systems, file formats, and hardware and software components” rather than on the task of teaching students to be “informed questioners of technology” (p. 74). In a time when, as Sheelah M. Sweeny (2010) noted, “the ability to stay connected with others is constant,” it is increasingly important to engage composition students in critical thinking about the spaces they write in (p. 121). It is becoming clearer, as technology giants such as Google® and Apple® introduce new technologies, that critical literacy and critical thinking about technology are necessary for our students’ futures.
Valentini, C. (2015). Is using social media “good” for the public relations profession? A critical reflection. Public Relations Review, 41(2), 170-177. doi:10.1016/j.pubrev.2014.11.009
p. 172 there is no doubt that digital technologies and social media have contributed to a major alteration in people’s interpersonal communications and relational practices. Inter- personal communications have substantially altered, at least in Western and developed countries, as a result of the culture of increased connectivity that has emerged from social media’s engineering sociality ( van Dijck, 2013 ), which allows anyone to be online and to connect to others. Physical presence is no longer a precondition for interpersonal communication.
(Jiping) The Pew Research Center ( Smith & Duggan, 2013 , October 21) indicates that one in every ten American adults has used an online dating site or mobile dating app to seek a partner, and that in the last eight years the proportion of Americans who say that they met their current partner online has doubled. Another study conducted by the same organization ( Lenhart & Duggan, 2014 , February 11) shows that 25% of married or partnered adults who text, have texted their partner while they were both home together, that 21% of cell-phone owners or internet users in a committed relationship have felt closer to their spouse or partner because of exchanges they had online or via text message. Another 9% of adults have resolved online or by text message an argument with their partner that they were having difficulty resolving person to person ( Lenhart & Duggan, 2014 , February 11). These results indicate that digital technologies are not simply tools that facilitate communications: they have a substantial impact on the way humans interact and relate to one another. In other words, they affect the dynamics of interpersonal relations
Experience explore expand. Adventure based how to collaborate in ways we have not collaborated before pedagogical guidelines internet driven
Instructor – content – design
Today: first think is design, content, instructor. So how do we design learning environments is the most important one
Guide learners as designers. Constructivism. Design for meaning. Through the power of the story.
Geotetic design a learning environment learn geography using GIS
Situated movies (student-centered learning)
Grant Earthducation go to the most remote parts of the world to align their education with their culture, instead of what the government is downing as culture
Use of phone: whoever answers instructor’s question first, gets to pose the next question to the rest of the audience.
Design based research
Self-narrative, referencing the experience real world issues in real time
the U Media Lab.
The Changing Earth. App GoX (instagram on steroids. tell their story through the app). How is this different from Google Earth
Raptor Lab (rehabilitate a raptor).
podcast pontification (audio version of blog self reflections)
Greg Steinke The U
A Digital Story Assignment using WeVideo
WeVideo is the Google response to iMovie cloud
The U is on Google email and thus google drive and all other google tools
The Center for Digital Storytelling. short videos, 3-5 min incorporate photographs with the author narration, reflection
Assignment (verbal directions). process (write a 2 page script, every page is about a minute of video), gather images that support the story; edit the script (rewrite); record audio to the script (use an app on the phone instead of WeVideo), WeVideo can edit the audio recording; edit the story, edit the photos to match the story; YourTube and/or Google+
working with faculty: is the digital story a good fit for your course? two questions: does the course have many writing assignments? does everyone have to do the same type of assignment? do you want to offer choices? do you want your students to share their work outside of the class? to you want to explore opportunities for students to develop 21 century skills?
google communities for sharing
wewideo has a tutorial at Center for Digital Storytelling
students can use the digital story for their eportfolio
the entire exercise is entirely based on mobile devices
time frame: scaffolding options
3d printing products were the tangible result of the project and the digital storytelling just the format to present
Google Drive master folder for the phone images and video; iOS apps: MoviePro, FiLMc Pro, VoiceRecord Pro (including mp3); Android: WeVideo
Storyboard template
Faculty Development Programs: Digital Storytelling Community of Practice
chemistry professor. 3D printing with different materials.
what else can be made (e.g. reaction vessel)
printing of atoms
crystalography dbase
Karen: pre-service teachers professor: how to use 3d printers and be comfortable with them. Steve Hoover. Thinkercad and Autodesk123D>
3D academy http://www.team3dacademy.com/index2.html. Pinterest board for3d Printing with resources
Lisa: graphic design. not intuitive. Rhinoceros (not free anymore). 123D strong learning curve. 3d printing will be incorporated in the curriculum. sculpture students and others don’t like fudging on the computer, but Adobe people love it. Some items takes up to 4 hours to print out. when working on the computer is difficult for some students to visualize the dimensionality.
collaborative learning opportunities.
no makerspace or fab lab. additional interest from the theater and business dept. 3d printing is connected to future work skills. new media ecology or media literacy set of skills.
the main presenter: build excitement and interest and gradually step back. how much material goes through and should we charge back. clean and maintenance involved; not too bad. better then a copier. plastic inexpensive. sizes with plastic – $25 and $50. how many project of a spool: depending on the size of the projects but considerable amount. two printers one art dept and one in the faculty dev area.
non profit visually impaired students. how 3d can make difference in special ed.
3d printing lab with access for everybody. ownership brings policy. where housed: neutral place.
only one printer is barely sufficient for faculty to figure out how to use it. purchasing two more if students and curricula to be involved.
The Balancing Act: Team-Creating an eBook as an Alternative Method for Content Delivery Tom Nechodomu, University of Minnesota
Susan Andre uses a slide titled “trust” to elucidate how the entire project was enabled. “trust” and “transparency” are sparse currency in the environment I work in. if she is right an ebook ain’t happening anytime soon at my place.
inclining habitat.
students involvement. use stipends. student artists. food for the video interviews. create a community, student centered.
people able to change the book.
copyright process; did you find it cumbersome. copyright permission center.
time span and amount of hours spent: 3-4 months per chapter.
Main speaker
David Wiley. Making Teaching and Learning Awesome with Open
MN Learning Commons
open educational resources
LUMEN
education – sharing feedback, encouragement with students passion about the discipline, yourself
open is not the same as free. free + permissions + copyright permission: 5 r = retain (make and own copies), reuse (use in a wide range of ways), revise (adapt, modify, and improve), remix (combine two or more), redistribute (share with others)
open:
free and unfettered access
perpetual, irrevocable copyright permissions
(look but don’t touch is not open)
tech enables OER permits
traditionally copyright materials on the Internet – not so good ; jet on the road
openly copyright materials on the internet _ yes: jet in the air
permission-less innovation. relatively inexpensive and broad permissions.
intellectual infrastructure of education: learning outcomes/objectives; assessments; textbooks. they are relatively expensive and narrow permissions.
so what?
open education infrastructure: open outcomes, objectives, activities, educational resources
the culture of glued legos must be eradicated. open pedagogy. open credentialing model
namely, that plagiarism is in a much smaller degree intentional and to its largest percentage lack of systematic approach and clear directions by faculty toward students.
Rebecca Moore Howard, a professor of writing and rhetoric at Syracuse University, has called “patchwriting,” or borrowing large sentence structures and vocabularies from a source and only swapping out the occasional word or phrase with language of their own.
academic integrity represents an incredibly complex subject to master: It encompasses knowledge (What are the rules of academic integrity? How do they apply in this context?), skills (How do I summarize or paraphrase this passage without plagiarizing? How do I credit the work of others when I am collaborating with peers or using sources?), and values (Why does academic integrity matter? Why should I care about it?).
“Those who do not want to imitate anything, produce nothing.” ― Salvador Dalí
Tumbleson, B. E., & Burke, J. (. J. (2013). Embedding librarianship in learning management systems: A how-to-do-it manual for librarians. Neal-Schuman, an imprint of the American Library Association.
Kvenild, C., & Calkins, K. (2011). Embedded Librarians: Moving Beyond One-Shot Instruction – Books / Professional Development – Books for Academic Librarians – ALA Store. ACRL. Retrieved from http://www.alastore.ala.org/detail.aspx?ID=3413
xi. the authors are convinced that LMS embedded librarianship is becoming he primary and most productive method for connecting with college and university students, who are increasingly mobile.
xii. reference librarians engage the individual, listen, discover what is wanted and seek to point the stakeholder in profitable directions.
Instruction librarians, in contrast, step into the classroom and attempt to lead a group of students in new ways of searching wanted information.
Sometimes that instruction librarian even designs curriculum and teaches their own credit course to guide information seekers in the ways of finding, evaluating, and using information published in various formats.
Librarians also work in systems, emerging technologies, and digital initiatives in order to provide infrastructure or improve access to collections and services for tend users through the library website, discovery layers, etc. Although these arenas seemingly differ, librarians work as one.
xiii. working as an LMS embedded librarian is both a proactive approach to library instruction using available technologies and enabling a 24/7 presence.
1. Embeddedness involves more that just gaining perspective. It also allows the outsider to become part of the group through shared learning experiences and goals. 3. Embedded librarianship in the LMS is all about being as close as possible to where students are receiving their assignments and gaining instruction and advice from faculty members. p. 6 When embedded librarians provide ready access to scholarly electronic collections, research databases, and Web 2.0 tools and tutorials, the research experience becomes less frustrating and more focused for students. Undergraduate associate this familiar online environment with the academic world.
p. 7 describes embedding a reference librarian, which LRS reference librarians do, “partnership with the professor.” However, there is room for “Research Consultations” (p. 8). While “One-Shot Library Instruction Sessions” and “Information Literacy Credit Courses” are addressed (p. 809), the content of these sessions remains in the old-fashioned lecturing type of delivering the information.
p. 10-11. The manuscript points out clearly the weaknesses of using a Library Web site. The authors fail to see that the efforts of the academic librarians must go beyond Web page and seek how to easy the information access by integrating the power of social media with the static information residing on the library web page.
p. 12 what becomes disturbingly clear is that faculty focus on the mechanics of the research paper over the research process. Although students are using libraries, 70 % avoid librarians. Urging academic librarians to “take an active role and initiate the dialogue with faculty to close a divide that may be growing between them and faculty and between them and students.”
Four research context with which undergraduates struggle: big picture, language, situational context and information gathering.
p. 15 ACRL standards One and Three: librarians might engage students who rely on their smartphones, while keeping in mind that “[s]tudents who retrieve information on their smartphones may also have trouble understanding or evaluating how the information on their phone is ‘produced, organized, and disseminated’ (Standard One). Standard One by its definition seems obsolete. If information is formatted for desktops, it will be confusing when on smart phones, And by that, it is not mean to adjust the screen size, but change the information delivery from old fashioned lecturing to more constructivist forms. e.g. http://web.stcloudstate.edu/pmiltenoff/bi/
p. 15 As for Standard Two, which deals with effective search strategies, the LMS embedded librarian must go beyond Boolean operators and controlled vocabulary, since emerging technologies incorporate new means of searching. As unsuccessfully explained to me for about two years now at LRS: hashtag search, LinkedIn groups etc, QR codes, voice recognition etc.
p. 16. Standard Five. ethical and legal use of information.
p. 23 Person announced in 2011 OpenClass compete with BB, Moodle, Angel, D2L, WebCT, Sakai and other
p. 24 Common Features: content, email, discussion board, , synchronous chat and conferencing tools (Wimba and Elluminate for BB)
p. 31 information and resources which librarians could share via LMS
– post links to dbases and other resources within the course. LIB web site, LibGuides or other subject-related course guidelines
– information on research concepts can be placed in a similar fashion. brief explanation of key information literacy topics (e.g difference between scholarly and popular periodical articles, choosing or narrowing research topics, avoiding plagiarism, citing sources properly whining required citations style, understanding the merits of different types of sources (Articles book’s website etc)
– Pertinent advice the students on approaching the assignment and got to rheank needed information
– Tutorials on using databases or planning searches step-by-step screencast navigating in search and Candida bass video search of the library did you a tour of the library
p. 33 embedded librarian being copied on the blanked emails from instructor to students.
librarian monitors the discussion board
p. 35 examples: students place specific questions on the discussion board and are assured librarian to reply by a certain time
instead of F2F instruction, created a D2L module, which can be placed in any course. videos, docls, links to dbases, links to citation tools etc. Quiz, which faculty can use to asses the the students
p. 36 discussion forum just for the embedded librarian. for the students, but faculty are encouraged to monitor it and provide content- or assignment-specific input
video tutorials and searching tips
Contact information email phone active IM chat information on the library’s open hours
p. 37 questions to consider
what is the status of the embedded librarian: T2, grad assistant
p. 41 pilot program. small scale trial which is run to discover and correct potential problems before
One or two faculty members, with faculty from a single department
Pilot at Valdosta State U = a drop-in informatil session with the hope of serving the information literacy needs of distance and online students, whereas at George Washington U, librarian contacted a distance education faculty member to request embedding in his upcoming online Mater’s course
p. 43 when librarians sense that current public services are not being fully utilized, it may signal that a new approach is needed.
pilots permit tinkering. they are all about risk-taking to enhance delivery
p. 57 markeing LMS ebedded Librarianship
library collections, services and facilities because faculty may be uncertain how the service benefits their classroom teaching and learning outcomes. my note per
“it is incumbent upon librarians to promote this new mode of information literacy instruction.” it is so passe. in the times when digital humanities is discussed and faculty across campus delves into digital humanities, which de facto absorbs digital literacy, it is shortsighted for academic librarians to still limit themselves into “information literacy,” considering that lip service is paid for for librarians being the leaders in the digital humanities movement. If academic librarians want to market themselves, they have to think broad and start with topics, which ARE of interest for the campus faculty (digital humanities included) and then “push” their agenda (information literacy). One of the reasons why academic libraries are sinking into oblivion is because they are sunk already in 1990-ish practices (information literacy) and miss the “hip” trends, which are of interest for faculty and students. The authors (also paying lip services to the 21st century necessities), remain imprisoned to archaic content. In the times, when multi (meta) literacies are discussed as the goal for library instruction, they push for more arduous marketing of limited content. Indeed, marketing is needed, but the best marketing is by delivering modern and user-sought content.
the stigma of “academic librarians keep doing what they know well, just do it better.” Lip-services to change, and life-long learning. But the truth is that the commitment to “information literacy” versus the necessity to provide multi (meta) literacites instruction (Reframing Information Literacy as a metaliteracy) is minimizing the entire idea of academic librarians reninventing themselves in the 21st century.
Here is more: NRNT-New Roles for New Times
p. 58 According to the Burke and Tumbleson national LMS embedded librarianship survey, 280 participants yielded the following data regarding embedded librarianship:
traditional F2F LMS courses – 69%
online courses – 70%
hybrid courses – 54%
undergraduate LMS courses 61%
graduate LMS courses 42%
of those respondents in 2011, 18% had the imitative started for four or more years, which place the program in 2007. Thus, SCSU is almost a decade behind.
my note:
library blog was offered numerous times to the LRS librarians and, consequently to the LRS dean, but it was brushed away, as were brushed away the proposals for modern institutional social media approach (social media at LRS does not favor proficiency in social media but rather sees social media as learning ground for novices, as per 11:45 AM visit to LRS social media meeting of May 6, 2015). The idea of the blog advantages to static HTML page was explained in length, but it was visible that the advantages are not understood, as it is not understood the difference of Web 2.0 tools (such as social media) and Web 1.0 tools (such as static web page). The consensus among LRS staff and faculty is to keep projecting Web 1.0 ideas on Web 2.0 tools (e.g. using Facebook as a replacement of Adobe Dreamweaver: instead of learning how to create static HTML pages to broadcast static information, use Facebook for fast and dirty announcement of static information). It is flabbergasting to be rejected offering a blog to replace Web 1.0 in times when the corporate world promotes live-streaming (http://www.socialmediaexaminer.com/live-streaming-video-for-business/) as a way to promote services (academic librarians can deliver live their content)
p. 59 Marketing 2.0 in the information age is consumer-oriented. Marketing 3.0 in the values-driven era, which touches the human spirit (Kotler, Katajaya, and Setiawan 2010, 6).
The four Ps: products and services, place, price and promotion. Libraries should consider two more P’s: positioning and politics.
Mathews (2009) “library advertising should focus on the lifestyle of students. the academic library advertising to students today needs to be: “tangible, experiential, relatebale, measurable, sharable and surprising.” Leboff (2011, p. 400 agrees with Mathews: the battle in the marketplace is not longer for transaction, it is for attention. Formerly: billboards, magazines, newspapers, radio, tv, direct calls. Today: emphasize conversation, authenticity, values, establishing credibility and demonstrating expertise and knowledge by supplying good content, to enhance reputation (Leboff, 2011, 134). translated for the embedded librarians: Google goes that far; students want answers to their personal research dillemas and questions. Being a credentialed information specialist with years of experience is no longer enough to win over an admiring following. the embedded librarian must be seen as open and honest in his interaction with students.
p. 60 becoming attractive to end-users is the essential message in advertising LMS embedded librarianship. That attractivness relies upon two elements: being noticed and imparting values (Leboff, 2011, 99)
p. 61 connecting with faculty
p. 62 reaching students
attending a synchronous chat sessions
watching a digital tutorial
posting a question in a discussion board
using an instant messaging widget
be careful not to overload students with too much information. don’t make contact too frequently and be perceived as an annoyance and intruder.
p. 65. contemporary publicity and advertising is incorporating storytelling. testimonials differ from stories
p. 66 no-cost marketing. social media
low-cost marketing – print materials, fliers, bookmarks, posters, floor plans, newsletters, giveaways (pens, magnets, USB drives), events (orientations, workshops, contests, film viewings), campus media, digital media (lib web page, blogs, podcasts, social networking cites
p. 69 Instructional Content and Instructional Design
p. 70 ADDIE Model
Analysis: the requirements for the given course, assignments.
Ask instructors expectations from students vis-a-vis research or information literacy activities
students knowledge about the library already related to their assignments
which are the essential resources for this course
is this a hybrid or online course and what are the options for the librarian to interact with the students.
due date for the research assignment. what is the timeline for completing the assignment
when research tips or any other librarian help can be inserted
copy of the syllabus or any other assignment document
p. 72 discuss the course with faculty member. Analyze the instructional needs of a course. Analyze students needs. Create list of goals. E.g.: how to find navigate and use the PschInfo dbase; how to create citations in APA format; be able to identify scholarly sources and differentiate them from popular sources; know other subject-related dbases to search; be able to create a bibliography and use in-text citations in APA format
p. 74 Design (Addie)
the embedded component is a course within a course. Add pre-developed IL components to the broader content of the course. multiple means of contact information for the librarians and /or other library staff. link to dbases. link to citation guidance and or tutorial on APA citations. information on how to distinguish scholarly and popular sources. links to other dbases. information and guidance on bibliographic and in-text citations n APA either through link, content written within the course a tutorial or combination. forum or a discussion board topic to take questions. f2f lib instruction session with students
p. 76 decide which resources to focus on and which skills to teach and reinforce. focus on key resources
p. 77 development (Addie).
-building content;the “landing” page at LRS is the subject guides page. resources integrated into the assignment pages. video tutorials and screencasts
-finding existing content; google search of e.g.: “library handout narrowing topic” or “library quiz evaluating sources,” “avoiding plagiarism,” scholarly vs popular periodicals etc
-writing narrative content. p. 85
p. 87 Evaluation (Addie)
formative: to change what the embedded librarian offers to improve h/er services to students for the reminder of the course
summative at the end of the course:
p. 89 Online, F2F and Hybrid Courses
p. 97 assessment impact of embedded librarian.
what is the purpose of the assessment; who is the audience; what will focus on; what resources are available
p. 98 surveys of faculty; of students; analysis of student research assignments; focus groups of students and faculty
Integers: A signed or unsigned whole number running from -32,768 to 32,768 or from 0 to 65,535 if not signed. Integers are used anytime something needs to be counted.
Long Integer: Any whole number outside the above range. Python doesn’t distinguish between the two though many languages do. Practically, Python’s integers range from −2,147,483,648 to 2,147,483,648 or 0 to 0 to 4,294,967,295. Most of us will be very happy with this many whole numbers to choose from.
Real and Floating Point Numbers: Real numbers are signed or unsigned numbers including decimals. The numbers 2,3,4 are Integers and Real Numbers. The numbers 2.1, 2.9,3.9 are Real Numbers, but not Integers. Real Numbers can include representations of irrational numbers such as pi. Real numbers must be rational, that is a decimal number that terminates after a finite number of decimals. You will sometimes encounter the term Floating Point Numbers. This is a technical term referring to the way that large Real Numbers are represented in a computer. Python hides this detail from you so Real and Floating Point are used intercangeably in this language.
Binary Numbers: And Octal and Hexadecimal. These are numbers used internally by computers. You will run into these values fairly often. For instance, when you see color values in HTML such as “FFFFFF” or “0000FF”,
Hexadecimal and Octal are used because humans can read them without too much trouble and they are compromise between what computers process and what we can read. Any time you see something in Octal or Hexadecimal, you are looking at something that interfaces with the lower levels of a computer. You will most commonly use Hexadecimal numbers when dealing with Unicode character encodings. Python will interpret any number which begins with a leading zero as binary unless formatting commands have been used.
Numbers such as 7i are referred to as complex. They have a real part, the 7, and an imaginary part, i. Chance are you won’t use complex numbers unless you’re working with scientific data.
A String consists of a sequence of characters. The term String refers to how this data type is represented internally. You store text in Strings. Text can by anything, letters, words, sentences, paragraphs, numbers, just about anything.
Lists are close cousins to Strings, though you may never need to think of them that way. A list is just that, a list of things. Lists may contain any number of numbers or any number of strings. List may even contain any number of other lists. Lists are compared to arrays, but they are not the same thing. In most uses, the function the same so the difference, for our purposes, is moot. Strings are like lists in that, internally, the computer works with strings in an identical manner to lists. This is why the operations on Strings are so different from numbers.
The last main data type in the Python programming language is the dictionary. Dictionaries are map types, known in other languages as hashes, and in computer science as Associative Arrays. The best way to think of what the dictionary does is to consider a Library of Congress Call Number(something this audience is familiar with). The call number is what’s called a Key. It connects to a record which contains information about a book. The combination of keys and records, called values, comprises a dictionary. A single key will connect to a discrete group of values such as the items in this record. Dictionaries will be touched on in the next lesson in some detail in the next course. These are fairly advanced data structures and require a solid understanding a programming fundamentals in order to be used properly.
Statements, an Overview
Programs consist of statements. A statement is a unit of executable code. Think of a statement like a sentence. In a nutshell, statements are how you do things in a program. Writing a program consists of breaking down a problem you want to solve into smaller pieces that you can represent as mathematical propositions and then solve. The statement is where this process gets played out. Statements themselves consist of some number of expressions involving data. Let’s see how this works.
An expression would be something like 2+2=4. This expression, however is not a complete statements. Ask Python to evaluate it and you will get the error “SyntaxError: can’t assign to operator”. What’s going on here? Basically we didn’t provide a complete statement. If we want to see the sum of 2+2 we have to write a complete statement that tells the interpreter what to do and what to do it with. The verb here is ‘print’ and the object is ‘2+2’. Ask Python to evaluate ‘print 2+2’ and it will show ‘4’. We could also throw in subject and do something a bit more detailed: ‘Sum=2+2’. In this case we are assigning the value of 2+2 to the variable, Sum. We can then do all sorts of things with Sum. We can print it. We can add other numbers to it, hand it off to a function and so on. For instance, might want to know the root of Sum. In which case we might write something like ‘print sqrt(sum)’ which will display ‘2’.
A shell is essentially a user interface that provides you access to a system’s features. Normally, this means access to an Operating System. In cases like this, the shell provides you access to the Python programming environment.
Anything preceed by a “#” is not interpreted or executed by the programming shell. Comments are used widely to document programs. One school of programming holds that code should be so clear that comments are uncessary.
Operations on Numbers
Expressions are discrete statements in programming that do something. They typically occupy one line of code, though programmers will sometimes squeeze more in. This is generally bad form and can really make your program a mess. Expressions consist of operations and data or rather data and operations on them. So, what can you do with numbers? Here is a concise list of the basic operations for integers and real numbers of all types:
Arithemetic:
Addition: z= x + y
Subtraction: z = x – y
Multiplication: z = x * y. Here the asterisk serves as the ‘X’ multiplication symbol from grade school.
Division: z = x/y. Division.
Exponents: z = x ** y or xy, x to the y power.
Operations have an order of precedence which follows the algebraic order of precedence. The order can be remembered by the old Algebra mnenomic, Please Excuse My Dear Aunt Sally which is remeinds you that the order of operations is:
Parentheses
Exponents
Multiplication
Division
Addition
Subtraction
Operations on Strings
Strings are strange creatures as I’ve noted before. They have their own operations and the arithmetic operations you saw earlier don’t behave the same way with strings.
Putting Expressions Together to Make Statements
As I noted earlier, all computer languages, and natural languages, possess pragmatics, larger scale structures which reduce ambiguity by providing context. This is a fancy way of saying just as sentences posses rules of syntax to make able to be comprehended, larger documents have similar rules. Computer Programs are no different. Here’s a break down of the structure of programs in Python, in a general sense.
Programs consist of one or more modules.
Modules consist of one or more statements.
Statements consist of one or more expressions.
Expressions create and/or manipulate objects(and variables of all kinds).
Modules and Programs are for the next class in the series, though we will survey these larger structures next lesson. For now, we’ll focus on statements and expressions. Actually, we’ve already started with expressions above. In Python, statements can do three things.
Assign a variable
Change a variable
Take an action
Variable Names and Reserved Words
Now that we’ve seen some variable assignments, let’s talk about best practices. First off, aside from reserved words, variable names can be almost any combination of letters, numbers and punctuation marks. You, however, should never ever, use the following punctuation marks in variable names:
+
–
!
@
^
%
(
)
.
“
?
/
:
;
*
These punctuation marks tends to be operators and characters that have special meanings in most computer languages. The other issue is reserved words. What are “reserved words”? They are words that Python interprets as commands. Pythons reservers the following words.:
True: A special value set aside for boolean values
False: The other special value set aside for boolean vaules
None: The logical equivalent of 0
and: a way of combining logical conditions
as: describes how modules are imported
assert: a way of forcing something to take on a certain value. Used in debugging of large programs
break: breaks out of a loop and goes on with the rest of the program
class: declares a class for object oriented design. For now, just remember not to use this variable name
continue: returns to the top of the loop and keeps on going again
def: declares functions which allow you to modularize your code.
elif: else if, a cotnrol structure we’ll see next lesson
else: as above
except: another control structure
finally: a loop control structure
for: a loop control structure
from: used to import modules
global: a scoping statement
if: a control structure/li>
in: used in for each loops
is: a logical operator
lamda: like def, but weird. It defines a function in a single line. I will not teach this becuase it is icky. If you ever learn Perl you will see this sort of thing a lot and you will hate it, but that’s just my personal opinion.
nonlocal: a scoping command
not: a logical operator
or: another logical operator
pass: does nothing. Used as placeholder
raise: raises an error. This is used to write custom error messages. Your programs may have conditions which would be considered invalid based on our business situation. The interpreter may not consider them errors, but you might not want your user to do something so you ‘raise’ an exception and stop the program.
return: tells a function to return a value
try: this is part of an error testing statement
while: starts a while loop
with: a context manager. This will be covered in the course after the next one in this series
yield: works like return
Variable names should be meaningful. Let’s say I have to track a person’s driver license number. explanatory names like ‘driverLicenseNumber’.
Use case to make your variable names readable. Python is case sensitive, meaning a variable named ‘cat’ is different from named ‘Cat’. If you use more than one word to name variable, start of lower case the change case on the second word. For instance “bigCats = [‘Tiger’,’Lion’,’Cougar’, ‘Desmond’]”. The common practice used by programmers in many settings is that variables start with lowercase and functions(methods and so on) start with upper case. This is called “Camel Case” for its lumpy, the humpy appearance. Now, as it happens, there is something of a religious debate over this. Many Python programmers prefer to keep everything lower case and join words in a name by underscores such as “big_cats”. Use whichever is easiest or looks the nicest to you.
Variable names should be unique. Do not reuse names. This will cause confusion later on.
Python conventions. Python, as with any other programming language, has culture built up around it. That means there are some conventions surrounding variable naming. Two leading underscores, __X, denote system variables which have special meaning to the interpreter. So avoid using this for your own variables. There may be a time and place, but that’s for an advanced prorgramming course. A single underscore _X indicates to other programmers that this a fundamental variable and that they mess with it at their own peril.
Avoid starting variable names with a number. This may or may not return an error. It can also mislead anyone reading your program.
“A foolish consistency is the hobgoblin of little minds”. But not to programming minds. Consistency helps the readability of code a great deal. Once you start a system, stick with it.
Statement Syntax
Putting together valid statements can be a little hard at first. There’s a grammar to them. Thus far, we’ve mainly been workign with expressions such as “x = x+1”. You can think of expression as nouns. We’ve clearly defined x, but how do we look inside? For that we need to give it a verb, the print command. We would then write “print x”. However we can skip the middle statement and print an expression such as “print x + 1”. The interpreter evaluates this per the order of operations I laid out earlier. However, once that expression is evaluated, it then applies the verb, “print”, to that expression.
Print is a function that comes with the Python distribution. There are many more and you can create your own. We’ll cover that a bit in next lesson. Let’s look at little more at the grammar of a statement. Consider:
x = sin(b)
Assume that b has been defined elsewhere. x is the subject, b is the object and sin is the verb. Python will go to the right side of the equal sign first. It will then go to the inside of the function and evaluate what’s there first. It then evaluates the value of the function and finishes by setting x to that value. What about something like this?
x=sin(x+3/y)
Python evaluates from the inside out according to the rules of operation. Very complex statements can be built up this way.
x = sin(log((x + 3)/(e**2)))
Regardless of what this expression evaluates to (I don’t actually know), Python starts with the innermost parentheses, then works through the value of e squared then adds 3 to x and divides the result by e squared. With that worked out, it takes the logarithm of the result and takessthe sine of that before setting x to the final result.What you cannot do is execute more than one statement on a line. No more than one verb on a line. In this context, a verb is an assignment, or a command acting on an expression
markdown cell
code cell
Call up your copy of Think Python or go to the website at http://www.greenteapress.com/thinkpython/html/. Read Chapter 2. This will reiterate much of what I’ve presnted here, but this will help cement the content into you minds. Skip section 2.6 because IPython treats everything as script mode. IPyton provides you with the illusion of interactive, but everything happens asynchronously. This means that any action you type in will not instantaneously resolve as it would if you were running Python interactively on your computer. You will have to use print statements to see the results of your work.
Your assignment consists of the following:
Exercise 1 from Chapter 2 of Think Python. If you type an integer with a leading zero, you might get a confusing error:
<<< zipcode = 02492
SyntaxError: invalid token
Other numbers seem to work, but the results are bizarre:
<<< zipcode = 02132
<<< zipcode
1114
Can you figure out what is going on? Hint: display the values 01, 010, 0100 and 01000.
Exercise 3 from Chapter 2 of Think Python.Assume that we execute the following assignment statements:
width = 17
height = 12.0
delimiter = ‘.’
For each of the following expressions, write the value of the expression and the type (of the value of the expression).
width/2
width/2.0
height/3
1 + 2 5
delimiter 5
Exercise 4 from Capter 2 of Think Python. Practice using the Python interpreter as a calculator:
1. The volume of a sphere with radius r is 4/3 π r3. What is the volume of a sphere with radius 5? Hint: 392.7 is wrong!
2. Suppose the cover price of a book is $24.95, but bookstores get a 40% discount. Shipping costs $3 for the first copy and 75 cents for each additional copy. What is the total wholesale cost for 60 copies?
3/ If I leave my house at 6:52 am and run 1 mile at an easy pace (8:15 per mile), then 3 miles at tempo (7:12 per mile) and 1 mile at easy pace again, what time do I get home for breakfast?
In your IPython notebook Create a markdown cell and write up your exercise in there. Just copy it from the textbook or from the above write up. Next ceate a code cell and do your work in there. Please, comment your work thoroughly. You cannot provide too many comments. Use print statements to see the outcome of your work.
Subject-specific lessons – an hour of history in the morning, an hour of geography in the afternoon – are already being phased out for 16-year-olds in the city’s upper schools. They are being replaced by what the Finns call “phenomenon” teaching – or teaching by topic. For instance, a teenager studying a vocational course might take “cafeteria services” lessons, which would include elements of maths, languages (to help serve foreign customers), writing skills and communication skills.
The reforms reflect growing calls in the UK – not least from the Confederation of British Industry and Labour’s Shadow Education Secretary Tristram Hunt – for education to promote character, resilience and communication skills, rather than just pushing children through “exam factories”. (http://www.theguardian.com/education/2015/mar/20/labour-calls-time-on-exam-factory-approach-to-schooling)
(My Note/Question: so UK is ready to scrap what US pushes even harder with the STEM idea?)
More on education in Finland and its education in this IMS blog:
Digital Portfolios: Facilitating Authentic Learning and Cultivating Student Ownership
presented on Tuesday, March 3, 2015.
Steve Zimmerman (charter school director), New York
digital porfolio software: open source. Google Sites – free, but too laborious for teachers
must be student owned and intuitive interface (you cannot say this about MN eFolio)
assessment rubrics
easy sharing and feedback
accessible form mobile devices (you cannot say this about MN eFolio)
easy integration with other applications (you cannot say this about MN eFolio)
Tina Holland
she is not a test person. good for her.
writing, critical thinking, creative thinking, soft skills (communication, collaboration, negotiation). team players, problme solvers, prioritize,
education is moving from traditional teaching methods, to inquiry based. self-directed learning. from summative to formative assessment
Playing in the Past: A History of Games, Toys, and Puzzles in North American Libraries
Author(s): Scott Nicholson
Source: The Library Quarterly, Vol. 83, No. 4 (October 2013), pp. 341-361
Published by: The University of Chicago Press
Stable URL: http://www.jstor.org/stable/10.1086/671913
demonstrate the different ways in which libraries have used games, toys, and puzzles over the last 150 years through bothcollections and services
p, 342 Defining games –
p. 348 Games as the Subject of Collections\
p. 350A significant shift in academic libraries is a focus on providing services to students. Since agrowing number of academic publications both current issues and back volumes
are ac-cessible online through library subscriptions, the physical space of academic libraries is notneeded for collections of periodicals. The concept of the “learning commons”has become
popular on US campuses in the past decade; it combines traditional library resources and
the availability of library staff members with group work spaces, computer access and assis-
tance, and writing assistance to provide one place where students can get assistance with
course work. In addition, many of these learning commons also include cafes, social spaces,
and other support of the social lives of students, and it is in this role that academic libraries
provide access to collections of games.
p. 357 Another upcoming area of gaming in libraries is gamification. Gamification is the application of game design elements to a nongame setting ðDeterding et al. 2011Þ.
The concept of meaningful gamification is that the primary use of game layers is not to provide
external rewards, but rather to help participants find a deeper connection to the underyling topic
notes under the NPR article and on its Facebook posting most interesting, as usually. E.g.:
Brian TrudoI wrote my final paper in college english on this subject. I believe that ultimately it is the producers of electronic devices (like apple) responsibility to rebuy and recycle older electronics. especially whwn they come out with a new device every year
Dan NeidlingerI did a report on this kind of thing in college, just for a basic writing class. First world pollution of the third world is a big and nasty problem that’s not given great focus.