Wednesday, May 6, 2020
Most Difficult Topics a Computer Science Student Encounters
I. INTRDUCTION This research entitled, ââ¬Å"A study on The Most Difficult Topic a Computer Science Student Encountersâ⬠, was made in partial fulfillment of the requirements in Operations Research I. Guided by my Professor, Mrs. Realinixa Krishnan, I am trying to cite the topic which most Computer Science Student perceive as the most difficult in order for me to show computer educators which topics to focus and give more time to. Because of the fact that every year level receives different amounts of knowledge, I made my research vary according to year level. II. RELATED LITERATURE As the research continued I gathered several related articles as completion to the given format of the said research. Dan Zambonini said on his web blog atâ⬠¦show more contentâ⬠¦Sci. Student Encountersâ⬠Directions: Please honestly rank the topics below from 1-12 according to your personal perception on their level of difficulty (1-easiestâ⬠¦12-most difficult). Please fill the box of your respective year level. For first year students:Name: a) Surfing the Internet (for researches) b) Encoding school projects c) Downloading and installing d) Computer terminologies e) Computer Games f) Typing Lessons g) Knowledge on Operating Systems h) Microsoft Excel i) Using Removable media (flash, floppy, USB, etc.) j) Email and chat messaging k) Microsoft Word l) Troubleshooting | For Second year students:Name: a) Surfing the Internet (for researches) b) Encoding school projects c) Downloading and installing d) Computer terminologies e) Presentations on PowerPoint f) Computer Games g) Troubleshooting h) HTML Designing (Web pages) i) Knowledge on Operating Systems j) Microsoft Excel k) Email and chat messaging l) Using Removable media (flash, flop py, USB, etc.) | For third year students:Name: a) Surfing the Internet (for researches) b) Encoding school projects c) Downloading and installing d) Computer terminologies e) Presentations on PowerPoint f) Computer Games g) Creating a Database h) Programming (Using Visual Basic) i) OS Installation and Reformatting j) Photo Editing k) HTML Designing (Web pages) l) Troubleshooting/Hardware | For fourth yearShow MoreRelatedThe Invention Of Light Microscope By Robert Hooke846 Words à |à 4 Pages Since the invention of light microscope by Robert Hooke and the study of living cells, knowledge in the field of science has developed tremendously. In fact, the development of computers in the twentieth century proved itself a real boon for education. Technology is a tool in teaching and learning processes. Technology and knowledge have always been complementary to each other. In school settings technology can be applied to ease the exchange of knowledge. In modern e ducational setting, PowerPointRead MoreA Career as a Software Engineer Essays1087 Words à |à 5 Pagesbecome a Software Engineer you would usually major in Computer Science (CUnet 1). A Computer Science degree is the most common degree among Software Engineers. Itââ¬â¢s the most common because it covers a broad range of topics that Software Engineers need to know for this occupation (U.S. Department of Labor 1). Software Engineerââ¬â¢s need at least a Bachelorââ¬â¢s Degree in Computer Science to get hired by companies. Even though Computer Science is the most common degree Software Engineerââ¬â¢s have, there are alsoRead MoreLiberal Arts Education Should Be Implemented Into A New Core Curriculum2137 Words à |à 9 Pagespeople enjoy change. Nowadays, numerous jobs require basic to intermediate computer skills, literacy in basic business and economic concepts, and a remedial understanding of geography, social customs, and current events. The core curriculum of a libera l arts education, which includes history, math, art, science, English, literature, and a variety of social sciences, needs to be expanded to encompass the subjects people encounter every day in the 21st century. This paper is directed towards a generalRead MoreLearning Styles- Theory of Multiple Intelligences Essay1078 Words à |à 5 Pagesother place that one would be taught a subject or lesson. While attending a class or lecture each person that is their to learn will grasp the concept of the lesson in a different way and gain a different amount of knowledge and understanding on the topic no matter what. This reason being is every one has a different way of learning. Just as each individual is different in their own way they also have a different way of gaining information from a source. The way people are able to grasp informationRead MoreEssay on How Technology Influences Children1331 Words à |à 6 Pagesgrounded theory approach to develop an understanding for the topic under study. Data analyses reveal that children assume an autonomous nature, constructing, interpreting, and manipulating their technological environment. This dictates how technology is integrated in their lives within different contexts of family, peers, and school. If for instance we take the case of the widely used internet, we find that accessibility of personal computers has resulted in introduction of the Internet and the WorldRead MoreA Justification For Implementation Of The Program1653 Words à |à 7 PagesMcGrath and Noble (2003), believe that young people in todayââ¬â¢s society are using different coping strategies than previous generations to deal with lifeââ¬â¢s challenges. In todayââ¬â¢s society it is believed that young people are more likely to encounter a range of difficult circumstances, negative events and down times and they are not equipped to cope with these challenges and downtimes (McGrath Noble, 2003). Young people in todayââ¬â¢s society are more likely to participate in life threatening behaviour likeRead MoreCyber Bullying And Its Effects1411 Words à |à 6 Pagesunderstand why and how a cyber-bully works. After researching and analyzing informative articles on the topic, this research paper aims to infor m and answer questions such as: what a cyber-bully is, how they work, whom they target, and how to stop them. By understanding how a cyber-bully works we will be able to better protect youth populations as technology grows. Approximately half ofà U.S. students are impacted by traditional bullying each school day (Ross). Cyber-bullying is technology powered andRead MoreCyber Bullying And Its Effects1411 Words à |à 6 Pagesunderstand why and how a cyber-bully works. After researching and analyzing informative articles on the topic, this research paper aims to inform and answer questions such as: what a cyber-bully is, how they work, whom they target, and how to stop them. By understanding how a cyber-bully works we will be able to better protect youth populations as technology grows. Approximately half of U.S. students are impacted by traditional bullying each school day (Ross). Cyber-bullying is technology powered andRead MoreGender Imbalance Of Computer Science3624 Words à |à 15 Pages Gender Imbalance in Computer Science Introduction In past many generations, men and women had distinct roles. In ancient times, the stereotype of a woman was working as a housewife, taking care of children and doing housekeeping jobs, while man were responsible for hunting or farming. As human civilization goes on, woman are no longer restricted in household routines and have been widely accepted as an indispensable source of labor force in a variety of occupations. However disparity of careerRead MoreCyber Bullying And Its Effect On Today s Youth1587 Words à |à 7 Pagessuch topic, this research paper aims to inform and answer the following questions: What a cyber-bully Nunez 2 is, how they work, whom they target, and how to stop them. By understanding how a cyber-bully works we would be capable of better protecting youth population as technology grows. Approximately, half of the students who reside
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.