Engaging Students in Active Learning Worshop 6
How do we engage students in active learning? In this session, the
teachers examine the elements of authentic instruction and cooperative learning to identify ways of engaging students in social studies content. They review the importance of questioning in relation to higher-order thinking and explore classroom strategies to stimulate
thinking and bring social studies concepts to life for their students.

Author(s): No creator set

License information
Related content

Asian Security Seminar - The Geopolitics of Energy
The purpose of this seminar is, first, to remind ourselves of the importance of economic change and policies to geopolitics; and, second, to note various new dimensions to energy issues that I refer to as the 'new' geopolitics of energy. The reality that oil and natural gas are strategic commodities, as the US rejection, largely on nationalist and security grounds of the Chinese oil company (CNOOC)'s bid for Unocal, reminds us, is by no means new though it now has a new intensity. We have increa
Author(s): No creator set

License information
Related content

Afghanistan's Elections: Can Straw be Spun into Gold?
Afghanistan's presidential election on 20 August has triggered a storm of complaints, and widespread apprehension on the part of international commentators. Yet the question of how to move forward constructively is on the desk of foreign ministries in many major capitals. In this lecture Professor Maley, who was an accredited international observer for the election, offers an account of the forces that have brought Afghanistan to this pass, and some suggestions about what might be required to av
Author(s): No creator set

License information
Related content

Asian Security Seminar: G2 but no EU? What a China-US Strategic Partnership Would Mean for Europe
Dr Gudrun Wacker is a researcher at the German Institute for International and Security Affairs in Berlin, where she specialises in China's foreign and security policy and domestic development. Her current areas of research focus include EU-China relations; China in the Asia-Pacific region and the role of the US; challenges to China's modernisation and sustainable development; and China in the international order. She has co-authored numerous books, academic articles and working papers, includin
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 2: "Possession and ownership of data" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 2 includes the first panel of the workshop, entitled "Possession and own
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 2: "Possession and ownership of data" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 2 includes the first panel of the workshop, entitled "Possession and own
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 3: "Security and risk in the cloud" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 3 includes the second panel of the workshop, entitled "Security and risk
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 3: "Security and risk in the cloud" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 3 includes the second panel of the workshop, entitled "Security and risk
Author(s): No creator set

License information
Related content

Anthony Scaturro: Cyber Security for Non-technical Users Non-technical Users
Lunch 'n Learn presentation: Your work or home computer may contain information about yourself, (e.g., tax returns and other personal information), about others (e.g., work-related reports, databases), or about matters you are working on (e.g., research) that you may not want to share with the public. It is not uncommon for computer users to assume that the various computer and software vendors sell products that will protect such information “out-of-the-box.“ While their products may conta
Author(s): No creator set

License information
Related content

Anthony Scaturro: Cyber Security for Non-technical Users PDF
Lunch 'n Learn presentation: Your work or home computer may contain information about yourself, (e.g., tax returns and other personal information), about others (e.g., work-related reports, databases), or about matters you are working on (e.g., research) that you may not want to share with the public. It is not uncommon for computer users to assume that the various computer and software vendors sell products that will protect such information “out-of-the-box.“ While their products may conta
Author(s): No creator set

License information
Related content

The Role of Europe in a Multilateral World - November 19, 2009
In his lecture, “The Role of Europe in a Multilateral World,” Romano Prodi will examine the benefits and challenges presented by the European Union’s expansion. Although the enlargement of the union has had significant impact on the democratic transition in eastern Europe and has extended European markets, there is no unanimity on issues of security, energy, and foreign affairs. Prodi maintains that if the EU aims to play a key role on the world’s political stage, it will need to develop
Author(s): No creator set

License information
Related content

The Role of Europe in a Multilateral World - November 19, 2009
In his lecture, “The Role of Europe in a Multilateral World,” Romano Prodi will examine the benefits and challenges presented by the European Union’s expansion. Although the enlargement of the union has had significant impact on the democratic transition in eastern Europe and has extended European markets, there is no unanimity on issues of security, energy, and foreign affairs. Prodi maintains that if the EU aims to play a key role on the world’s political stage, it will need to develop
Author(s): No creator set

License information
Related content

Alex Halderman, Princeton University: "Securing the Electronic Ballot"
In the wake of the 2000 Florida recount debacle, many states turned to computer voting machines to increase election accuracy and security. Many computer scientists have long been skeptical of such machines, but only recently have researchers had access to them for study. In in his talk he describes how his colleagues and he examined several widely used electronic voting systems and discovered that they were susceptible to attacks that could alter election results and compromise the secrecy of
Author(s): No creator set

License information
Related content

Alex Halderman, Princeton University: "Securing the Electronic Ballot"
In the wake of the 2000 Florida recount debacle, many states turned to computer voting machines to increase election accuracy and security. Many computer scientists have long been skeptical of such machines, but only recently have researchers had access to them for study. In in his talk he describes how his colleagues and he examined several widely used electronic voting systems and discovered that they were susceptible to attacks that could alter election results and compromise the secrecy of
Author(s): No creator set

License information
Related content

20 - Subgame perfect equilibrium: wars of attrition
We first play and then analyze wars of attrition; the games that afflict trench warfare, strikes, and businesses in some competitive settings. We find long and damaging fights can occur in class in these games even when the prizes are small in relation to the accumulated costs. These could be caused by irrationality or by players' having other goals like pride or reputation. But we argue that long, costly fights should be expected in these games even if everyone is rational and has standard goal
Author(s): No creator set

License information
Related content

03 - Technology and Invention in Finance
Technology and innovation underlie finance. In order to manage risks successfully, particularly long-term, we must pool large amounts of risk among many, diverse people and overcome barriers such as moral hazard and erroneous framing. Inventions such as insurance contracts and social security, and information technology all the way from such simple things as paper, and the postal service to modern computers have helped to manage risks and to encourage financial systems to address issues pertaini
Author(s): No creator set

License information
Related content

情報基礎実習
Description not set
Author(s): Creator not set

License information
Related content

Rights not set

カメラツールの設定
After Effects CS5の強化されたカメラツールの設定とマウスによる操作について学びます。
Author(s): No creator set

License information
Related content

Community College Persistence among Minority Students: A Conceptual Analysis of the Literature
Edna Kingsley, Stacey Edmonson, John R. Slate
Community colleges in the 21st century fill a variety of important educational roles. Because of their geographic accessibility, open-door a

Author(s): No creator set

License information
Related content

Still banning that Bomb: Thinking about nuclear non-proliferation and disarmament
Friday 31 July, 3.30-5.00pm Seminar Room 1.03, Ground Floor, Hedley Bull Centre, Garran Rd, ANU campus Ron Huisken is Senior Fellow at the Strategic and Defence Studies Centre, Australian National University. He spent a number of years at the Stockholm International Peace Research Institute and the UN Centre for Disarmament Affairs before joining government (1981-2001), predominantly the Departments of Foreign Affairs and Trade and of Defence. He returned to academia in 2001 with research intere
Author(s): No creator set

License information
Related content