2011-2012 Catalog and Student Handbook

Total Page:16

File Type:pdf, Size:1020Kb

2011-2012 Catalog and Student Handbook Dyersburg State Community College 2011-2012 Catalog and Student Handbook Table of Contents DSCC Catalog Academic Calendar 2011-2012 ................................................................ 2 For More Information About... ................................................................... 4 President’s Message ................................................................................. 5 History and Mission ................................................................................... 9 Requirements for Admission ...................................................................13 Fees and Expenses ..................................................................................25 Financial Aid .............................................................................................28 Student Services ......................................................................................43 Community Services ................................................................................46 Academic Affairs and Regulations ..........................................................48 Programs of Instruction ...........................................................................59 Course Descriptions .................................................................................92 Definition of Terms .................................................................................121 Directories ............................................................................................. 123 DSCC Foundation Board of Directors ................................................124 Administration .................................................................................... 125 Staff .................................................................................................... 126 Advisory Committees ..........................................................................127 Faculty and Staff .................................................................................130 DSCC Student Handbook Administrative Staff ...............................................................................139 DSCC Dyersburg Campus Map ..............................................................141 DSCC Jimmy Naifeh Center at Tipton County Map...............................142 Services and Special Assistance ..........................................................143 Index........................................................................................................158 Dyersburg State Community 1510 Lake Road, Dyersburg, Tennessee 38024 731/286-3350 • www.DSCC.edu Dyersburg State Community College is one of 45 institutions in the Tennessee Board of Regents system, the sixth largest system of higher education in the nation. The Tennessee Board of Regents is the governing board for this system which is comprised of six uni- versities, thirteen two-year colleges, and twenty-six Tennessee Technology centers. The TBR system enrolls more than 80 percent of all Tennessee students attending public institutions of higher education. 2011-2012 1 August 2011 S M T W T F S Academic Calendar 2011-2012 1 2 3 4 5 6 Please make note of the deadlines listed in the Academic Calendar, since some dates fall on weekends or holidays. 7 8 9 10 11 12 13 Students without home access to the Internet are encouraged to utilize DSCC computer resources or to contact the 14 15 16 17 18 19 20 One Stop Center located on the Dyersburg Campus, the DSCC Gibson County Center or the DSCC Jimmy Naifeh Center 21 22 23 24 25 26 27 at Tipton County. 28 29 30 31 FALL SEMESTER 2011 September 2011 April 4-17 Advising and Priority Registration for Summer and Fall 2011 S M T W T F S April 18 – Ongoing Registration for Fall 2011 1 2 3 August 26 4 5 6 7 8 9 10 August 1 Priority Date for Financial Aid Processing 11 12 13 14 15 16 17 August 19 Application Deadline for Fall 2011 – Last Day to apply for admission or readmission if you were 18 19 20 21 22 23 24 not enrolled Spring or Summer 2011 25 26 27 28 29 30 August 22 Fall Update (8:00 a.m. – 12:00 p.m. for Faculty & Staff and 1:00 – 4:00 p.m. for Faculty) Adjunct Faculty Workshop – Dyersburg Campus (6:00 – 9:00 p.m. for new and dual enrollment instructors and 7:00 – 9:00 p.m. for returning instructors) August 25 Adjunct Faculty Workshop – DSCC Jimmy Naifeh Center at Tipton County (6:00 – 9:00 p.m. for October 2011 new and dual enrollment instructors and 7:00 p.m. – 9:00 p.m. for returning instructors August 27 Classes Begin including DSCC Online and RODP S M T W T F S August 28 Last Day to Receive a 100% Refund 1 August 30 Financial Aid Census Date 2 3 4 5 6 7 8 Last Day to Register or Add Classes 9 10 11 12 13 14 15 September 5 College Closed for Observance of Labor Day – No Day or Evening Classes 16 17 18 19 20 21 22 September 9 End of 75% Refund Period 23 24 25 26 27 28 29 Last Day to Remove “I” Grade from Spring 2011 or Summer 2011 30 31 September 22 End of 25% Refund Period – Date may differ for RODP October 10 Midterm Grading Opens October 14 Fall Conference for Faculty & Staff – No Day Classes – Evening Classes Will Meet October 15-18 Fall Break – No Day or Evening Classes November 2011 October 31 Deadline for Submission of Midterm Grades S M T W T F S November 4 Last Day to Drop or Withdraw with a “W” 1 2 3 4 5 Last Day to Change to Audit Deadline to File Intent to Graduate 6 7 8 9 10 11 12 November 14-27 Advising & Priority Registration for Spring Semester – Currently Enrolled Students Only 13 14 15 16 17 18 19 November 23 Day & Evening Classes Will Meet 20 21 22 23 24 25 26 November 24-27 College Closed for Observance of Thanksgiving – No Day or Evening Classes 27 28 29 30 November 28 Pre-registration Begins for Spring Semester – Open to Everyone December 12 Last Day of Classes – Date may differ for RODP December 13-17 Final Exams – Dates may differ for RODP December 2011 December 24 – DSCC Closed S M T W T F S January 2 1 2 3 SPRING SEMESTER 2012 4 5 6 7 8 9 10 November 14-27 Advising and Priority Registration for Spring 2012 11 12 13 14 15 16 17 November 28 – Ongoing Registration for Spring 2012 18 19 20 21 22 23 24 January 11 25 26 27 28 29 30 31 December 15 Priority Date for Financial Aid Processing January 3 DSCC Reopens January 5 Application Deadline for Spring 2012 – Last Day to apply for admission or readmission Adjunct Faculty Workshop at DSCC Jimmy Naifeh Center at Tipton County (6:00 – 9 :00 p.m. for January 2012 new and dual enrollment instructors and 7:00 – 9:00 p.m. for returning instructors) S M T W T F S January 6 Spring Update for Faculty and Staff (1:00 p.m. – 3:30 p.m. for Faculty & Staff and 1 2 3 4 5 6 7 1:00 – 4:30 p.m. for Faculty) 8 9 10 11 12 13 14 January 9 Adjunct Faculty Workshop – Dyersburg Campus (6:00 – 9 :00 p.m. for new and dual enrollment 15 16 17 18 19 20 21 instructors and 7:00 – 9:00 p.m. for returning instructors) January 11 Last Day to Receive a 100% Refund 22 23 24 25 26 27 28 January 12 Classes Begin including DSCC Online and RODP 29 30 31 January 13 Last Day to Register or Add Classes Financial Aid Census Date January 16 College Closed for Observance of Dr. Martin Luther King, Jr. Day January 25 End of 75% Refund Period February 2012 Last Day to Remove “I” Grade from Fall 2011 S M T W T F S February 8 End of 25% Refund Period – Date may differ for RODP 1 2 3 4 March 1 Midterm Grading Opens March 5-10 Spring Break – No Day or Evening Classes 5 6 7 8 9 10 11 March 16 Deadline for Submission of Midterm Grades 12 13 14 15 16 17 18 March 23 Last Day to Drop or Withdraw with a “W” 19 20 21 22 23 24 25 Last Day to Change to Audit 26 27 28 2 DSCC Catalog April 2-15 Advising & Priority Registration for Summer & Fall Semesters – Currently Enrolled Students Only March 2012 April 5 Spring Conference for Faculty & Staff – No Day or Evening Classes S M T W T F S April 6-8 College Closed for Observance of Good Friday & Easter – No Day or Evening Classes April 16 Pre-registration Begins for Summer and Fall Semesters – Open to Everyone 1 2 3 April 30 Last Day of Classes – Date may differ for RODP 4 5 6 7 8 9 10 May 1-5 Final Exams – Dates may differ for RODP 11 12 13 14 15 16 17 May 5 Commencement – 2:00 p.m. 18 19 20 21 22 23 24 25 26 27 28 29 30 31 SUMMER SEMESTER 2012 May Semester – May 9 through May 24 April 2-15 Advising & Priority Registration for May Semester – Currently Enrolled Students Only April 2012 April 16 Pre-registration Begins for May Semester – Open to Everyone S M T W T F S May 2 Application Deadline for May Semester – Last Day to apply for admission or readmission 1 2 3 4 5 6 7 May 8 Last Day to Register or Add May Semester Classes 8 9 10 11 12 13 14 Last Day to Receive 100% Refund for May Semester 15 16 17 18 19 20 21 May 9 May Semester Classes Begin 22 23 24 25 26 27 28 May 10 End of 75% Refund Period for May Semester Classes May 12 End of 25% Refund Period for May Semester Classes 29 30 May 18 Last Day to Drop or Withdraw from May Semester Classes with a “W” or Change to Audit May 24 May Semester Classes End May 2012 Full Term – May 29 through July 31 S M T W T F S April 2-15 Advising & Priority Registration for May Semester – Currently Enrolled Students Only 1 2 3 4 5 April 16 Pre-registration Begins for May Semester – Open to Everyone 6 7 8 9 10 11 12 May 21 Application Deadline for Full Term Classes – Last Day to apply for admission or readmission May 28 Last Day to Receive 100% Refund for Full Term Classes 13 14 15 16 17 18 19 College Closed for Observance of Memorial Day 20 21 22 23 24 25 26 May 29 Full Term Classes Begin
Recommended publications
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Municipal Leaders Updated on Key Legislative Issues
    1-TENNESSEE TOWN & CITY/MARCH 19, 2007 www.TML1.org 6,250 subscribers www.TML1.org Volume 58, Number 4 March 19, 2007 Municipal leaders updated on key legislative issues Ramsey, Naifeh Proposed senior property tax freeze discuss League’s significantly impacts local revenues 2007 priorities BY CAROLE GRAVES the State Comptroller of the Treasury for As- TML Communications Director sessments, reported on the estimated impact on BY GAEL STAHL local governments and the potential adminis- Editor A proposed property tax freeze for senior trative difficulties when implementing the pro- and CAROLE GRAVES citizens will have significant financial impacts gram. on local governments, and in all likelihood on Fleming explained that the tax freeze is a Speaking to some 200 city officials from its residents, according to projections by the local option for counties and municipalities by across the state, Lt. Gov. Ron Ramsey and Tennessee Comptroller of the Treasury. ordinance or resolution. Taxes are frozen as of: House Speaker Jimmy Naifeh discussed sev- After enactment of the senior tax freeze, a • The date of adoption by the local govern- eral pieces of legislation that affect municipali- penny tax rate increase will no longer generate ment ties during the Tennessee Municipal League the same amount money prior to the tax freeze, • The tax year in which the taxpayer turns 65 Legislative Conference held in Nashville ear- and therefore will place a greater burden on all years old, or lier this month. Both discussed pending legis- other property owners under the age of 65, • The tax year in which taxpayers age 65 or lation to delay implementation of the stream- including that young family who just qualified over purchase their residence lined sales tax – one of TML’s top priorities.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • Title: P2P Networks for Content Sharing
    Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia (chd, sarana, raj)@cs.mu.oz.au ABSTRACT Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and Fasttrack are explored in details, and they are finally concluded with the comparison table in the last section. 1. INTRODUCTION Peer-to-peer (P2P) content sharing has been an astonishingly successful P2P application on the Internet. P2P has gained tremendous public attention from Napster, the system supporting music sharing on the Web. It is a new emerging, interesting research technology and a promising product base. Intel P2P working group gave the definition of P2P as "The sharing of computer resources and services by direct exchange between systems". This thus gives P2P systems two main key characteristics: • Scalability: there is no algorithmic, or technical limitation of the size of the system, e.g. the complexity of the system should be somewhat constant regardless of number of nodes in the system. • Reliability: The malfunction on any given node will not effect the whole system (or maybe even any other nodes). File sharing network like Gnutella is a good example of scalability and reliability.
    [Show full text]
  • Investigating the User Behavior of Peer-To-Peer File Sharing Software
    www.ccsenet.org/ijbm International Journal of Business and Management Vol. 6, No. 9; September 2011 Investigating the User Behavior of Peer-to-Peer File Sharing Software Shun-Po Chiu (Corresponding author) PhD candidate, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan & Lecture, Department of Information Management Vanung University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Huey-Wen Chou Professor, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Received: March 26, 2011 Accepted: May 10, 2011 doi:10.5539/ijbm.v6n9p68 Abstract In recent years, peer-to-peer file sharing has been a hotly debated topic in the fields of computer science, the music industry, and the movie industry. The purpose of this research was to examine the user behavior of peer-to-peer file-sharing software. A methodology of naturalistic inquiry that involved qualitative interviews was used to collect data from 21 university students in Taiwan. The results of the study revealed that a substantial amount of P2P file-sharing software is available to users. The main reasons for using P2P file-sharing software are to save money, save time, and to access files that are no longer available in stores. A majority of respondents use P2P file-sharing software to download music, movies, and software, and the respondents generally perceive the use of such software as neither illegal nor unethical. Furthermore, most users are free-riders, which means that they do not contribute files to the sharing process. Keywords: Peer to peer, File sharing, Naturalistic inquiry 1. Introduction In recent years, Peer-to-Peer (P2P) network transmission technology has matured.
    [Show full text]
  • Public Peer-To-Peer Filesharing Networks’ Evaluation
    PUBLIC PEER-TO-PEER FILESHARING NETWORKS’ EVALUATION J. Lloret Mauri1, B. Molina Moreno2, C. Palau Salvador3, M. Esteve Domingo4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n, Valencia, Spain [email protected], [email protected], [email protected], [email protected] ABSTRACT • Download speed: some internal P2P network, due to Since the recent appearance of P2P file-sharing networks, its internal behaviour, are optimal for downloading many Internet users have chosen this technology to search files of reduced size. Others, however, use for programs, films, songs, etc. Their number of users is multisplitting mechanisms and permit the download growing every day due to the attractive and interesting from multiple sources, making them suitable for content type that can be found and downloaded over these obtaining larger files. networks. In this article six public architectures are analyzed, Gnutella, FastTrack, Opennap, Edonkey, MP2P These parameters are responsible for an architecture and Soulseek, tracking their evolution during a week in becoming very popular or, on the other hand, terms of connected users, number of files and size of disappearing. The above factors can make a P2P network shared files per hour. The results will be compared and more attractive to users of a specific nation due to the discussed with previous measurements taken a year ago. utilization of a specific language or even social trends [7]. These data can be used to design new network models, to It is also interesting to distinguish between a P2P network calculate their performance or to optimize new network and P2P client, the development of which must not be parameters.
    [Show full text]
  • Click Here to View the Complete Study As
    American Enterprise Institute The Project on Fair Representation Edward Blum Visiting Fellow American Enterprise Institute 1150 Seventeenth St. NW Washington, DC 20036 202.862.5800 Executive Summary of the Bullock-Gaddie Report Voting Rights Progress in Tennessee By Edward Blum Tennessee was not covered by the original Voting Rights Act trigger, and has not subsequently fallen under preclearance. Relatively high rates of registration and participation in the state followed the elimination of the poll tax in the early 1950s, and by the early 1960s Tennessee had participation in elections more typical of a border south or midwestern state. But by 1980, the Tennessee advantage had been eliminated. For instance, black voter registration in Mississippi for the last quarter century exceeds that in Tennessee in every year except 1994 when the Tennessee advantage is an insignificant 0.1 percentage points. The state had a high degree of black voter participation in the early 1960s, but the advantage the state enjoyed over most of the rest of the South in black voter participation during the 1970s and 1980s have been lost. Tennessee ranks behind Mississippi and the median southern state among the seven originally subject to section 5 in terms of black voter participation. There is progress in the election of black officials, though the state Senate lags the state House in approaching proportionality for black representation. Most gains in black office holding since the 1980s have been in municipal government. Race structures vote choice under some circumstances. In both the most-heavily black urban county and the most-heavily black rural county, white voter preferences for Republicans up-ticket is pronounced.
    [Show full text]
  • I-69 Final Eis Document 6-28-06
    FHWA-TN-EIS-04-01F INTERSTATE 69, SECTION OF INDEPENDENT UTILITY #9 From the Interstate 55/MS State Route 304 Interchange in Hernando, Mississippi to the Intersection of U.S. 51 and State Route 385 in Millington, Tennessee DeSoto and Marshall Counties, Mississippi Shelby and Fayette Counties, Tennessee Final Environmental Impact Statement Submitted Pursuant to the National Environmental Policy Act of 1969 42 U.S.C. 4332(2) U.S. Department of Transportation Federal Highway Administration, Tennessee Department of Transportation and Mississippi Department of Transportation Cooperating Agency Tennessee Valley Authority U.S. Army Corps of Engineers, Memphis District U.S. Army Corps of Engineers, Vicksburg District U.S. Department of Interior, Fish and Wildlife Service This document identifies and assesses the environmental impacts associated with the construction of an interstate facility from Hernando, Mississippi to Millington, Tennessee. The project is a segment of Corridor 18, a Congressionally-designated High Priority transportation Corridor that will be designated as Interstate 69. Segments of the roadway are proposed for new locations, while other segments will follow existing interstates and state highways built to interstate standards. The length of the proposed improvement is approximately 44 miles. __________________ ______________________________________________________________ Date of Approval For Federal Highway Administration __________________ ______________________________________________________________ Date of Approval For
    [Show full text]
  • Phil Bredesen Governor OFFICE of the GOVERNOR State Capitol Nashville, TN 37243-0001 (615) 741-2001 TN.Gov/Governor PHILIP NORMAN BREDESEN (D) Governor of Tennessee
    PHIL BREDESEN Governor OFFICE OF THE GOVERNOR State Capitol Nashville, TN 37243-0001 (615) 741-2001 TN.gov/governor PHILIP NORMAN BREDESEN (D) Governor of Tennessee Phil Bredesen took office as Tennessee’s 48th governor on January 18, 2003, delivering on a promise to leave stale political debates behind and focus on achiev- ing real results for families. In November 2006, he was re-elected in a landslide victory – reportedly becoming the first governor in over a century to win all 95 counties in Tennessee. Bredesen’s strong voter mandate stems, in part, from his commitment to ac- countability and open government. During his first year in office, Bredesen threw open the doors to administrative budget hearings, allowing taxpayers to see for the first time the decisions that are made on how their money is spent. In year one, Bredesen worked with the General Assembly to manage the state through a fiscal crisis without raising taxes or cutting funding for education. By Bredesen’s fourth year in office, Tennessee had passed four balanced budgets, received improved rankings from national bond rating agencies, and raised its rainy day fund to a record high. Bredesen set clear priorities for the state, beginning with Tennessee’s number one priority – education. He raised teacher pay above the Southeastern average and expanded the state’s pilot Pre-K initiative into a program for four-year-olds across the state. Bredesen also led the General Assembly to increase education funding by a record $366.5 million. Under Bredesen’s leadership, Tennessee is raising standards in K-12 education by implementing a rigorous curriculum and specific, relevant skills that students will meet by the time they finish high school.
    [Show full text]
  • When Worlds Collide the Intersection of Constructivism, Learning Objects, and Peer-To-Peer Networking Technologies
    When Worlds Collide The intersection of constructivism, learning objects, and peer-to-peer networking technologies David Wiley (and hopefully others soon) v1.3, November 6, 2000 The current conception of learning objects There is a vision. A vision in which the creation of instruction can be automated; in which a computer program is capable of inspecting, selecting, and assembling learning objects in order to instantiate an instructional design. And why not? From automobiles to computer processors, humans have succeeded in automating some pretty complex assembly processes. Historically, the success of automation has relied on two factors. The first is an understanding of the assembly process, first discovered and performed by hand, then captured, studied, and expressed in a technology. The second factor is the standardization of component properties. The standardization of component properties creates a marketplace in which many vendors can create components competitively. The broad availability of inexpensive standardized components makes assembly processes easier to express in concrete terms. For example, once standard building construction components such as bricks and two-by-fours were widely available, it became easier to create detailed building plans. The construction metaphor is an apt one for the current discussion, as the current term “learning objects” is borrowed from the 1994 CEdMA working group entitled “Learning Architectures and Learning Objects” (LALO), in which the Architecture is the expression of the construction or assembly process (the blueprint), and the Objects are the standardized components (bricks and boards). But our concern is the facilitation of learning. In our case, the assembly plans are probabilistic instructional design theories and models, prescriptive methods likely to facilitate learning.
    [Show full text]
  • Praktische Untersuchung Und Vergleich Von Gnutella, Kazaa, Edonkey Und Soulseek
    Universität Karlsruhe (TH) Praktische Untersuchung und Vergleich von Gnutella, KaZaA, eDonkey und SoulSeek Studienarbeit am Institut für Telematik Prof. Dr.rer.nat. Martina Zitterbart Fakultät für Informatik Universität Karlsruhe (TH) von cand. inform. Christian Wagner Betreuer: Prof. Dr.rer.nat. Martina Zitterbart Dr.rer.nat Thomas Fuhrmann Dipl.-Ing. Kendy Kutzner Tag der Anmeldung: 21. Juli 2003 Tag der Abgabe: 1. Dezember 2003 Institut für Telematik Ich erkläre hiermit, dass ich die vorliegende Arbeit selbstständig verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel verwendet habe. Karlsruhe, den 1. Dezember 2003 Inhaltsverzeichnis 1. Einleitung ..................... 1.1 Gliederung der Arbeit....................................................................................... 1 " #to-Peer Netze ............................................................................. & 2.1 Geschichte ........................................................................................................ 3 2.2 Definition.......................................................................................................... 4 2.3 Modelle von P2P-Netzen.................................................................................. 5 2.3.1 P2P-Systeme mit einem zentralen Server................................................. 5 2.3.2 Dezentrale P2P-Systeme........................................................................... 7 2.3.3 Hybride P2P-Systeme..............................................................................
    [Show full text]