Course Registration and Result Processing System in Computer Science Department University of Nigeria, Nsukka

Total Page:16

File Type:pdf, Size:1020Kb

Course Registration and Result Processing System in Computer Science Department University of Nigeria, Nsukka COURSE REGISTRATION AND RESULT PROCESSING SYSTEM IN COMPUTER SCIENCE DEPARTMENT UNIVERSITY OF NIGERIA, NSUKKA BY AMAH MARYLYN CHIDIMMA PG/MSc/12/62093 Being an M.Sc project submitted in partial fulfillment of the requirements for the award of Master’s degree in Computer Science of the University of Nigeria. SUPERVISOR: DR M.C. OKORONKWO DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF NIGERIA, NSUKKA JUNE, 2015 i CERTIFICATION I hereby declare that the work presented herein was done by me, and not a third party. Should I be convicted of having cheated in this work, I shall accept the verdict of the university. AMAH, MARYLYN CHIDIMMA. PG/MSc/12/62093 ii APPROVAL PAGE This Project is approved for submission DR M. C. OKORONKWO iii DEDICATION I dedicate this research work to my loving mother Mrs Elizabeth Amah who amidst all toils remained very supportive to the project work. Her consistent and warm advice in the face of trouble pushed me through. Mum may God Bless You. iv ACKNOWLEDGEMENT I sincerely send my profound gratitude to Almighty God for his goodness. In fact, God used this research process to expose me to his unfathomable saving graces. I earnestly send warm appreciation to all the staff of the Computer Science Department UNN. They in no small measure contributed to the realization of this project. The framework of the project, the system analysis and the data collation are all contributions from various lecturers of the department. My most profound gratitude goes to my Supervisor Dr M.C. Okoronkwo for his commitment and dedication towards making this research a success. Doc! I’m immensely grateful. I will not fail to thank a loving brother and a friend Mr Emma Ukekwe for making this project a reality. Mr. Emma went extra mile to develop modules that were implemented in the project. Alongside are Engr. Collyns Udanor, Dr. (Mrs.) Ebem, Mr. Chinwuko and others. I pray the good Lord to reward you abundantly. I use this medium also to thank my family members especially my mum, Mrs Elizabeth Amah, Mr Innocent Ike and Revd Christian Amah for their financial support. To my friends and well wishers Revd Fr Fidelis Ajamugha, Honorable Collyns Owhonda, Honorable Ibrahim Adeoti and Mr. MackJames Ukwueje who supported me morally and financially in the cause of this project. I am immensely grateful to you all. Remain Blessed. v ABSTRACT Course Registration and Result processing system form the key activities in the life span of a student. The demand for effective and efficient result computation and output lead to the production of the automated result process. The digitalized process provides the capabilities of centralized repository for storage, management and dissemination of result information to those concerned. A study into the manual process reveals the inefficiencies and the rigorous nature of course registration and result processing, therefore the existing manual process was analyzed and converted into an automated system. The manual activities was modeled with an object-oriented methodology and the system was implemented with PHP(hypertext processor), a scripting language and MYSQL database management systems. It provides a robust database that generates various reports that is relevant to the department. The result of this research work is a system that automates the course registration and examination result processing for the Department of Computer Science, which can be used in any department of most universities in Nigeria. vi TABLE OF CONTENTS LIST OF ITEMS PAGE NUMBER Title Page …………………………………………………………. i Certification page …………………………………………………. ii Approval Page ..…………………………………………………... iii Dedication …………………………………………………………. iv Acknowledgement Page …………………………………………... v Abstract …………………………………………………………….. vi Table of Contents.…………………………………………………... vii List of Figures……………………………………………………..... ix List of Tables………………………………………………………... xi Chapter 1: Introduction ………………………………………… 1 1.0 Introduction …………………………………………….. 1 1.1 Statement of Problem .………………………………….. 3 1.2 Objectives ……………………………………………… . 4 1.3 Scope of the Study ……………………………………….. 4 1.4 Significance of the Study…………………………………. 4 Chapter 2: Literature Review ......................................................... 5 2.0 Introduction……………………………………………….. 5 2.1 Theoretical Background …………………………………... 5 2.2 Review of Related Literature………………………………. 10 vii Chapter 3: Systems Analysis and Design…………………………. 21 3.0 Introduction ……………………………………………… 21 3.1 Analysis of the Existing System………………………….. 22 3.2 Description of the Proposed System……………………… 25 3.3 Design of the Proposed System…………………………... 27 3.3.1 Design Methodology……………………………... 27 3.3.2 Justification for the use of the design methodology. 27 3.3.3 Design tool………………………………………… 28 3.3.4 Database design…………………………………… 32 3.3.5 Input and output design…………………………… 35 3.4 Systems Architecture………………………………………. 45 Chapter 4: System Implementation………………………………… 46 4.0 Introduction………………………………………………… 46 4.1 Development Environment…………………………………. 46 4.2 Choice of Programming Language used……………………. 47 4.3 Implementations Architecture………………………………. 47 4.4 Software Testing……………………………………………. 48 4.5 Documentation……………………………………………… 49 4.5.1 Software Modules……………………………...49 4.5.2 User Guide/Manual…………………………… 52 4.5.3 Software Installation………………………… 54 4.5.4 Source Code Listing……………………….......54 Chapter 5: Summary and Conclusion………………………………. 55 5.0 Summary……………………………………………………. 55 5.1 Conclusion………………………………………………….. 56 5.2 Recommendations………………………………………….. 56 References Appendices viii LIST OF FIGURES Figure 3.1 The Use Case Diagram of the System - - - 28 Figure 3.2 The Class Diagram - - - - - 31 Figure 3.3 Screenshot of the Database tables - - - 32 Figure 3.4 The Student’s Login design Form - - - 35 Figure 3.5 Admin Login design Form - - - - 35 Figure 3.6 Student’s Course Registration design Form - - 36 Figure 3.7 Design form of an ongoing course registration - 37 Figure 3.8 Design input form for uploading student’s result - 38 Figure 3.9 Design input form for adding courses - - - 39 Figure 3.10 Design of the Course Registration Printout- - - 40 Figure 3.11 Design of the View Result Form- - - - 41 Figure 3.12 Design of the Semester Transcript Result - - 41 Figure 3.13 Design of the Lecturer’s Grade Sheet - - - 42 Figure 3.14 Design of the Official Semester Broadsheet - - 43 Figure 3.15 Design of the Official Cumulative Broadsheet- - 44 Figure 3.16 System Architecture- - - - - - 45 Figure 4.1 Design of the Implementation Architecture - - 47 Figure 4.2 Screenshot of the Homepage - - - - 60 Figure 4.3 Screenshot of the Admin Login Page - - - 61 Figure 4.4 Screenshot of the Add Course Form - - - 61 Figure 4.5 Screenshot of Uploaded Result file from excel- - 62 Figure 4.6 Screenshot of the Course Registration Form - - 62 Figure 4.7 Screenshot of the Error Registration Page - - 63 ix Figure 4.8 Screenshot of the Semester Broadsheet Report - 63 Figure 4.9 Screenshot of the Lecturer’s Grade Sheet - - 64 Figure 4.10 Screenshot of the Class List - - - - 65 Figure 4.11 Screenshot of the Semester Transcript Report - 65 Figure 4.12 Screenshot of the Student’s CGPA Report - - 66 x LIST OF TABLES Table 3.1 Sample Table for Calculating Student’s GPA- 24 Table 3.2 Student’s Bio-data Table - - - - 33 Table 3.3 Admin Table - - - - - 33 Table 3.4 Course Table - - - - - 33 Table 3.5 Course Registration Table - - - 34 Table 3.6 Result Table - - - - - - 34 xi CHAPTER 1: INTRODUCTION 1.0 INTRODUCTION Automated course registration and exam processing system is a software that facilitates the students course registration and processing of examination result. It will build in an automated information system capability that will ease the stress and enhance all the activities involved in course registration and result processing. The occurrence of examination and assessment irregularities can seriously damage public confidence in the validity and legitimacy of examination and assessment results and should be dealt with as a matter of urgency within the judicial framework established for this purpose[12]. There are different computer programs in different tertiary institutions for computing examination results. However, beyond examination result computation, not many programs in use provide multi- level aggregated data of student population and academic progress at various stages of studentship. The need for data use to inform administrative decisions in tertiary institutions have been emphasized for the purpose of better planning[1]. Almost every section of the educational system requires information processing. With the deployment of a good information system, wear and tear occasioned during data retrieval and handling, and sometimes loss is greatly minimized. Data sharing is less difficult and reproduction becomes a lot more cheaper. Furthermore, information system when employed to the educational sector, prompts the following:- prompt access to students’ personal and course information, instant student information updating, automatic computation of the Grade Point Average (GPA), monitoring of failed courses, quick production of result, storing course information such as course code, course description, course unit and scores for the xii purpose of GPA computation, and producing user-friendly data entry screens for ease of use. It is unfortunate that most universities in Nigeria still adapt the manual system of course registration and examination result processing. The errors associated with the existing manual method of results computation make it not only desirable
Recommended publications
  • Data Types Are Values
    Data Types Are Values James Donahue Alan Demers Data Types Are Values James Donahue Xerox Corporation Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, California 94304 Alan Demers Computer Science Department Cornell University Ithaca, New York 14853 CSL -83-5 March 1984 [P83-00005] © Copyright 1984 ACM. All rights reserved. Reprinted with permission. A bst ract: An important goal of programming language research is to isolate the fundamental concepts of languages, those basic ideas that allow us to understand the relationship among various language features. This paper examines one of these underlying notions, data type, with particular attention to the treatment of generic or polymorphic procedures and static type-checking. A version of this paper will appear in the ACM Transact~ons on Programming Languages and Systems. CR Categories and Subject Descriptors: 0.3 (Programming Languages), 0.3.1 (Formal Definitions and Theory), 0.3.3 (Language Constructs), F.3.2 (Semantics of Programming Languages) Additional Keywords and Phrases: data types, polymorphism XEROX Xerox Corporation Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, California 94304 DATA TYPES ARE VALVES 1 1. Introduction An important goal of programming language research is to isolate the fundamental concepts of languages, those basic ideas that allow us to understand the relationship among various language features. This paper examines one of these underlying notions, data type, and presents a meaning for this term that allows us to: describe a simple treatment of generic or polymorphic procedures that preserves full static type-checking and allows unrestricted use of recursion; and give a precise meaning to the phrase strong typing, so that Language X is strongly typed can be interpreted as a critically important theorem about the semantics of the language.
    [Show full text]
  • Ignificant Scientific Progress Is Increasingly the Result of National Or Confine Hot Plasma
    ADVERTISEMENT FEATURE LIGHTING THE WAY FOR TOMORROW ignificant scientific progress is increasingly the result of national or confine hot plasma. Its maximum repeatable plasma current can reach 1MA, S international collaboration. A particular strength of the University currently the highest in the world, while its diverted plasma discharge is the of Science and Technology of China (USTC) is its powerful facilities world’s longest. designed specifically to cater for large-scale science, which will help form In 2017, EAST achieved more than 100 seconds of steady-state, the bedrock of China’s second Comprehensive National Science Center, high-confinement mode (H-mode) operation, a world record. This has based in Hefei. implications for the International Thermonuclear Experimental Reactor (ITER), a huge international effort, in which China is a participant, aiming to Accelerating research with the Hefei Light Source build the infrastructure to provide clean nuclear fusion power. USTC has proven expertise in major national projects. With USTC’s support, International collaborations through EAST have already included a joint China’s synchrotron radiation accelerator was officially launched in 1983, experiment on steady-state operation with the DIII-D team of defence becoming the country’s first dedicated VUV and soft X-ray synchrotron contractor General Atomics in the United States, joint conferences and radiation facility — the Hefei Light Source (HLS). projects on plasma-wall interactions with Germany, and joint efforts with To better serve growing demand, phase II of the HLS (HLS-II) was Russia to translate research results. launched in 2010. In this phase a linear accelerator, an 800MeV storage ring and five beamline stations were built, all of which, plus the top-off operation More fusion power: Keda Torus eXperiment mode, have significantly improved the stability, brightness and service life Another device harnessing fusion power is USTC’s Keda Torus eXperiment of the light source.
    [Show full text]
  • Figureseer: Parsing Result-Figures in Research Papers
    FigureSeer: Parsing Result-Figures in Research Papers Noah Siegel, Zachary Horvitz, Roie Levin, Santosh Divvala, and Ali Farhadi Allen Institute for Artificial Intelligence University of Washington http://allenai.org/plato/figureseer Fig. 1: FigureSeer is an end-to-end framework for parsing result-figures in research papers. It automatically localizes figures, classifies them, and analyses their content (center). FigureSeer enables detailed indexing, retrieval, and redesign of result-figures, such as highlighting specific results (top-left), reformatting results (bottom-left), com- plex query answering (top-right), and results summarization (bottom-right). Abstract. `Which are the pedestrian detectors that yield a precision above 95% at 25% recall?' Answering such a complex query involves identifying and analyzing the results reported in figures within several research papers. Despite the availability of excellent academic search en- gines, retrieving such information poses a cumbersome challenge today as these systems have primarily focused on understanding the text content of scholarly documents. In this paper, we introduce FigureSeer, an end- to-end framework for parsing result-figures, that enables powerful search and retrieval of results in research papers. Our proposed approach au- tomatically localizes figures from research papers, classifies them, and analyses the content of the result-figures. The key challenge in analyzing the figure content is the extraction of the plotted data and its association with the legend entries. We address this challenge by formulating a novel graph-based reasoning approach using a CNN-based similarity metric. We present a thorough evaluation on a real-word annotated dataset to demonstrate the efficacy of our approach. 1 Computer Vision for Scholarly Big Data Academic research is flourishing at an unprecedented pace.
    [Show full text]
  • A National Prospective Study of Pornography Consumption and Gendered Attitudes Toward Women
    Sexuality & Culture (2015) 19:444–463 DOI 10.1007/s12119-014-9264-z ORIGINAL PAPER A National Prospective Study of Pornography Consumption and Gendered Attitudes Toward Women Paul J. Wright • Soyoung Bae Published online: 23 December 2014 Ó Springer Science+Business Media New York 2014 Abstract Whether consuming pornography leads to gendered attitudes toward women has been debated extensively. Researchers have primarily studied pornog- raphy’s contribution to gendered sexual attitudes such as rape myth acceptance and sexual callousness toward women. The present study explored associations between pornography consumption and nonsexual gender-role attitudes in a national, two- wave panel sample of US adults. Pornography consumption interacted with age to predict gender-role attitudes. Specifically, pornography consumption at wave one predicted more gendered attitudes at wave two for older—but not for younger— adults. Gender-role attitudes at wave one were included in this analysis. Pornog- raphy consumption was therefore associated with interindividual over time change in older adults’ gendered attitudes toward women. Older adults’ attitudes toward nonsexual gender roles are generally more regressive than those of younger adults. Thus, this finding is consistent with Wright’s (Commun Yearb 35:343–386, 2011) script acquisition, activation, application model (3AM) of media socialization, which posits that attitude change following media exposure is more likely for viewers’ whose preexisting behavioral scripts are less incongruous with scripts for behavior presented in mass media depictions. Contrary to the perspective that selective exposure explains associations between pornography consumption and content-congruent attitudes, gender-role attitudes at wave one did not predict por- nography consumption at wave two.
    [Show full text]
  • Introduction
    Introduction Pornography is a social toxin that destroys relationships, steals innocence, erodes compassion, breeds violence, and kills love. The issue of pornography is ground zero for all those concerned for the sexual health of our loved ones, communities, and society as a whole. As the following points illustrate, the breadth and depth of pornography’s influence on popular culture has created an intolerable situation that impinges on the freedoms and wellbeing of countless individuals. ▪ Young Age of First Exposure: A study of university students found that 93% of boys and 62% of girls had seen Internet pornography during adolescence. The researchers reported that the degree of exposure to paraphilic and deviant sexual activity before age 18 was of “particular concern.”1 Another sample has shown that among college males, nearly 49% first encountered pornography before age 13.2 ▪ Pervasive Use: A nationally representative survey found that 64% of young people, ages 13–24, actively seek out pornography weekly or more often.3 A popular tube site reports that in 2016, people watched 4.6 billion hours of pornography on its site alone;4 61% of visits occurred via smartphone.5 Eleven pornography sites are among the world’s top 300 most popular Internet sites. The most popular such site, at number 18, outranks the likes of eBay, MSN, and Netflix.6 1Chiara Sabina, Janis Wolak, and David Finkelhor, “The Nature and Dynamics of Internet Pornography Exposure for Youth,” CyberPsychology & Behavior 11, no. 6 (2008): 691–693. 2Chyng Sun, Ana Bridges, Jennifer Johnson, and Matt Ezzell, “Pornography and the Male Sexual Script: An Analysis of Consumption and Sexual Relations,” Archives of Sexual Behavior 45, no.
    [Show full text]
  • Pornography Consumption and Satisfaction: a Meta-Analysis (2017)
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314197900 Pornography Consumption and Satisfaction: A Meta-Analysis: Pornography and Satisfaction Article in Human Communication Research · March 2017 DOI: 10.1111/hcre.12108 CITATIONS READS 0 76 4 authors, including: Robert Tokunaga University of Hawaiʻi at Mānoa 32 PUBLICATIONS 963 CITATIONS SEE PROFILE All content following this page was uploaded by Robert Tokunaga on 07 April 2017. The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document and are linked to publications on ResearchGate, letting you access and read them immediately. Human Communication Research ISSN 0360-3989 ORIGINAL ARTICLE Pornography Consumption and Satisfaction: A Meta-Analysis Paul J. Wright1, Robert S. Tokunaga2, Ashley Kraus1, & Elyssa Klann3 1 The Media School, Indiana University, Bloomington, IN 47405, USA 2 Department of Communicology, University of Hawaii, Manoa, HI 96822, USA 3 School of Education, Indiana University, Bloomington, IN 47405, USA A classic question in the communication literature is whether pornography consumption affects consumers’ satisfaction. The present paper represents the first attempt to address this question via meta-analysis. Fifty studies collectively including more than 50,000 par- ticipants from 10 countries were located across the interpersonal domains of sexual and relational satisfaction and the intrapersonal domains of body and self satisfaction. Pornog- raphy consumption was not related to the intrapersonal satisfaction outcomes that were studied. However, pornography consumption was associated with lower interpersonal satis- faction outcomes in cross-sectional surveys, longitudinal surveys, and experiments. Associ- ations between pornography consumption and reduced interpersonal satisfaction outcomes were not moderated by their year of release or their publication status.
    [Show full text]
  • Reflections on the Growth and Development of Islamic Philosophy
    Ilorin Journal of Religious Studies, (IJOURELS) Vol.3 No.2, 2013, Pp.169-190 REFLECTIONS ON THE GROWTH AND DEVELOPMENT OF ISLAMIC PHILOSOPHY Abdulazeez Balogun SHITTU Department of Philosophy & Religions, Faculty of Arts, University of Abuja, P. M. B. 117, FCT, Abuja, Nigeria. [email protected], [email protected] Phone Nos.: +2348072291640, +2347037774311 Abstract As a result of secular dimension that the Western philosophy inclines to, many see philosophy as a phenomenon that cannot be attributed to religion, which led to hasty conclusion in some quarters that philosophy is against religion and must be seen and treated as such. This paper looks at the concept of philosophy in general and Islamic philosophy in particular. It starts by examining Muslim philosophers’ understanding of philosophy, and the wider meanings it attained in their philosophical thought, which do not only reflect in their works but also manifest in their deeds and lifestyles. The paper also tackles the stereotypes about the so-called “replication of Greek philosophy in Islamic philosophy.” It further unveils a total transformation and a more befitting outlook of Islamic philosophy accorded the whole enterprise of philosophy. It also exposes the distinctions between the Islamic philosophy and Western philosophy. Keywords: Islam, Philosophy, Reason, Revelation Introduction From the onset of the growth of Islam as a religious and political movement, Muslim thinkers have sought to understand the theoretical aspects of their faith by using philosophical concepts. The discussion of the notion of meaning in Islamic philosophy is heavily influenced by theological and legal debates about the interpretation of Islam, and about who has the right to pronounce on interpretation.
    [Show full text]
  • ICD-10 CM Official Guidelines for Coding and Reporting FY 2019
    ICD-10-CM Official Guidelines for Coding and Reporting FY 2019 (October 1, 2018 - September 30, 2019) Narrative changes appear in bold text Items underlined have been moved within the guidelines since the FY 2018 version Italics are used to indicate revisions to heading changes The Centers for Medicare and Medicaid Services (CMS) and the National Center for Health Statistics (NCHS), two departments within the U.S. Federal Government’s Department of Health and Human Services (DHHS) provide the following guidelines for coding and reporting using the International Classification of Diseases, 10th Revision, Clinical Modification (ICD-10-CM). These guidelines should be used as a companion document to the official version of the ICD-10- CM as published on the NCHS website. The ICD-10-CM is a morbidity classification published by the United States for classifying diagnoses and reason for visits in all health care settings. The ICD-10-CM is based on the ICD-10, the statistical classification of disease published by the World Health Organization (WHO). These guidelines have been approved by the four organizations that make up the Cooperating Parties for the ICD-10-CM: the American Hospital Association (AHA), the American Health Information Management Association (AHIMA), CMS, and NCHS. These guidelines are a set of rules that have been developed to accompany and complement the official conventions and instructions provided within the ICD-10-CM itself. The instructions and conventions of the classification take precedence over guidelines. These guidelines are based on the coding and sequencing instructions in the Tabular List and Alphabetic Index of ICD-10-CM, but provide additional instruction.
    [Show full text]
  • How Do I Know Whether to Trust a Research Result?
    HOW DO I KNOW WHETHER TO TRUST A RESEARCH RESULT? MARTIN SHEPPERD, BRUNEL UNIVERSITY LONDON, UK Magazines such as this, together with many journals are filled with articles presenting findings, new methods, tools and all kinds of software engineering advice. But how can we know if we can trust a research result? Or to put it another way, should the research influence decision making? For practitioners these are important questions. And it will come as no kind of surprise in a column such as this that the role of evidence is emphasised. It helps us decide whether the research can indeed be trusted. It is gratifying therefore to see that empirical evaluation is increasingly becoming a tool for modern software engineering researchers. So that should be the end of the matter. Look at the evi- dence. Unfortunately it would Inconsistent Results in Software Engineering seem not to be quite that sim- The following are three examples of systematic litera- ple. In many situations the ture reviews that have failed to find `conclusion stabil- evidence may be contradictory ity' [9] followed by a large experiment comprising many or at least equivocal. Fur- individual tests. thermore, this can happen even Jørgensen [5] reviewed 15 studies comparing model- when one examines the body based to expert-based estimation. Five of those studies of evidence using a systematic supported expert-based methods, five found no differ- literature review to identify all ence, and five supported model-based estimation. relevant studies and then meta- Mair and Shepperd [8] compared regression to analogy analysis (that is statistical tech- methods for effort estimation and similarly found con- niques to combine multiple re- flicting evidence.
    [Show full text]
  • The Scientific Method the Scientific Method Is a Process Used by Scientists to Study the World Around Them
    The Scientific Method The scientific method is a process used by scientists to study the world around them. It can also be used to test whether any statement is accurate. You can use the scientific method to study a leaf, a dog, an ocean, or the entire Universe. We all have questions about the world. The scientific method is there to test if your answer is correct. You could ask, "Why do dogs and cats have hair?" One answer might be that it keeps them warm. A good scientist would then come up with an experiment to test whether the statement was accurate. BOOM! It's the scientific method in action. 1. IDENTIFY THE PROBLEM The scientific method starts with identifying a problem and forming a question that can be tested. A scientific question can be answered by making observations with your five senses and gathering evidence. The question you ask needs to be something you can measure, so you can compare results you are interested in. For example, “How does fertilizer affect plant growth?” would be a testable scientific question. It’s important to do background research to find out what’s already written about your question before starting your experiment. 2. FORM A HYPOTHESIS The second step in the scientific method is to form a hypothesis. A hypothesis is a possible explanation for a set of observations or an answer to a scientific question. A hypothesis must be testable and measurable. This means that researchers must be able to carry out investi- gations and gather evidence that will either support or disprove the hypothesis.
    [Show full text]
  • Designing an Experiment
    H OW CAN WE U NDERSTAND OUR WATER R ESOURCES? Designing an Experiment he information in this chapter is a Every experiment has specific parts that can short summary of some topics that are be identified by students. These different Tcovered in depth in the book Students parts can all be checked off during the design and Research written by Cothron, Giese, and phase of an experiment. If all the parts of the Rezba. See the end of this chapter for full experiment have been accounted for and information on obtaining this book. The book considered carefully before the experiment is is an invaluable resource for any middle or started it is more likely to be a successful and high school science teacher. beneficial experience for the student. An experiment starts and finishes with the THE DIFFERENT PARTS OF AN EXPERIMENT factors that change during the experiment. There are different types of practical activities These are the variables. The experimenter will that can be carried out either by working purposely change one of the variables; this scientists or by science students. Only some of is the independent variable or manipulated these would strictly be considered experiments. variable. The second variable changes in When younger students begin learning how to response to the purposeful change; this is the carry out simple experiments the experiment dependent variable or responding variable. is often referred to as a “fair test.” The experi- For example, if students change the wing ment can be a test of the effect of different shape of a paper airplane and measure the actions carried out by the experimenter or a resulting time that the plane stays in flight, test comparing differing conditions as some the independent variable would be the wing action is carried out.
    [Show full text]
  • How to Use the ICF: a Practical Manual for Using the International Classification of Functioning, Disability and Health (ICF)
    How to use the ICF A Practical Manual for using the International Classification of Functioning, Disability and Health (ICF) Exposure draft for comment October 2013 World Health Organization Geneva How to use the ICF A Practical Manual for using the International Classification of Functioning, Disability and Health (ICF) Exposure draft for comment Suggested citation World Health Organization. How to use the ICF: A practical manual for using the International Classification of Functioning, Disability and Health (ICF). Exposure draft for comment. October 2013. Geneva: WHO Contents Preface to the ICF Practical Manual 1 Why should I read this Practical Manual? 1 What will I learn from reading this Practical Manual? 1 How is this Practical Manual organised? 2 Why was this Practical Manual written? 2 1 Getting started with the ICF 3 1.1 What is the ICF? 3 1.2 How can I use the ICF? 7 1.3 What does the ICF classify? 12 1.4 How does a classification such as the ICF relate to electronic records? 14 2 Describing functioning 15 2.1. How can I use the ICF to describe functioning? 15 2.2 What is the ICF coding structure? 18 2.3. How can I describe Body Functions and Body Structures using the ICF coding structure? 20 2.4 How can I describe Activities and Participation using the ICF? 22 2.5 How can I describe the impact of the Environment using the ICF? 25 2.6. How can I use the personal factors? 26 2.7 How can I use the ICF with existing descriptions of functioning? 27 3 Using the ICF in clinical practice and the education of health professionals 29 3.1 Can the ICF be used to enhance the training of health professionals? 29 3.2 How can the ICF be used in the education of health professionals? 31 3.3 How can I use the ICF to describe functioning in clinical practice? 34 3.4.
    [Show full text]