scholarly journals The Use of Computer Based Testing Method for the Conduct of Examinations at the University of Ilorin

2012 ◽  
Vol 2 (3) ◽  
pp. 68 ◽  
Author(s):  
A.T. Alabi ◽  
A. O. Issa ◽  
R. A. Oyekunle

This paper presents an overview of the application of Information and Communication Technology in the conduct of post-UTME and other examinations at the University of Ilorin. It provides a brief historical background to the practice at the University, dating back to 2005 when it started by adopting the Pen-and-Paper Testing up to the present practice, using the Computer-Based Testing method. The paper underscored the challenges associated with the former practice, thus justifying the introduction of the latter, thereby justifying it. In conclusion, this paper advocates the widespread adoption of CBT method for the conduct of not just the post-UTME examinations, but also other University-based examinations with large population of students in Nigerian Universities owing to the success story of the University of Ilorin.

2006 ◽  
Vol 5 ◽  
pp. 2-5
Author(s):  
Georg Marckmann ◽  
Kenneth W Goodman

Computer-based information and communication technologies continue to transform the delivery of health care and the conception and scientific understanding of the human body and the diseases that afflict it. While information technology has the potential to improve the quality and efficiency of patient care, it also raises important ethical and social issues. This IRIE theme issue seeks to provide a forum to identify, analyse and discuss the ethical and social issues raised by various applications of information and communication technology in medicine and health care. The contributions give a flavour of the extraordinarily broad landscape shaped by the intersection of medicine, computing and ethics. In fact, their diversity suggests that much more work is needed to clarify issues and approaches, and to provide practical tools for clinicians.


2019 ◽  
Vol 9 (1) ◽  
pp. 69-74
Author(s):  
A. Naseer ◽  
B. Mini Devi

Rapid changes in information and communication technology require application of managerial techniques, human resource management and integration of several technologies in library and information Centers. The present research aims at studying the extent of job enlargement in selected eight state university libraries in Kerala. Data of the study was gathered from a total of 266 qualified and permanent library and information science professionals. Analysis of data was done using SPSS and Micro Soft excel. The important finding of the research is that there is no significant level of job enlargement among library and information science professionals. It also finds that job enlargement situation of libraries in the universities in Kerala is low and different. The study reveals that there is significant variation in the level of job enlargement among the university libraries in Kerala. The highest level of job enlargement is found in Sree Sankaracharya University of Sanskrit, Kalady followed by Kannur University.


2017 ◽  
Vol 10 (10) ◽  
pp. 102
Author(s):  
Alaa A. Asowayan ◽  
Sammar Y. Ashreef ◽  
Haya S. Aljasser

Several changes have occurred over the past century in the education system of Saudi Arabia. The changes have largely been associated with the fact that in the 21st century, information and communication technology is highly applied in the learning process, thereby leading to a major transformation of the process. The application of information and communication technology has also transformed interactions and rapidly changed the learning process, giving a new meaning to social interactions. Enterprises that operate in the information age enjoy information interchange, collaboration, and adoption and application of innovative tendencies and shared decision-making. Students’ demands have changed in that they no longer hope for middle-class success or application of routine skills, but they measure success in terms of ability to share, communicate and apply information to arrive at solutions to complex problems. The changing learning environment requires that the teaching staff learns new tendencies and skills that they can apply to cope with the ever-changing learner and general society expectations. Teachers’ competence at work is measured in terms of their ability to improve the power of technology in enhancing creation of new knowledge. Therefore, leaders of teacher education programs are responsible for developing sustainable programs that allow for teacher education. Training has become part of the ethics of the teaching profession, and members of the teaching staff must be ready for training throughout their profession. This paper will shed light on the training program of faculty members in two well-known universities in the United States: the University of Maryland & George Mason University, as an attempt to compare the above educational establishments with the conditions of training of faculty members of King Saud University in Saudi Arabia to suggest a training plan to develop training programs in KSU. It is time when leaders in educator preparation should critically reexamine their roles in the 21st century knowledge and skills whose landscape has largely changed.


2020 ◽  
Vol 12 (2) ◽  
pp. 211-224 ◽  
Author(s):  
Manel Jiménez-Morales ◽  
Marta Lopera-Mármol ◽  
Alan Salvadó Romero

Information and Communication Technology (ICT) are key elements in the educational process of teens. Consequently, efforts should be made to integrate ICT into educational plans and policies. Based on this premise, HEBE has been launched – a study on youth empowerment that was funded by the Spanish Ministry of Economy and Competitiveness and carried out by five universities: the University of Girona, the Autonomous University of Madrid, the Autonomous University of Barcelona, the University of Barcelona and Pompeu Fabra University. The project, based on media literacy and transmedia skills, involves the creation of an interactive documentary (i-doc). The HEBE i-doc: digital prints relates the experiences and reflections during the maturation stage of six youngsters with different cultural, educational, family and social backgrounds and profiles. This exploration was carried out through their own audio-visual creations, in a life story format. The i-doc has the dual purpose of (1) devising a methodology based on digital ethnography, and (2) creating an interactive platform for sharing experiences and promoting the visibility of these issues via citizen science.


Al-TA'DIB ◽  
2021 ◽  
Vol 14 (1) ◽  
pp. 1
Author(s):  
Nurdin Nurdin ◽  
Laode Anhusadar ◽  
Herlina Herlina ◽  
Sitti Nurhalimah

This qualitative case study aims to review and analyze the condition of the information and communication technology (ICT) facilities for the implementation of the computer-based national examination (UNBK), the principal's strategies in implementing UNBK, and the obstacles in implementing UNBK at one of junior high schools in Kota Kendari, Southeast Sulawesi, Indonesia. Data were collected by interview, observation and documentation. The result of data analysis revealed the lack of facilities for the implementation of UNBK in the school. The principal's strategies in implementing UNBK in the school cover various aspects, such as facilities and infrastructure, human resources, and pupil affairs. Two obstacles emerged i.e., technical and non-technical.


Author(s):  
Francois Venter

Professor Dana van der Merwe of the University of South Africa (UNISA) delves into the impact of the information era on the law, drawing distinctions with the aid of legal philosophy between data, information and intelligence. o    In similar vein Dr Tanya du Plessis of the University of Johannesburg investigates the impact of information and communication technology on the practice of law and knowledge management in law firms. o    Professor Anneliese Roos of UNISA follows with an in-depth and comparative exposition of statutory data protection with specific reference to the legislation of New Zealand, illustrating important disadvantages for participants in the information technology arena in South Africa.


2008 ◽  
Vol 4 (3) ◽  
pp. 29-34 ◽  
Author(s):  
Areti Valasidou ◽  
Despoina Bousiou-Makridou

The aim of this paper is to describe the results of a research that took place in order to examine the opinion and impact of Information and Communication Technology to undergraduate students of University of Macedonia. The research was conducted with two main purposes. The first purpose is to investigate how familiar are the students of international and political studies with the use of ICTs on and off campus. The second purpose of the research is to examine the possible relationship between the use of ICTs and the gender and the students performance (marks) at the Introduction to Computers module that is part of their programme of studies. The results revealed that male students are more favourable toward ICT usage and the students that scored high at the module Introduction to Computers were more likely to find that the use of ICTs help them at their studies with various ways. The university academic and administrative personnel is highly recommended to find ways in order the students to be motivated and maintain positive students attitudes to use ICTs. Thus, the students will find it very helpful during their studying or even a supplement to other teaching activities.


2018 ◽  
Vol 1 (2) ◽  
pp. 118-124
Author(s):  
Arif Hidayat ◽  
Ismail Puji Saputra

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.


Sign in / Sign up

Export Citation Format

Share Document