Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Education

Student Usage Patterns And Perceptions For Differentiated Lab Exercises In An Undergraduate Programming Course, Heng Ngee Mok May 2012

Student Usage Patterns And Perceptions For Differentiated Lab Exercises In An Undergraduate Programming Course, Heng Ngee Mok

Research Collection School Of Computing and Information Systems

Differentiated instruction in the form of tiered take-home lab exercises was implemented for students of an undergraduate-level programming course. This paper attempts to uncover the perceptions and usage patterns of students toward these new lab exercises using a comprehensive survey. Findings reveal that these tiered exercises are generally very well received and preferred over their traditional "one size fits all" counter-parts. Although the study does not show that tiered exercises have improved proÞciency or scores, it does seem to indicate higher student engagement and motivation levels. Based on the survey results, a list of recommendations is put forth for the …


Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan Apr 2012

Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan

Research Collection School Of Computing and Information Systems

This paper describes how a generic computer laboratory equipped with 52 workstations is set up for teaching IT-related courses and other general purpose usage. The authors have successfully constructed a lab management system based on decentralised, client-side software virtualisation technology using Linux and free software tools from VMware that fulfils the requirements of fast "switch over" time between consecutive lab sessions, the ability to support a wide range of IT courses and usage scenarios, low cost, easy maintenance, and a sandboxed environment for potentially disruptive IT security lab exercises. Sufficient implementation details are provided so that readers can build a …