ACM Inroads » Information Technology https://blog.inroads.acm.org Paving the Way Toward Excellence in Computing Education Sun, 18 Oct 2015 12:13:35 +0000 en-US hourly 1 https://wordpress.org/?v=3.9.34 Can a) b) c) d) Assess Understanding? https://blog.inroads.acm.org/2013/01/can-a-b-c-d-assess-understanding/?utm_source=rss&utm_medium=rss&utm_campaign=can-a-b-c-d-assess-understanding https://blog.inroads.acm.org/2013/01/can-a-b-c-d-assess-understanding/#comments Wed, 02 Jan 2013 18:16:57 +0000 http://inroads.acm.org/blog/?p=74 Continue reading ]]> As an information technology (IT) faculty member teaching in the systems and networking side of the camp (rather than development), I have always found it important to assess students’ clear understanding of and ability to discuss computing technologies. Because IT is an applied discipline, this understanding is different than what computer science students require.  As an example, IT students need to grasp how DNS functions and how it communicates with clients and other services, then be able to configure it on multiple server operating systems. They do not, however, need to understand the intricacies of shaping the DNS packet to optimize traffic on a network or be able to develop a new DNS application for a network appliance.

Most any college student can press next or follow a step-by-step guide to get some computing technology to work.  But IT students need to troubleshoot problems, apply guides to their own specific environment, integrate technologies, apply security, optimize performance, and be able to quickly adapt to new or changing technologies.  They do this by possessing knowledge of the underpinnings of the computing technology.  As such, labs that I give students are more of a task list to complete rather than a step-by-step recipe.

IT students also need to learn to communicate about computing technologies within an organization and not have to do a Google search in the midst of talking to others (technical or non-technical) about these technologies.  Because of this, exam/quiz questions I give to students are not multiple-choice or true/false in nature.  Much to their chagrin, students are asked to describe some piece of computing technology, how it communicates with the network, how to secure it, and its implications for other services or devices.

Perhaps this is just my own tired bias against multiple-choice rearing its head.  As a student, I always thought multiple-choice questions fell into two categories; very easy or trick questions.  Knowing an exam was going to be multiple-choice resulted in a lack of studying on my part, assured that a decent grade was within my grasp just because of the exam format.  I tell my students that they will rarely get a multiple-choice question in the real world, and certainly not trick questions; instead they will need to be able to discuss and comprehend computing technologies.

With rising class sizes within my own department and no teaching assistants though, I worry about how long I will be able to sustain my favored assessments.  Can I determine if a student truly understands DNS (or any other type of computing technology) and be able to logically talk about it by using a more efficient grading mechanism?  Do I fail to see the strength of good multiple-choice questions?  What are your experiences?

]]>
https://blog.inroads.acm.org/2013/01/can-a-b-c-d-assess-understanding/feed/ 1
An Introduction, Mark Stockman – Information Technology https://blog.inroads.acm.org/2012/12/an-introduction-mark-stockman-information-technology/?utm_source=rss&utm_medium=rss&utm_campaign=an-introduction-mark-stockman-information-technology https://blog.inroads.acm.org/2012/12/an-introduction-mark-stockman-information-technology/#comments Thu, 06 Dec 2012 21:13:16 +0000 http://inroads.acm.org/blog/?p=29 Continue reading ]]> Thanks to Amber and Inroads for the opportunity to contribute to this blog. As an information technology (IT) educator, it is encouraging when ACM practices inclusion of all computing disciplines, beyond just computer science, as it has with this invitation. I look forward to being part of a, hopefully, impactful and ongoing discussion of computing education.

My name is Mark Stockman, for the past eleven years I have served as a faculty member at the University of Cincinnati in the IT bachelors degree program. Prior to that, I worked in several computing capacities within industry (networking, software/web development, database management, systems administration, technical support, management). Also an active member of ACM’s Special Interest Group for IT Education (SIGITE) from its inception, I served as Chair of the SIG till summer of this year.

IT is an applied computing discipline. The membership of SIGITE has worked with ACM over the past several years to define the distinctiveness of IT within the spectrum of computing. In a nutshell, while computer scientists construct the software technologies and computer engineers build the hardware technologies, IT professionals develop strategies to deploy, integrate, secure, and administer computing technologies. For more details of how the disciplines are distinctive (and overlap) see the ACM Computing Curricula 2005, the ACM IT 2008 Curriculum Guidelines, or a summary produced by SIGITE.

My teaching revolves around the networking/systems side of IT rather than development, primarily teaching courses in the applied nature of system administration, cloud computing (server virtualization), cybersecurity, cyberforensics. The focus of my past research centered on the pedagogy of creating and delivering IT curriculum, specifically in the development and use of hands-on activities/labs.

More recently I have jumped into a cross-disciplinary academic path; now in the second year of a PhD program in Criminal Justice, specifically studying criminology and crime prevention with an emphasis on cybercrime. As a discipline that can impact many (most) others, IT research can move forward through domain induction like this. My hope is that this marriage of computing and criminology/crime prevention allows for substantial knowledge creation for cybersecurity.

Certainly, my background will influence what you will see from me on this blog. I hope you will speak up in the comments and/or through Twitter (@putrnrd). Discussion, even (especially) disagreement, is a great thing as we continue towards a common goal; the advancement and promotion of computing education.

Mark

]]>
https://blog.inroads.acm.org/2012/12/an-introduction-mark-stockman-information-technology/feed/ 2