Deploying computer-based learning under suboptimal conditions

Loading...
Thumbnail Image
Date
2012
Journal Title
Journal ISSN
Volume Title
Publisher
IEEE
Abstract
In this study, secondary school students were taught mathematics using Computer-Based Learning (CBL) approach in four lessons, during their mathematics classes. CBL was deployed without Internet connectivity. Data were recorded to measure any cognitive progress observed amongst the students; the impact that the method had on them, the position of CBL in relation to face-to-face approach and the viability of deploying digital content off-line to students without basic computer knowledge. For revision classes, the students showed a modest improvement in their cognition of mathematics. However, studying mathematics through digital content before face-to-face session had discouraging results. Information from the questionnaire revealed that overall; CBL approach was preferred as a complement to the face-to-face method. While cognitive improvement was not statistically significant, the main challenge to digital approach seems to be the alignment of CBL with face-to-face method. The study confirms that basic computer knowledge is not necessary for successful deployment of CBL. It is further concluded that investing in off-line CBL under sub-optimal conditions (where Internet connectivity is not available) is the viable alternative to Web-learning and Mobile-learning (M-learning). It is insisted that even without connectivity, the effect of severe lack of mathematics teachers and books can be mitigated by CBL, if this is properly deployed.
Description
Full-text Article. Also available at https://ieeexplore.ieee.org/abstract/document/6470992
Keywords
Suboptimal conditions, Mathematics, Web-based learning, Secondary school, Computational basis, Secondary school students, Suboptimal condition
Citation
Mselle, L. J., & Kondo, T. S. (2012, December). Deploying computer-based learning under suboptimal conditions. In 2012 International Conference for Internet Technology and Secured Transactions (pp. 94-98). IEEE.
Collections