Contextualized IT Education in Tanzania: Beyond Standard IT Curricula
نویسندگان
چکیده
منابع مشابه
Contextualized IT Education in Tanzania: Beyond Standard IT Curricula
Tumaini University at Iringa, Tanzania, started a new B.Sc. program in IT in 2007. In the course of planning and implementation of the program, we found out that standard ACM/IEEE IT curricula are not adequate for an IT program in a poor, developing country. The standard curricula describe, in detail, the competences that IT specialists in industrialized countries should possess, but the specia...
متن کاملEmpowerment in IT Education
Executive Summary Educating undergraduate students to be capable IT professionals poses several significant problems. Firstly, there is the question of what knowledge should be taught in a subject where new areas of interest can appear, flourish and then largely disappear within a few years. Secondly there is the question of how the subject should be taught to try to ensure that the students no...
متن کاملExamining critical thinking and teaching it in education
To have a healthy community requires a healthy family; and one of the key to having a healthy family is transcendental education with the program. As education is one of the main pillars of a progressive society, attention to its basic pillars and structures has a special place. In recent years, Critical Thinking has been supposed as one of the essential components of education. Despite the imp...
متن کاملUnregulated IT - Beyond Utility Computing
The concept of buying an organization's computing needs on a pay-as-you-go basis is known as Utility Computing. In this model, organizations pay for the usage of applications, either to Information Technology (IT) departments or to an external technology vendor. This approach is similar to the way consumers pay for utility services like electricity, gas, and water. Though the Utility Computing ...
متن کاملFahrzeuganbindungen durch Standard-IT-Verfahren
Der folgende Text beschreibt im ersten Teil die bisher bei PC-Systemen eingesetzten Verfahren zum Zugriff auf Fahrzeugnetzwerke am Beispiel des Controller Area Network ‚CAN’ und deren Nachteile in Bezug auf übliche informationstechnischeModelle und Anforderungen. Im zweiten Teil wird gezeigt, wie auf ein CAN-Fahrzeugnetzwerk mit Verfahren aus der Standard-IT, analog der etablierten Internet-Kom...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Technology Education: Research
سال: 2009
ISSN: 1547-9714,1539-3585
DOI: 10.28945/162