• Title/Summary/Keyword: first problem posing

Search Result 36, Processing Time 0.018 seconds

A Study on the Practical Methods of Open Teaching and Loaming in Mathematics Education (수학 교육에서 열린 교수 학습의 실천적 방법 연구)

  • Lim Mn Ku
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.1 no.1
    • /
    • pp.17-32
    • /
    • 1997
  • Open education is carried out and studied in both phases of theory and practice in Korean elementary schools in these days. 1 introduced three open teaching and learning methods which we can use practically in elementary school mathematics education. They are the teaching and learning by open-end-approach, From problems to problems and Problem posing. First, I illustrate each meaning of three teaching and learning methods. Next, I presented the concrete plans of each teaching and learning method, and exhibited some examples of students' own works.

  • PDF

An Analysis of Teacher's Scientific Questioning in Elementary Science Classes (초등학교 과학수업에서 사용된 교사의 과학적 질문유형 분석)

  • Lee, Sang-Gyun
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.5 no.3
    • /
    • pp.287-296
    • /
    • 2012
  • This research analyzed elementary teacher's scientific questioning during science teaching. This research studied 4 elementary school teachers in Gyeongnam were observed and the classes were videotaped. all teacher's questioning and student's answering were transcribed. Teacher's questionings were categorized into 2 types such as simple questions and productive questions. The findings of the research were as following. First, in the teaching-learning activities of the science subject, teacher-student conversation was used 202 times on average, and questions asked by the teachers were 72 times on average. The teachers use productive questions more than simple questions. Second, in the type of simple questions, management questions were used the most, and the next were simple confirmation questions and rethink questions in order. Third, productive questions used by the teachers in the class were mostly the attention-focussing questions, but the type of higher level questions such as problem-posing questions, comparing questions, action questions and reasoning questions was rarely adopted.

A Note on Teaching Method of Addition and Subtraction between Korea and New Zealand Primary School (한국과 뉴질랜드 초등학교 저학년의 덧셈과 뺄셈 지도방법에 관한 고찰)

  • Choi, Chang Woo
    • East Asian mathematical journal
    • /
    • v.31 no.4
    • /
    • pp.505-525
    • /
    • 2015
  • The purpose of this study is to analyze teaching method of addition and subtraction of whole number in Korea and New Zealand lower grade textbook and to get some suggestive points to develop mathematics curriculum and for a qualitative improvement of textbook. To do this, we will analyze focusing on teaching material, type and method of teaching, cases of real teaching and in the case of New Zealand, we will analyze portfolios together to see what kind of things do they deal with related to addition and subtraction. From these analyzing, the results are as follows: First, the guideline of accomplishment of group of year are stated in 2009 revised curriculum in Korea but it is rough. On the other hand, the level of accomplishment from kindergarten to high school are stated divided by eight kinds of thing in New Zealand curriculum. Second, there were common and different points in the aspect of teaching material. The common points are that both of our Korea and New Zealand are using materials related to real life intimately and the diifferent points are to use technology such as calculator and computer. They are more widely used in New Zealand than our Korea. Third, Korea had used routine method mainly but New Zealand had used method to develop creativity of learner such as to write problem corresponding to expression, posing problem corresponding to information, to complete table and find pattern and to write word problem to explain pattern and so on. Fourth, we could see special calculation strategies in the case of teaching addition and subtraction such as concept of double, compensation, various strategy based on counting of number, addition of the same number, magic square, near-double which are not finding in our mathematics textbook. Fifth, in the New Zealand textbook they had used teaching methods inducing curiosity of learner such as finding message and puzzle problem than solving given problem simply.

Exploration of the application possibility of curriculum with mathematical modeling through coding activities

  • Kim, Dong-Joong;Kim, Won;Jung, Jae young;Choi, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.241-250
    • /
    • 2020
  • In this paper, we propose a direction of teaching method for future generations. In order to suggest such the direction, teaching and learning materials that integrate coding activities and mathematical modeling were developed through top-down and bottom-up processes. Coding and engineering experts and mathematics education experts developed teaching and learning materials through councils (top-down courses) and applied them to 24 high school first graders based on student responses (bottom-up courses). Additionally, the developed curriculum helped students increase interest and motivation and realize conceptual understanding, problem posing, and problem solving in mathematics. On the basis of these results, it provided an idea about how to develop curriculum combining mathematical modeling with coding activities, needed for the fourth industrial revolution.

Analysis of the Effect of the Havruta Method in Engineering Education (공학교육에서 하브루타 수업방식의 효과 분석)

  • Eom, Mi Ri;Lee, Young In
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.1
    • /
    • pp.149-157
    • /
    • 2020
  • This study aimed to explore the change of engineering students' competencies through the havruta class. In the havruta class, engineering students' competencies were compared with pre-test and post-test. The research tool was developed by selecting learning readiness, academic self-efficacy, and communication ability as the learner's competence in the havruta class. Finally, 105 data were analyzed with SPSS 21.0 for windows. First, there was a statistically significant difference in learning readiness. Second, there was no statistically significant difference in academic self-efficacy. Third, there was a statistically significant difference in communication ability. It was found that there was a positive change of competencies in learning readiness ability and communication ability in the havruta class. Although the findings are difficult to generalize to all majors, these results will be a useful basis for instructors who want to apply the havruta class.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF