In December 2025, the Wisc-Online website will be retired. But don’t worry—the Wisc-Online brand and a collection of your favorite learning resources will live on at WisTech Open, Wisconsin’s new hub for open educational resources.
[Learn More →]In this learning activity you'll review the differences between identification, authentication, and authorization.
Students explore the history of U.S. Constitutional amendments and the process involved in adding an amendment. In an interactive exercise, learners author their own amendments and explain why these should be added to the Constitution.
By Mona Wenrich
Learners examine the psychological and sociological barriers that interfere with clear communication. They select examples of ad hominem fallacy, bandwagon fallacy, emotional appeals, red herrings, irrelevant appeals to authority, suggestibility and conformity, “poisoning the well’, and “shoehorning.” In an interactive exercise, learners identify ways to overcome these barriers.