Bloom's Taxonomy For Cognitive Learning and Teaching (Screencast)
The users of this learning object read a brief introduction to the six levels of Bloom's Cognitive Taxonomy and quiz themselves on a basic understanding of the levels.
In this learning activity, you’ll identify information hackers use to gain access to a company, explain different types of social engineering attacks, and recognize different solutions to avoid these attacks.
Learners use two calculations to prepare a graphical solution to the biasing of bipolar junction transistors and junction field effect transistors. This method eliminates the problem of having to re-calculate the operational Q point when dealing with hard saturation.
This activity is cognitive. Learners will actively listen to a story activated by the computer. Then learners will take a quiz on their comprehension. Lastly, learners will compare their chosen answers against the answer key to determine how well they really did "actively" listen. (Credit given to Tom E. Wirkus, University Of Wisconsin-LaCrosse for this activity.)
Overcoming Barriers to Critical Thinking: Being Human
The learner will identify ways to overcome barriers to critical thinking and problem-solving including false memories, personal biases and prejudices, and physical and emotional hindrances.
In this interactive and animated object, learners examine the operation of a semiconductor diode when it is forward and reverse biased. A brief quiz completes the activity.
In this animated activity, learners examine the operation of the SCR, including how it is biased and how it is turned off. A brief quiz completes the object.