Educational Computer Software "Inheritance Mechanisms" in Biology Lectures
Journal Title: TEM JOURNAL - Year 2012, Vol 1, Issue 2
Abstract
The author's interests are connected with the introduction of the new Infocommunication Technologies in biology educatione. Computer application in educational system should include thoroughly designed complex procedure which is eminently realised in all parts of educational system. The process of designing and applying educational computer software should be particulary emphasized. In the aim of enhancing lectures and overcoming mentioned drawbacks we created a software for learning the contents from lecture topic "Inheritance mechanisms" for the 4th grade of grammar schools. Educational computer software "Inheritance Mechanisms" in Biology lectures represents a new generation of educational technology, which is based on computing science and resources. This software is made for teaching and learning procedure, tests, assessments and exercises.
Authors and Affiliations
Vesna Odadzic, Borislav Odadzic
Effective Teaching of Physics and Scientific Method
Teaching science in modern society shows a lack of efficiency, as well as the discrepancy between goals and the quantum and quality of students' knowledge. Teaching physics in elementary and grammar schools in Serbia is...
Moments of Macrodiversity SC Receiver with Two Microdiversity EGC Receivers over Gamma Shadowed Rician Multipath Fading Channel
SC macrodiversity system with dual EGC microdiversity receivers operating over shadowed multipath fading environment is considered. Received signal experiences correlated Gamma long term fading and Rician short term fadi...
Two Idea Implementation of Real-Time Systems
Currently Web portals which are providing real time services, required to implement two separate servers. One of them deals contact with the client and the other synchronizes data posted by users. Such solutions require...
Breach of Personal Security through Applicative use of Online Social Networks
Throughout this article there is an attempt to indicate the threats of potential to breach of personal security through applicative use of internet as well as applicative use of online social networks. In addition...