Just another OpenETC Wordpress site

Author: ruining (Page 1 of 4)

AE311 PROJECT 4

Light Bell: A Smart Doorbell System for Individuals with Hearing Impairments

Detailed Research and Creative Development Process :

The “Light Bell” project began with identifying a significant challenge faced by individuals with hearing impairments: the inability to hear traditional doorbells, which can lead to missed visitors or deliveries and even safety concerns. The idea was to create a system that would alert these individuals using visual cues instead of auditory ones.

To develop this concept, I conducted extensive research into existing products and technologies, such as visual doorbells and smart-home systems. I analyzed their strengths and weaknesses, noting that many lacked customization options and integration with modern smart-home ecosystems. This research phase also involved studying how Bluetooth and Wi-Fi technology could be leveraged to connect the doorbell system to various devices within the home.

I then moved on to the ideation phase, where I explored different ways to create a user-friendly and effective visual alert system. This involved sketching out various designs, experimenting with materials, and considering the overall form and function of the device. My sketches included ideas for how the system would look, the types of lights to be used, and how the mobile app interface would function. I also considered the practical aspects of installation and how users could easily customize their alerts based on their preferences.

Throughout this process, I consistently sought feedback from peers and potential users. I shared my initial ideas and sketches with classmates and individuals who are hard of hearing, which provided valuable insights into what features would be most beneficial. This feedback led to several iterations of the design, where I refined the system to be more responsive to user needs, such as adding a camera feature for visual confirmation of visitors and offering a wider range of color options for the alerts.

The final design was a culmination of these efforts, resulting in a prototype that is both functional and aesthetically pleasing. The process from start to finish was a clear path of research, ideation, feedback, and refinement, ensuring that the final product met the needs of its intended users.

Problem:

Many people with hearing impairments face challenges in knowing when someone is at their door. Traditional doorbells rely on sound, which is ineffective for those who cannot hear. As a result, they might miss important visitors or deliveries, leading to frustration and potential safety concerns. The need for a solution that effectively alerts individuals with hearing impairments to someone at their door is crucial, especially in environments where they are alone or in larger homes where they might not be near the entrance.

Solution:

The solution to this problem is a product called Light Bell, a doorbell system specifically designed for people with hearing impairments. The Light Bell is a modern, inclusive adaptation of the traditional doorbell. When a visitor presses the doorbell, instead of producing sound, the system triggers lights inside the home to flash, immediately alerting the homeowner of the presence of a visitor.

However, Light Bell doesn’t stop at just flashing lights. It is designed with a variety of customizable features to accommodate different needs. The lights can be set to different colors or flash patterns based on user preferences or the type of visitor (e.g., blue for familiar faces, red for potential unknown visitors). Additionally, the system is smart-home compatible, allowing integration with mobile devices, so users can receive alerts on their phones or smartwatches, giving them flexibility and peace of mind, even when they are not near the lights.

Evidence of Trying New Methods to Solve Problems and Develop Creative Ideas:

The development of the Light Bell involved several innovative approaches to problem-solving. One of the main challenges was ensuring that the light system would be effective in different lighting conditions and for different types of users. To address this, I experimented with various types of light bulbs and flash patterns, ultimately settling on LED bulbs that could change color and intensity based on user preferences. This approach allowed for maximum customization and ensured that the alerts would be noticeable even in bright daylight.

Another challenge was integrating the system with existing smart-home technology. I explored different ways to connect the doorbell system to other devices, such as using Bluetooth and Wi-Fi, to ensure seamless integration. This involved researching the best practices for smart-home connectivity and testing different configurations to find the most reliable and user-friendly setup.

I also explored the user experience in-depth, considering how individuals with hearing impairments would interact with the system. A mobile app that allows users to customize their alerts, view real-time video from the front door (if the device includes a camera), and receive notifications on their phones or smartwatches. This was a new approach for me, as it required learning about app development and user interface design, but it was crucial in creating a system that was both accessible and easy to use.

Asking Meaningful Questions to Develop Innovative Solutions:

Throughout the project, I posed several key questions that guided the development of the Light Bell. For instance, I asked, “How can I ensure that the visual alerts are effective in all lighting conditions?” and “What features would make this system more useful and convenient for individuals with hearing impairments?” These questions prompted me to think critically about the design and functionality of the product, leading to the development of features such as customizable light settings and smart-home integration.

I also considered the broader impact of the product, asking, “How can the Light Bell improve the overall quality of life for its users?” and “What other challenges do individuals with hearing impairments face that this product could help address?” These questions encouraged me to think beyond just the immediate problem of missing visitors and consider how the product could be part of a larger system that enhances home safety and accessibility.

Written Work Includes Evidence of Depth of Understanding and Articulation of Ideas:

In this project, I demonstrated a deep understanding of the challenges faced by individuals with hearing impairments and articulated a clear, well-researched solution through the Light Bell system. My approach was rooted in empathy, ensuring that every design decision was made with the end user in mind.

The research phase highlighted the gaps in existing solutions, which informed the innovative features of the Light Bell, such as customizable light alerts and smart-home compatibility. I articulated these ideas clearly in my design documentation, ensuring that the rationale behind each decision was well-explained.

Moreover, the iterative process of seeking feedback, refining the design, and testing different solutions demonstrated a commitment to creating a product that is not only functional but also thoughtfully designed. This depth of understanding is evident in the final prototype, which reflects a careful consideration of user needs, technological possibilities, and aesthetic appeal.

Light Bell is a smart doorbell system specifically designed for individuals with hearing impairments, aiming to provide a more convenient and safer home experience. By using visual signals instead of traditional sound alerts, Light Bell ensures that people with hearing difficulties are easily aware of visitors at their door.

  • Key Features: When a visitor presses the doorbell, Light Bell triggers changes in the home’s lighting to alert the user. The light bulbs are connected to the system via Bluetooth or Wi-Fi and can change color or flashing patterns according to the user’s preferences, offering a personalized notification method.
  • Mobile App Support: Light Bell comes with a dedicated mobile app, allowing users to customize light settings, view real-time video from the front door (if the device includes a camera), and receive instant notifications from the doorbell.
  • Smart Bulb Connectivity: Users can connect the Light Bell system to their home’s smart bulbs through Bluetooth or Wi-Fi. The bulbs can not only change colors when the doorbell is pressed but can also be automated based on time of day or user needs.
  • Multiple Color Options: The Light Bell prototype is designed in blue, offering visual clarity and aesthetic appeal. Different color options allow users to customize the system to match their home decor or personal preferences.
  • Design and Usability: The system features a simple, user-friendly design that can be easily installed at the front door. It is both attractive and functional, making it ideal for everyday use.

Light Bell provides a straightforward yet effective solution to help individuals with hearing impairments easily manage visitor notifications. You might also consider adding a logo to the device to enhance its recognition and trustworthiness. For emergency situations, you can set specific light alerts through the app, further enhancing safety.

AE311 PROJECT 3

small pot

Detailed Research and Creative Development Process :

In the early stages of this project, I conducted an in-depth study of Monomi Ohno’s cardboard art, particularly focusing on how she uses cardboard, an ordinary material, to create intricate and expressive sculptures. Inspired by this, I decided to choose a common everyday object—a pot—as my design subject. I started from the initial concept and gradually explored the plasticity and structural characteristics of cardboard. During this process, I consulted relevant design materials and used visual research methods such as sketching, prototyping, and material testing to develop and validate my design ideas.

I first drew various design schemes for the pot in my sketchbook and analyzed the material adaptation for each design, paying particular attention to how cardboard would affect the shape and function of the pot. I also discussed my design ideas with friends and family, gathered their feedback, and adjusted my design based on this input. Subsequently, I created an initial cardboard pot prototype and discovered issues with the strength and workability of the cardboard during the actual making process. These findings prompted me to optimize the structure in the subsequent design.

Evidence of Trying New Methods to Solve Problems and Develop Creative Ideas:

During the implementation of the project, I tried various new methods to address the technical challenges encountered. The strength of the cardboard is relatively weak, making it prone to bending and deformation, which posed difficulties in structural design. To solve this issue, I adopted a method of layering the cardboard to increase the material’s thickness and strength. Additionally, I explored using different types of glue and connection techniques to ensure a solid bond between the components. Ultimately, through these new methods, I successfully resolved the technical challenges posed by the cardboard material and created a cardboard pot that was satisfactory in both appearance and structure.

Asking Meaningful Questions to Develop Innovative Solutions:

During the creative development process, I raised several key questions to guide my design direction. For example, I asked myself, “How does the fragility of cardboard affect the traditional use and meaning of the pot?” and “How can I challenge the audience’s expectations of the pot through material selection?” These questions helped me delve deeper into the uniqueness of cardboard as a material and drove me to seek innovative design solutions.

I also explored the issue of environmental sustainability, considering how to use recycled cardboard to reduce environmental impact. Through this process, I began to focus on the relationship between design and ecological responsibility. The questions raised not only helped me clarify my design goals but also encouraged continuous reflection and adjustment during the creative process, leading to a work that is both artistically valuable and socially meaningful.

Written Work Includes Evidence of Depth of Understanding and Articulation of Ideas:

In this project, I focused not only on the superficial effects of design but also on deeply exploring the relationship between material, form, and function. I critically examined the design concept of “form follows function” and deliberately chose to challenge this principle by using a material that contradicts it. By using fragile, perishable cardboard to create a pot, I aimed to provoke the audience’s reconsideration of the connection between an object’s purpose and the materials used to create it.

Throughout the process, I recognized that cardboard carries many implicit meanings. It is often seen as a low-value, temporary material, in stark contrast to the durability and high value of metals or ceramics. By applying this material to an object traditionally associated with sturdiness and durability (such as a pot), I sought to disrupt the preconceived associations between materials and their intended uses, thereby revealing our habitual thinking about objects.

Furthermore, during the creative process, I gained a deeper understanding of the physical properties of cardboard. The structural characteristics of cardboard required careful consideration of how weight and pressure would be distributed in the design and construction phases, which deepened my understanding of how material selection profoundly impacts design outcomes. Additionally, by applying unconventional materials in this way, I expressed my concern for environmental issues, advocating for sustainable use of materials through innovative design.

I also drew inspiration from Monomi Ohno’s art, where she creates stunning works from ordinary cardboard, redefining our perception of everyday materials. Her work taught me that materials themselves can be powerful tools of expression, not merely means to achieve functionality.

This is her media:

https://www.instagram.com/monamincb/

And some works:

What Your Idea Was and How You Decided on Its Material/s

My idea was to create a small pot using cardboard, inspired by the work of Monomi Ohno, a Japanese artist known for her intricate cardboard sculptures. Like Ohno, I wanted to explore the potential of cardboard as a versatile and expressive material, transforming something ordinary and often discarded into an object of art. The choice of cardboard was deliberate, aiming to echo Ohno’s approach of repurposing a common, accessible material to create something that challenges traditional perceptions.

How the Materials Change or Subvert the Meaning of Your Design

Using cardboard changes the traditional meaning of a pot by introducing a sense of fragility and impermanence. Normally, pots are made from durable materials like clay or metal, but by using cardboard, the design subverts the expectation of durability and longevity. This choice reflects a broader commentary on the temporary nature of many of our creations and the potential for everyday materials to be elevated into something meaningful. The cardboard also brings an element of surprise, as it is not typically associated with lasting, functional objects, much like Ohno’s work, which often surprises and delights through its unexpected medium.

What You Discovered During the Process

During the process, I discovered that cardboard is both challenging and rewarding to work with. It requires careful consideration of structure and support, as it lacks the inherent strength of more traditional materials. However, this also allowed for creative problem-solving and innovation, much like the way Monomi Ohno approaches her art. I learned that even the most mundane materials can be transformed with enough creativity and attention to detail. The flexibility of cardboard provided opportunities for experimentation in shaping the pot, which was a liberating experience.

What or Who Inspired the Design

The design was directly inspired by Monomi Ohno, whose work with cardboard has redefined how we view this common material. Ohno’s ability to create complex and detailed sculptures from cardboard encouraged me to explore the material’s possibilities in my own work. Her approach to art—turning something ordinary into something extraordinary—resonated deeply with me and guided the direction of my project.

What Artist or Designer You Can Think of Who Practices Social Responsibility in Their Work

Monomi Ohno herself can be seen as an artist who practices social responsibility in her work. By using recycled cardboard, she not only creates stunning art but also promotes the idea of sustainability and reusability. Her work challenges the throwaway culture by demonstrating that even the most overlooked materials can be used to create something beautiful and valuable. This aligns with the growing movement in design and art that emphasizes environmental consciousness and the responsible use of resources.

Interactive Learning Resource on Network Security and Cybersecurity Fundamentals


Authors: ruiningfeng, brucemao, longle


Course Overview

Getting Started

Start out with the main learning modules of our Interactive Learning Resource in Course Outline.

  • Try your best to complete each activity and assessment. These will help guide your learning, and you are also able to receive feedback from the formative assessment in the end of each subtopic.


Welcome to our Interactive Learning Resource on Network Security and Cybersecurity Fundamentals. This resource is designed to provide an in-depth understanding of the key concepts, threats, and protective measures related to cybersecurity. The following sections guide you through the course’s main modules and provide additional resources to support your learning journey.

Related Resource
Cybersecurity for Beginners | Google Cybersecurity Certificate


To learn more about the design of our Interactive Learning Resource see the drop-down in the menu under course overview. Or follow the links below:

  1. An Overview of the Resource (this page)
  2. Learning Theory
  3. Learning Design
  4. Learning Context and Inclusive Design
  5. Learning Outcomes
  6. Assessment Plan
  7. Technology Choices
  8. Peer Review and Feedback
  9. References

Course Rationale

Why Take This Course?
Understanding cybersecurity is essential in our increasingly digital world. This course equips students with the knowledge to protect against cyber threats, making it valuable for both personal security and professional development.

What’s In It for Me?
Students will develop critical skills in identifying and mitigating cyber threats. The course also fosters an understanding of how cybersecurity measures can protect sensitive information, both personally and within organizations.

Future Benefits
Upon completion, students will be able to apply cybersecurity principles in various contexts, enhancing their career prospects in IT and related fields. The knowledge gained will also contribute to creating safer digital environments.


Examples of Our Topic

Network Security Essentials
Explore the fundamental concepts of network security, including threat identification, vulnerability management, and incident response.

Case Studies in Cybersecurity
Analyze real-world cyber attacks, such as the Target data breach, to understand the impact and preventative measures of cybersecurity.


More Info

To delve deeper into each course section, explore the drop-down menu under “Course Overview” or follow the provided links. Each part of the course is carefully designed to build a comprehensive understanding of cybersecurity, providing a thorough and engaging learning experience.

Previous

Learning Design

The course on Network Security and Cybersecurity Fundamentals is thoughtfully designed to ensure that learners not only grasp the core concepts but also actively apply them in a variety of contexts. The learning design incorporates a blend of class presentations, weekly reflections, and interactive discussions to create a comprehensive and engaging educational experience.

Class Presentations
Each week, students will participate in class presentations focused on different cybersecurity topics. These presentations are more than just a platform for sharing information; they are a means for learners to develop confidence in articulating complex cybersecurity concepts and explaining them to their peers. This process not only reinforces their knowledge but also hones their communication skills, essential for any professional in the field.

Weekly Blog Reflections
In addition to presentations, the course requires weekly blog reflections. These reflections serve multiple purposes: they encourage learners to critically assess their own learning progress, connect the course content with real-world cybersecurity scenarios, and share personal insights. This reflective practice is designed to deepen learners’ understanding by allowing them to contextualize and internalize what they have learned, making the content more relevant and memorable.

Interactive Discussions
The course also includes interactive discussions that are integral to the learning process. These discussions provide a dynamic platform where learners can engage with their peers, ask probing questions, and explore diverse perspectives on cybersecurity challenges. This interaction is crucial for fostering a collaborative learning environment, where students learn from each other and deepen their understanding through dialogue and debate.

Collaborative Projects
To further enhance the learning experience, the course incorporates collaborative projects where students work together to solve real-world cybersecurity problems. These projects are designed to simulate professional environments, allowing learners to apply theoretical knowledge in practical situations. Through collaboration, students will develop critical teamwork and problem-solving skills, preparing them for future careers in cybersecurity.

Continuous Assessment and Feedback
Finally, the course design includes continuous assessment and feedback. Students will receive regular feedback on their presentations, reflections, and participation in discussions, enabling them to continuously improve and refine their understanding of cybersecurity principles.

By integrating these diverse learning activities, the course ensures a holistic learning experience that is both engaging and effective, equipping students with the skills and knowledge they need to excel in the field of cybersecurity.

Learning Context and Inclusive Design

Learning Context

This course is designed to provide learners with a foundational understanding of network security and cybersecurity fundamentals.  It targets individuals with varying levels of prior knowledge in IT and cybersecurity, making it accessible to both beginners and those looking to deepen their understanding of the subject.  The course utilizes a blended learning approach, combining direct instruction through video lectures, interactive simulations, and case studies to help learners engage with the material in a meaningful way.

To contextualize the learning experience, the course begins by introducing key concepts such as threat identification, vulnerability management, and incident response.  These topics are woven into a “storyline” that revolves around real-world cybersecurity scenarios, allowing learners to see the practical applications of the theories they are studying.  By analyzing high-profile cyber attacks, such as the Target data breach, learners are able to connect abstract concepts to tangible outcomes, reinforcing their understanding and helping them retain the information more effectively.

The course also emphasizes the importance of cybersecurity in both personal and professional contexts.  By exploring how cybersecurity measures can protect sensitive information and prevent cyber threats, learners gain insights that are not only academically valuable but also immediately applicable in their daily lives and careers.

Inclusive Design

To ensure that the needs of all learners are met, this course employs a Universal Design for Learning (UDL) approach. UDL focuses on creating a flexible learning environment that accommodates a wide range of learning preferences and needs, making the course accessible and engaging for everyone.

One of the barrier is the potential lack of access to computers or reliable internet connections. To address this, the course materials are designed to be mobile-friendly and can be accessed on various devices, including smartphones and tablets. Additionally, a downloadable PDF version of the course content is available, allowing learners to engage with the material offline or in areas with limited connectivity. While this format may lack some of the interactive features, it ensures that all learners have the opportunity to complete the course, regardless of their technological constraints.

Learning Theory

Constructivism

The course on Network Security and Cybersecurity Fundamentals is deeply rooted in constructivist learning theory, which posits that learners build their own understanding through active engagement and reflection (Kurt, 2022). This course is designed to align with these principles, incorporating various interactive and collaborative elements that enhance the learning experience.

Interactive Learning Elements
To facilitate a constructivist approach, the course includes interactive class presentations where students delve into specific cybersecurity topics. These presentations are designed to not only share insights with peers but also to stimulate discussion and critical thinking, fostering a collaborative learning environment.

Reflective Practice
Weekly reflections in the form of blog posts encourage learners to connect new concepts with their personal experiences. This reflective practice helps solidify their knowledge and makes it more applicable to real-world situations, ensuring that learning is both meaningful and practical.

Collaborative Learning Activities
The course also emphasizes group discussions and hands-on activities. These are crucial for supporting constructivist principles, as they allow learners to collaborate, debate, and engage in problem-solving together. By actively participating in these activities, learners are more deeply involved in their learning process, leading to a more robust understanding of cybersecurity concepts.

Continuous Feedback and Adaptation
To further enhance the learning experience, the course includes continuous feedback mechanisms. This feedback helps students refine their understanding and encourages them to adapt their learning strategies as they progress through the course, ensuring that they are consistently building on their knowledge.

Learning Outcomes

By the end of this course, you will be equipped with the knowledge and skills to effectively navigate the digital world with a strong understanding of cybersecurity principles. Specifically, you will be able to:

  • Comprehend Fundamental Cybersecurity Concepts
    Gain a thorough understanding of basic cybersecurity principles and recognize their significance in ensuring everyday digital safety.
  • Identify and Mitigate Common Cyber Threats
    Recognize and understand common cyber threats such as phishing, scams, and malware. Learn practical strategies to avoid these threats and protect yourself online.
  • Implement Practical Cybersecurity Measures
    Apply simple yet effective steps to safeguard personal devices and online accounts, enhancing your overall security posture.
  • Create and Manage Secure Passwords
    Develop the ability to create strong, secure passwords and implement effective password management techniques to protect your online presence.
  • Protect Personal Information Online
    Safeguard your personal information while using social media, email, and other online services by understanding best practices for online privacy.
  • Detect and Respond to Suspicious Activities
    Learn how to identify suspicious emails, links, and attachments, and understand the steps to take to avoid falling victim to cyber-attacks.
  • Understand the Role of Software Updates in Security
    Recognize the importance of regular software updates in protecting against vulnerabilities and ensuring the security of your digital devices.
  • Respond to Security Incidents
    Know the appropriate actions to take if your personal information is compromised or if you suspect a security breach, including steps to mitigate damage and recover from the incident.
  • Enhance Organizational Cybersecurity Awareness
    Apply the knowledge gained to not only protect your personal digital assets but also to contribute to the cybersecurity awareness and practices within an organization.

By achieving these outcomes, you will be well-prepared to navigate the challenges of the digital world, protect yourself and others from cyber threats, and contribute to a safer online environment.

Assignment Plan

Formative Assessment: In this course, we incorporate a quiz that is directly linked to the reading materials. This quiz primarily focuses on key cybersecurity concepts, such as types of motivation in relation to cybersecurity behaviors.

The quiz is delivered through a Google Form, allowing students to receive immediate feedback on their performance. This feedback is essential as it highlights areas where students may need to improve and guides them on how to strengthen their understanding of the course content.

Summative Assessment: For the summative assessment, students will engage in a series of tasks, including essay-type questions, presentations, and a research report. These tasks are designed to comprehensively evaluate the students’ grasp of the course material. The final grade will be composed of scores from both the formative assessments and these summative assessments.

Grading Scheme:

Rationale for the Assessment: The formative assessments are designed to actively involve students in their learning journey, offering timely feedback that helps them recognize and address any misunderstandings early on. This ongoing feedback loop is crucial for helping students build a strong foundation in cybersecurity principles.

Summative assessments serve as a means to measure students’ overall understanding and application of the material covered throughout the course. These assessments are critical for determining final grades and ensuring that students have achieved the necessary competencies.

In designing this assessment plan, we followed a “learning cycle” approach. This involves first introducing and teaching each concept, then assessing students’ understanding through formative assessments, and finally consolidating their learning through summative assessments.

Technology Rationale

In the rapidly evolving field of cybersecurity, selecting the right tools is essential for protecting digital assets and ensuring the security of systems. Below are five of the best cybersecurity software tools that can enhance your ability to safeguard against various cyber threats:

  • SiteLock
    SiteLock is a powerful web security tool designed to protect websites from vulnerabilities and malware. By continuously scanning websites, SiteLock identifies and mitigates potential threats, ensuring safe and secure online operations. This tool is especially valuable for businesses that rely heavily on their web presence, as it helps maintain the integrity and security of their sites. Learn more about SiteLock
  • Heimdal Security
    Heimdal Security offers a comprehensive security suite that includes advanced threat detection, endpoint protection, and ransomware defense. This software is particularly useful for organizations looking to enhance their overall cybersecurity posture by providing robust protection against sophisticated cyber threats. Heimdal Security’s proactive approach ensures that systems remain secure in the face of emerging threats. Discover Heimdal Security
  • Wireshark
    Wireshark is a renowned network protocol analyzer that captures and inspects data packets traversing a network. It is an invaluable tool for network administrators and cybersecurity professionals, as it helps identify network issues and potential security breaches. Wireshark’s detailed analysis capabilities make it an essential tool for troubleshooting and securing network environments. Explore Wireshark
  • Nessus Professional
    Nessus Professional is a leading vulnerability assessment tool that scans systems for security weaknesses. It helps organizations identify and address vulnerabilities before they can be exploited by malicious actors. Nessus is widely used in the industry to ensure compliance with security standards and to maintain a secure IT infrastructure. Get to know Nessus Professional
  • Snort
    Snort is an open-source intrusion detection and prevention system (IDPS) that monitors network traffic for suspicious activities and potential threats. By analyzing network packets in real-time, Snort can detect and respond to various types of cyber attacks, making it a critical tool for protecting networks against unauthorized access and malicious activity. Learn more about Snort

Why These Tools?
The selection of these tools is based on their proven effectiveness in addressing various aspects of cybersecurity. They cover a broad spectrum of needs, from web security and endpoint protection to network monitoring and vulnerability assessment. By integrating these tools into a cybersecurity strategy, individuals and organizations can significantly enhance their ability to detect, prevent, and respond to cyber threats.

These tools not only provide essential security features but also contribute to a comprehensive cybersecurity framework that can adapt to the evolving threat landscape. Whether you are securing a small business website or managing the cybersecurity infrastructure of a large organization, these tools offer the functionality and reliability needed to safeguard digital assets.

Assessments Grading

Assessments Grading

Grading for this course will be based on the following components:

  1. Cybersecurity Quiz: 20% of the final grade
  2. Group Assignment: 50% of the final grade
  3. Participation and Engagement: 20% of the final grade
  4. Reflection and Feedback: 10% of the final grade
« Older posts

© 2024 RuiningのBlog

Theme by Anders NorenUp ↑