Browse the glossary using this index

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  (Next)
  ALL

S

Visvanath Ratnaweera

SCNR

by Visvanath Ratnaweera - Saturday, February 1, 2025, 2:29 PM
 
Sorry, Could Not Resist

Cristi Ionescu

SCORM

by Cristi Ionescu - Friday, September 29, 2006, 11:35 PM
 

Sharable Content Object Reference Model (SCORM) is a collection of standards and specifications for web-based e-learning. It defines communications between client side content and a host system called the run-time environment (commonly a function of a learning management system). SCORM also defines how content may be packaged into a transferrable ZIP file.
After going through SCORM standards 1.0, 1.1, 1.2, 2004 first edition, the current latest version is SCORM 2004 2nd edition.


Martin Dougiamas

sections

by Martin Dougiamas - Monday, October 6, 2003, 11:10 PM
 
The areas within a course that hold activities are known as sections. This is a generic term that covers weeks and topics.

Martin Dougiamas

server

by Martin Dougiamas - Wednesday, October 1, 2003, 2:26 PM
 
This is where your web site or database, or both, resides. You may choose to run your own server or have a hosting provider look after this for you.

Lukas Haemmerle

Shibboleth

by Lukas Haemmerle - Saturday, July 2, 2005, 1:29 AM
 
Shibboleth is not only a kind of linguistic password that identifies one as a member of an 'in' group, it's also the name of a middleware project of Internet2.

The Shibboleth project is developing architectures, policy structures, practical technologies and an open source implementation (also called Shibboleth) to support inter-institutional sharing of (web) resources subject to access controls.

Some key concepts of Shibboleth are:
  • Federated Administration
  • Access Control Based on Attributes
  • Active Management of Privacy
  • Standards Based
  • Framework for Multiple, Scaleable Trust and Policy Sets (Federations)
  • Standard Attribute Value Vocabulary
Using Moodle with Shibboleth authentication has the following advantages (depending on the Shibboleth federation you are part of):
  • Access to Moodle can be restricted very accurate (e.g. you allow only students from universities A, B and D to access your Moodle, but not students from universities C and E. Or you allow only medicine students.)
  • User accounts are created automatically as soon as a user logs in the first time.
  • The user profiles are set up automatically (e.g. the users firstname, surname and email address is inserted the first time a user logs in)
  • The user profiles can automatically kept up-to date all the time
  • So you don't have to care anymore for user management issues because this is basically handled by the Identity Provider of the Shibboleth user (e.g. the home university).
  • Once Shibboleth users are authenticated, they can access other Shibboleth-enabled resources without loggin in another time. Due to this single sign-on mechanism, they e.g. can jump from one Moodle installation to another or the can access a Shibboleth-protected library or a web shop, always being authenticated.
Plans for the future concerning Moodle:
  • Automatic course enrollment according to Shibboleth attributes.


Martin Dougiamas

SMTP

by Martin Dougiamas - Wednesday, October 1, 2003, 4:57 PM
 
Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another. In addition, SMTP is generally used to send messages from a mail client (or a program like Moodle) to a mail server.

Martin Dougiamas

social constructionism

by Martin Dougiamas - Thursday, January 8, 2004, 9:01 PM
 

Social constructionism is a term that defines a particular view of education. It acknowledges constructivism as a description of what each learner experiences, while focussing on the power of constructing artifacts (like text) within a social environment.

From this point of view, education is best served by creating experiences that would be best for learning from the learner's point of view, rather than just publishing and assessing the information you think they need to know. Each participant in a course can be a teacher as well as a learner. A 'teacher' in this environment is an influencer and role model of class culture, connecting with others in a personal way that addresses their own learning needs, and moderating discussions and activities in a way that collectively leads students towards the learning goals of the class.

Moodle tries to promote this view, but is not constrained by it.

Sakshi Goel

SOP

by Sakshi Goel - Tuesday, July 9, 2013, 3:19 PM
 

Standard Operating Procedure.


Art Lader

spam

by Art Lader - Sunday, May 15, 2005, 12:32 PM
 
Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. However, if a long-lost brother finds your e-mail address and sends you a message, this could hardly be called spam, even though it's unsolicited. Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.
In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.

There is some debate about the source of the term, but the generally accepted version is that it comes from the Monty Python song, "Spam spam spam spam, spam spam spam spam, lovely spam, wonderful spam" Like the song, spam is an endless repetition of worthless text. Another school of thought maintains that it comes from the computer group lab at the University of Southern California who gave it the name because it has many of the same characteristics as the lunchmeat Spam:

Nobody wants it or ever asks for it.
No one ever eats it; it is the first item to be pushed to the side when eating the entree.
Sometimes it is actually tasty, like 1% of junk mail that is really useful to some people.

source

Markus Ebenhoeh

SQL

by Markus Ebenhoeh - Saturday, July 5, 2008, 5:29 AM
 
short for 'Structured Query Language'


(I entered this entry only because a forum search for 'firebird' also brought up ALL the entries that included 'sql' even as a substring as e.g. in 'mysqladmin'.)




Page:  1  2  (Next)
  ALL