AAP logoAAP logo
Results for "energy"
127 Results
  • Micro-credentials
    The educator uses current research and resources aligned with global education to create a yearly resource plan. The educator identifies strategies and activities that support the global competence framework, and incorporates them into lessons, assignments, activities, or assessments. Method Components Educating a new generation of globally and culturally competent students is imperative. A clear framework for global competence requires students to engage in robust and rigorous exploration that includes investigating the world, recognizing perspectives, communicating ideas, and taking action. Definition of Global Education Global education helps students develop their capacity to be informed, open-minded, responsible people who are responsive to diverse perspectives. Global education prepares us to address the world’s most pressing issues collaboratively, equitably, and sustainably. Global education helps students understand that pressing issues must be faced in an interdisciplinary way, given the complexity of environments and competing needs and interests.
    By: Jayathilini Lakshika Hewapathirana
    Wednesday, May 12, 2021
    +1
    post image
  • THE CULTURAL CONTEXT OF HOME CARE
    Culture affects the day-to-day organization of care. Consider the idea of a partnership between families and nurses sought by home health care agencies. Agencies rightly recognize that optimal self-management of disease and a person’s return to function depends on a reasonable division of labor, shared information, and the willingness of family caregivers to learn rehabilitation and nursing protocols, medication administration, the use of assistive technologies, and the like (Wolff et al., 2009). But a family’s involvement may depend on how they define this partnership and, in particular, whether or not the home health care provider is considered part of the family (Knox and Thobaben, 1997; McGarry, 2009). Similar effects of culture may be evident in the willingness of families to accept telehealth technology, express their degree of burden or need for help, or seek hospice care at the end of life.
    By: rupali
    Wednesday, May 12, 2021
    +2
    post image
  • Outcomes of Global Education
    Through global education, students will prepare to thrive and lead change in an interconnected world. Students will engage in dimensions of cultural diversity to reach common understandings and goals. Through a stronger awareness of global issues, students will be able to address today’s greatest challenges and make a difference in the world, both collaboratively and equitably. Global Competence Framework The four-part framework (investigating the issue, recognizing perspectives, communicating ideas, taking action) incorporated into this micro-credential reflects the changing role of our students in the 21st century. Students must have a substantive understanding of the complex, diverse, and interdependent world in which they live. Educators will delve into the research that supports the students becoming globally competent through inquiry. The four-part framework is described below. Additional resources are available in the “Supporting Rationale and Research” section and should be examined prior to completing this micro-credential.
    By: Scarlet Patrick Erinson
    Wednesday, May 12, 2021
    +3
  • HOME CARE AND THE SOCIAL-ECOLOGICAL MODEL
    The social-ecological model emerged from ecological systems theory (Bronfenbrenner, 1979), which explicitly sought to examine transactions between persons and their environments. The model stresses cross-level influences, in which community or organizational environments can shape individual behavior (top-down effects), but also examines how individuals form groups or take actions that may affect higher-level organizational or community spheres (bottom-up effects). The Centers for Disease Control and Prevention has incorporated social-ecological models into a number of its health promotion and disease prevention efforts. The simple onion or Russian doll rendering of social-ecological relations as concentric circles is not in itself very informative. However, flowchart models based on such relationships can be useful for specifying hypothesized cross-level influences.
    By: rupali
    Wednesday, May 12, 2021
    +1
    post image
  • Artificial intelligence
    Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience. Since the development of the digital computer in the 1940s, it has been demonstrated that computers can be programmed to carry out very complex tasks—as, for example, discovering proofs for mathematical theorems or playing chess—with great proficiency. Still, despite continuing advances in computer processing speed and memory capacity, there are as yet no programs that can match human flexibility over wider domains or in tasks requiring much everyday knowledge
    By: Edwin Castel
    Wednesday, May 12, 2021
    +3
    post image
  • Response Accommodations
    Response Accommodations The educator uses a set of guiding questions to identify one response accommodation for a student with a disability based on his or her individual learning strengths and needs and the barrier created by the disability. The educator then implements the accommodation and evaluates its effectiveness. Method Components This micro-credential, one of four in the Accommodations stack, addresses response accommodations. These micro-credentials are consistent with the Individuals with Disabilities Education Improvement Act (IDEA) requirements, and are therefore relevant to students in grades K-12 with disabilities. Educators should understand that students with disabilities often encounter barriers when they access the general education curriculum. The Every Student Succeeds Act (ESSA) and the Individuals with Disabilities Education Improvement Act (IDEA) require that educators provide appropriate
    By: Lorell Sandi
    Wednesday, May 12, 2021
    +1
    post image
  • Drink enough water
    It’s common to get a little constipated if you don’t drink enough water. Inactivity, diet changes, illness, and even stress can add to the problem. Constipation usually passes on its own, but you can help move things along with exercise, over-the-counter meds, and of course, water. See a doctor if your constipation lasts for more than a week or two or you have dizziness, bad pain in your belly, or blood in your stool. These could be signs of something more serious. Read more follow : https://www.webmd.com/a-to-z-guides/ss/slideshow-drink-enough-water
    By: Abira Grooz
    Wednesday, May 12, 2021
    +1
  • symmetric-key encryption
    symmetric-key encryption is effective only if the symmetric key is kept secret by the two parties involved. If anyone else discovers the key, it affects both confidentiality and authentication. A person with an unauthorized symmetric key not only can decrypt messages sent with that key, but can encrypt new messages and send them as if they came from one of the two parties who were originally using the key.
    By: Edwin Castel
    Wednesday, May 12, 2021
    +3
    post image
  • symmetric-key encryption
    symmetric-key encryption is effective only if the symmetric key is kept secret by the two parties involved. If anyone else discovers the key, it affects both confidentiality and authentication. A person with an unauthorized symmetric key not only can decrypt messages sent with that key, but can encrypt new messages and send them as if they came from one of the two parties who were originally using the key.
    By: Edwin Castel
    Wednesday, May 12, 2021
    +3
    post image
  • Communication to Support Student Learning in a Digital Learning Environment
    The P21 framework emphasizes effective use of oral, written, and nonverbal communication skills for multiple purposes (e.g., to inform, instruct, motivate, persuade, and share ideas). It also focuses on effective listening, using technology to communicate, and being able to evaluate the effectiveness of communication efforts—all within diverse contexts (adapted from P21). Note that working in partners is a great way to collaborate or build shared understanding but a critical part of communication is sharing with an authentic audience. Example strategies that use technology to support communication in the classroom: Host a TED-style conference or showcases for your students to present original ideas on a topic of interest to them to an authentic, external audience. Record and post the videos to a youtube stream. Provide opportunities to listen and ask questions through back channel tools like Today’s Meet or even Twitter. Have your students publish their work through blogs, by creating websites, and by building other online resources that are shared with authentic audiences.
    By: Rose Hozw
    Wednesday, May 12, 2021
    +1
    post image
  • Encryption and decryption
    Encryption and decryption address the problem of eavesdropping, one of the three Internet security issues mentioned at the beginning of this document. But encryption and decryption, by themselves, do not address another problem: tampering. This section describes how public-key cryptography addresses the problem of tampering. Tamper detection and related authentication techniques rely on a mathematical function called a one-way hash (also called a message digest). A one-way hash is a number of fixed length with the following characteristics: The value of the hash is unique for the hashed data. Any change in the data, even deleting or altering a single character, results in a different value. The content of the hashed data cannot, for all practical purposes, be deduced from the hash-which is why it is called "one-way."  
    By: rupali
    Wednesday, May 12, 2021
    +1
    post image
  • symmetric-key encryption
    With symmetric-key encryption, the encryption key can be calculated from the decryption key and vice versa. With most symmetric algorithms, the same key is used for both encryption and decryption.Implementations of symmetric-key encryption can be highly efficient so that users do not experience any significant time delay as a result of the encryption and decryption. Symmetric-key encryption also provides a degree of authentication, since information encrypted with one symmetric key cannot be decrypted with any other symmetric key. Thus, as long as the symmetric key is kept secret by the two parties using it to encrypt communications, each party can be sure that it is communicating with the other as long as the decrypted messages continue to make sense.
    By: Edwin Castel
    Wednesday, May 12, 2021
    +1
    post image
  • loading