Class to evaluate training methods there are some questions


1. Computer-based training is more widely used today by both organizations and educational institutions. Discuss the differences between CBT and eLearning in both environments. List the basic components of CBT and how interactive multimedia is used to enhance the content of the CBT. Give some of your own experiences with CBTs as examples.

2. Class to evaluate training methods there are some questions we can ask in the investigatory stage of learning more about current training programs.  It can be useful to find out the following information:

a. How long have they been using this method?

b. How many people get training with this method each year (Approximate)?

c. What are the advantages of using this over other methods?

d. What are the disadvantages of using this over other methods?

e. Do they blend this type of training with other methods?  If so, why?

f. Do they have any evidence of whether trainees are responding positively or negatively to the method?

g. How is the method delivered to the trainees (LAN, internet, etc.)?

3. In this week's lecture, we discussed the importance of planning your instructional strategy. What are the components of an instructional strategy? How important is the room layout and what impact does it have on the effectiveness of training? What are some of the characteristics of a good training room? How would you decide on the best room layout for classroom training?

4. Why is an understanding of national cultures important in strategic training? 

2 part:

1. Research a recent web application security breach in both the popular media and some technical media. What caused the security breach? How did the company respond? What was the result?

2. If you were giving advice to someone who wasn't really technically savvy and who had a new computer, what advice would you give him or her about security?

3. Do you think that security breaches tend to happen to bigger organizations such as Home Depot because of their size? Or, do you think that there are other characteristics here that we can see that can come into play?

4. It is often said that there are trade-offs between security and other desirable goals for a website, such as cost, performance, and ease of use. Can you give an example of how increasing security might make a website more costly, slower, harder to use, or impact it in other ways? What factors should an organization consider in deciding how much security should be applied to a site?

5. Do you think that there is such a thing as too much security here as a whole? What do you think are some dangers with too much security impacted here?

6. What are some of the problems users encounter with managing passwords to websites? How can password management be made easier?

7. Think of yourself as a consumer - what would you say is a good eCommerce website that you've used that you feel safe with but is not too cumbersome to get a transaction through? What makes you think that you are comfortable with this overall?

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Class to evaluate training methods there are some questions
Reference No:- TGS02636585

Now Priced at $35 (50% Discount)

Recommended (93%)

Rated (4.5/5)