#distance learning education
distance learning (e-learning)
Distance learning, sometimes called e-learning, is a formalized teaching and learning system specifically designed to be carried out remotely by using electronic communication. Because distance learning is less expensive to support and is not constrained by geographic considerations, it offers opportunities in situations where traditional education has difficulty operating. Students with scheduling or distance problems can benefit, as can employees, because distance education can be more flexible in terms of time and can be delivered virtually anywhere.
Popular distance learning technologies include:
- Voice-centered technology, such as CD or MP3 recordings or Webcasts
- Video technology, such as instructional videos, DVDs, and interactive videoconferencing
- Computer-centered technology delivered over the Internet or corporate intranet
Studies indicate that distance learning can be as effective as the traditional format when the methods are appropriate to the teaching tasks, there is student-teacher interaction, and the teachers provide students with appropriate and timely feedback.
This was last updated in September 2005
– The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise’s capital and earnings. (SearchCompliance.com )
– Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or website or a request for further information) from a selected group of con. (SearchCRM.com )
– An engineering bill of materials (EBOM) is a product recipe structured from the design standpoint, rather than the manufacturing standpoint. (SearchManufacturingERP.com )
– Terms related to business, including definitions about project management and words and phrases about human resources, finance and vertical industries.
– This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce.
The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory and technological threats to an enterprise’s capital and earnings.
Risk management is a company’s process for identifying and controlling threats to its assets, including proprietary corporate data, customers’ PII and intellectual property.
OPSEC (operational security) is an analytical process that identifies assets such as sensitive corporate information or trade secrets, and determines the controls required to protect these assets.
Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or website or a request for further information) from a selected group of consumers in response to communication from a marketer.
Microsoft Dynamics 365 is a new service that integrates Microsoft’s CRM system with ERP data as well as with Office 365 to give sales people greater data intelligence about customer records in terms of customer transactions, customer behavior and customer preferences.
Show-me marketing is the practice of telling a brand’s story and engaging consumers through pictures, videos and other visual media.
Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast future activity, behavior and trends.
A/B testing is a statistical method used to assess proposed changes to a product or service.
Data science as a service (DSaaS) is the delivery of analytical reports and data products with embedded analytics produced by a service provider’s team of data scientists to a client enterprise.
A differential backup is a type of backup that copies all the data that has changed since the last full backup.
Backup software makes a duplicate copy of data to protect it and enable recovery if the data is lost or corrupted due to equipment failure or some other catastrophic event.
A storage snapshot is a set of reference markers for data at a particular point in time.
VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).
Pivot3 is a hyperconverged appliance vendor that has deployed over 16,000 infrastructures and all-flash arrays in over 50 countries around the world.
Stratoscale is a cloud infrastructure vendor offering software-defined data center (SDDC) technology.
Panasas is a scale-out NAS (network-attached storage) vendor that produces hardware and software for demanding technical and enterprise environments.
Partitioning a hard disk drive is the first step in preparing it for data storage. A disk partition is a carved out logical space used to manage operating systems and files.
Rambus Dynamic Random Access Memory, or RDRAM (Rambus DRAM), is a type of computer device active memory developed and licensed by Rambus Inc.
Preventive maintenance is the practice of routinely taking measures in hardware administration that reduces the risk of failures and improves the likelihood of quick recovery in the event that a failure does occur.
DevOps engineer is a professional role for information technology (IT) employees who work with development, testing and other aspects of IT to bring new software releases through development, and deploy, test and run the code on production IT infrastructure.
ServiceNow is a cloud-based self-proclaimed “everything as a service” company focused on facilitating the management of IT services (ITSM), IT operations, IT business and software development.
Synchronous replication copies data over a SAN, LAN or WAN so multiple copies are available. The technique is used for applications with low recovery time objectives.
Business continuity is the ability of an organization to maintain essential functions during, as well as after, a disaster has occurred.
A mass notification system helps organizations send one-way alerts to staff and the public during a crisis situation. Notification can be triggered by humans, as well as sensing or security devices.
All Rights Reserved,Copyright 1999 – 2016. TechTarget