• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

dissertation proposal

Extracts from this document...

Introduction

Sadia Hussain        BSc BIS         Dissertation

Introduction

Title:

Aim:

The aim of this project is to investigate what are the impacts of multimedia CD Packages for autistic children

This project provides an insight to what autism is as well as analysing and evaluating multimedia Packages that are designed for autistic children.  The assignment also provides an insight to what autism is as well as looking at the user interface designs of these multimedia packages to see in what manner the designers implement areas so that they best suit autistic children. Two importance areas of this project is come up with a possible solution my self in a form of a design of a product and appropriate literature.

The main purpose for a multimedia package for autistic children is so   that they are able to adapt and relate to a cyber environment in a way that that can help stimulates their learning capabilities.  However;

“The debate over the use of computer technology with children with autism is continuous and ranges from the very optimistic to the very cautious”.

[Plienis & Romanczyk 1985]

Autistic children have difficulties in communicating with people and relating to them in a meaningful way.  It has been recognised by professionals that autism is four times more common in boys than girls and knows no racial boundaries.  A families earnings, their lifestyle or even how educated they are, has no effect on the chances of it happening over a whole spectrum.

...read more.

Middle

Contact image08.png

User and send

 Questionnaires

Carry out image09.png

Interviews

Analyse  image03.png

Interviewee results

Do secondary

Research image10.png

(Internet, Books,

Journals)

image11.png

Analyse

Secondary

Research and

Make notes

image02.png

Write up draft

Report

image03.png

Write up

Final report

Included with

All the info and

Corrections

image04.png

Hand in dateimage05.png

(4th may)

Autism / Autistic Spectrum Disorders

How can ICT benefit students with Learning Difficulties?

ICT facilitates social interaction and communication between two pupils working together.

- ICT assists with the production of high quality, well presented documents.
- ICT can offer pupils privacy in their work, others may be less likely to see their failures. ICT can offer an opportunity to accommodate differing learning styles.
- ICT can assist pupils in learning to be independent.
- ICT affords learners the opportunity to work at their own pace.
- ICT is non-judgmental and allows pupils more control of their own learning.
- ICT can allow some pupils to be gainfully employed while the teacher works with the rest of the class.
- ICT can motivate pupils to making a greater effort and can provide pupils with extra practice required to master basic skills.
- ICT gives pupils instant feedback to their responses.
- ICT can provide pupils with a safe environment to work in.

How is ICT used by teachers of students with Learning Difficulties?

For pupils with Learning Difficulties, ICT can help in the areas of:

Computer Assisted Learning:
A wide variety of programmes are available - tutorial software, drill and practice, problem solving, adventure games and simulations which the teacher can integrate into various curriculum areas.

...read more.

Conclusion



The location of the computer in the classroom is very important. Locate it close to the teacher's desk, facing away from other pupils to avoid distractions and facilitate the teacher with monitoring the pupil's work on the computer.

Multi-media personal computers are shipped with speakers. This is not the best solution for using the computer in the classroom. Headphones offer a better solution. For pairs working together, many hi-fi shops will sell a splitter jack that will allow you plug two sets of headphones into the computer. However, make sure that you buy stereo jacks as mono jacks are also available and you might end up with no sound in one side.

To keep a check on the pupil's use of the computer, set up a monitoring system with a pupil sign-in sheet or a checklist to be ticked off at the end of the session.

Establish a timetable or roster to prevent a pupil staying on too long at the computer. The next pupil(s) won't forget to remind you.

A zip lock bag can be taped to the side of the monitor and used to store headphones neatly when not in use.

Teach pupils a basic understanding of how the computer works. If pupils can sort out minor difficulties when something goes wrong themselves, this builds confidence and makes them more independent.

Be careful about matching the level of difficulty of any task to the pupil's ability. If a task is too difficult or too easy, the pupil will lose motivation.

http://www.dimensionsspeech.com/articles-readingsoft.html

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Request For Proposal Example

    3.2 Goals Our first goal is to have each consultant thoroughly versed in the three core office applications by August 2009 and the productivity tools by December 2009. Our second goal is to ensure that all education must be flexible and available on demand so the consultant can fit it into his or her schedule.

  2. Project proposal "Designing a simple Integrated Network for a Secondary School"

    concerning IT, I realized that our schools are really lacking behind in technology related to IT. Then I decided that creating and designing a network for a school would not be a bad idea. Thought of how to start that, I then contacted my Dad for possible advice.

  1. The intention of this study is to analyze and explore the emerging field of ...

    The scheduler software served as an 'authentication proxy', performing subsequent authentication to other I-WAY resources on the user's behalf. Most sites used a privileged (root) rsh from the local I-POP to an associated resource. The rsh command is used for command execution on the network and does not require the user to input a password [HLE2001].

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    Sanger (2009) explains Microsoft Access is meant for individuals and small businesses. One of the reasons for this is that the data within the database is limited to an overall 2GB size. However, if the business grows, migrating Access data to a more robust database such as Oracle is possible.

  1. Website Design. This is a Texans Credit Union online website. It has recently ...

    Customer Trigger: process tax info request Relationships: Include: Login to system Extend: Normal Flow of Events 1. For each account for currently logged in member a. get the Account tax related transactions b. Summarize transactions as complies with current tax code Exceptional Flows: 6.

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    is no longer appropriate and the company may need to invest in a totally different software, as some time the size of a organization may increase this would mean more data/figures, so the organisation may have to invest in a software that can cope with this data because the current software can?t handle the data load.

  1. Internet Privacy and Security

    Hackers also have access to default passwords of wireless systems so those passwords should be changed as well. Disabling Identifier Broadcasting that announces that you have a wireless connection will in turn not announce it to potential hackers. Enabling encryption will help guard your system against casual hackers but most could still be subject to denial-of-service attacks.

  2. Facebook and its Multimedia elements

    The amount of money regularly coming in is US$2 billion the year of 2010. The Net income is N/A and the employees are 2004+(2011). The website of Facebook is ?www.facebook.com?. The IPv6 support of Facebook is www.v6.facebook.com. The Alexa rank which is online service that ranks for websites based on users data of facebook is -2.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work