- Category: Education
- Topic: Learning
Virtual Learning Environments (VLEs) typically support the Shared Content Object Reference Model (SCORM) as a standard, but there is no universally agreed standard for transferring student performance data from one VLE to another. The IMS Global Consortium has defined standards for content sharing, while local authorities and educational bodies have established their own compliance frameworks to encourage engagement. VLEs are not limited to college and university students; they are also used in K-12 education, homeschooling, and independent education programs. As virtual learning becomes more integrated into curricula, it is crucial to assess the quality and rigor of virtual programs against Virtual Learning Program Standards.
1.7 Project Documentation
Rendanow University has undertaken steps to develop a new VLE to enhance educational efficiency by combining education and innovative technology. Our team created the VLE along with its underlying infrastructure and application, while maintaining a safe environment that meets the necessary requirements. Dr. Lum Kum Meng is one of our clients with whom we reviewed the VLE's previous requirements.
2 Evaluation
Teachers and educators require benchmarks to evaluate VLEs as an effective educational tool. Two methods include the Distance Learning Environment Study (DELES) survey tool developed by Walker, which explores elements such as instructor assistance, student autonomy, and authentic learning, and a criterion-based method devised by Harnish and Reeves, which focuses on training, system implementation, communication, and support.
2.1 Experiment Scope
This project uses the Moodle platform to create an electronic learning platform for students, administrators, and educators. The e-learning system encourages students to develop collaborative attitudes, enhance communication, and offers them a more convenient approach to attend classes while reducing the time and costs associated with learning and self-development.
2.2 Plan Reckoning
Our group plans to complete this project within 11 weeks from 20/10/2021 to 22/12/2021. Our primary goal is to construct a professionally stable security system while allowing public access. We will urge our clients to support the specific criteria and general goals outlined in the project's structure and give them a better understanding of the entire operation.
2.2.1 Work Breakdown Structure
2.3 Scheme Analysis
Rendanow University uses both Windows and Linux servers.
2.6 Roles and Responsibilities
The project manager ensures that the team is efficient and well-informed before executing the end result. The item administrators should ensure the yield proficiency from each team member and guarantee that the group meets the standards and goals of the project. The chief should emphasize the quality of the group members undertaking the project. The client should provide input to upgrades and ensure the standards and expectations of the objectives by the team are well met.
2.7 Methodology
After discussions with the production team, we have decided to use the waterfall method for this project. This method is easy to handle and use. In the waterfall model, each step should be completed before moving on to the next, and the stages do not overlap. Careful planning is crucial in the waterfall system. The project's prerequisites should be clear from the start, and everyone involved in the project should be aware of the requirements. Each part of the team should be aware of their role in the project and what it entails. The different phases of the Waterfall Model are displayed in the following diagram.
Redesigning - The optimal approach for the planning phase of the cascade process involves dividing it into two distinct subphases: intelligent planning and actual planning. The legitimate plan subphase is the initial conceptualization and hypothesizing of potential solutions. The actual plan subphase involves the transformation of these ideas and designs into tangible specifications.
Execution - During the implementation stage, developers assimilate the requirements and specifications obtained from the earlier stages and proceed to produce authentic code.
Validation - The client is responsible for reviewing the product during the verification stage to ensure that it meets the requirements and guidelines established at the beginning of the cascade project. This is accomplished by delivering the finished product to the client.
Maintenance - During the maintenance phase, the client frequently uses the product and identifies any bugs, deficiencies, and other errors that may have occurred during production. The production team rectifies these issues as necessary until the client is fully satisfied.