WWW.DIS.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Thesis, dissertations, books
 
<< HOME
CONTACTS



Pages:     | 1 || 3 | 4 |   ...   | 7 |

«Gloria Childress Townsend Professor of Computer Science Stephanie Ball Laura Kuh Computer Science Majors DePauw University SIGCSE Original 2005 ...»

-- [ Page 2 ] --

Description: Students from the same classes can meet several nights before a test to review the material and ask questions.

Benefits: An organized study session prevents procrastination. Students are able to combine their knowledge for a better understanding of the material.

–  –  –

Description: Ask faculty members to hold a study session for students interested in taking the GRE. Afterwards, encourage students to review each subject area (such as computer organization) as a group, using at least two sessions where all students prepare for the first meeting using notes and textbooks from previous classes. Individual members of the group prepare presentations that address unanswered questions in a second meeting.

Benefits: Allowing the students to ask experienced faculty members questions about the GRE will calm nerves and kick off the test preparation phase. "Dividing and conquering" further preparation keeps the group on task and lends efficiency to the process.

–  –  –

19. "Take Apart Your Computer" Day Academic Description: Faculty members help female students explore the inside of a computer. Alternately, student volunteers take computers apart with younger students, such as students from a local high school, Girl Scout troop, etc.

Benefits: As young children, girls are not encouraged to explore things on their own, especially a computer – the "boys' domain". Therefore, women are less likely than men to view the computer as a "toy" to take apart and to explore. Participating in a "Take Apart Your Computer" Day gives women a new perspective, demystifies the computer as a black box, and creates a knowledge base that empowers women. Bettina Bair at The Ohio State University offers a "Computer Anatomy 101 Workshop" that is a variation. (See next pictures.)

–  –  –

Bettina Bair and ACM-W event for elementary school girls

For more information regarding Idea #19:

Bettina Bair The Ohio State University bbair@cse.ohio-state.edu "This event turned out to be fairly easy to run. We were lucky to get a lot of equipment donations from CSE faculty, staff and students.

We had many old PCs, one Macintosh and even a couple thin clients.

There were also several monitors, keyboards, mice, disk drives and various modems and other circuitry. Almost everyone got her own PC to dismantle. (There were a couple of pairs of sisters who worked together on one box.) It was amazing how fearless the girls were in ripping out circuit boards, disk drives and cables. They also surprised us by asking to take home various parts as souvenirs. One girl was thrilled with her 'brain' (CPU). Another girl dismantled a keyboard to leave us a Thank You note spelled out in key pads.

The best part was seeing everyone successfully identify all of the eleven components in their challenge: CPU, Memory, Bios, Chipset, Video Board, Modem, Soundboard, Motherboard, Fan, Diskdrive and Power Source.

Each child went home with a ring of 'mindquest' style trading cards that contained fun facts about all the parts [available online]. These girls are going to be terrific computer scientists someday.

When all the dust settled, we were left with the skeletonized carcasses of a dozen PCs, some lost screw bits, a pile of unclaimed screws, a lot of pictures and many fond memories."

Cost: We spent money on printing the trading cards (~$250), and on stickers (~$5). Volunteers brought tools, which were loaned out (and mostly returned in good condition). The workshop took about 45 minutes to set up and about 15 minutes to cleanup. We had one practice session for the volunteers, too.

20. Community Colleges Academic & Service Description: Statistics indicate that community colleges have a higher percentage of female students receiving degrees in computing-related majors than four-year institutions do.

Gather a small group of students to visit a nearby community college and have a meeting, brown-bag lunch, or similar event with women who have related interests. The students can talk about their respective programs and explore ways to continue communication and common events. The community college probably lacks a formal, organized "women in computing" group, allowing the visitors to encourage formation of a sister or joint group.

Benefits: A meeting between a community college and a four-year institution benefits the women's programs of both schools by encouraging retention in both schools and recruitment of the women who will graduate with associate's degrees to the four-year, sister school.

–  –  –

21. Research Presentation Academic Description: Select several female seniors from the capstone course (Senior Project, Senior Seminar, etc.) for a program where the seniors give advice to younger women. Some or all of the seniors can demonstrate their work for the younger students.

Benefits: This activity provides role-modeling opportunities and helpful advice for younger women from experienced students.

–  –  –

22. Visit Universities Academic Description: Small- or medium-sized colleges plan a field trip to a nearby large, research institution’s campus to visit research project laboratories and/or hear female graduate students talk about their research and their lives as graduate students. For large universities, plan a trip to a nearby small or medium-size college to present research and talk about lives as graduate students.





Benefits: This activity keeps the students up to date on current research and provides undergraduates with insight into graduate school life. Mentoring and practicing presentation skills reward graduate students.

–  –  –

23. "Meet the Grads" Night Academic & Social Description: Invite recent graduates to talk to current students in the computer science department. The graduates should be a mix of people who went to graduate school and people who started their careers right after graduation.

Benefits: Students will receive knowledge about possible paths after graduation and helpful advice about their futures from successful role models.

Group Size: Large

24. Bulletin Boards Academic & Social Description: Gather a group of students to make announcement boards to be placed in public areas, advertising classes in the computer science department, career possibilities, research posters, pictures of local award winners and women in-the-news, famous women in computing, tutoring opportunities, grants scholarships, ACM-W meetings, etc..

Popular places to post would be restrooms, inside classrooms, and in dorms. Consider fun pictures of officers, blown up to poster size. This also helps to dispel stereotypes.

Vicki Allan at Utah State University takes pictures of her officers making a human pyramid on the quad or dressed in prom dresses, tiaras, with sashes stating the students' offices. Another shot shows the officers lying as spokes in a wheel with their heads together.

Benefits: Bulletin boards are a great, informal source of information that could draw curious people to the computer science department, especially if placed in unexpected but highlyvisited locations.

Group Size: Large

25. Scrapbook Academic Description: Organize a group with scrapbook experience to construct a "women in computing" scrapbook. When high school women come for visits, show them the book. When young women in introductory classes talk about majoring or when faculty members suggest it, also share the scrapbook with them.

Benefits: The scrapbook is useful for recruiting young women to the computing field. It shows the advantages and diversity the major has to offer.

Group Size: Medium

26. Testimonials Academic Description: Host an "Oprah" event: Each woman shares her “most difficult time in computing and how she dealt with problem” or “what I’ve learned in COMPUTER SCIENCE that may help others”, etc.

Benefits: An event like this allows the students to open up and share their experiences with one another, promoting new friendships, understanding and role-modeling.

Group Size: Large

27. Buddy System Academic Description: At the beginning of each semester, hold a meeting where women can get together and meet the other women in their classes. The students can then pair up with each other (or form small groups) and set up times to meet outside the classroom throughout the semester, so that the class goes more smoothly for each.

Benefits: Previous research has shown that women thrive in smaller classrooms with small group interaction [15]. The buddy system works to achieve that small group interaction with women.

Group Size: Groups of two

28. Women’s History Month and Computer Science Education Week Academic Description: Provide a display for the computer science classrooms area regarding pioneers, including the ENIAC women, Ada Lovelace, and Grace Hopper. Work with the Women's Center, Feminist Studies Department, or the Computer Science Department, etc. to ask a technical female speaker of historical interest to tell her story. Invite as broad an audience as possible. Ask the speaker to lunch or dinner with members of the women-incomputing organization.

Benefits: Honoring women pioneers is a great way to inform people of the achievements that women have made in computing.

Group Size: Medium Women and Communicating

–  –  –

Good communication skills are vital to success in the workplace, but men and women communicate very differently, which can often lead to problems. Understanding these communication differences could be a huge advantage to a woman, who then may be able to strengthen her communication skills in situations where both sexes are involved.

–  –  –

Description: Find an expert in communication who is willing to volunteer time. Many schools or offices specialize in providing teaching and training for campus groups and departments.

Frame the workshop as a general-audience event: How everyone can improve communication practices.

Benefits: At Stanford University, a third of the attendees to this event were male, even though the event was held in the Women's Center – far from the Computer Science building.

Communication is a critical part of computing project work success, and the topic had broad appeal. By taking the focus off of women, gender issues in communication can still be part of the discussion. By including both men and women, the focus can shift from what women should "fix" to how everyone can improve communication. (Lilly Irani)

–  –  –

Description: Obtain a copy of Deborah Tannen’s book You Just Don't Understand or

Women and Men in Conversation, or Linda Babcock’s book, Women Don't Ask:

Negotiation and the Gender Divide. Allow several women who have time to read or skim the books to hold a discussion on women’s forms of communication.

Benefits: Books provide good resources to explore the communication barrier between men and women in more depth.

–  –  –

31. Lab Welcoming Academic Description: The uninviting and unfamiliar COMPUTER SCIENCE laboratory environment can be daunting to women. Gather several older students and invite the laboratory assistants and any other student assistants in the department to a discussion session, providing information that will sensitize the students. The lab assistants should be sure to circulate among the students, be friendly, stop to ask how students who don't request help are doing, and not wait for students to summon a tutor.

Benefits: This welcoming session makes the students more comfortable in the lab environment, especially at big schools where labs are dominated by men.

–  –  –

32. Ice-breaking Session Academic Description: Early in the first week of the semester, invite all the student assistants (as well as any faculty members who are willing to attend) to a punch-and-cookies event for women in the introductory courses. Ask each tutor/assistant to provide personal information plus a hint that s/he developed from her/his own experience with the introductory sequence.

Explain to the student helpers beforehand that the goals lie in: Demonstrating the approachability of the students/faculty; breaking the ice so that students are more likely to seek help, when they need it; showing students that they "belong" and that the department welcomes them.

Benefits: Students, tutors, and faculty members will be better acquainted and the students will be more likely to seek help from these excellent resources.

–  –  –

33. Invite a Friend Academic & Social Description: Ask women to invite as many women as they can to a lunch or dessert event.

Advanced students should briefly describe "why I am majoring in computer science" and "what our classes are like". The sponsor can suggest that taking one, single class can make a difference in one's career choices; that taking the introductory course is a win/win situation; that having no computing background serves as a filter to strain out future options. She also describes the support system in place for women-in-computing.

Benefits: Students with no computing background realize the benefits of taking a computer science course.

–  –  –

Description: Invite students who are double-majoring or otherwise pursuing interdisciplinary paths, along with faculty members who perform interdisciplinary research to speak about projects. Examples include digital art, artificial life, mathematical simulation, etc.

Benefits: Women are able to see other women pursuing a different path in computer science other than just writing code. These women can be role-models to students who want to use computers as agents to benefit the community.

–  –  –

Description: Ask an attorney, physician, or veterinarian, etc. who is an alumna to hold a short conversation with the women-in-computing group. Have the speaker concentrate on how the computer science undergraduate degree helped her to succeed in her chosen field.



Pages:     | 1 || 3 | 4 |   ...   | 7 |


Similar works:

«A GOOD WORD FOR FATHERS Sermon Preached by Jon M. Walton June 17, 2012 Scripture: Genesis 9:18-29; I John 3:1-3 It’s Father’s Day and I would like to say a good word on behalf of fathers. Fathers are of course, either lionized or demonized in popular culture, and blamed for many things on the therapist’s couch. But few of the fathers we see on television or in the movies are exactly like the fathers in our own families. When I was growing up Robert Young played the role of Jim Anderson...»

«The Dialectics of Closure in Bulgakov's Master and Margarita Susan Amert In the essay below, Amert explores the notion of endings -particularly death, but also narrative endings in The Master and Margarita. Published in The Russian Review 61, no. 4 (October 2002): 599-617. From the archive section of The Master and Margarita http://www.masterandmargarita.eu Webmaster Jan Vanhellemont Klein Begijnhof 6 B-3000 Leuven +3216583866 +32475260793 Some of it Pilate could read: There is no death. The...»

«EDUCATOR’S GUIDE TUNDRA BOOKS About the Book A bug flies through an open door into a house, through a bathroom, across a kitchen and bedroom and into a living room. where its entire life changes with the switch of a button. Sucked into the void of a vacuum bag, this little bug moves through denial, bargaining, anger, despair and eventually acceptance — the five stages of grief — as it comes to terms with its fate. Will there be a light at the end of the tunnel? Will there be dust...»

«Malta: Aktuelle Situation für Verletzliche Themenpapier des SFH-Rechtsdienstes Muriel Trummer Bern, 6. September 2010 Impressum HE R AU SG EB E R IN Schweizerische Flüchtlingshilf e SFH Postfach 8154, 3001 Bern Tel. 031 370 75 75 Fax 031 370 75 00 E-Mail: info@fluechtlingshilfe. ch Internet: www. fluechtlingshilfe. ch Spendenkonto: PC 30-1085-7 AUT O R I N Muriel Trummer CO PY R I G HT © 2010 Schweizerische Flücht lingshilfe SFH, Bern Kopieren und Abdruck unter Quellenangabe erlaubt....»

«A POSTCOLONIAL AND ECOCRITICAL READING OF MARLENE VAN NIEKERK'S MODERN PLAASROMAN AGAAT Reinhardt Fourie Academiejaar 2010-2011 Promotor: Prof. dr. Yves T’Sjoen Masterproef voorgelegd aan de Co-promotor: Prof. dr. Kathleen Gyssels Faculteit Letteren en Wijsbegeerte ter verkrijgen van de graad Master in die vergelijkende moderne januari 2011 letterkunde ABSTRACT A Postcolonial and Ecocritical Reading of Marlene van Niekerk's Modern plaasroman Agaat This study aims to determine the importance...»

«Luke 15:1-3, 11-32 1Now all the tax-collectors and sinners were coming near to listen to Jesus. 2And the Pharisees and the scribes were grumbling and saying, ‘This fellow welcomes sinners and eats with them.’ 3So he told them this parable. 11‘There was a man who had two sons. 12The younger of them said to his father, “Father, give me the share of the property that will belong to me.” So he divided his property between them. 13A few days later the younger son gathered all he had and...»

«City Branding: Part 1: Nicknames, Slogans, Songs & Icons What’s Your City’s Claim to Fame? Take action to define your identity and image By Jeff Coy, ISHC If your city has a nickname, it adds to your identity. It says something about the people who live there their values, what they view as important. Whether it is official or unofficial, a nickname tells a story about your city and begins to establish a brand. Your city’s brand has economic value in terms of attracting visitors. The...»

«LA GESTIÓN DE RIESGOS EN EL ORDENAMIENTO TERRITORIAL: INUNDACIONES EN CALI, LA C.V.C Y EL FENÓMENO ENSO. Andrés Velásquez* Universidad del Valle OSSO, Corporación OSSO. Ingeniero Geólogo de la Universidad Nacional Seccional Medellín (1984). Ha sido investigador asociado del OSSO desde 1987 y actualmente es su director. Es profesor de la Universidad del Valle desde 1988, y miembro fundador de La Red de Estudios Sociales en Prevención de Desastres en América Latina, LA RED...»

«UD Biostatistics Dataset Requirements Introduction The format typically required for analysis of data is described below. The intention is twofold. First, we aim to minimize delays and improve efficiency, as the time spent providing data management can be significant. For this reason, it is requested that you reformat your data in an intractable form. Second, we want to encourage good data management practice. It is suggested that you consult with us about your dataset before you begin data...»

«I AM A MOON & THE MEANTIME – FURTHER INFORMATION on THEATER EMORY AUDITIONS– GENERAL Please see the THEATER EMORY STUDENT AUDITIONS: FREQUENTLY ASKED QUESTIONS document for general information about auditions and Theater Emory productions. Actors may audition for I am a Moon (Moon), or The Meantime (Meantime), or for both productions. • Moon and Meantime overlap. Actors can be cast in one or the other production, not both. In any case, Theater Emory and Theater Studies advise involvement...»

«Copyright © 2003, 1997 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-142579-9 The material in this eBook also appears in the print version of this title: 0-07-137751-4. All...»

«14 RESEARCH Research is where all the hard work of cataloging pays off. Research allows you to develop insights and draw conclusions about your collections. PastPerfect can sort and organize your data in new and unexpected ways. If your catalog records have been entered carefully and consistently, you will enjoy performing searches of the collections. Using the Research section on the Main Menu, you can access Catalog Lists, create queries using fields common to all four catalogs (Object,...»





 
<<  HOME   |    CONTACTS
2016 www.dis.xlibx.info - Thesis, dissertations, books

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.