Free Essay

Hole in the Wall

In:

Submitted By agrandey
Words 6338
Pages 26
Page 1
Acquisition of computing l iteracy on shared public computers:children and the “hole in the wall”
Sugata Mitra, Ritu Dangwal, Shiffon Chatterjee, Swati Jha, Ravinder S. Bisht and Preeti
Kapur
Centre for Research in Cognitive Systems
NIIT Limited
Synergy Building
IIT Campus
Haus Khas
New Delhi 110016
India
Webmaster’s e-mail: himanshut@niit.com
Website: www.niitholeinthewall.com
Abstract
Earlier work, often referred to as the "hole in the wall" experiments, has shown that groups of children can learn to use public computers on their own. This paper presents the method and results of an experiment conducted to investigate whether such unsupervised group learn ing in shared public spaces is universal. The experiment was conducted with "hole in the wall" (minimally invasive education, or
MIE) computers in 17 locations in rural India. Focus groups in each location were tested for computer literacy for 9 months.
Results, which are discussed in the paper, show that groups of children can learn to use computers and the Internet on their own, irrespective of who or where they are.
It is further observed that such group self -instruction is as effective as traditional classroom instruction.
At the same time, such learning is considerably less expensive and independent of teachers and schools.
The results point to a new pedagogy for children’s education in those circumstances where schools and teachers are either absent or not effective due to any reason.
Introduction
Current research on computers in education is, generally, on the influence and consequences of computers in the school settings that are characterized by direct instructional methods of the last century. These methods are effective in structured teaching systems where all students try to achieve a common goal. These methods consist of drill, practice, fixed ways of assessment, rote memory, passing
Page 2 on of established knowledge areas to students and examinations. While these methods are effective in the hands of good educators and schools, they have severe limitations of scalability and quality. Good schools are expensive, unviable and difficult to build in remote areas. Good teachers of computers and
Information Technology are unlikely to exist or move to rural and other remote areas. Good teachers are rare and expensive and this trend is likely to continue. At the same time, computers are, and will continue to be, more functional, cheaper and faster. It is necessary to assess how computers, as a pedagogic mechanism, can help provide equal opportunity and the required context to children from all types of socioeconomic and cultural backgrounds to learn and achieve basic levels of literacy and education. The present paper is about the acquisition of computer literacy in children in the age group of 6-14 years, it puts forward the following hypothesis, ‘if given appropriate access and connectivity, groups of children can learn to operate and use computers w ith none or minimal intervention from adults”.
The paper is in two sections:
- It evaluates the results of experiments carried out in 17 locations all over India, where 48 computers have been placed in urban slum and rural India. Findings indicate that computers can play an effective role in ensuring equal learning opportunity for the less advantaged children, thereby impacting the socio-economic development of any country in the world.
- It compares the computer literacy of self-taught children to students who gain formal computer education by conventional and structured classroom, teacher centric instruction delivery systems. The “hole in the wall” and Minimally Invasive Education
Many studies indicate that children benefit from exposure to computers as they use it for multiple purposes. Clement (1999) observed that computers give children opportunities that cannot be offered in the physical world. In other words, technology offers children unique intellectual experiences and opportunities. Children have the opportunity to complete a given task on their own thus they have the chance to develop their thinking skills (Papert, 1980).
Minimally Invasive Education (MIE) is a pedagogic method, and derives its name partly from the medical term minimally invasive surgery (Mitra and Rana 2001, Mitra 2003). The idea of MIE crystallized over a period of time based on observations and educational experiments conducted at NIIT.
The experiments were first conducted in Kalkaji, a suburb of New Delhi, India. A computer was connected to the Internet and embedded into a brick wall near a slum. The media often describes this experiment as “the hole in the wall”. It was reported that most of the slum children were able to use the computer to browse, play games, create documents and paint pictures within a few days. Thus, it was observed that, even in the absence of any direct input, mere curiosity led groups of children to explore, which resulted in learning. This, coupled with minimal input from peers, or from anyone familiar with computers, helped the children learn more.
This le ads us to believe that any learning environment that provides an adequate level of curiosity can cause learning among groups of children. Children's desire to learn, along with their curiosity and peer interaction, drives them to explore the environment in order to satisfy their inquisitiveness. As the children explore their environment, they relate their new experience with their previous experience and thereby new learning takes place (Frontline World 2002, Education Guardian 2000, Businessweek
Online 2000, Mitra 2000, Mitra 2003 and Wullenweber 2001). Hence, we define MIE as a pedagogic method that uses the learning environment to generate an adequate level of motivation to induce learning in groups of children, with none or minimal intervention from a teacher. In MIE, the role of the
Page 3 teacher is limited to providing, or guiding learners to, environments that generate adequate levels of interest. A known example of MIE is the type of learning that takes place when an appropriate puzzle is given to children with little or no input from others. The computer itself is capable of generating such intervention from time to time.
The original hole in the wall of 1999 has evolved into a brick structure with computers embedded in it.
In the rest of this paper we will refer to this arrangement as "Minimally Invasive Education Learning
Stations" (MIE learning stations). These have been set up in 22 rural and urban locations across India and similar results are reported through field observations as well as through a GUI Icon Association
Inventory test (Mitra 2003) administered to children. Observations across locations show a learning process of random exploration, collaboration, discovery, vocabulary construction, generalization, practice and peer tutoring (Inamdar, P. (2004).
Minimally Invasive Education (MIE) is based on a paper (Mitra, 1988) that speculated that children can learn to use a computer on their own. Empirical research for five years (Mitra, 1999; 2000, 2001, 2003,
2004) substantiated this speculation. It is an approach that promises to bridge the “digital divide” by helping diverse populations achieve computer literacy. MIE is also a concept of important consequences to the area of education in general. “Minimally invasive” refers to the least possible, negligible, or the minimum help required by the child to initiate and continue the process of learning basic computing skills. This minimal amount of help from other children at the MIE learning station is necessary and sufficient for the children to become computer literate. This “help”, which is the fundamental aspect of
MIE, could be from peers, siblings, friends, or any other child familiar with computers. Children are found to collaborate and support each other. The learning environment is characterized by its absence from adult intervention, openness and flexibility. Children are free to operate the computer at their convenience, they can consult and seek help from any other child/children, and are not dictated by any structured settings. It is observed that children tend to rely upon themselves to generate the necessary learning environment, and to organize themselves for learning. It is to be noted that MIE learning stations are located in safe, open public spaces and are easily accessible to children. They have been designed for use by children (Mitra 2004).
MIE experiments are located in urban slum and rural India. This has resulted in a design for MIE learning stations that address issues of access to technology, financial resources, and cost constraints.
India has problems of poverty, illiteracy, inadequate infra structure, diversity of socio-cultural communities, of varied socio-economic status, spread over a large geographical region.
Page 4
Figure1: A MIE learning station at Village D.Salhundi, Karnataka, India.
MIE experiments clearly indicate that children are able to learn to use computers and the Internet on their own, irrespective of their social, cultural or economic backgrounds (Mitra and Rana, 2001, Mitra
2004). The diversity of Indian conditions is, ironically, useful for applying these results anywhere in the world. Present study
Salient features of children at MIE learning station
The 22 locations where MIE learning stations exist range from the Himalayas to the tip of the Indian peninsula (North to South) and from the Rajasthan deserts to the Ganges Delta (West to East). Of the 22 locations studied in India, children frequenting MIE learning stations are in the age range of 6-14 years, with a mean of 10-11 years. Majority of these children study at the elementary school level (below grade 8). Most are students of government schools. They come from diverse ethnic and cultural backgrounds, and have different first languages such as Hindi, Tamil, Kannada, Marathi, and Bengali.
Most have a rudimentary understanding of the English language. They are typically Hindus, Muslims, and Christians. Within a given community, as is often the case in rural India, they are differentiated by caste. Page 5
The background of the parents is equally diverse; from daily wage labour to farmers, shop owners, autorickshaw drivers, working in cottage industries or in a government organization etc. Men are found to be more educated (8th grade), while the womenare mostly illiterate.
In order to study the impact of MIE learning stations on computer literacy amongst children, we have considered experimental or focus groups, frequent users and control groups from different states. We have clubbed the states into four zones, each zone consisting of a particular state.
South Zone 2 States – Karnataka & Tamil Nadu
North Zone 3 States – Uttaranchal, Jammu & Kashmir, Uttar Pradesh
East Zone 1 State- West Bengal
West Zone 2 States – Rajasthan & Maharashtra
a. Experimental or focus group s – 15 children from each location (except for one location, where the experimental group consisted of 10 children) were selected randomly to be part of this group. For this study, the experimental (focus) group consisted of a total of 250 children from
17 locations. The Icon Association Inventory (IAI), a measure of computer literacy (Mitra
2003, 2004 and described below ) was administered at regular intervals to the focus group.
b. Frequent users –This group consisted of 250 children from all the 17 locations and the IAI was administered on them, only in the ninth month, the last month of measurement. These children visit the MIE learning station frequently but are not part of the focus group.
Measurements on this group was made in order to check whether the focus group scores have any bias due to test familiarity (the Hawthorne effect).
c. Control groups -. Control groups are selected from nearby villages with similar socioeconomic features as the experimental group’s village. A total of 119 children (7 children per location) were selected for this study. These groups did not have access to MIE learning stations or to any other computers. We did not test the control group until at the end of the experimental period. This is important because computers generate such curiosity amongst children that even a hint of a nearby computer would encourage children to visit the MIE learning stations or other places where they may encounter computers.
Students following other learning systems
It is necessary to compare the results of children exposed to MIE learning stations with those of others who learn to use computers in other, more traditional, ways. We selected two groups of such learners:
a. The first group of traditional learners was of the same age group as MIE students, but enrolled as regular students in a school. They are taught computers in the classroom setting, with a prescribed curriculum along with computer laboratory facilities. The medium of instruction was
English and the Central Board of Secondary Education (CBSE) prescribes the syllabus. The
CBSE is a government body that decides the curriculum for primary and secondary education in Indian government schools. Computer education is an integral part of their formal curriculum and professionally trained teachers teach the course. For our study, 50 students in the age range from 10 to 13 years were randomly selected from the sixth grade of the Delhi Police Public
School located in New Delhi, India. Of these, 35 students were finally assessed over a period of
Page 6
5 months. The balance 15 children left the school due to transfer of parents, or were absent on the days when assessment was done.
b. The second group of traditional learners were students enrolled for a one-year Diploma in
Information Technology (DIT hereafter) at an NIIT Centre in New Delhi. NIIT is predominantly an education company and operates over 3000 education centres in 26 countries. These students were engaged in rigorous training on the fundamentals of computers as well as on certain programming languages. The content of the DIT course is varied and is taught by skilled professional Instructors. The pedagogy is “highly invasive” wherein the instructor follows instructions in structured and prescribed courseware followed by structured sessions in a computer lab. We selected a new batch of students and measured their IAI scores over a five month period. There were 27 students in the batch with an ages ranging from 18 to 21 years.
Most of the students were enrolled in college and some of them had already completed graduation. This group of students were older in age, educationally more qualified and had access to state-of-the-art technology.
The Icon Association Inventory
The experimental design (to be described in detail below) consisted mainly of periodic tests for computer literacy amongst focus groups of 15 children at each location over nine months. In order to do so, a test was required that could be:
1. Administered outdoors, since many locations did not have a facility where indoor testing could be conducted.
2. Administered in a short period of time, since it is difficult to assemble and retain the focus groups in outdoor environments for more than 30 minutes at a time.
3. Evaluated in a short time by different evaluators, since the number of tests to be evaluated were relatively large (around 300 results every month).
4. Administered and evaluated using paper and pencil alone, since other facilities or equipment may not be available at field locations. Also, we decided to have the test results sent to a central location (New Delhi) for evaluation by a group of trained evaluators to ensure consistency of evaluation. We could not find a test meeting these conditions and decided to develop one. While the design and validation of this test will be described in detail elsewhere, include below a brief account of the procedures we used to develop and validate the test.
In order to develop a test for computer literacy, we started with children who had taught themselves to use computers at some of our earliest playground facilities (Mitra and Rana, 2001). These children had developed their own vocabulary to describe icons in the Microsoft Windows environment. For example, they referred to the mouse cursor as “teer” or “sui”, Hindi words for arrow and needle, respectively. The folder symbol was described as a cupboard for keeping other objects. While the words used to describe the icons were chosen from their own language and experience, their description of the functionality of the icons were accurate.
We then constructed a list of the 77 icons present in the Microsoft Windows and Microsoft Office environment. The test (see Figure 2) consisted of a list of these common computer GUI (Graphical User
Interface) icons and persons taking the test are asked to describe the purpose of each icon. It is assumed that the number of correct descriptions of icons is correlated to the IT literacy level of the person taking the test. We decided to test this assumption.
Page 7
Figure 2: The GUI Icon Association Inventory, sample layout
Not all persons who are adept at using computers use icons. Indeed, many users do not use icons at all but prefer to use drop-down menus instead. It would, therefore, appear that the ability to identify the function of an icon may not correlate well with the ability of a respondent to use a computer.
We selected 74 users of computers in an urban environment and administered the IAI. These users were people who used the standard functions of MS-Windows and MS-Office such as word processing, spreadsheets, e-mail and so on. They consisted of a heterogeneous group of office administrative staff, students of Information Technology, research assistants and faculty. All were competent and experienced users.
The average score obtained was 49%, with a standard deviation of 18%. The maximum score obtained was 76%, while the minimum was 7%. The results seemed to indicate that users, irrespective of whether they used icons or not, could guess the function of an icon provided it was from software that they used frequently. For example, a secretary who uses a word processor often would be able to guess the function of the icons of word processing correctly, while, if his job does not involve using spreadsheets, would not be able to guess the functions of the icons used in spreadsheets.
Next, we identified two frequent users (Pawan, age 16 and Lalit, age 12) in a slum area of New Delhi, and asked them to study the icons, and write down their descriptions. These independent descriptions were then matched for consistency.
We then asked the two children to work together to resolve any inconsistencies and also describe the functions of the icons they had been unable to, when working independently. Over a period of a week they developed descriptions of most the icons they were shown.
The children could not identify the functions of the icons used in the spreadsheet program, MS-Excel, because this program was not available to them. This was done to check whether they could arrive at a correct functional description of an icon using guesswork and reasoning alone.
Page 8
At the end of this exercise, we matched the descriptions provided by the children with the descriptions given in the Windows and Office “Help” files.
Finally, we developed a scoring key for the IAI that listed the ‘correct’ descriptions for each of the 77 icons. An evaluator would compare these descriptions with those provided by a user in response to the test, and make a subjective evaluation of how closely the two matched for any icon and decide whether to award a correct score for that item.
We then administered the test to 9 children in Madangir, a slum area in New Delhi. These children had been exposed to playground computers for 15 days. The results showed that frequent user of computers took less time and identified more icons correctly than others.
It now became necessary to investigate two aspects of the test:
1. The evaluation of the IAI is dependent on the subjective judgment of the evaluator in deciding whether a child’s description of the function of an icon is adequately close to that given in the evaluation key. We need to find out if such subjective evaluation is sufficiently close to any other objective evaluation, so that the subjective evaluation method can be considered accurate.
2. Whether a score in the IAI, for instance 7 correct identifications out of 77, is a good measure of the computer literacy of the child concerned as compared with his score in any other, standard, test of computer literacy.
The IAI contains 77 icons and requires about 30 minutes to complete and about 10 minutes to evaluate.
Since the evaluation is both subjective and time consuming, an automated version of the test (see Figure
3) was developed by Batra, Dangwal and Ina mdar (NIIT 2003, unpublished). This test consists of the same 77 icons as in the IAI, along with 4 multiple-choice answers to describe each icon. The test is administered on a computer and then evaluated automatically. This eliminates any subjective element in the evaluation. We will call this software version of the IAI, the IAI-S
Page 9
Figure 3: The GUI Icon Association Inventory Software, a sample screen
It is to be noticed that while the IAI-S is an objective method for administering the IAI, its use is restricted to urban, English-speaking populations, where computers are available to all respondents.
A task based computer literacy (TBCL) test (see Figure 4) has been devised by “Outreach and
Extension”, University of Missouri and Lincoln University, USA
(http://outreach.missouri.edu/fcrp/evaluation/computerskills.htm). This test consists of tasks that a person is asked to perform on a computer and its subsequent evaluation.
Figure 4: Task-based computer skills assessment test. Some sample questions.
As such, the TBCL test is a literal test of computer literacy. It takes over an hour to complete the test and about 30 minutes to evaluate the results. While we could not find a validation study on the TBCL, we decided that the results of this test were a good benchmark for evaluating the effectiveness of the two versions of the IAI. This decision was based on the fact that a literal test, such as the TBCL, is close to how examinations are conducted in schools, and should be a good measure of actual performance.
It is important to mention here that we could not find a validated computer literacy test to measure the
IAI against. Hence, we had to rely on the self-consistency of the IAI to establish its validity.
We administered three tests, namely, the IAI, the IAI-S and the TBCL to a group of 18 students (all young adults) enrolled for a course in IT skills. These students consisted of an entire, randomly chosen,
“batch” of students taking these courses in a traditional computer training institute in New Delhi. There were 9 men and 9 women in the sample.
The results, to be reported in detail elsewhere, showed all three tests results to be highly correlated (in the region of 0.95 with a very low probability of error).
We concluded that the GUI Icon Association Inventory in either of its two versions is an effective instrument for measuring computer literacy.
Page 10
The measurement of computer literacy of children at MIE learning stations was, therefore, done using the Icon Association Inventory, a test created and validated for this purpose.
Of the 77 icons in the IAI, 26 icons (in the Excel and Text Format categories) are not present in the computers as configured for use by children at MIE learning stations. Measurements were, therefore, carried out using 51 of the 77 icons. The children are also tested on the remaining 26 icons, as a check of the effectiveness of the IAI in measuring computing skills (there should be an uniformly low score on these icons throughout the testing period).
Measurement Schedule of the IAI
The IAI was administered to all the three groups- children at MIE learning stations, traditional learners in school and students pursuing professional training in Information Technology (DIT), in the following manner. Figure 5: Time intervals for testing
Figure 5 shows the time intervals at which the IAI was administered. It was administered for the first time on the day the MIE learning stations were commissioned for the village children. For the other two groups of formal learners it was first administered on the day of the start of the respective courses. The test was then administered on the 3rd day, the 7th day and every 30 days for a nine month period. The total duration of the testing spanned 248 days, as shown in the figure.
Due to unavoidable circumstances, data for students pursuing professional IT course (DIT) could be collected for a period of 8months and for the regular school students, 5months.
Results
We report the results in two sections. The first section reports the results of the measurements on children using MIE learning stations in 17 locations. The second section reports the results of the measurements on the two learner groups in New Delhi, namely, school students and students at NIIT.
Section I
MIE Learning Station Users
Figure 6 shows the learning curve for children using MIE learning stations.
Figure 6: National level - Performance of MIE LS users in Icon Association Inventory
1 3 7 31 62 93 124 155 186 217 248
Time in Days
1st month 2nd month 5th month 9th month
Page 11
Icon test - National Average with Standard Deviations (9 months)
13.85%
22.84%
27.71%
32.42%
35.45%
41.59%
44.80%
48.42%
51.50%
55.24%
61.34%
-0.55%
1.34%
4.33% 4.52%
8.79%
11.69%
13.64%
16.88%
19.90% 21.12%
24.80%
6.65%
12.09%
16.02%
18.47%
22.12%
26.64%
29.36%
32.65%
35.70%
38.18%
43.07%
R2 = 0.9952
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
40.00%
45.00%
50.00%
55.00%
60.00%
65.00%
1 3 7 31 62 93 124 155 186 217 248
Implemention of icon test over Days
Average Performance (in %)
Avg+Stdev Avg-Stdev Average Linear (Average)
1st month 2nd month 5th month 9th month
The average scores increased from 6.65% to 43.07% over the experimental period of nine months. A high standard deviation is observed throughout. Indeed, this high standard deviation is observed at all individual locations as well.
Figure 7 compares the average scores for the focus, control and frequent user groups over the experimental period. Figure 7: National level Performance in Icon Association Inventory
Page 12
The focus group score is seen to rise from 6.65% to 43.07% while the control group score on the 9th month is seen to be 6.94%. The frequent users score an average of 43.73% in the ninth month. We observe that: There is a significant difference in the performance of the experimental (focus) group on the day of inauguration as compared to their performance on the 9th month. There is a significant difference in the performance of the experimental (focus) group and the control group in the ninth month. There is negligible difference between the focus and frequent user group scores in the ninth month. The Hawthorne effect has not been observed. There is a significant difference between the Control group and the frequent users group scores in the ninth month.
Section II
Results from formal learning systems
a. Regular/Conventional school Children - The data for this group is available for 5 months.
Figure 8 shows the performance in the IAI (without excel and text format icons). It is seen that the IAI average scores rise from 10.44 to 35.96 in the first five months.
Figure 8: Performances of Regular School Children in Icon Association Inventory
Average Performance of Regular School Children
21.05
23.3
25.68
29.1
33.94
39.38
-0.17
4.26
8.7
11.34
14.2
17.88
25.16
46.76
35.96
28.63
24.07
20.22
17.19
13.78
10.44
R2 = 0.9755
-5
0
5
10
15
20
25
30
35
40
45
50
1 3 7 31 62 93 124
Average performance in %
Avg+std Avg-std Average Linear (Average)
1st month 2nd month 5th month
Implementation of IAI over days
b. Students of a professional IT course – The data for this group is available for 8 months. Figure 9 shows the performance in the IAI (without excel and text format icons). It is seen that the IAI average scores rise from 11.96 to 49.17 in the first eight months.
Page 13
Figure 9: Performances of Professional Course Students (DIT) in Icon Association Inventory
Average Performance of IT Professional Course Students in IAI
22.70
24.78 25.57
30.22
34.24
39.86
45.59
49.85 51.22 51.21
1.18
5.55
9.46 10.99
13.23
17.00
23.62
35.09
43.46
47.13
11.96
15.17
17.52
20.60
23.73
28.43
34.60
42.47
47.34
49.17
R2 = 0.9722
0
5
10
15
20
25
30
35
40
45
50
55
Average performance in %
Avg+std Avg-std Average Linear (Average)
1 3 7 31 62 93 124 155 186 217
1st month 2nd month 5th month 8th month
IAI implementation over days
Discussion
Table 1.0 Comparative analysis of the general attributes, learning environment and cost for the three groups studied
a) General attributes of the three groups studied
MIE learning stations Regular School IT Professional school
Age Ranging from 7 - 14 years.
Average age 10-11 years
Ranging from age 10-13 years Ranging from 18 – 21 years
Gender Males and Females Males and Females Males and Females
Background Majority from economically weaker sections
Lower to middle income groups Middle to upper income groups
Education Primary to middle Middle Under graduates to graduates.
[All students have completed
12th grade]
Access to computers Shared Public MIE learning stations Classroom instruction and computer lab
Classroom instruction and computer lab
Assessment Through the IAI Assignments, examstheory, practicals and projects. IAI
Assignments, projects,
Assessments and practicals. IAI
Teaching
Method
Self, Collaborative, little or no intervention from adults
Teacher dependent approach Faculty dependent approach
Time Spent No time restriction 2.5 – 4 hours per week 6 hours per week
b) The Learning Environment
MIE Group Regular School IT Professional group
Page 14
Context Shared public MIE learning stations Classroom instruction and computer laboratory
Classroom instructions and computer laboratory
Access to computers during working hours - On an average, the usage is between 10am-4 pm [MIE learning stations remain open from 9am -5.30pm, beyond which they are shut down]
- no time restriction , children can access computers as long as the learning station is open
- accessible to all children
- visit MIE learning station before going to school or on return or on holidays, nearly the whole day
- 2.4 – 4 hours per week
- attend class at fixed time
- accessible only to students of a given class
- 6 hours per week
- attend class at fixed time - accessible only to students of allotted batch Teaching
Method
- children organize themselves into small groups. Each child is both student (learns from others) and teacher
(teaches children who have less knowledge than him/her). Hence, studentteacher boundaries are blurred. - peers, siblings, friends& others -absence of adult intervention -absence of formal teaching
- teacher centric approach
- entire class taught by one teacher - children not allowed to interact or consult each other during class time.
- teacher centric approach - faculty dependent
- entire class taught by one teacher
- students not allowed to interact or consult each other during class time.
Qualifications Mainly primary school children Teachers are professionally trained and qualified and have teaching experience
Teachers are professionally trained and qualified and have teaching experience
Learning
methods/strategy
Mainly collaborative learning through the methods of observation, modeling, trial & error & self discovery
Individual based learning Individual based learning
Assessment/
Evaluation
No evaluation except IAI which is not seen as assessment. No examination.
Assignments, tests and final examination for both theory and practicals, and projects Assignments, periodic assessment and practicals . Final examination. c) Cost of learning (1 US$= Rs. 44, April 2005)
MIE Group Regular School IT Professional group
Rupee 1 per child per day, based on an estimate of an average of
200 children using each learning station. Annual cost Rs. 365/- per child
Rs. 1250/- per month per child
Annual cost Rs. 15000/-
Rs. 17000/- per semester per student. Annual cost Rs. 34000/-
Page 15
Table 2.0 Comparative analysis of performance on IAI for the three study groups: MIE learning station users, regular school students and IT Professional course students
MIE Group Regular School IT Professional group
Inauguration (1st day) 6.65 10.44 11.96
3rd month (62 days) 22.12 24.01 23.73
5th month (124 days) 29.36 35.96 34.6
8th month (217 days) 38.18 Not available 49.17
Table 1.0 provides a comparative analysis of the three groups on the basis of general attributes, learning environment and financial costs. There is a significant difference in the age ranges of MIE learning station users and Regular School Students (10-11years) versus IT professionals (18-21 years). Also, the
MIE learning station users are from an economically disadvantaged group in contrast to the other groups. Regarding the learning environment in which all the three groups accomplish computer literacy, the differences between MIE learning station users and others is significant. The learning method used by
MIE learning station users, draws upon the expertise of peers, siblings and friends. Each learner is both a learner and a trainer.
Table 2.0 provides the performance on IAI for the three groups studied. The MIE learning station users begin at the lowest level of performance – 6.65%, in comparison to regular school students (10.44%) and the IT professional course students (11.96%).By the third month, the three groups are at par. By the eighth month, the IT professional group of students stands at 49% in comparison to MIE le arning station users at 38.18%. So, the IT professional group of students performed the best, to begin with, which was perhaps not surprising, given their background. However, the other groups caught up with them by the eighth month. In this connection, it may be noted that office secretaries score between 30% and 50% in the IAI, as seen from an independent (as yet unpublished) study.
The unstructured, open and flexible environment of the MIE learning station seems to produce comparable levels of computer literacy amongst learners as compared to formal methods. It does so at a considerably lower cost.
Conclusions
We conclude that groups of children can learn to use computers on their own, irrespective of who or where they are. This will happen if computers are provided to them in safe, public locations.
This method of acquisition of computer literacy does not depend on the existence of schools or teachers.
It is also considerably less expensive than traditional methods of computer education. Therefore, in those circumstances where schools and teachers are absent, MIE learning stations are an adequate substitute. Places affected by natural disasters, such as the recent Tsunami in the Indian Ocean, or places affected by war, such as Afghanistan or Iraq, or places affected by economic or social problems such as poverty or HIV/AIDS in Africa are likely to benefit quickly and reliably through such self-learning methods. While this paper is about the acquisition of computer literacy, there are indications that MIE learning stations produce other changes in children’s social and educational achievements. Such changes
(Inamdar, 2004, and others to be published) are described elsewhere.
Page 16
Acknowledgements
An experiment of this nature involves many people, much traveling, data analysis and discussion.
Special acknowledgements are due to Vikram Kumar, Dinesh Mehta, Nitin Sharma, Ashoo Dubey, and the 17 field observers at the villages. It is with their help that the villages were identified and the learning stations constructed. Sanjay Gupta, Vivek Rana, Meera Dutta, Himanshu Tayal and Shailender
Minz’s contributions to the hardware and software development aspects of the experiment were invaluable to the development of the learning stations. We wish to acknowledge the contributions of
Marmar Mukhopadhyay (NIEPA), Kenneth Kenniston (MIT), Bruno Bondet de la Bernardie (IFC), Anil
Inamdar (The Aquarians), Manas Chakrabarti and Suneeta Kulkarni (Soham), in advising the research effort. Financial assistance from the International Finance Corporation, the Government of Delhi, the ICICI bank and NIIT Limited is gratefully acknowledged.
References
Bathla, G (2002); Self-development through collaborative learning: A constructivist approach, an unpublished project report, D.R College, University of Delhi.
Cappelle Van F, Evers, V, & Mitra S (2004): Investigating the effects of unsupervised computer use on educationally disadvantaged children’s knowledge and understanding of computers. Proceedings of
CATaC 2004,Karlstad, Sweden, ( www.it.murdoch.edu.au/catac)
Clement, D.H. (1999) “ Young children and technology”, In Dialogue on early childhood science, mathematics and technology education. Washington D.C: American Association for the Advancement of science Project 2061.
Inamdar, P. (2004): Computer skills development by children using 'hole in the wall' facilities in rural
India. Australasian Journal of Educational Technology, 20(3), 337-350. http://www.ascilite.org.au/ajet/ajet20/inamdar.html Mitra Sugata (1988), A computer assisted learning strategy for computer literacy programmes. presented at the Annual Convention of the All-India Association for Educational Technology, December
1988, Goa, India.
Mitra, Sugata (2000), Minimally invasive education for mass computer literacy, presented at CRIDALA
2000 Conference, Hong Kong, 21-25.
Mitra, Sugata & Rana, Vivek (2001): Children and the Internet: experiments with minimally invasive education in India. British Journal of Educational Technology 32 (2), 221-232.
Mitra, S, Minimally Invasive Education (2003): A progress report on the “Hole -in-the-wall” experiments, The British Journal of Educational Technology, 34, 3, pp367-371.
Mitra, S., The Hole In The Wall, Dataquest, September 23 (2004), http://www.dqindia.com/content/industrymarket/2004/104092301.asp#interact Page 17
MIE Users Manual (2003): Copyright Hole-in-the-wall Education Limited (HiWEL), NIIT Ltd. New
Delhi, India. Contact www.niitholeinthewall.com
Papert, S. (1980). Mindstorms: Children, Microcomputers and powerful ideas. New York Basic Books.
Wullenweber, Walter, (2001), Das loch in der wand, Stern Magazine, No. 42, October 11, pp 97-102.

Similar Documents

Free Essay

Hole in the Wall

...Jessica Garcia Eng 60, CRN 30663 Assignment-Essay 1 Mr. Silva 1 July, 2013 Hole In The Wall The weekend prior to finals, on May 23, 2013 my boyfriend , Christian, took me to a movie theatre called Four Star Cinemas. It was a small, hole- in- the- wall, movie theatre. As we sat down on our individual pillow-like reclining seats, Christian had no difficulty at six- feet- tall reaching the black hardwood floor. On the contrary, I sunk slowly in between the seat like if I had sat in quicksand. Christian just laughed until he eventually helped me. Although the seats weren’t fit for a petite person, we continued to return because of their fantastic prices and consistent showing of new movies. On an early Sunday morning I received a call from Christian at nine o’clock. I rolled back and forth putting my universe-themed blanket over my head: enormous star struck, Saturn-like planets, Dreamworks –like- crescent moon, and a Teletubbies Sun baby. Refusing to answer, but after his persistence I gave in. “Hey,” I said. “Get ready,”he replied with a tone of urgence. I immediately repeated the same routine daily, except today was a different day. Excited for what was awaiting, I felt butterflies in my stomach as if it was our very first date, nearly taking me two hours to prepare myself I was running late not knowing what to wear! Even though Christian pressured me, he was trying to make up for the time I took by speed driving like the excelerater at Six Flags. We arrived before...

Words: 671 - Pages: 3

Premium Essay

Black Jack Ketchum: The Hole In The Wall Gang

...Thomas Ketchum, known as Black Jack Ketchum, was born on October 31, 1862 in San Saba County, Texas. He was a cowboy who then later turned into the life of crime. He joined other outlaws of the Hole in the Wall Gang, focusing on train robberies. When they were not robbing trains, they worked for ranches in New Mexico and Texas. Ketchum had participated in previous train robberies and murders. But on August 16, 1899, Tom attempted to single-handedly rob the same train that he and his brother, Sam Ketchum, had already robbed a few weeks earlier. The conductor of the train saw Tom approaching and recognized him. He grabbed a shotgun and shot Tom in the arm, knocking him off his horse. The train then continued as usual. A posse then found Tom by...

Words: 283 - Pages: 2

Free Essay

Cabling Factors and Tools Discussion

...and offers the most flexibility in placement of outlets and the routing of your cable .When deciding on the location of your outlets, try to visualize where you'll eventually be placing the furniture in the room in relation to the location of your television. Internet services are also being provided now by a lot of cable companies so placing an outlet in a spot near your planned computer station is also a good idea .In general it's a good idea to put at least one outlet in every room whether or not you plan to use it immediately. At least it will be there when it is needed, avoiding the drilling of any unsightly holes in the future. Outlet boxes can be purchased at any hardware store and should be fastened to the wall stud in the location that you want at the same height as existing electrical outlets. It is recommended to install the outlet box in the adjacent wall stud cavity. Any wiring system should have a suitable ground and wiring for your cable TV needs is no exception. When planning your wiring layout always take the point of grounding under initial consideration. This is where most cable companies prefer to enter...

Words: 988 - Pages: 4

Free Essay

Portals

...I was walking one day and noticed something about the path had changed. I looked around and saw that a piece of the right side wall had disappeared. Nobody had ever been on the other side of the wall. There had also never been a hole in the wall. I wanted to investigate but I also had to go to school first so I covered up the hole with ivy growing on the 30 foot wall. Then I ran off to school. On my way home from school I went to the hole in the wall and peeked out. It was all darkness except for one tiny light in the distance. I finally gathered up the courage to step out into the darkness. Covering the hole behind me I slowly made my way to the light. It took me what seemed to be ten minutes to get there. The light seemed to be a portal of some kind. I had read about them in stories but never thought they actually existed. Stepping through the portal I covered my eyes the light was so bright. The brightness suddenly disappeared and I was standing in a round circular room with thousands or maybe millions of portals lining the wall. You could look up and as far as the eye could see were portals. There were platforms so I stepped on one and it said to me which way you would like to go. Up I replied. So the platform started to move up, it was getting so high I was starting to get dizzy from the never ending sight of portals. On the other side of the room (if you could even call it that) I saw something that caught my...

Words: 291 - Pages: 2

Free Essay

Stonehenge

...same time (Ruggles et al). It is important to note that the Stonehenge is built in stages. The circular earthen ditch and bank is the earliest known development in Stonehenge, probably built using the antler of a red deer. It was developed during the Middle Neolithic period, around 2950 BC (Ruggles et al). The monument originally comprised of a ring made of 56 pits, known as the Aubrey holes, named after the antiquarian and scholar, John Aubrey who first discovered and recorded the holes in 1666 (Jack). These holes erected Bluestones that came from the Preseli Mountain in South wales, about 250 kilometers away (Pearson). These Bluestones were around 2 meters long and weigh several tons each (Ruggles et al). It took a lot of effort for prehistoric people to transport the heavy Bluestones from Whales to England; this suggests that the people who first created the monument placed significant importance on the Bluestones. The Station Stones and Heelstone (with a missing companion) were also put at about the same time. The Station stone is a rectangular arrangement of four stones found near the Aubrey Holes and the Heelstones are located outside the northeast entrance (Ruggles et al). The sarsens were then brought to the Stonehenge around 2450BC, these are the huge sandstone blocks that are up to 7 meters tall that we see today. The sarsens are topped with lintels that are linked together forming a...

Words: 3526 - Pages: 15

Free Essay

Pest Insect

...How to Control Pests Safely Getting Rid of Roaches and Mice A Healthy Homes Guide THE NEW YORK CITY DEPARTMENT of HEALTH and MENTAL HYGIENE Contents Why You Need This Guide How to Find Pests How to Control Pests Safely Step 1: Clean Up Step 2: Shut Pests Out Step 3: Starve Them and Parch Them How to Choose Safer Pest-Control Products For Cockroaches: dusts, gel baits, bait stations and sticky traps For Rodents: baits and traps When to Hire a Professional Why You Need This Guide Too many New Yorkers live in homes or buildings that have cockroaches, mice, or rats. Nobody wants to live with pests! Insects and rodents can contaminate food, damage homes, and make allergies and asthma worse. Chemicals people use to get rid of pests also cause problems. Pesticides can cling to carpets, furniture, and other surfaces, and many are dangerous to people and pets. The Poison Control Center takes about 1,000 reports of accidental pesticide poisonings or exposures every year – half of them to children under five. What Are People Doing Wrong? Many tenants, landlords, and pest control professionals make the same mistake: they turn to pesticides first. But chemicals kill only a small number of pests. Pests can become resistant, so the poison no longer kills them and their offspring. Pesticides – chemicals that kill pests – are often unnecessary. When they are needed, only safer products should be used. Why This Guide Works Good pest control gets to the root of...

Words: 2459 - Pages: 10

Premium Essay

Supply Chain Management-Checkers

...Checkers Management 212- Essay 1 Word count: 2887 Table of Contents 1. Introduction: 3 2. Checkers Supply Chain network: 3 3. Typology of Checkers: 7 4. Comparison of the Checkers to a smaller retailer 10 5. Conclusion: 12 LIST OF REFERENCES: 13 PLAGIARISM DECLARATION 14 1. Introduction: This essay will be focusing of the supply network of checkers supermarket that is operated by the Shoprite holding Ltd is South Africa. Checkers stores target a living standard measurement of 7 to 10 which means that they are targeting people of upper income class (Shoprite Holding Ltd, 2013b). In addition, the supermarkets offer a wide range of products from fresh meat to kitchen accessories (Shoprite Holding Ltd, 2013b).They have currently 167 checkers supermarkets in South Africa. However, they are also operating in some neighbour’s countries such as Botswana and Namibia (Shoprite Holding Ltd, 2013b). Their specialized departments are the bakery, meat market, cheese and delicatessen counter and wine stores. One influential limitation encounter was their current strategy are, checkers would not tell anyone because then they would not being able to drive the competition away from their main competitors such as Pick and Pay. In order to do the assignment, a supply chain will be developed in terms of suppliers and consumers (Pycraft, Singh, Phihlela, Slack, Chambers, Johnston., 2010: 138). And then, the typology of the firm will be developed and finally a polar...

Words: 3649 - Pages: 15

Free Essay

Concrete vs. Hurricane

...Concrete vs. Hurricane Abstract There are many ways to manipulate concrete to increase its durability and resistance to high winds as such in a hurricane. This paper goes over the numerous types of additives to concrete as well as a little bit of the history of “ hurricane proofing “ structures. Reinforced concrete seems to be the best defense against hurricanes so far. The National Hurricane Center in south Florida was built specifically for withstanding hurricanes. This facility cost over five million dollars and contains 3,000 cubic yards of concrete. The structure was built to withstand 130-mph winds and can take a direct hit by a 250-pound projectile at 60-mph. The building is surrounded by a 10-inch thick concrete shell and is elevated 5 feet above the flood plain. Removable storm panels and roll down shutters protect the buildings openings. There are many other examples of building built to withstand hurricanes but this paper is more focused on the concrete and the concrete reinforcements used in those buildings. Monolithic Domes are becoming popular in the concrete construction industry. These type buildings use half as much concrete and steel as traditional buildings and are resistant against fire, rot, and insects. FEMA describes this construction as “near-absolute protection” against wind speeds up to 250-mph. There is a monolithic dome gymnasium built in Italy, Texas, an area that is prone to high winds. This building is 17,000 SF Diameter...

Words: 997 - Pages: 4

Free Essay

Marketing

...Daisy Plan (4’ x 8’) www.CleanCoops.com “The Daisy” Chicken Coop Plan Property of CleanCoops.com Page 1 of 41 Daisy Plan (4’ x 8’) www.CleanCoops.com INTRODUCTION When designing our Daisy Coop Plan we designed it with the following features and criteria in mind: MAXIMIZING FLOOR SPACE / QUANTITY – This coop will house up to 12 laying hens comfortably. We have designed plenty of space for roosting, nesting and roaming. CLEANLINESS / EASY TO MAINTAIN – We have designed it in such a way that it is easy to maintain, requiring only occasional cleaning that can be done VERY quickly and easily. All corners of the coop can be reached for cleaning without bending over or going inside. ATTRACTIVENESS – As you can see from some of the included photos, we have designed and built a coop that actually adds to the aesthetics of your property! Your friends and neighbors will appreciate and adore your new coop while adding charm and character to your landscape. QUALITY – This is a sturdy, solid, long lasting and quality design. You want your work to last for years to come. You don’t want to build something that you will have to constantly fix and repair. Our durable design will withstand the elements of your climate. PROTECTION FROM PREDATORS – The entire coop was designed keeping in mind that there are critters out there that would like to get to your chickens. This design is virtually critter-proof! COMFORTABLE CHICKENS – This design will keep...

Words: 7632 - Pages: 31

Premium Essay

The Importance Of Escaping Dared Alcatraz

...Escaping dared Alcatraz is hard, but not impossible for three hardened prisoners. At exactly 9:30 on the night of June 11, 1962, Frank Morris and the Anglin brothers escaped Alcatraz with an ingenious plan. Frank Morris and the Anglin brothers escaped Alcatraz alive. Frank Morris and the Anglin brothers found places to crawl through so they were not trapped in that 1 room. On page 6, the article states, “they made holes big enough to crawl through.” This shows they were escaping the jail by crawling through holes in the wall. That is actually a brilliant idea! Page 6 also explains that “For months, they had been using tiny tools to chip away at the concrete walls.” This also explains that they are trying to escape through...

Words: 383 - Pages: 2

Free Essay

Tars

...install the shelf and may include new cable hole drilling. Remove vertical stand and mask any damage on the teller wall. pics CWP widen QST cable holes to 1 inch or larger on front and/or back of backsplash to accommodate QST, ferrite bead prior to the QST cable management pic Carl - fyi There is an empty power cord plugged into the server UPS pics Cwp to be on site night of install to assist with qst cable management due to bandit barriers along teller row pic(s) 20,24,11. FYII QST cables are at 1 inch. Cwp to be on site night of install to assist with false walls pic(s) SV3 tech drill QST cable holes to 1 inch or larger on front and/or back of backsplash to accommodate QST, ferrite bead prior to QST cable management pic(s) 9,10. Mount QST on customer right on horizontal shelf. SV3 Tech existing vertical QST will move to the new horizontal stand pic This will be the new TAR to change the vertical qst to a horizontal shelf. Include picture references. CWP to be onsite in support of QST installation. Work may include, but is not limited to, false wall removal, drilling, cable routing, etc. Also, assist with mounting of the QST wall shelf and removal of the QST vertical stands, if applicable. This will be the new TAR to have CWP remove false walls, drill, cable management, etc. Include picture references. CWP to be onsite in support of QST installation. Work may include, but is not limited to, false wall removal, drilling, cable routing, etc. ...

Words: 3539 - Pages: 15

Premium Essay

East Wall Fire Case Study

...damage was noted on the northeast garage wall with fire extension into the attic. This corner of the garage had a significant amount of debris that needed to be removed to better examine the area. Once the northeast corner was cleared of debris, a detailed examination of the electrical panel which was located on the east wall was conducted. We noticed that there were two burn holes in the electrical panel cover as documented in photo 73. These two holes where cause by electrical arching within the panel box during the fire. We then examined the inside of the panel box which showed significant fire damage within the panel box. The fire had damaged all the breakers to the point that we could not make a visual determination which breakers had tripped or identify what the breakers controlled as noted in photo 76. Our investigation then focused on the exterior east wall just to the north of the panel box. Upon opening the wall up to expose the wiring in the wall, we located a wire strand that was missing about a foot of wiring. We used yellow wire ties to trace the source of this wire. Upon tracing this wire, we determined that the wire was the power source for the kitchen range. We then examined the...

Words: 486 - Pages: 2

Premium Essay

Emperor Qin Shi Huang

...Asian 160L Shanrui Yong 12/08/2015 Emperor Qin Shi Huang Emperor Qin Shi Huang was the first emperor of what would come to be known in the Western world as China. He unified the warring states of China and kept them together by means of a centralized bureaucracy and a standardized and codified law system. In his 35-year reign, he managed to create magnificent and enormous construction projects such as the Great Wall of China and the Terracotta Army. He standardized all weights and measures used in China, and it was during his reign that the Chinese system of written characters became used throughout the land. Today’s Chinese characters are written differently, but are direct descendants of those used during Qin Shi Huang’s reign. Despite his good intentions in unifying China, he did many things that were deemed ruthless. With Li Si’s advice, he banning and burning of many books and the execution of recalcitrant scholars. At the same time, many slaves were sacrificed during the construction of the Great Wall of China. Many scholars have argued that Emperor Qin Shi Huang was a brutal Emperor and disregard his contributions to China. However, his contributions far surpassed his unmerciful action. Therefore, Emperor Qin Shi Huang was the one of the greatest reformer and pioneer in China history and left behind many legacies that has made China what it is today. Emperor Qin named himself “Qin Shi Huangdi,” which means the first great emperor of China. "Qin was for his original...

Words: 1564 - Pages: 7

Premium Essay

Thermodynamics: Gunpowder And Germ Warfare

...enemy walls, could get the attacking...

Words: 882 - Pages: 4

Free Essay

The Israeli Frontier by Banksy

...towards 1992-1994. His age might be around 30 years (he was born in 1974) The context Since Israel creation in 1948, a lot of conflicts took place between Israel and Palestine and some others Middle East countries. In 2002, Israel decided to build a wall to protect the country from the Palestinian attacks. The aim was to separate Israeli and Palestinian population. The wall became the symbol of a closed and militarized frontier. Description This graffti represents two children playing as if they were on a beach, with sceau and pelles. We can see that these two characters have been stenciled on the wall. They seem happy to be playing on the sand. They are represented in black and white in contrast with the sceau which is yellow. The two children are shirtless, but we don’t know if it is to evoke heat or poverty. Above the 2 children, we see like a hole, in which there is a paradisiac and sunny landscape, with palmiers, cocotiers, turquoise water, white sand and a beach. The wall seems broken. Interpretation Through this graffiti, Bansky tries to criticize war stupidity. It is why he decided to paint on this specific wall: because it represents the conflict between Israelis and Palestinians. The hole in the wall maybe represents the idées reçues broken, and replaced by a better reality. Also thanks to the paradisiac landscape, Banksy maybe wants to show us that after the frontier, the other side isn’t the enfer, that it is not filled with enemies, but it is rather...

Words: 319 - Pages: 2