Free Essay

Vi Cheat Sheet

In:

Submitted By DuaneJunior
Words 1256
Pages 6
vi Editor “Cheat Sheet” Invoking vi: vi filename Format of vi commands: [count][command]Command mode versus input modeVi starts in command mode. The positioning commands operate only while vi is in command mode. You switch vi to input mode by entering any one of several vi input commands. (See next section.) Once in input mode, any character you type is taken to be text and is added to the file. You cannot execute any commands until you exit input mode. To exit input mode, press the escape (Esc) key.Input commands (end with Esc)a Append after cursor i Insert before cursor o Open line below O Open line above :r file Insert file after current lineAny of these commands leaves vi in input mode until you press Esc. Pressing the RETURN key will not take you out of input mode.Change commands (Input mode) cw Change word (Esc)cc Change line (Esc) - blanks line c$ Change to end of line rc Replace character with c R Replace (Esc) - typeover s Substitute (Esc) - 1 char with string S Substitute (Esc) - Rest of line withtext . Repeat last changeChanges during insert mode <ctrl>h Back one character <ctrl>w Back one word <ctrl>u Back to beginning of insert | VI “Cheat” SheetACNS Bulletin ED–03Februa ry 1995(count repeats the effect of the command)File management commands :w name Write edit buffer to file name :wq Write to file and quit :q! Quit without saving changes ZZ Same as :wq :sh Execute shell commands (<ctrl>d)Window motions <ctrl>d Scroll down (half a screen) <ctrl>u Scroll up (half a screen) <ctrl>f Page forward <ctrl>b Page backward /string Search forward ?string Search backward <ctrl>l Redraw screen <ctrl>g Display current line number andfile information n Repeat searchN Repeat search reverse G Go to last line nG Go to line n :n Go to line n z<CR> Reposition window: cursor at topz. Reposition window: cursor in middle z- Reposition window: cursor at bottomCursor motions H Upper left corner (home) M Middle lineL Lower left corner h Back a character j Down a line k Up a line ^ Beginning of line $ End of linel Forward a character w One word forward b Back one word fc Find c ; Repeat find (find next c) |
Deletion commands dd or n dd
Delete
n lines to general buffer
Delete word to general buffer dw d n Delete w n words
Delete to end of sentence
d)
Delete previous word db Delete to end of line
D
x
Delete character
Recovering deletions p Put general buffer after cursor
P
Put general buffer before cursor
Undo commands
Undo last change u Undo all changes on line
U
Rearrangement commands
Yank (copy) line to general buffer yy or Y

z yy 6
Yank 6 lines to buffer z yw
Yank word to general buffer

a dd 9
Delete 9 lines to buffer a “
A
dd
9
Delete 9 lines; Append to buffer a “ a p
Put text from buffer a after cursor
Put general buffer after cursor p Put general buffer before cursor
P
Join lines
J
Parameters
Show invisible characters
:
set list
Don’t show invisible characters
:
set nolist
Show line numbers
:
set number
:
set nonumber
Don’t show line numbers set autoindent
:
Indent after carriage return
Turn off autoindent
:
set noautoindent
Show matching sets of
:
set showmatch parentheses as they are typed
Turn off showmatch
:
set noshowmatch
:
set showmode
Display mode on last line of screen
:
set noshowmode
Turn off showmode
:
set all
Show values of all possible parameters Move text from file old to file new vi old “ a yank 10 lines to buffer yy 10 a write work buffer
:
w
:
e new edit new file

a p put text from a after cursor w :30,60 new Write lines 30 to 60 in file new Regular expressions (search strings)
^
Matches beginning of line
$
Matches end of line
.
Matches any single character
*
Matches any previous character
.*
Matches any character
Search and replace commands
Syntax:
address]s/old_text/new_text/
:[
Address components:
.
Current line n Line number n
.+
m
Current line plus m lines
$
Last line
/string/
A line that contains "string"
%
Entire file
[
Specifies a range addr1],[addr 2]
Examples:
The following example replaces only the first occur- rence of Banana with Kumquat in each of 11 lines starting with the current line (.) and continuing for the
10
that follow
(.+10).
.,.+10s/Banana/Kumquat
:
The following example replaces every occurrence
(
caused by the g at the end of the command) of apple with pear.
%s/apple/pear/g
:
The following example removes the last character from every line in the file. Use it if every line in the file ends with ^M as the result of a file transfer. Execute it when the cursor is on the first line of the file.
:
%s/.$//
Deletion commands dd or n dd
Delete
n lines to general buffer
Delete word to general buffer dw d n Delete w n words
Delete to end of sentence
d)
Delete previous word db Delete to end of line
D
x
Delete character
Recovering deletions p Put general buffer after cursor
P
Put general buffer before cursor
Undo commands
Undo last change u Undo all changes on line
U
Rearrangement commands
Yank (copy) line to general buffer yy or Y

z yy 6
Yank 6 lines to buffer z yw
Yank word to general buffer

a dd 9
Delete 9 lines to buffer a “
A
dd
9
Delete 9 lines; Append to buffer a “ a p
Put text from buffer a after cursor
Put general buffer after cursor p Put general buffer before cursor
P
Join lines
J
Parameters
Show invisible characters
:
set list
Don’t show invisible characters
:
set nolist
Show line numbers
:
set number
:
set nonumber
Don’t show line numbers set autoindent
:
Indent after carriage return
Turn off autoindent
:
set noautoindent
Show matching sets of
:
set showmatch parentheses as they are typed
Turn off showmatch
:
set noshowmatch
:
set showmode
Display mode on last line of screen
:
set noshowmode
Turn off showmode
:
set all
Show values of all possible parameters Move text from file old to file new vi old “ a yank 10 lines to buffer yy 10 a write work buffer
:
w
:
e new edit new file

a p put text from a after cursor w :30,60 new Write lines 30 to 60 in file new Regular expressions (search strings)
^
Matches beginning of line
$
Matches end of line
.
Matches any single character
*
Matches any previous character
.*
Matches any character
Search and replace commands
Syntax:
address]s/old_text/new_text/
:[
Address components:
.
Current line n Line number n
.+
m
Current line plus m lines
$
Last line
/string/
A line that contains "string"
%
Entire file
[
Specifies a range addr1],[addr 2]
Examples:
The following example replaces only the first occur- rence of Banana with Kumquat in each of 11 lines starting with the current line (.) and continuing for the
10
that follow
(.+10).
.,.+10s/Banana/Kumquat
:
The following example replaces every occurrence
(
caused by the g at the end of the command) of apple with pear.
%s/apple/pear/g
:
The following example removes the last character from every line in the file. Use it if every line in the file ends with ^M as the result of a file transfer. Execute it when the cursor is on the first line of the file.
:
%s/.$//

Similar Documents

Free Essay

Cheating

... Cheating: * Any attempt to give or obtain assistance in a formal academic exercise (like an examination) without due acknowledgment. * dishonesty and breaking the rules. Reasons of cheating 1. Performance concerns * Need to excel at any cost 2. External pressures * Academic * Semester workload too heavy * Others’ cheating puts me at disadvantage * Professor/text did not adequately explain material * Too many tests on one day * Nonacademic * Pressure from parents * Job leaves no time for study * Illness prevents adequate preparation * GPA for athletic qualification * Financial aid depends on GPA * Good grades needed for job or graduate school 3. Unfair professors * Overly harsh grading * Unfair tests designed to fail students * Unreasonable workload in course 4. Lack of effort * Did not attend class * Did not study, do reading, etc. 5. Adherence to other loyalties * Helping a friend * Loyalty to a group (fraternity) 6. All’s fair in love and academia 7. Opportunity * Unexpected opportunity arose * Instructor left room during exam * Instructor wasn’t watching carefully * Other students didn’t cover their paper 8. Campus ethos * Others do it * No one ever really gets punished/caught Some ways of cheating 1. Copying Homework ...

Words: 3122 - Pages: 13

Free Essay

Nt1430

...VI “Cheat” Sheet ACNS Bulletin ED–03 February 1995 vi Editor “Cheat Sheet” Invoking vi: Format of vi commands: vi filename [count][command] Command mode versus input mode Vi starts in command mode. The positioning commands operate only while vi is in command mode. You switch vi to input mode by entering any one of several vi input commands. (See next section.) Once in input mode, any character you type is taken to be text and is added to the file. You cannot execute any commands until you exit input mode. To exit input mode, press the escape (Esc) key. Input commands (end with Esc) a i o O :r file Append after cursor Insert before cursor Open line below Open line above Insert file after current line Any of these commands leaves vi in input mode until you press Esc. Pressing the RETURN key will not take you out of input mode. Change commands (Input mode) cw cc c$ rc R s S . Change word (Esc) Change line (Esc) - blanks line Change to end of line Replace character with c Replace (Esc) - typeover Substitute (Esc) - 1 char with string Substitute (Esc) - Rest of line with text Repeat last change Changes during insert mode h w u Back one character Back one word Back to beginning of insert (count repeats the effect of the command) File management commands :w name :wq :q! ZZ :sh Write edit buffer to file name Write to file and quit Quit without saving changes Same as :wq Execute shell commands (d) ...

Words: 794 - Pages: 4

Free Essay

Qt Cheatsheet.Pdf

...qwertyuiopasdfghjklzxcvbnmqwerty uiopasdfghjklzxcvbnmqwertyuiopasd fghjklzxcvbnmqwertyuiopasdfghjklzx Quantitative cvbnmqwertyuiopasdfghjklzxcvbnmq Aptitude Cheat Sheet wertyuiopasdfghjklzxcvbnmqwertyui Formulae and Fundas opasdfghjklzxcvbnmqwertyuiopasdfg hjklzxcvbnmqwertyuiopasdfghjklzxc vbnmqwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfg hjklzxcvbnmqwertyuiopasdfghjklzxc vbnmqwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfg hjklzxcvbnmrtyuiopasdfghjklzxcvbn mqwertyuiopasdfghjklzxcvbnmqwert yuiopasdfghjklzxcvbnmqwertyuiopas Ramandeep Singh www.BankExamsToday.com Number system Natural Numbers: 1, 2, 3, 4….. Whole Numbers: 0, 1, 2, 3, 4….. Integers: ….-2, -1, 0, 1, 2 ….. Quantitative Aptitude Cheat Sheet HCF and LCM For two numbers, HCF x LCM = product of the two. HCF of Fractions = LCM of Fractions = Rational Numbers: Any number which can be expressed as a ratio of two integers for example a p/q format where ‘p’ and ‘q’ are integers. Proper fraction will have (pq) Factors: A positive integer ‘f’ is said to be a factor of a given positive integer 'n' if f divides n without leaving a remainder. e.g. 1, 2, 3, 4, 6 and 12 are the factors of 12. Prime Numbers: A prime number is a positive number which has no factors besides itself and unity. Composite Numbers: A composite number is a number which has other factors besides itself and unity. Factorial: For a natural number...

Words: 2990 - Pages: 12

Free Essay

Test

...WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2012 This “Windows Logging Cheat Sheet” is intended to help you get started setting up basic and necessary Windows Audit Policy and Logging. By no means is this list extensive; but it does include some very common items that should be enabled, configured, gathered and harvested for any Log Management Program. Start with these settings and add to it as you understand better what is in your logs and what you need. DEFINITIONS:: ENABLE: Things you must do to enable logging to start collecting and keeping events. CONFIGURE: Configuration that is needed to refine what events you will collect. GATHER: Tools/Utilities that you can use locally on the system to set or gather log related information – AuditPol, WEvtUtil, Find, etc. HARVEST: Events that you would want to harvest into some centralized Event log management solution like syslog, SIEM, Splunk, etc. RESOURCES: Places to get information on EventID’s        www.ultimatewindowssecurity.com/securitylog/encyclopedia/Default.aspx - Better descriptions of Event OD’s www.EventID.Net – Most of the Event ID’s Google! – But of course IIS Error Codes - http://support.microsoft.com/kb/318380 - IIS Error Codes http://cryptome.org/2014/01/nsa-windows-event.pdf - Good Article http://technet.microsoft.com/en-us/library/dd772712(v=ws.10).aspx – MS Adv Security Audit Policy Descriptions https://support.microsoft.com/en-us/kb/3004375 - Patch and Reg Tweak for KB3004375...

Words: 2520 - Pages: 11

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Free Essay

Cryptography & Online Bankcard Transactions

...CRYPTOGRAPHY & ONLINE BANKCARD TRANSACTIONS Keller Graduate School of Management SE577ON_A – Cryptography and Security Mechanisms NOV10 Alicia Franklin Cryptography for an Extranet Table of Contents I. Online Banking Overview ………………………………………………3 II. Security Threats to Businesses…………………………………………..3 III. Cross Site Attacks ………...…………………………………………….4 IV. Mitigating Cross Site Attacks ………………………………………….5 V. Phishing ………………………………………………………………….6 VI. Cryptography .…………………………………………………………..6 VII. Secret Key Cryptography .………………………………………………7 VIII. Public Key Cryptography.………………………………………………7 IX. Hash Functions ……..…………………………………………………...7 X. Biometrics …………………………...…………………………………...8 XI. Summary ………………………………………………………………8 XII. References ……………………………………………………………….9 I. Online Banking Overview The number of malicious applications targeting online banking transactions has increased dramatically in recent years. This represents a challenge not only to the customers who use such facilities, but also to the institutions who offer them, as evidenced by an ongoing trail in the US. These malicious applications employ two kinds of attack vector – local attacks which occur on the local computer, and remote attacks, which redirect the victim to a remote site. The possibility also exists that both approaches will be combined. Some attacks may be foiled by adopting security measures such as transaction numbers (TAN). However, it is likely that the risks...

Words: 1753 - Pages: 8

Premium Essay

Reup

...ANNOUNCING BY 101-3A - FALL SEMESTER LECTURE SCHEDULE DATE TOPIC PAGES Aug. 18 Introduction to BY 101 - Structure of the Cell --------------------------------- 11-25;44-71 23 Discussion of How to Study; Structure of the Cell ---------------------------- ” 25 “ ” 30 Physiology of the Cell ------------------------------------------------------------- 25-43;72-108 Sept. 1 “ ” 6 LABOR DAY HOLIDAY 8 “ ” 13 Cellular Genetics ------------------------------------------------------------------- 109-205 15 “ ” 15 In Class Review Session for First Examination 20 EXAMINATION (CELL STRUCTURE THROUGH CELL PHYSIOLOGY) 20 Cellular Genetics ------------------------------------------------------------------- 109-205 22 “ ” 27 “ ...

Words: 3361 - Pages: 14

Free Essay

Colonial Rulw

...DESIGN AND IMPLEMENTATION OF ONLINE ENTRANCE EXAMINATION (A CASE STUDY OF CARITAS UNIVERSITY ENUGU) BY NAME: ABI THOMAS AUGUSTINE REG NO: CST/2009/378 IN PARTIAL FULFILLMENT OF BACHELOR OF SCIENCE DEGREE IN COMPUTER SCIENCE/ INFORMATION TECHNOLOGY FACULTY OF NATURAL SCIENCES EXAMINATON CARITAS UNIVERSITY, AMORJI-NIKE ENUGU JULY 2013. i CERTIFICATION This is to certify that this project DESIGN AND IMPLEMENTATION OF ONLINE ENTRANCE EXAMINATION (A CASE STUDY OF CARITAS UNIVERSITY, ENUGU) was carried out by; -------------------------------------------- ---------------------- NAME OF STUDENT SIGNATURE ------------------------------DATE ii APPROVAL PAGE This is to certify that this research was carried out by Abi Thomas Augustine Reg. No: CST/2009/378 of the Department of Computer Science/Information Technology , Faculty of Natural Sciences Caritas University Amorji-Nike, Enugu State. ____________________ _______________ CHIZOBA EZEME (MRS) DATE SUPERVISOR _______________________ _______________ ARINZE NWAEZE (Ph.D) DATE HEAD OF DEPARTMENT ____________________ __ _______________ Dr. BONIFACE EKECHUKWU EXTERNAL EXAMINER DATE iii DEDICATION This work is dedicated to the Almighty God for giving me the knowledge, wisdom and understanding in the pursuit of my academic career. I also extend this to my late father Chief A. E. Abi, mum, brother and sisters for all you love. May God bless you all. iv ACKNOWLEDGEMENT I want to use this medium to express my immeasurable...

Words: 18416 - Pages: 74

Free Essay

Project

...DESIGN AND IMPLEMENTATION OF ONLINE ENTRANCE EXAMINATION (A CASE STUDY OF CARITAS UNIVERSITY ENUGU) BY NAME: ABI THOMAS AUGUSTINE REG NO: CST/2009/378 IN PARTIAL FULFILLMENT OF BACHELOR OF SCIENCE DEGREE IN COMPUTER SCIENCE/ INFORMATION TECHNOLOGY FACULTY OF NATURAL SCIENCES EXAMINATON CARITAS UNIVERSITY, AMORJI-NIKE ENUGU JULY 2013. i CERTIFICATION This is to certify that this project DESIGN AND IMPLEMENTATION OF ONLINE ENTRANCE EXAMINATION (A CASE STUDY OF CARITAS UNIVERSITY, ENUGU) was carried out by; -------------------------------------------- ---------------------- NAME OF STUDENT SIGNATURE ------------------------------DATE ii APPROVAL PAGE This is to certify that this research was carried out by Abi Thomas Augustine Reg. No: CST/2009/378 of the Department of Computer Science/Information Technology , Faculty of Natural Sciences Caritas University Amorji-Nike, Enugu State. ____________________ CHIZOBA EZEME (MRS) SUPERVISOR _______________ DATE _______________________ ARINZE NWAEZE (Ph.D) HEAD OF DEPARTMENT _______________ DATE ____________________ __ Dr. BONIFACE EKECHUKWU EXTERNAL EXAMINER _______________ DATE iii DEDICATION This work is dedicated to the Almighty God for giving me the knowledge, wisdom and understanding in the pursuit of my academic career. I also extend this to my late father Chief A. E. Abi, mum, brother and sisters for all you love. May God bless you all. iv ACKNOWLEDGEMENT I want to use this medium to express my immeasurable...

Words: 18414 - Pages: 74

Premium Essay

Fluctuations in Indian Rupee

...China which despite being large economy has its currency pegged to US dollar. 2) FLOATING (OR FREE) EXCHANGE RATE: Bigger and developed economies like US, UK, Japan etc generally let market determine their exchange rate. In such economy exchange rate is determined by demand and supply of the currency. For example consider exchange rate of US dollar versus Japanese Yen. If US wants to import certain item from Japan, it will have to pay the Japanese company in Japanese yen. This is because in common market of Japan, dollar will not fetch you anything. But the American company will not have Yen, so it will purchase Yen from the international currency market. This will increase the demand of Yen and supply of dollar. Thus the value of Yen vis a vis dollar will...

Words: 3613 - Pages: 15

Premium Essay

Industry Project

...Word Count:(Main Content – excluding appendices) | | Table of Contents Assignment Cover Page 2 Table of Contents 3 I. PROJECT OVERVIEW 3 II. SUMMARY OF PROBLEMS IDENTIFICATION 3 1) Problem 1: Dishonest employees 3 2) Problem 2: inconvenience of the gas station 3 3) Problem 3: Huge loss due to the high salary for the workforce 3 III. PROJECT OBJECTIVES 3 IV. ANALYSIS & DIAGNOSIS 3 1) Problem 1: Dishonest employees 3 2) Problem 2: Inconvenience of the gas stations 3 3) Problem 3: Huge loss due to the high salary for the workforce 3 V. LITERATURE REVIEW 3 1) Problem 1: Dishonest employees 3 2) Problem 2: Inconvenience of the gas stations 3 3) Problem 3: Huge loss due to the high salary for the workforce 3 VI. RESEARCH METHODOLOGY 3 VII. FEASIBILITY OF RECOMMENDATION /...

Words: 9685 - Pages: 39

Free Essay

Fairness Prevention

...Does Fairness Prevent Market Clearing? An Experimental Investigation Ernst Fehr; Georg Kirchsteiger; Arno Riedl The Quarterly Journal of Economics, Vol. 108, No. 2. (May, 1993), pp. 437-459. Stable URL: http://links.jstor.org/sici?sici=0033-5533%28199305%29108%3A2%3C437%3ADFPMCA%3E2.0.CO%3B2-E The Quarterly Journal of Economics is currently published by The MIT Press. Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at http://www.jstor.org/journals/mitpress.html. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. The JSTOR Archive is a trusted digital repository providing for long-term preservation and access to leading academic journals and scholarly literature from around the world. The Archive is supported by libraries, scholarly societies, publishers, and foundations. It is an initiative of JSTOR, a not-for-profit organization with a mission to help the scholarly community take advantage of...

Words: 9679 - Pages: 39

Premium Essay

Syllabus

...Effective Term: 201310 NOVA SOUTHEASTERN UNIVERSITY H. Wayne Huizenga School of Business and Entrepreneurship Masters Programs FIN 5535 - Futures and Options   (Weekend) I. INSTRUCTOR * Francisco J De Cossio     (fdecossi@nova.edu) | II. COURSE DESCRIPTION Futures and Options: This course examines the structure and functions of the futures and options markets. The course covers the structure of options and futures markets with an emphasis on American markets such as the CME and CBOE. Additional topics include arbitrage restrictions, option pricing, hedging with futures, options on futures, exotics, trading strategies, and an introduction to corporate securities as options on the underlying cash flows. Prerequisites: FIN 5620 and FIN 5530. | III. PREREQUISITES ( GMP 5620 OR FIN 5620 ) AND ( FIN 5530 OR GMP 5530 ) | IV. LEARNING OUTCOMES A. ENTRANCE COMPETENCIES: Students must have prerequisite course work in the areas of basic accounting, basic economics, basic mathematics and statistics, managerial accounting, managerial economics, managerial finance, and quantitative methods. Additional coursework in financial markets and investments is required. All students entering this course should be computer literate, familiar with Microsoft Office 97 Professional Edition or 2000 Professional Edition Software, have unrestricted access to a personal computer, and have the ability to communicate effectively in writing.    B. EXIT COMPETENCIES: By the end of...

Words: 3334 - Pages: 14

Premium Essay

Talent Management Syllabus

...Rev. 1/16 NOVA SOUTHEASTERN UNIVERSITY H. Wayne Huizenga School of Business and Entrepreneurship Masters Programs HRM 5365 – Talent Management (Online) Table of Contents Instructor Contact |Technology| Course Description | Prerequisites | Learning Outcomes | Course Material | Grading Scale | Schedule of Assignments |Discussions | Policies | Meeting Dates | Cover Page I. INSTRUCTOR CONTACT • Anne Fiedler (af879@nova.edu) The best way to contact the professor is through Email Professor or Ask the Professor on Blackboard. Messages will be checked between 9 a.m. and 11 a.m. on Monday through Friday. II. Technology • You will need the following: o a computer, o microphone, and o digital camera (often integrated into your computer for this class. It is important that you ensure that you are technologically ready to use Blackboard in your online classes. To check If you are using the proper technology (operating systems, etc.). Please click on the Test your Browser on the right side of your Blackboard entry page. • Respondus LockDown Browser for Online Exams This course requires the use of LockDown Browser for taking online exams. The LockDown Browser software prevents a user from accessing other applications or going to other websites during an exam. This tool makes it possible for students to take online exams from any location, and at times that are convenient. It also creates a fair testing environment for everyone in the ...

Words: 3506 - Pages: 15

Premium Essay

Narrative Report

...of the Requirements for the Course Education 402 By: ARTHUR SUAN JUANITE Student Teacher 2005-2006 Siargao Island Institute of Technology College of Education Dapa, Surigao del Norte Approval Sheet This Narrative Report of ARTHUR SUAN JUANITE entitled “Student Teaching Experiences” is submitted as partial fulfillment of the requirements in Education 402 (Student Teaching) for the degree of Bachelor in Elementary Education has been approved. Approved by: GEMNA G. POBE Supervising Instructor Preface This narrative report is an endeavor of the author to express that teaching is the noblest and a very good profession even it is not an easy task. It is a complex and many-sided task demanding the variety traits and abilities of an individual. This book was made by the author to have a guide of the student teachers when they serve, when they have an actual teaching in their field. It is also made in order that they have a souvenir of the student teachers for academic year 2005-2006. This book contains the observation and participations, overview on actual teaching, detailed lesson plans, performance rating sheets with comments and suggestions and some DepEd Forms. It seems like a long journey of my studies that Siargao Island Institute of Technology, Dapa, Surigao del Norte nurtured and activate the students very well. It seems like a long wait with the sweetness...

Words: 6169 - Pages: 25