One of the techniques which is a breakthrough to traditional lock step language teaching is group work. The traditional lockstep language teaching focuses teaching language on the explicit explanation of grammatical aspects, asking students to read and translate line by line, memorizing difficult words, repeating words, phrases and sentences, and memorizing dialogues. This way, students tend to be passive and have lack of language practice in the classroom. In other words, language teaching focuses on presenting grammatical knowledge, not on the use of language. The traditional teaching now has been replaced by the various innovative and effective language teaching techniques since the emergence of communicative language teaching in 1970s. One of them is group work. Group work is learning together in a small group of four or five to work with language. Through group work, students can have more chance to practice the use of language in the classroom. Many research findings show that group work is superior to traditional language teaching in terms of learning achievement. Some of the activities which can be implemented through group work in the classroom are to be presented in this paper. They are game, role play, project, information gap, jigsaw, think pair and share, debate, enquiry technique, prioritizing (Expedition to Gunoeng Leuser), and fishbowl technique.
In a world of interdependent economies and online transactions, a large volume of data hosted on the cyberspace a daily bases. Cyber threats and attacks are steadily increasing. Most time, these threats and attacks are targeted at service providers but service users are greatly affected by the attacks due to their vulnerability level. When disasters knockdown the infrastructures of a single service provider, it will have ripple effects on thousands of innocent service users. Therefore, service users need more than ever to prepare for major crises targeted at their service providers. To cope with this trends, every service user requires an independent business continuity plan (BCP) or disaster recovery plan (DRP) and data backup policy which falls within their cost constraints while achieving the target recovery requirements in terms of recovery time objective (RTO) and recovery point objective (RPO). The aim of this paper is to develop a model for a user-centric disaster recovery system to enable service users to independently develop their data backup policies that best suits their remote databases, and host same as a cloud service deployable on public cloud for users to subscribe to and be billed on pay-as-you-go billing model. The system developed is highly compatible with MYSQL, MSSQL and Oracle databases. A combination of Dynamic System Development Methodology (DSDM) and Object- Oriented Analysis and Design Methodology (OOADM) were used to design the system while Java Enterprise Edition (JEE) is used to develop the system. The encryption and compression mechanisms of the system were tested with various sizes of backup files ranging from 64 Kb to 20Mb and several performance metrics such as (1) Encryption time; (2) Compression size; (3) CPU clock cycles and battery power are compared and analysed with some well-known encryption and compression algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.