2 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Analogy
Go to Main Menu
3 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Prof. T. Anitha
Kalasalingam University
Compare this Analogy with the concept of Interrupts. While the microcontroller is
executing the main program, whenever an interrupt is raised, it stops executing the
main program, and responds to the interrupt immediately. After the interrupt service
routine is executed, control returns to the main program and the microcontroller
resumes execution from the place where it stopped.
4 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
From:
Prof. A. B. Vennela
Science and Humanities Department
SKCET, Coimbatore
A fountain-emitting one-way valve is shown above. This one-way valve allows water to
flow through it only in one direction. When water flows through the valve, the fountain is
formed.
Similarly, the light emitting diode conducts and emits light only when forward biased. It
does not conduct when reverse biased.
5 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Brain-storming
Go to Main Menu
6 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
From:
Prof. R. S. Bharsakade
Vishwakarma Institute of Technology, Pune
The following questions can serve as sample questions for the activity:
The responses of the learners can be noted down on the board. Incorrect/irrelevant
responses can be removed after explaining why they are so. From the remaining
responses, the topic can be introduced.
7 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
From:
Dr. Chandrani Mitra
Department of Engineering Sciences
Vishwakarma Institute of Technology, Pune
Learners can be asked to give as many examples of discrete and continuous random
variables as they can and we can ask the CR to list them down.
8 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Demonstration
Go to Main Menu
9 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Demonstration -1
Suggested by:
Prof. Ashwini Karanagi
PDACEG , Gulbarga
10 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Demonstration
We can call three learners A, B and C. Learner A will be given red plate, Learner B will
be given blue plate, Learner C will be given green plate. Now we can ask learner A to
keep the plate i.e. red plate on the table which will be considered as stack. Learner B can
place the blue on the top of the previous plate. Learner C can place the green plate on
the top of the previous plate i.e. blue plate. Now we can ask the other learner to observe
the order of the plates i.e. green plate is on the top, next is blue and red is at the bottom.
In the same way data is placed in the stack.
Delete Operation
Now we can call one learner to pick the plate from the table. Learner will pick the first
plate which is on the top i.e. Green plate. We can call other learners to pick the next
plate i.e. blue plate.
From this demonstration learners can observe that the element which is inserted at the
last will be deleted first.
11 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Demonstration - 2
Suggested by:
Prof. Jagadale Amol Bhupal
S.V.E.R.I’s College of Engineering, Pandharpur
12 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Demonstration
The learners can be asked to sit in proper alignment as rows and columns. For example,
4 rows and 3 columns. The columns represent individual bits in memory. The rows
represent a memory word. Clocks can be indicated by a tick sound produced by the
instructor. Each learner can indicate bit processing by clapping over the head.
Each square below represents a learner and the number in the square indicates the
clapping sequence. Clapping is done in the specified sequence at the tick of the clock. At
the first tick, all learners representing 1 shall clap. At the second tick, all learners
representing 2 shall clap. So on and so forth.
13 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Demonstration (contd.)
3 2 1 1 1 1
6 5 4 2 2 2
9 8 7 3 3 3
12 11 10 4 4 4
14 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Role Play
Go to Main Menu
15 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Role Play -1
Suggested by:
Prof. Sane Suneeta Shriram
Department of Mechanical Engineering
Vidhyarthi Griha'S College of Engineering and Technology, Pune
16 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Role Play
Two learners, preferably of different physique, will come in front of the class. A third
learner will measure the surface temperature of the two.
Learner 3: Good! Both the systems are now at the required temperature of 500 degrees
Celsius. I have to ensure that this temperature is maintained for the next half an hour.
What can I do? Let me apply insulation.
He/she performs the following action:
•Wraps 2 rounds of sheet of paper to both.
•Puts a tag indicating T = 500 degrees Celsius to both the learners.
•Comes back with a friend after some time.
17 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Role Play (contd.)
Learner 3: It is 11.30 now. Let me check the temperature. Measures the surface
temperature of the two.
How is it that the system I shows a temperature drop of 10 degrees when System II is
maintained at 500 degrees Celsius?
Learner 4: You must not have put proper insulation to this system.
Learner3: I’m 100% sure that I’ve applied the same insulating paper to both the
systems.
18 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
A brainstorming session can be conducted after this role-play, to find out the
possible reason(s) for the difference in temperature between the two systems.
19 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Role Play -2
Suggested by:
Prof. S. T. Nanaware
Computer Science Department
S.V.E.R.I’s College of Engineering, Pandharpur
20 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Role Play
Randomly select six learners and form them into three different groups of 2 learners each.
Group 1 understands only Marathi.
Group 2 understands only Kannada.
Group 3 understands both Marathi and Kannada.
The role play can be conducted as described below.
1.Group 2 shall speak a sentence in Kannada to Group 1. Group1 cannot understand it.
2.The faculty can then ask, ‘What is required for Group1 to understand the sentence?’
3.Group 2 shall then reply, ‘Translation’.
4.One leaner from Group 2 can speak the same sentence in Kannada to a learner in Group 3.
5.This learner can speak the same sentence in different words to the other learner in Group 3. The latter
can come up with the translation and explain the meaning of the sentence in Marathi to Group 1.
6.Now Group1 can understand what Group 2 had tried to say.
We can now ask other students what they understood from the role play and what the need for translation
is.
21 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Re-calling
Keywords
Go to Main Menu
22 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Prof. K. Phaniraj
MIT, Manipal
We can ask the learners to write and explain the keywords which they learned in this
session, one by one. The learners may come up with the following keywords:
Serviceability
Elastic Curve
Slope
Deflection
Boundary Condition
23 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Prof. Aradhana D.
BITM, Bellary
We can divide the class into four groups and conduct the technical Anthakshari. The rules of the
game are very simple. We can provide the first group with a technical word. On their part, they
need to give a statement, which contains that word. The next group will have to identify another
technical word from that statement and formulate a statement of their own consisting of this
technical word. The process will thus continue.
24 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Technical Anthakshari (contd.)
25 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Technical Anthakshari (contd.)
26 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Mnemonics
Go to Main Menu
27 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
From:
Prof. P. Sevvel
Magna College of Engineering, Chennai
Session Input: Elements of (Total Quality Management)TQM, their Tools and Types
[Mechanical Engineering ]
28 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Mnemonic Techniques (contd.)
Similarly, the initial letters of New Seven Management Tools can be separated out &
rearranged in a manner to get meaningful acronyms as shown below: A, R, T, M, A,
P, M.
AM – Anti Meridian; PM – Post Meridian; ATR – Any Time Run.
The names of Generic tools of TQM can be easily memorized by the learners by making
use of the Pedagogic Technique of Mnemonic instruction – Initial Letter Method. All
the initial letters of Generic Tools of TQM can be separated out and can be memorized
easily by forming a meaningful sentence (Initial Letter Method) out of it as shown below:
P, C, P, C, R, S, C
“Police Commissioner to Police Constable Rejected Supreme Court”.
When the learners memorize this sentence, they can very easily get the initial letters of
the Generic Tools of TQM, from which they can easily write down the names of the
Generic Tools.
29 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
From:
Prof. Savitha S. Desai
BVBCET, Hubli
30 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Quiz
Go to Main Menu
31 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Quiz -1
Suggested by:
Prof. P. Bharani Rao
BITM, Bellary
32 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Who am I?
We can frame simple hints for this activity. Now, the class can be divided into 6 groups and each
group can be asked to identify the computer type from the hint assigned to them. The following
hints can be a part of this activity:
5. I am used for business data processing in medium to large corporations. I am bigger than a
workstation.
Answer: Mainframes
33 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Quiz -2
Suggested by:
Prof. Rajan
SSIT, Tumkur
34 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Picture Quiz
We can ask the learners to look at the images and identify the applications of GPS.
(Likely Answer: Aviation - For aircraft to land at the exact destination, the pilot needs to identify the
exact landing location. Through GPS, he can identify and recognize the landing location.)
35 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Picture Quiz (contd.)
36 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Puzzles
Go to Main Menu
37 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Puzzle -1
Suggested by:
Dr. Chandrani Mitra
Department of Engineering Sciences
Vishwakarma Institute of Technology, Pune
38 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Crossword Puzzle
With the help of a Crossword Puzzle, we can revise the concepts discussed in the class
and conclude the session.
39 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Crossword Puzzle (contd.)
40 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Puzzle - 2
Suggested by:
Prof. Abhilasha P. S.
Vidya Academy of Science and Technology, Thrissur
41 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Jumbled Words
The various terms (probably twenty) related to compass surveying, which have been
covered till now, can be displayed in jumbled order. Learners can be asked to unscramble
them and write them down on a piece of paper within 1 minute. Each learner can then
exchange the paper with the learner sitting next to him/her.
The faculty can prompt the learners for the correct answers. Each correct answer can be
given five points and for each wrong answer, three points can be deducted. The learners
scoring maximum points can be declared winners.
Sample terms: ropitd for tripod, worras for arrows, eencngitr for centering, enav for vane,
riereabfong for forebearing, draquantal for quadrantal, smariptic for prismatic, etc.
42 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Games
Go to Main Menu
43 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Game -1
Suggested by:
Prof. Ekta Upadhyay
Computer Science Department
RGIT, Mumbai
44 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Passing the Message
1st group can be the encoder and convert the message to 8-bit binary. A bit position
can be assigned to a column of learners (from first bench to last bench).
2nd group can be the channel that will just pass the 8-bits to the decoder.
3rd group can be the intruder who has the right to change any bit from the message
bits.
4th group can be the decoder who will convert the message bits to decimal and give it
to the receiver.
45 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Passing the Message (contd.)
The decoder will decode the message i.e. 247 and send it to the receiver. Though there has been
an error, there is no way in which the decoder can understand that an error has occurred.
At the end of the activity, the learners will be able to appreciate the need for detection of error(s).
46 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Game - 2
Suggested by:
Prof. Matilda S.
Information Technology Department
IFET College of Engineering and Technology, Villupuram
47 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: IP Address Wheel
A wheel with twelve sectors is prepared and is held on a pivot such that it can rotate.
Each sector has a different colour and holds an IP address.
The class can be divided into 12 groups. (Each row can form a group). Each group can
be asked to choose their favourite colour. Once they have chosen, the wheel can be
rotated and then wait till it comes to rest. A particular colour will be pointed to by the
marker arrow. The group which has chosen the colour has to identify whether the
address is valid or invalid. If valid, the learners can be asked to find the type of address
in that sector(Class A, Class B, Class C, Class D, Private, LoopBack). If it is invalid,
the learners can be asked to give the reason as to why it is invalid.
48 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: IP Address Wheel (contd.)
49 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Group Discussion
Go to Main Menu
50 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Prof. Shrinivas D. Desai
Vishwakarma Institute of Technology, Pune
"What happens if one of the links is cut down in a mesh, star, bus and/or ring topology?“
51 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Prof. Sarita T. Sawale
Anuradha Engineering College, Chikhli
We can ask 5 to 8 members from the class to volunteer to become panel members.
Topics/concepts such as DES structure, Key schedule, IP, IP-1, Left shift, Function F,
S Boxes related to DES algorithm can be given to the panel. Panel members can be
requested to discuss about the pros and cons of the DES. Other learners in the class can
be asked to observe the panel discussion. The faculty can play the role of the
moderator.
52 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Story-telling
Go to Main Menu
53 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Story-1
Suggested by:
Prof. K. Phaniraj
MIT, Manipal
54 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Fictionalized Narrative
The narrator begins the activity by contextualizing the story to be told with the topic:
Narrator: Have a look at the seat part of the chair on which you sit. It has two
supports. Thus, the seat of a chair acts as a beam. When you sit on it, you are applying
a downward force on the beam.
Narrator: Well, this reminds me of the story of three chairs which I have in my house.
Let me tell you that story.
55 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Fictionalized Narrative (contd.)
STORY OF THREE CHAIRS
I have 3 chairs in my house. One is a regular easy chair with a cloth seating which is
MINE!
And the third one is a special chair of rubber wood. Its seating is straight when no one
sits on it. But attains this shape when some one sits on
it . That’s all! It has never broken down! But none of my friends sit on
the third one! They occupy the second one and if a second friend comes, she pulls me out
of MY easy chair and sits on that!
Learner C : ‘SHE’?!
56 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Fictionalized Narrative (contd.)
Narrator: Why? Can’t I have a lady as a friend? Well, let’s talk about that later. She pulls
me out of MY easy chair and sits on that! I sit on that special chair, wondering why none
of my friends want to sit on it!! DO YOU KNOW WHY?
Leaner D: May be because it curves when he/she sits.
Narrator: My easy chair is already curved before any one sits.
Learner E: This one was straight, but curves when one sits on it. They may feel unsafe
to sit on such a chair.
Narrator: But I sit on it and talk to them for hours. They know that it has never broken
and made me fall.
Learner E: That’s your chair and your fate…they say! (Classroom ruptures into
laughter).
57 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Fictionalized Narrative (contd.)
Narrator: Not so Funny! Well I have decided that they are dumb and cowards. But you
guys and girls are not. Are you?
Classroom in unison: NO!!!
Narrator: Well, now you are sitting in the second floor classroom. The same type of
classroom is there above yours in the 3rd floor. Now if as soon as a group of learners
occupy that room, and the ceiling of your classroom visibly curves down, what would
you do?
Classroom (In Multiple Voices): We will run out of the class!
Narrator: Why? I can stand under it for as long as you want and assure you that it will
not fall down. Come on you are all going to be Civil Engineers!
Learner J: We will stand out side and watch you! We are human beings first and Civil
Engineers afterwards. We care for our lives!
58 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Fictionalized Narrative (contd.)
59 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Story - 2
Suggested by:
Prof. R. Manjula
BITM, Bellary
60 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Story telling
In the olden days, kingdoms were often at war with each other. Now, the prince and
princess of two warring kingdoms fell in love with each other. But their parents were,
predictably, against the match. So, they could not meet often; but wrote to each other
bundles of letters. Finally, desperate, they decided to run away from their kingdoms and
marry. But it so happened that every time they made a plan to meet somewhere, it was
foiled.
61 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Story-telling
When the princess received the letter, she was surprised for a moment. But then she
quickly recollected that it probably was the picture of the lake of lotuses, on whose banks
they had met for the very first time. She felt nostalgic, and decided to visit that place once
more. Since the picture did not implicitly state any plans for escape, nobody from the
palace thought of stopping her.
62 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Case Study
Go to Main Menu
63 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Caselet
Suggested by:
Prof. Praveen Y. Chitti
KLESCET, Belgaum
64 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Caselet
65 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Caselet (contd.)
He faced many difficulties during the peak hours when the density of traffic was very
high.
By the end of the day, he used to be drained of his energy and it was difficult for him
to discharge his duties well.
The problem used to be further amplified during the rainy season when visibility is low
and violation of traffic rules became the order of the day.
So the need for automation arose, which was taken care of by installing an embedded
system traffic controller, which helped the policeman in discharging his duties.
Similarly, we can ask the learners to suggest some other case studies or examples to
explain the importance of embedded systems.
66 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Case Study
Suggested by:
Prof. Naveed M. Mulla
Martha Mandal Engineering College, Belgaum
67 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Case Study
We can divide the learners into 4 groups and ask them to prepare a case study of an
ERP for an Aluminium Manufacturing Company. Each group can be asked to work on
a particular phase of the requirement elicitation process. We can read out the various
cases that happen during Requirements Discovery, Requirements Classification,
Requirements Prioritization and Negotiation, and Requirements Documentation.
Group A: Requirements Discovery
ERP (Enterprise Resource Planning) software is to be built for an Aluminium
Manufacturing Company. During the Requirements discovery phase, the requirement
engineers shall go to all the stake holders like,
The Accountants
The Data entry
The Inventory manager
The Security manager
The HR manager
68 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Case Study (contd.)
Requirements like
R1. The ERP should maintain the list of all the Employees of the company with their
personal and Payment details
R2. The ERP should maintain the data of raw material and finished products.
R3. The ERP should have an option to give bonus to employees.
R4. The ERP should maintain Vendors’ and Customers’ accounts, and update them at
times of sales or purchase.
R5. The ERP should generate profit bills every month.
R6. The ERP should have options to add new employees and delete existing
employees.
R7. The bills generated should be on A4 size paper.
69 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Case Study (contd.)
70 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Case Study (contd.)
1.2 The ERP should have Manager Accounts 11:30 12/10/2009 None
an option to give
bonus to employees
71 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Animation
Go to Main Menu
72 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Prof. Satyadhyan Chickerur
MSRIT, Bangalore
An animation movie can be played. The learners may be asked to write the important
and interesting aspects of the video.
Animated Movie:
http://www.mission10x.com/mission-10x/Documents/filling_bag.avi
&
http://www.mission10x.com/mission-10x/Documents/melt_ice.avi
73 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Prof. Sachin R. Gavali
Mechanical Engineering Department
S.V.E.R.I’s College of Engineering, Pandharpur
Suggested Activity:
Video clips/Animation can be downloaded from the internet, showing the operation of
Carnot cycle. This can be shown to the learners twice or thrice so that they can
comprehend the processes in the cycle clearly.
Animation Link:
http://galileoandeinstein.physics.virginia.edu/more_stuff/flashlets/carnot.htm
74 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Other Innovations
Go to Main Menu
75 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Example - 1
Suggested by:
Prof. T. Meenakshi
IFET College of Engineering, Villupuram
76 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Innovative Fill in the Blanks
The class can be split into 2 teams and given the word “fdsfodali”. The learners can be informed
that when they rearrange the letters, they will get a flower’s name and each letter in that flower’s
name is the starting letter of the answer for one of the following questions.
77 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Innovative Fill in the Blanks
(contd.)
The answers for the above questions can be discussed by rearranging the clue.
When the learners rearrange the word, they get “DAFFODILS”. Now each letter of the word is the
first letter of the answer.
1.Diode is a unidirectional device.
2.Rectifier converts Alternating current into direct current.
3.When positive of supply is connected to anode and negative of supply is connected to cathode in
SCR, the junction 1 and 3 are Forward biased.
4.The full wave bridge rectifier has Four number of diodes.
5.The half wave rectifier has One number of diodes.
6.Depletion layer is formed when P type and N type layer are joined together.
7.The pure form of semiconductor is called Intrinsic semiconductor.
8.SCR has four Layers.
9.In SCR, the gate current is used to control the load current and voltage.
78 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Example - 2
Suggested by:
Prof. Badrunnisa S.
Bellary Institute of Technology and Management, Bellary
79 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Model Making
We can brief the learners regarding this activity beforehand, so as to help them
complete the task within the stipulated period of time.
For the activity, we can divide the class strength into teams as per the number of rows
in the class and supply each team with playing dough of different colours. Now, we
can ask each team to prepare the cell structure of one organelle.
After completing the task, we can randomly select two learners and ask them to collect
the models of the organelles from each team and categorize them as plant and animal
cells.
Some examples of the prepared models are as shown below.
80 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Model Making (contd.)
81 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Combination of
Activities
Go to Main Menu
82 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Dr. (Mrs.) Anjali Lodha
MIT, Pune
A monomer is like a single bead. We can show the learners white, red, green, etc
colored beads of different sizes and shapes. We can explain that each single bead
represents a monomer. There are beads of different sizes and shapes. Similarly, there
are different types of monomers.
Then we can put a few beads in one thread to get a chain. A chain is an analogy for a
polymer. Polymer is a chain of monomers.
83 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested by:
Prof. Milind S. Patnakar
Cummins College of Engineering for Women, Pune
84 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
Suggested Activity: Role Play based on Analogy
(contd.)
The process for shipping finished products in a manufacturing company is enacted
through the role play:
Scene 1: If B receives the finished product wrapped in a wrapper, he/she ACCEPTS
it and sends it for shipping.
If he/she receives the finished product without a wrapper, he/she REJECTS it .
This is an Analogy for Half wave Rectifier’s working .
Scene 2: If B receives the finished product wrapped in a wrapper, he/she ACCEPTS it.
If he/she receives the finished product without a wrapper , he/she will WRAP it
and then send it for shipping .
85 © 2009 Wipro
WM05 LtdVer- 1.0
Confidential
INNOVATE EDUCATE EXCEL