Required - QA Learner Interaction 1.1: Promote Learning Outcomes

QA Course Overview

Required

The Quality Assurance Rubric, for the Learner Interaction Section 1.1 states: 

The learning activities promote the achievement of stated learning outcomes.

 

From the SD Board of Regents

Expectations

  • Similar to III.1, but just applied to learning activities (i.e. assignments).
  • For example, if you want your students to be able to identify symptoms and recommend first-aid treatment, having them write an essay on the history of first aid does not achieve the stated outcome.
  • Provide a variety of learning activities such as class discussions, case studies, simulation exercises, practice quizzes, exams, writing exercises. Be sure that you have your learning activities align with your course outcomes and assessments.

 

References

  • QM FIPSE rubric V.1

 

Other Examples


Example 1: Computer Science Course

Course Learning Outcome: Students will be able to identify common cybersecurity threats and implement appropriate security measures to mitigate them.

Learning Activity 1: Case Study Analysis

Activity Description: Students are given detailed case studies describing various cybersecurity threats faced by organizations. They must identify the type of threat, analyze the potential impact, and recommend appropriate security measures to mitigate the threat.

Alignment with Learning Outcome: This activity directly aligns with the learning outcome by requiring students to practice identifying cybersecurity threats and recommending security measures based on realistic scenarios.

Learning Activity 2: Simulation Exercise

Activity Description: Students participate in a virtual simulation where they interact with a network environment under a simulated cyber attack. They must identify the threat, perform a series of security assessments, and implement measures to protect the system.

Alignment with Learning Outcome: This activity allows students to apply their knowledge in a simulated real-world environment, reinforcing their ability to identify cybersecurity threats and implement appropriate security measures.


Example 2: Business Ethics Course

Course Learning Outcome: Students will be able to analyze ethical dilemmas in business and propose ethical solutions using established ethical frameworks.

Learning Activity 1: Group Discussion on Ethical Scenarios

Activity Description: Students are divided into small groups and given ethical dilemmas to discuss. Each group must analyze the dilemma using ethical frameworks discussed in the course and propose a solution. The groups then present their analysis and solutions to the class.

Alignment with Learning Outcome: This activity engages students in critical thinking and collaborative discussion, promoting their ability to analyze ethical dilemmas and propose solutions based on ethical frameworks.

Learning Activity 2: Reflective Essay on Ethical Decision-Making

Activity Description: Students write a reflective essay on a personal or observed ethical dilemma in a business context. They must analyze the situation using at least two ethical frameworks and propose a solution, reflecting on how the frameworks guide their decision-making process.

Alignment with Learning Outcome: This writing exercise encourages students to deeply engage with ethical frameworks and apply them to real-world scenarios, reinforcing their ability to analyze and propose solutions to ethical dilemmas.

 


These examples illustrate how learning activities in a computer science course can be structured to promote the achievement of specific learning outcomes related to cybersecurity, ensuring that students engage in meaningful and relevant tasks that directly support their learning goals.