Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all categories
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II






        

Refine Your Search:

Materials 11 - 20 shown of 9,613 results

How Gamification Reshapes Learning

'Dedicated Learning Professionals and Educators across the globe were until recently desperately seeking for ways, methods... see more
Material Type: Reference Material
Author: Various
Date Added: Sep 22, 2014 Date Modified: Sep 22, 2014
Peer Review for material titled "How Gamification Reshapes Learning"
User Rating for material titled "How Gamification Reshapes Learning"
Member Comments for material titled "How Gamification Reshapes Learning"
Personal Collections for material titled "How Gamification Reshapes Learning"
Learning Exercises for material titled "How Gamification Reshapes Learning"
Accessibility Info for material titled "How Gamification Reshapes Learning"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

How to Become an eLearning Professional

'The free How to Become an eLearning Professional eBook is filled with the knowledge, wisdom, experience and inspiration of... see more
Material Type: Reference Material
Author: Various
Date Added: Sep 22, 2014 Date Modified: Sep 22, 2014
Peer Review for material titled "How to Become an eLearning Professional"
User Rating for material titled "How to Become an eLearning Professional"
Member Comments for material titled "How to Become an eLearning Professional"
Personal Collections for material titled "How to Become an eLearning Professional"
Learning Exercises for material titled "How to Become an eLearning Professional"
Accessibility Info for material titled "How to Become an eLearning Professional"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

84 Tips on New Instructional Design for New Instructional Technology

'Today’s learning professionals have myriad technology options for designing, developing, and delivering content, from... see more
Material Type: Reference Material
Author: Karen Forni, Editor
Date Added: Sep 22, 2014 Date Modified: Sep 22, 2014
Peer Review for material titled "84 Tips on New Instructional Design for New Instructional Technology"
User Rating for material titled "84 Tips on New Instructional Design for New Instructional Technology"
Member Comments for material titled "84 Tips on New Instructional Design for New Instructional Technology"
Personal Collections for material titled "84 Tips on New Instructional Design for New Instructional Technology"
Learning Exercises for material titled "84 Tips on New Instructional Design for New Instructional Technology"
Accessibility Info for material titled "84 Tips on New Instructional Design for New Instructional Technology"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

72 Tips for Using Media to Engage and Teach

'Many organizations expect eLearning designers and developers to be experts in multiple forms of media, including full-motion... see more
Material Type: Reference Material
Author: Karen Forni, Editor
Date Added: Sep 22, 2014 Date Modified: Sep 22, 2014
Peer Review for material titled "72 Tips for Using Media to Engage and Teach"
User Rating for material titled "72 Tips for Using Media to Engage and Teach"
Member Comments for material titled "72 Tips for Using Media to Engage and Teach"
Personal Collections for material titled "72 Tips for Using Media to Engage and Teach"
Learning Exercises for material titled "72 Tips for Using Media to Engage and Teach"
Accessibility Info for material titled "72 Tips for Using Media to Engage and Teach"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:01): Introduction

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Peer Review for material titled "Information Security (06:01): Introduction"
User Rating for material titled "Information Security (06:01): Introduction"
Member Comments for material titled "Information Security (06:01): Introduction"
Personal Collections for material titled "Information Security (06:01): Introduction"
Learning Exercises for material titled "Information Security (06:01): Introduction"
Accessibility Info for material titled "Information Security (06:01): Introduction"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:02): Physical Security

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Peer Review for material titled "Information Security (06:02): Physical Security"
User Rating for material titled "Information Security (06:02): Physical Security"
Member Comments for material titled "Information Security (06:02): Physical Security"
Personal Collections for material titled "Information Security (06:02): Physical Security"
Learning Exercises for material titled "Information Security (06:02): Physical Security"
Accessibility Info for material titled "Information Security (06:02): Physical Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:03): Authentication

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication.... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Peer Review for material titled "Information Security (06:03): Authentication"
User Rating for material titled "Information Security (06:03): Authentication"
Member Comments for material titled "Information Security (06:03): Authentication"
Personal Collections for material titled "Information Security (06:03): Authentication"
Learning Exercises for material titled "Information Security (06:03): Authentication"
Accessibility Info for material titled "Information Security (06:03): Authentication"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:04): Protecting Your Data

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Peer Review for material titled "Information Security (06:04): Protecting Your Data"
User Rating for material titled "Information Security (06:04): Protecting Your Data"
Member Comments for material titled "Information Security (06:04): Protecting Your Data"
Personal Collections for material titled "Information Security (06:04): Protecting Your Data"
Learning Exercises for material titled "Information Security (06:04): Protecting Your Data"
Accessibility Info for material titled "Information Security (06:04): Protecting Your Data"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:05): Network Security

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired),... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Peer Review for material titled "Information Security (06:05): Network Security"
User Rating for material titled "Information Security (06:05): Network Security"
Member Comments for material titled "Information Security (06:05): Network Security"
Personal Collections for material titled "Information Security (06:05): Network Security"
Learning Exercises for material titled "Information Security (06:05): Network Security"
Accessibility Info for material titled "Information Security (06:05): Network Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:06): Internet Security

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Peer Review for material titled "Information Security (06:06): Internet Security"
User Rating for material titled "Information Security (06:06): Internet Security"
Member Comments for material titled "Information Security (06:06): Internet Security"
Personal Collections for material titled "Information Security (06:06): Internet Security"
Learning Exercises for material titled "Information Security (06:06): Internet Security"
Accessibility Info for material titled "Information Security (06:06): Internet Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 2 of 962
Left Arrow  Prev 1  2  3  4  5  6  7  8  9  10  Next Next Arrow
Jump to page