US20070009876A1 - Lock-in training system - Google Patents
Lock-in training system Download PDFInfo
- Publication number
- US20070009876A1 US20070009876A1 US11/496,246 US49624606A US2007009876A1 US 20070009876 A1 US20070009876 A1 US 20070009876A1 US 49624606 A US49624606 A US 49624606A US 2007009876 A1 US2007009876 A1 US 2007009876A1
- Authority
- US
- United States
- Prior art keywords
- user
- training
- lock
- student
- web
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B7/00—Electrically-operated teaching apparatus or devices working with questions and answers
Definitions
- This invention relates to a system and method for a memory building and retention process and, more particularly, to a method and system for helping a user to learn, memorize, and retain unfamiliar materials.
- a provided learning material may contain sufficient explanatory contents to help a learner to understand and memorize the subject matter.
- purely reading the learning material and/or receiving classroom instruction related to the material is not the best way to quickly memorize the new concepts contained because a huge portion of the learning material is used not for helping the learner to memorize the concepts, but for helping the learner to understand the concepts. Therefore, the learner may be distracted in her learning process to grasp the gist of the learning material. It is thus not uncommon that although, in a learning process, the concept may have to be explained in detail paragraph after paragraph, the gist of the concept may only hinge on a few keywords. Consequently, to learn or to memorize the new concept depends on how well a learner can memorize the keywords. Therefore, a learning platform designed to help the learner to quickly grasp and master the new concepts extracted from the learning material will significantly speed up the learning process.
- a multiple-choice test may be designed and given to the learners to check how well the learners have learned.
- the multiple choice test is obviously not the best choice.
- One embodiment of the invention is a Lock-In Training system.
- the system can include an appropriately programmed Web site and a user computer.
- the Lock-In Training system can also include an appropriately programmed stand-alone computer.
- Some embodiments of the invention allow student users to efficiently learn materials by taking Lock-In Training courses.
- a Lock-In Training course may include one or more Lock-In Training sessions. These sessions may include one or more Lock-In Training parts. These parts can include a group of questions and answers. The answers can include one or more keywords.
- a student user can lock-in material by entering keywords in response to questions. The questions may be presented in Introductory rounds and/or Retention rounds on one or more training days.
- inventions of the invention include the computer programs and databases that enable student users to take efficient training courses as well as the methods performed by the computer systems during the training courses.
- FIG. 1A presents a block diagram illustrating the primary components of a system that operates in accordance with some embodiments of the present invention.
- FIG. 1B presents a database.
- FIG. 2 presents a registration screen display.
- FIG. 3 presents another registration screen display.
- FIG. 4 presents yet another registration screen display.
- FIG. 5 presents still another registration screen display.
- FIG. 6 presents a screen display that allows a student user to select a Lock-In Training course.
- FIG. 7 presents a screen display that allows a student user to select a Lock-In Training session.
- FIGS. 8 through 16 present screen displays from an Introductory round of a Lock-In Training course.
- FIG. 17 presents a screen that informs a student that the student user has completed an Introductory round of a Lock-In Training course.
- FIGS. 18 through 22 present screen displays from a Retention round of a Lock-In Training course.
- FIG. 23 presents a block diagram illustrating the primary components of a system that operates in accordance with some embodiments of the present invention.
- ASP Active Serve Page
- An HTML page that includes one or more small embedded programs, known as scripts, which are processed on a Web server before the HTML page is served to a Web browser.
- the Web server utilizes data from a database to build the HTML page before serving the HTML page to the Web browser.
- Cookies A technology that enables a Web server to retrieve information from a consumer's computer that reveals prior browsing activities of the consumer.
- the informational item stored on the consumer's computer (typically on the hard drive) is commonly referred to as a “cookie.”
- Many standard Web browsers support the use of cookies.
- Database A collection of information organized in such a way that a computer program can store, and/or retrieve desired pieces of information.
- Dynamic HTML HTML extensions that enable a Web document to react to user input without sending requests to a Web server.
- Element In markup languages such as HTML, the combination of a set of tags, any content contained between the tags, and any attributes the tags may have.
- An element is an object.
- HTML Hypertext Markup Language
- HTML Hypertext Markup Language
- HTTP Hypertext Transport Protocol
- HTTP includes a number of different types of messages that can be sent from the client to the server to request different types of server actions. For example, a “GET” message, which has the format GET ⁇ URL>, causes the server to return the document or file located at the specified URL.
- Hyperlink A navigational link from one document to another, or from one portion (or component) of a document to another.
- a hyperlink is displayed as a highlighted word or phrase that can be selected by clicking on it using a mouse to jump to the associated document or portion.
- Hypertext System A computer-based informational system in which documents (and possibly other types of data entities) are linked together via hyperlinks to form a consumer navigable “web.”
- Internet A collection of interconnected (public and/or private) networks that are linked together by a set of standard protocols (such as TCP/IP and HTTP) to form a global, distributed network. (although this term is intended to refer to what is now commonly known as the Internet, it is also intended to encompass variations that may be made in the future, including changes and additions to existing standard protocols.)
- standard protocols such as TCP/IP and HTTP
- Intranet A network belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization.
- An intranet's Web sites look and act just like any other Web sites, but a firewall surrounding an intranet fends off unauthorized users.
- JavaScript A scripting language developed by Netscape that enables Web authors to design interactive Web sites. See Dynamic HTML above.
- An object Any item that can be individually selected and/or manipulated.
- An object can include hyperlinks, shapes and pictures that appear on a display screen, as well as less tangible software entities.
- URL Uniform Resource Locator
- Web browser A unique address which fully specifies the location of a file or other resource on the Internet.
- the general format of a URL is “protocol://machine address:port/path/filename.”
- the port specification is optional, and if the consumer specifies none, the Web browser defaults to the standard port for the protocol. For example, if HTTP is specified as the protocol, the Web browser will use the HTTP default port of 80 .
- Web Site A computer system that serves informational content over a network using the standard protocols of the World Wide Web.
- a Web site corresponds to a particular Internet or Intranet domain name, such as “www.trivac.com,” and includes the content associated with a particular organization.
- the term is generally intended to encompass both (i) the hardware/software server components that serve the informational content over the network, and (ii) the “back end” hardware/software components, including any non-standard or specialized components, that interact with the server components to perform services.
- World Wide Web Used to refer generally to both (i) a distributed collection of interlinked, viewable hypertext documents (commonly referred to as Web documents or Web pages) that are accessible via the Internet, and (ii) the client and server software components that provide consumer access to such documents using standardized Internet protocols.
- Web documents typically referred to as Web documents or Web pages
- client and server software components that provide consumer access to such documents using standardized Internet protocols.
- HTTP HyperText Transfer Protocol
- HTML HyperText Transfer Protocol
- Web HyperText Transfer Protocol
- Web HyperText Transfer Protocol
- World Wide Web are intended to encompass future markup languages and transport protocols that may be used in place of (or in addition to) HTML and HTTP.
- FIG. 1A illustrates a simplified block diagram of a user computer 105 and a Lock-In Training Web site 110 , both of which are linked together by the Internet 115 or an Intranet (not shown).
- the block diagram of FIG. 1A is simplified to illustrate only those functional elements of interest in describing the present invention.
- the user computer 105 is conventional.
- the user computer 105 may be any type of computing device that allows a consumer to interactively browse Web sites on the World Wide Web via a Web browser.
- the user computer 105 may be a personal computer (PC) that runs a Windows operating system, an Apple computer, that runs an Apple operating system, a Web appliance, a hand held computer, or even a telephone.
- the user computer 105 typically includes a Web browser 120 , such as Microsoft's Internet Explorer, which uses the HTTP protocol to communicate with Web servers.
- the Web browser 120 can request, receive, and display Web documents 125 as well as other data entities, such as audio, video, and/or image documents. If printing of Web documents or other documents is desired, then the user computer 105 may also include a printer 130 .
- the Lock-In Training Web site 110 provides functionality for allowing users to learn, memorize, and retain unfamiliar materials. More specifically, the Lock-In Training Web site 110 includes a Web server 140 that allows a user to retrieve a plurality of Web documents 150 .
- the Lock-In Training Web site also contains a computer program 145 that posts a series of Web documents 150 , such as HTML documents and/or Dynamic HTML documents.
- the Lock-In Training Web site generates HTML documents and Dynamic HTML documents from ASP documents and one or more databases, such as database 155 .
- the Lock-In Training Web site 110 is a web site that allows users to enter and receive data as will be discussed more fully below.
- the computer program 145 and the database 155 can be stored in program storage devices such as hard disk drives, floppy disk drives, flash memory, DVD disks, CDROM disks, etc.
- Lock-In Training Web site allows a number of users to take Lock-In Training courses.
- a Lock-In Training course typically relates to a general subject area.
- a course may relate to the Presidents of the United States.
- Such a course can include one or more Lock-In Training sessions, which often relate to more specific subject areas.
- a course related to the Presidents of the United States could include a first session related to the Presidents before the Civil War and a second session related to the Presidents after the Civil War.
- a Lock-In Training session may include one or more parts.
- a part typically includes a group of “questions” and “answers.” For example, a question may be “Who was the first President?” Similarly, an answer may be “The first President was George Washington.”
- Each answer can include one or more keywords, i.e., significant words within the answer that may be utilized to convey the answer. The keywords in the above answer are “first” and “George Washington.”
- the user can be introduced to the material to be learned in an Introductory round.
- an Introductory round a student user typically reviews questions and answers, re-types the answers, and then answers the question with or without hints.
- the student user can take one or more Retention rounds.
- the purpose of the Retention rounds is to lock-in the material into the user's long-term memory.
- the student user In a Retention round, the student user typically answers the questions with or without hints.
- the student user In order to complete the Retention rounds, the student user must successfully answer the questions according to pre-defined criteria.
- the Lock-In Training Web site 110 can include a database 155 .
- This database 155 can contain a number of tables.
- FIG. 1B One example of database 155 is shown in FIG. 1B .
- the table names are italicized.
- the table primary keys are bolded and the table foreign keys are underlined.
- a primary key provides a unique identifier of a specific row in a database table.
- a foreign key is a database column whose value matches the primary key of another table.
- the “Clients” table shown in FIG. 1B contains a primary key, “ClientID.”
- the “Clients” table contains three columns. The first column, “ClientName,” can store the name of a client, such as “IBM,” “Starbucks,” “Palo Alto School System,” etc. The second column, “SessionDays,” can store the number of days of training that a student must take to fully complete a Lock-In Training session or course.
- a session that includes three days of training could have “SessionDays” set to three.
- a session that takes four days to complete could have “SessionDays” set to four.
- Lower values of “SessionDays” require less student time, while higher values of “SessionDays” ensure higher retention of learned materials.
- a client can specify, via “SessionDays,” the desired number of training days for courses or sessions taken by the client's students.
- the third column, “DaySessions,” can be used to control the training sequence of several multi-day sessions.
- a Lock-In Training course may include three sessions, such as sessions A, B and C, each of which are taken over a number of days.
- a “DaySessions” value of two could indicate that a student must complete the first training day of sessions A and B before taking the second training day of either session A or session B. However, the student could take the first training day of session C before taking any training days of either session A or B.
- the “Day Sessions” value was three, then the student could not take the second training day of sessions A, B, or C until the student has completed the first training day of sessions A, B, and C.
- the “Day Sessions” value was zero, then a student could take all of the training days of session A before taking any days of sessions B or C.
- the “Courses” table is utilized to store information about Lock-In Training courses.
- the table contains a primary key “CourseID” and two columns.
- the first column, “CourseName,” can store names of a Lock-In Training course.
- Example course names include “Presidents of the United States,” “Governors of the States,” and “Largest Cities in Texas.”
- the second column, “CourseGroup,” can store course groupings. For example, the above three courses could be grouped by a client administrator or by a system administrator under “American History.”
- the “ClientProfiles” table can be utilized to customize the graphical user interface of Lock-In Training courses for clients.
- the “ClientProfiles” table contains a primary key “ClientProfile” and four columns. The first column is a foreign key, “ClientID.” The second column “ActiveProfile,” can store data indicating whether a client has an active graphical user interface.
- the third column, “HeaderImage,” can store a file name that contains a customized image. This customized image can be utilized to create a portion of a customized graphical user interface, such as a custom header.
- the fourth column, “HeaderLocation,” can store horizontal and vertical screen locations that can be utilized to position the customized image on the computer screen of the user computer 105 .
- Other embodiments of the database include columns for other images, such as footer images, other image locations, background images, custom color schemes, custom fonts, custom font sizes, custom text, custom objects, and other graphical user interface elements.
- Still another table in the database shown in FIG. 1B is the “ClientCourses” table.
- This table contains information related to Lock-In Training courses that are associated with a particular client.
- the “ClientCourses” table contains a primary key “ClientCourse” and two foreign keys: “ClientID” and “CourseID.”
- the “Sessions” table provides information about a Lock-In Training session.
- the “Sessions” table contains a primary key “SessionID.”
- the table contains five columns.
- the first column is a foreign key, “ClientID.”
- the second column “SessionNum,” can store the number of a session.
- the first, second, and third sessions of a Lock-In Training course could be indicated by “SessionNum” values of 1, 2, and 3.
- the third column “SessionTitle,” can store titles of sessions.
- a title of a session could be “Presidents of the United States before the Civil War.”
- the fourth column “SessionDescription,” can store descriptions of sessions.
- a session description could be “The names of the sixteen Presidents of the United States before the Civil War.”
- the fifth column “LockoutPeriod” can be utilized to inactivate sessions until a specified period of time has passed so that spaced repetition of training sessions can be assured. More specifically, “LockoutPeriod” can store the length of a time period that must transpire between portions of sessions. For example, “LockoutPeriod” could indicate the required time between the completion of a prior day's session and the beginning of a current day's session.
- “LockoutPeriod” could indicate the required time between the beginning of a prior day's session and the beginning of a current day's session.
- “LockoutPeriod” can be utilized to ensure that a student does not take portions of Lock-In Training sessions too rapidly. If such a time period has not transpired, then a session (or a course) can be inactivated so that the student cannot take the remaining portions of the sessions until the “LockoutPeriod” has transpired. As will be discussed below, long-term retention of materials can be increased if spaced repetitions of Lock-In Training sessions occur.
- Still another table in the database shown in FIG. 1B is the “Users” table.
- This table can be utilized to store information on users of the Lock-In Training system. Typical users include private and public employees, elementary students, middle school students, high school students, college students, military personnel and law enforcement personnel.
- the “Users” table contains a primary key “UserID.”
- the table contains fifteen columns. The first column is a foreign key, “ClientID.”
- the second and third columns, “FirstName” and “LastName,” can store the first and last names of a user. For example, FirstName could store “John” and “LastName” could store “Smith.”
- Other embodiments of the database 155 could include an additional column for storing the middle name or the middle initial of users.
- the fourth and fifth columns “UserName” and “Password,” can be utilized to rapidly login a user into the Lock-In Training system.
- a user named John Smith could utilize “jsmith” and “Monsoon1$” to rapidly login into the Lock-In Training system.
- Other embodiments of the invention could also include other columns that contain information utilized to login a user into the Lock-In Training Website.
- the table could contain columns holding user's biometric information, such as fingerprints, voice patterns, eye patterns, etc.
- the sixth column, “UserType,” can be utilized to indicate whether the user is a student, a client administrator, a system administrator, or another type of user. Student users take Lock-In Training sessions.
- the rights and privileges of users can depend upon the user's UserType.
- Client administrators typically have the ability to configure Lock-In Training courses, add or remove student users, and assign Lock-In Training courses to student users.
- system administrators typically have the ability to add or remove clients and some or all of the rights and privileges of client administrators.
- the seventh column, “Inactive,” can be utilized to indicate inactive users, such as users that are no longer employed by a client. Such users may include, for example, users that have not accessed the Lock-In Training Web site for a predetermined period of time or users that have a “ClientID” associated with a delinquent client.
- the eighth and ninth columns of the “Users” table can be utilized to store user administrative data.
- “ResetPW” can be utilized to indicate if the computer program 145 , a client administrator, or a system administrator assigned the user's password or alternatively if the user has reset the user's password.
- “ResetPW” value could be set to “true;” otherwise, the “ResetPW” value could be set to “false.”
- “Registered” can be utilized to indicate whether the user has registered with the Lock-In Training Web site 110 .
- the remaining columns in the “Users” table can hold various information about the user, such as: the user's email, telephone number, street address, city, state, and zip code.
- Still another table in the database shown in FIG. 1B is the “UserCourses” table.
- This table contains a primary key, “UserCourse,” and eight columns. The first two columns are foreign keys: “UserID” and “CourseID.”
- the third column, “CourseOrder,” can be utilized to sequence courses for student users. For example, student users may have a number of different courses assigned to them, such as: American History I, American History II, and American History III. These three courses may be assigned “CourseOrder” values of one, two, and three respectively. Thus, the “CourseOrder” values could be utilized to ensure that the student takes American History I before American History II, or American History III.
- “CourseOrder” for those courses could be set to zero.
- the fourth column in the “User Courses” table is “Activated.” The “Activated” value can be utilized to indicate whether a particular course is available to a user.
- the fifth column in the “User Courses” table is “Completed.” The “Completed” column can be utilized to indicate whether a user has previously completed a course.
- the final three columns can be utilized to store course enrollment dates, course start (begin) dates, and course completion dates.
- the “UserSessions” table can be utilized to store information regarding a user's training session activities.
- the “User Sessions” table contains a primary key “UserSession.”
- the table contains eight columns, which include two foreign keys, “UserID” and “SessionID.”
- the third column, “DayNum,” can store information relating to the user's training activities. For example, if the user has completed a session's first day of training, then “DayNum” could be one. Similarly, if the user has completed a session's first and second days of training, then “DayNum” could be two.
- the next two columns, “StartTime” and “EndTime,” could store the start and end times of a user's session activities. These columns could be utilized to determine if a user has complied with a session's “LockoutPeriod” requirement.
- the seventh column, “Timeouts,” could store the time period since the user has entered any information into the user computer 105 , via computer keyboard, mouse, trackball, touch pad, touch screen, microphone, or otherwise.
- the final column, “Cancelled,” could indicate that a user's session has been canceled because, for example, the user's “Timeouts” exceeded a predefined time period.
- Parts table Another table in the database shown in FIG. 1B is the “Parts” table.
- This table can store information related to a Lock-In Training session's parts.
- This table contains a primary key “PartID.”
- the table contains three columns, one of which is a foreign key, “SessionID.”
- the second column, “PartNum,” can be utilized to sequence the parts within a session.
- a Lock-In Training session may include a number of different parts, such as: “U.S. Presidents 1-8” and “U.S. Presidents 9- 16.” These parts may be assigned “PartNum” values of one and two respectively.
- the “PartNum” values could be utilized to ensure that the student user takes “U.S. Presidents 1-8” before “U.S.
- PartNum The final column in the Parts table, “PartTitle,” can be utilized to store the title of a part, such as “U.S. Presidents 1-8.”
- the “Questions” table can store information related to questions and answers that will be presented to student users.
- the “Questions” table includes a primary key, “QuestionID.”
- the table includes six columns. The first column is a foreign key, “PartID.” The next three columns can be utilized to store question numbers, question titles, and questions. Thus, question number 1 could have a title “The first President of the United States.” Similarly, “Question” number 1 could be “Who is the first President of the United States?” The fifth column, “Answer,” can be utilized to store the answers to questions.
- the “Answer” to “Question” number 1 could be “The first President of the United States was George Washington.”
- the last column in the “Questions” table, “Keywords,” can be used to store the keywords of a question.
- the keywords for the above “Answer” could be “first,” “George,” and “Washington.”
- the “Answer” includes one or more codes that indicate the keywords.
- the “Answer” to “Question” number 1 could be “The %%first President of the United States was %%George %%Washington.”
- the “%%” characters could be utilized to indicate a keyword.
- a separate “Keywords” column is not needed because the keywords are identified in the “Answer.”
- the last table in the database shown in FIG. 1B is the “UserPart” table.
- This table can be used to store information related to users' activities related to taking a Lock-In Training part. This information, combined with the information stored in the “UserSessions” table, can be utilized to allow student users to resume their training at the question, round, part, and session where they previously stopped training.
- the table includes a primary key, “UserPart,” and thirteen columns. The first two columns, “UserID” and “PartID,” are foreign keys. The third column, “DayNum,” can store information relating to the user's training day activities. For example, if the user has completed the first training day of a part, then “DayNum” could be one.
- “DayNum” could be two.
- the table's sixth column, “RoundNum,” can store a student user's current round. For example, “RoundNum” could be zero if the student user is in an Introductory round. Similarly, “RoundNum” could be one if the student user is in a Retention round.
- “RoundNum” could also indicate the number of “Retention” rounds that a user has taken. For example, if the student user has completed the first Retention round, then “RoundNum” would be one. Similarly, if the student user has completed the third Retention round, then “RoundNum” could be set to three.
- the seventh column, “QNum,” can store a student user's current question number. “RoundNum” and “QNum” can be utilized to determine a student user's location in a particular Lock-In Training part so that the user can efficiently resume training at that location.
- the eighth column can store the number of times a student user retried each question in an Introductory round or a Retention round. Thus, “Retries” could be utilized to determine the relative difficulty levels of various questions.
- the ninth column, “Hints,” can store the total number of times that a student user utilized a hint to answer a question in a round.
- the tenth column “CompFinish1,” can store the Retention round number in which a student successfully answered a question without a hint in that round.
- the eleventh column, “CompFinish2” can store the Retention round number in which a student user successfully answered each question a second time without a hint in that round.
- the twelfth column, “Timeouts,” could store the time period since the user has entered any information into the user computer 105 .
- the final column, “Cancelled,” could indicate that a user's part has been canceled because, for example, the user's “Timeouts” exceeded a predefined time period.
- Some embodiments of the computer program 145 may utilize multiple databases to store the above information, while other embodiments of the computer program 145 utilize only one database, such as the database 155 shown in FIG. 1B , to store such information.
- the Lock-In Training Web site 110 may perform logging in users into the Lock-In Training Web site 110 .
- the Lock-In Training Web site's computer program 145 and Web Server 140 may serve a login Web document to a user computer 105 .
- the login Web document may request a user to enter a username and a password.
- the user computer's Web browser 120 transmits the username and the password to the Lock-In Training Web site 110 .
- the computer program 145 compares the username and password to data stored in a database.
- the computer program 145 may compare the username and password to values in the “UserName” and “Password” columns of the Users table in the database shown in FIG. 1B . If the username and password are not found in the database, then the Lock-In Training Web site 110 may serve another login Web document to the user computer 105 .
- the computer program 145 may retrieve user information from the database, such as for example, “UserType,” “FirstName,” “LastName,” “ResetPW,” “Registered,” “Email,” “Phone,” “Address,” “City,” “State,” and Zip” values from the “Users” table.
- the computer program 145 may serve a Web document, such as Web document 200 shown in FIG. 2 , to the user computer 105 .
- Web document 200 allows a user to enter the user's e-mail address, phone number, street address, city, state and zip code.
- the information entered by the user is then typically stored in a database, such as for example in the “Users” table of the database shown in FIG. 1B .
- data would typically be stored in the database 155 indicating that the user has been registered.
- the graphical user interface of Web document 200 may be based upon data stored in a database. For example, if a user's “ClientID” is Starbucks, the “Client Profiles” table of the database of FIG. 1B may be accessed, using the Starbuck's “ClientID.” As a result, the computer program 145 can retrieve one or more graphic images, image locations, background images, custom color schemes, custom fonts, custom font sizes, custom text, and/or other graphical user interface elements that are unique to Starbucks. Then, the graphical user interface of Web document 200 , and optionally other Web documents, may include some or all of the retrieved graphical user interface element(s). Similarly, if the user's “ClientID” is IBM, then the graphical user interface of Web document 200 and following Web documents may include graphical user interface elements that are unique to IBM.
- Web document 300 allows a user to enter and confirm a new password. If the two entered passwords match and optionally meet certain password criteria, such as password length, number of unique character sets in the password, password quality, etc., then the entered password can be stored in the database. In addition, data would typically be stored in the database that indicates that the user's password has been reset. Some embodiments of the invention store the password in plain text. However, other embodiments of the invention store the password in an encrypted format to increase the security of the password. As shown in FIG. 3 , Web document 300 may also display previously entered user information. Some embodiments of the invention also allow the user to correct or update any displayed user information.
- some embodiments of the invention display a Web document, such as Web document 400 shown in FIG. 4 , that displays the student name, username, and password.
- this Web document may be printed and securely stored by the user.
- the computer program 145 and the web server 140 serve a Web document, such as Web document 500 shown in FIG. 5 , that provides the user with a background and an overview of the Lock-In Training process.
- the computer program 145 and the web server 140 serve a Web document that displays the terms-of-use of the Lock-In Training Web site.
- the user may be required to click on a button indicating that the user has read and agreed to the terms-of-use before the user is allowed to take any training courses.
- the Web document that displays the terms-of-use also lists relevant patent numbers that cover various portions of the Lock-In Training Web site and other proprietary information.
- Lock-In Training Web site 110 may perform a function that the Lock-In Training courses.
- the Lock-In Training Web site's computer program 145 and Web server 140 may serve a Web document, such as Web document 600 shown in FIG. 6 , that allows a user to select a particular Lock-In Training course.
- the Web document may include a number of objects.
- Web document 600 includes a “Presidents of the United States (2 Sessions, 43 Questions)” object that could be selected by a user to indicate that the user desires to take a Lock-In Training course relating to learning the Presidents of the United States.
- Web document 600 includes “Governors of the States (3 Sessions, 50 questions)” and “Largest Cities in Texas (1 Session, 10 Questions)” objects.
- the list of Lock-In Training courses displayed in Web document 600 would be determined by retrieving information from a database.
- the computer program 145 could retrieve the course names from the “User Courses” and “Courses” tables shown in the database of FIG. 1B .
- the retrieved courses could then be inserted into a Dynamic HTML Web document by the computer program 145 , which would then be served to user computer 105 .
- Some embodiments of the invention also indicate to the user the status of Lock-In Training courses. For example, as shown in FIG. 6 , if a user has previously completed a Lock-In Training course, as indicated in a “Completed” value in a “User Courses” table, then a check icon 610 could indicate the status of the course. Similarly, if a course is available, as indicated in an “Activated” value in the “User Courses” table, then an unlocked padlock icon 620 could indicate the status of the course. Likewise, if a course is unavailable, then a locked padlock icon 630 could indicate the status of the course. A course may be unavailable because a user has recently completed another course or another session.
- the time that a user has completed a prior session or course is stored in the database.
- the database stores a lockout period for each course and/or each session. If the time that has elapsed since the user completed a prior session or course is less than the lockout time, then a course may be unavailable.
- courses having a certain status would be included in the Web document that was served to the user.
- some embodiments of the invention would only include available courses in Web documents.
- which serve Web documents that include unavailable courses if the user selects an unavailable course, then a Web document is served that includes an error message explaining that the course is not available and, optionally, the reason for the course's unavailability.
- a Web document containing (a) a message explaining that the course has been completed and/or (b) a message asking if the user would like to review the course material.
- Another function performed by some embodiments of the invention is selecting a session.
- the computer program 145 could retrieve course, session, part, and question information from database table(s). For example, the sessions of the course, the number of parts in each session, and the number of questions in the session could be retrieved. In addition, the number of training days that the user has completed for each session and the total number of training days for each session could be retrieved. Further, the status of the session (available, unavailable, or completed) may be retrieved.
- the computer program 145 and the Web server 140 could serve a Web document, such as Web document 700 shown in FIG. 7 , that allows the user to select a session.
- the Web document may include a number of objects.
- Web document 700 includes a “Presidents of the United States before the Civil War” object and a “Presidents of the United States after the Civil War” object. By clicking on one of the above objects, the user could select a Lock-In Training session. In addition to the two session objects, Web document 700 includes a “Return to Main Menu” object. If the user selects that object, then the Lock-In Training Web server 140 and computer program 145 could serve a Web document, such as Web document 600 , that allows the user to select a Lock-In Training course.
- Some embodiments of the invention also indicate to the user the status of Lock-In Training sessions. For example, if a user has previously completed a Lock-In Training session, then a check icon could indicate the status of the session. In addition, if a session is available, and hence unlocked, then an unlocked padlock could indicate the status of the session. Similarly, if a session is unavailable, then a locked padlock could indicate the status of the session.
- a session may be unavailable because a user has recently completed another session or another course.
- the time that a user has completed a prior session is stored in the database.
- the database stores a session lockout period for each course and/or each session. If the time that has elapsed since the user completed a prior session is less than the session lockout time, such as 1, 2, 3, 4, 6, 8, 10, 12, 14, 16, 18, 20, 22, 24, 36, or 48 hours, then the session may be unavailable.
- the number of sessions that a user has either begun or completed within a predetermined time period is stored in a database. If the number of sessions begun or completed within a predetermined time period, such as 1, 2, 3, 4, 6, 8, 10, 12, 14, 16, 18, 20, 22, 24, 36, or 48 hours, is greater than a predetermined number, such as 1, 2, 3, or 4, sessions, then new sessions may be unavailable to the user.
- a predetermined time period such as 1, 2, 3, 4, 6, 8, 10, 12, 14, 16, 18, 20, 22, 24, 36, or 48 hours
- sessions having a certain status would be included in the Web document that was served to the user.
- some embodiments of the invention would only include available and completed sessions in Web documents.
- a Web document is served that includes an error message explaining that the session is not available and, optionally, the reason for the session's unavailability. For example, if a user has completed two sessions in the last 24 hours and the user selects another session, then a Web document may be served that includes an error explaining that the user must wait a day to take another session because the user has already completed two sessions in one day.
- the computer program 145 can query a database to determine if the user had previously completed a portion of the session. If the student user had previously partially completed a Lock-In Training session, then the computer program 145 may retrieve information that identifies the last part and the last round in which the student user answered a question. In addition, the computer program 145 may retrieve information identifying the last question that the student user answered. Then, using the retrieved information, the computer program 145 and the Web server 140 may serve a Web document that allows the user to continue the user's training session in the same part, round, and question that the student user utilized when the student user ceased training. Thus, for example, if a student user stopped a prior Lock-In Training session while working on a particular question in a particular part and round, then the student user could resume the session at that same question, part, and round.
- Web document 800 presents the student user with the current session title, “Presidents of the United States before the Civil War,” and the current session number, “1.”
- Web document 800 presents the user with the current and total number of parts and the current and total number of questions in the current part. Further, Web document 800 informs the user that the user is currently training in an “Introductory Round.” As discussed in Section 5.5, the purpose of the introductory round is to introduce the user to the material that the user will be learning.
- Web document 800 also includes one or more elements that present the user with a question: “Who was the first President?” Similarly, Web document 800 includes one or more elements that present the user with an answer: “The first President was George Washington.” Notice that “first” and “George Washington” are displayed in a bold font in Web document 800 .
- the bold font is utilized to indicate that “first,” “George” and “Washington” are keywords.
- keywords indicate the essence of an answer. Thus, by learning the keywords of an answer, a user will have learned the answer.
- Web document 800 identifies the keywords by using a different font color, a different font size, a different font style (bold, italic, underline, etc.), and/or a different font family (Times Roman, Arial, etc.) than are used for non-keywords in the answer.
- Web document 800 identifies the keywords by placing a graphic object around or near the keywords, such as a box or an oval. To continue the Lock-In Training session, the user would typically select the “Press ‘Enter’ to Continue” object. Alternatively, the user could select the “Return to Main Menu” object to return to Web document 600 .
- Web document 900 shown in FIG. 9 could be displayed on the computer display of the user computer 105 .
- Web document 900 presents the first question and the complete first answer to the student user.
- Web document 900 also presents a partially completed first answer to the student user.
- the partially completed first answer replaces the keywords with continuous underlines.
- the keywords are replaced with non-continuous underlines.
- “first” would be replaced with “_ _ _ _ _.”
- the advantage of utilizing non-continuous underlines is that the non-continuous underlines provide the user with a small hint: the number of characters in each keyword.
- non-continuous underlines are utilized only in the Introductory round, while continuous underlines or no underlines are utilized in the Retention rounds.
- the student user enters the keywords into the user computer 105 using the completed answer as a guide.
- the student user types characters into a keyboard attached to user computer 105 .
- the user utilizes a mouse to select keys that are displayed on a simulated keyboard on a computer display.
- the student user utilizes a number pad to enter the key words. For example, a user may type “4” to enter “G,” “44” to enter “H,” and “444” to enter “I.” The use of such keyboards to enter characters may be particularly useful when the user computer 105 is a telephone.
- FIG. 10 presents a Web document 1000 into which the user has entered “first.”
- Web document 1000 identifies the entered keywords by using a different font color, a different font size, a different font style (bold, italic, underline, etc.), and/or a different font family (Times Roman, Arial, etc.) than are used for non-keywords in the answer.
- the Web document could identify the entered keywords by placing a graphic object, such as a box or an oval, near or around the keywords.
- the user would typically enter the keyword “George.”
- the incorrect character “r” may be displayed by using a different font color, a different font size, a different font style (bold, italic, underline, etc.), and/or a different font family (Times Roman, Arial, etc.) than are used for correctly entered characters.
- a Dynamic HTML Web document may display incorrectly entered characters in red, and may display correctly entered characters in blue.
- the character “r” is displayed in an italic bold font while correctly entered characters are displayed in a regular bold font.
- the Dynamic HTML Web document could display an error message, such as “Check the spelling, letter, or number.”
- only one incorrect character will be displayed.
- the Web document would display “s_______” because only the last incorrectly entered character would be displayed.
- 2, 3, 4, 5, or all incorrect characters could be displayed.
- the Web document would display “ Thomas .”
- the Web document would display characters that are entered for a keyword in a predetermined combination of upper and lower case characters regardless of the case of the entered characters. For example, if a student user enters “GEORGE” for the keyword “George,” then the Web document would display the entered characters as “George.” Similarly, if the student user enters “Washington” for the keyword “Washington,” then the Web document would display the entered characters as “Washington.”
- depressing the backspace and/or the delete keys does not remove the correctly entered characters.
- depressing one or both of those keys would remove the correctly entered characters from the user computer's display.
- the student user is required to enter a space between key words.
- the student user would be required to enter a space between “George” and “Washington.”
- the student user would not be required to enter a space.
- the student user could enter “georgewashington” and the Web document would display “George Washington.”
- a student user may not be required to enter a space between “first” and “george” in Web document 1100 .
- a student user can “jump” between keywords. For example, if a user desires to type “first” and then “Washington,” but not “George,” then the student user could type “first[Tab][Tab]Washington.” The [Tab] characters would allow the student user to skip over the second keyword. Similarly, after typing “first” the student user could utilize the mouse to select the first character in the third keyword. Allowing a student user to enter the information that the user knows and then using that information to enter the remaining keywords can increase the long-term retention of the student user.
- the Dynamic HTML Web document may display a message indicating that the user has correctly entered the keywords.
- a database in the Lock-In Training Website 110 is updated to indicate the successful answer, together with the current part, round, and session.
- this information is stored on a cookie on the user computer 105 . This information, regardless of whether it is stored on the Lock-In Training Web site 110 or the user computer 105 , can be utilized to allow the student user to easily resume training at a later time.
- a “Press ‘Enter’ to Continue” object is displayed. This object allows the student user to continue the student user's training. A student user would typically then select the “Press ‘Enter’ to Continue” object.
- Web document 1300 could be displayed. Note that Web document 1300 displays-the first question and an incomplete first answer. Web document 1300 does not include a complete answer as did Web document 1200 . Instead, Web document 1300 includes a “Hint” object.
- the “Hint” object provides the user with one or more hints to enable the user to easily enter the keywords. For example, in some embodiments of the invention, such as shown in FIG. 14 , if the user selects the “Hint” object a single time, the Web document would display the first character in each keyword. In some embodiments of the invention, such as shown in FIG. 15 , if the user selects the “Hint” object a second time, the Web document would display the first character in each keyword and the consonants in each keyword. Similarly, if the user selects the “Hint” object a third time, the Web document would display all the keywords.
- hints the first letter of each keyword, the consonants of each keyword, and the complete keywords.
- Other embodiments of the invention may include fewer or more hints.
- Such hints could include:
- the student user when a student user selects the “Press ‘Enter’ to Continue” object, the student user advances to a second question in the Introductory round.
- Web documents similar to Web documents 800 through 1600 will be displayed for the second question.
- the information required to generate the Web documents for a second question such as “Questions” table information, will have been downloaded to the user computer 105 before the user selects the “Press ‘Enter’ to Continue” object of FIG. 16 .
- the responsiveness of the training system will be optimized. After the student user has correctly answered the second question the required number of times with less than the required number of hints, then, similar Web documents for the remaining questions in the part will be displayed.
- a retention round begins by the computer program 145 and the Web server 140 serving a Web document, such as Web document 1700 shown in FIG. 17 .
- Web document 1700 informs the student user that the user has completed the Introductory round and has begun the Retention rounds.
- Web document 1700 provides the student user with the requirements to complete the Retention rounds.
- the completion requirements are obtained from a database. For example, as shown in FIG.
- the completion requirements may be answering each question twice without using the hint button.
- a student user utilizes a hint for a question in a Retention round, then that question will be included in a future Retention round.
- a student user has answered a question twice without using a hint, then that question will not be included in future Retention rounds.
- the student user will continue taking Retention rounds until each question has been answered twice without using any hints.
- the requirements of completing the Retention rounds may be answering each question a different number of times, such as 1, 3, 4, or 5, without using any hints.
- the requirements of completing the Retention rounds may be answering each question a predetermined number of times using less than a predetermined number of hints, such as 1, 2, 3, 4, or 5.
- the computer program 145 can query a database to determine if the user had previously completed a portion of a Retention round. If the user had previously completed a portion of a Retention round, then the computer program 145 may retrieve information that identifies the location that the student user stopped training. Then, using the retrieved information, the computer program 145 and the Web server 140 may serve a Web document that allows the user to continue the user's training session. Thus, for example, if a user stopped a prior session while working on a particular question in a particular Retention round on a particular day of training, then the user could begin the session at that same question, round, and training day.
- Web document 1800 includes an element that presents the user with the current session title, “Presidents of the United States before the Civil War,” and the current session number, “1.” In addition, Web document 1800 presents the user with the current and total number of parts. Further, Web document 1800 informs the user that the user is currently in a “Retention Round.” Web document 1800 also includes a “Hint” object. The “Hint” object provides the student user with one or more hints, as did the “Hint” in the Introductory round.
- Web document 1800 includes a dynamic process bar 1810 .
- the dynamic process bar 1810 can indicate the completion status of the Retention rounds.
- the Retention rounds' completion criteria may be to answer each question two times without the use of a hint.
- a dynamic process bar could indicate that (1) a question has not been answered without a hint, (2) a question has been answered once without a hint, and (3) a question has been answered twice without a hint.
- a dynamic process bar could indicate that (1) a question has not been answered without a hint, (2) a question has been answered once without a hint, (3) a question has been answered twice without a hint, and (4) a question has been answered three times without a hint.
- the dynamic process bar 1810 includes sixteen different circles. Each circle has a number directly above the circle that corresponds to a question number. Thus, the circle with “1” above it corresponds to question one. The pattern within the circle corresponds to the status of the question. As shown on the bottom left of FIG. 18 , a circle pattern with lower-left to upper-right lines indicates that a question “has not been answered without a hint.” Similarly, as shown on the bottom center of FIG. 18 , a circle pattern with horizontal and vertical lines indicates that a question has been “answered once without a hint.” Likewise, as shown on the bottom right of FIG.
- a circle pattern with diagonal crossing lines indicates that a question has been “answered twice without a hint.”
- the dynamic process bar 1810 indicates that none of the sixteen questions have been answered without a hint.
- the dynamic process bar 1810 can also indicate the current question number. For example, the disk that surrounds circle “1,” indicates that the current question is question one.
- FIG. 19 presents a Web document 1900 with another dynamic process bar 1910 .
- This dynamic process bar 1910 indicates that questions one through six have been “answered twice without a hint.”
- the dynamic process bar 1910 also indicates that questions seven through ten have been “answered once without a hint” and that questions eleven through sixteen have “not been answered without a hint.”
- the dynamic process bar 1910 indicates that the current question is question “10.”
- While the dynamic process bars of FIGS. 18 and 19 utilize different patterns within circles to indicate question status, other graphical elements could be utilized. For example, different colors of solid circles or circle sizes could indicate question status. Similarly, different graphical shapes, such as rectangles, squares, quadrilaterals, triangles, or ellipses, could be utilized to indicate question status. Similarly, text within a graphical shape could be utilized to indicate question status. For example, a circle surrounding a “1” could indicate that the question has been answered once without a hint and a circle surrounding a “2” could indicate that the question has been answered twice without a hint.
- Web document 1900 includes two confirmation images 1920 and 1930 . These confirmation images 1920 and 1930 could correspond to a Retention round completion requirement of answering a question correctly twice without using a hint.
- Confirmation image 1920 indicates that the student user has answered the current question once without using a hint.
- the confirmation image 1930 indicates that the student user still needs to answer the question without using a hint one additional time.
- a Web document such as Web document 2000 shown in FIG. 20 , allows the student user to review the student user's progress toward completing the Retention rounds.
- the Retention rounds' completion criteria may be to answer each question two times without the use of a hint.
- element 2010 provides the student user with the number of questions that have been answered once without a hint.
- element 2020 provides student users with the number of questions that the student user has answered twice without a hint.
- Web document 2000 also allows the student to review the student's progress in the last Retention round.
- Web document 2000 contains a “Results for Round 2” chart 2030 .
- This chart 2030 contains an entry for each question answered in the last Retention round.
- the chart 2030 contains an entry for sixteen questions. Thus, the last Retention round included sixteen questions.
- the chart 2030 also contains a question status indicator for each question. A star indicates that a question was answered without a hint and an “X” indicates that a question was answered with a hint.
- Web document 2000 also contains a dynamic progress bar 2040 .
- a student user may review questions by selecting either the question number or the question status indicator in the chart 2030 .
- a Web document such as Web document 2100 shown in FIG. 21
- Web document 2100 allows the student user to spend time learning the answer to question one before beginning Retention round 3 .
- the user can redisplay Web document 2000 by selecting the “Press ‘Enter’ to Continue” object of Web document 2100 .
- the student user desires to review additional questions, then the user may select other question status indicators. When the student user has reviewed the desired questions, and is ready to take the next Retention round, then the student user could select the “Press ‘Enter’ for Next Round” object. Then, the student user could answer the remaining questions (with or without hints).
- the student user can review the student user's progress in that round by reviewing a Web document, such as Web document 2200 shown in FIG. 22 .
- This Web document indicates that two questions have been answered without a hint once and that eight questions have been answered without a hint twice.
- chart 2230 only includes question numbers and question status indicators for questions seven through sixteen. Questions one through six are not included in the chart 2230 because the prior Retention round did not require the student user to answer those questions as those questions had already been answered twice without hints in the first two Retention rounds.
- the chart 2230 indicates that the student user answered questions seven and eight without a hint in the last round. Thus, the student user is making progress toward the completion of the Retention rounds.
- the purpose of the Retention rounds is to help the student user lock-in material into the student user's long-term memory.
- the Retention rounds utilize repetition to efficiently train student users.
- the repetition that is emphasized is repetition by the student and not by a teacher. It has been found that a student is more likely to retain material if the student repetitively enters answer keyword(s) into a computer as opposed to hearing a teacher repetitively provide the answer.
- requesting a student to enter complete answers takes significantly more training time than requesting the student to just enter the keywords of an answer.
- a Lock-In Training session typically includes up to twenty-five questions.
- a Lock-In Training part typically includes up to ten questions.
- the number of questions can vary above those values.
- the session entitled “Presidents of the United States before the Civil War” includes sixteen questions.
- that session may include only one part of sixteen questions.
- that session could possibly contain two parts of eight questions each.
- Smaller numbers of questions are often appropriate if the material is more complex.
- larger numbers of questions are often appropriate if the material is less complex.
- a client administrator or a system administrator determines the number of questions in each part and then stores such information in a database, such as the database shown in FIG. 1B .
- intervening events are utilized to increase the time intervals between the entering of keywords. Examples of such intervening events can include: reading material; watching a movie; listening to audio; viewing an image; or attending to an event occurring between successive questions.
- some embodiments of the invention utilize intervening events between question answers. For example, after entering keywords to answer a first question, the user computer may display a short movie, output a short audio stream, and/or display one or more images to the user.
- the student user may not be permitted to enter additional keywords until the movie and/or audio stream has terminated.
- the user may not be permitted to enter additional keywords until a predetermined period of time has elapsed, such as for example, 30 seconds or 1, 2, 3, 4, 5, 6, 7, 8, 9, or 10 minutes.
- the training environment should be structured, if possible, to control the time intervals between questions. Recall that the time intervals need not be too large. If the training environment includes too many distractions, such as telephone calls, emails, pager pages, and/or conversations, then the efficiency of training may decrease.
- Lock-In Training system One advantage of the Lock-In Training system is that no tests are required at the completion of training. It has been found that if a student user successfully completes a properly configured Lock-In Training course, as discussed in Section 5.9 below, then the student user will have learned the material in the course. Thus, there is no need to require the student user to take a separate test. By eliminating the testing requirements, student users are likely to be more relaxed and have increased long-term retention of the material.
- Lock-In Training system Another advantage of the Lock-In Training system is that slow learners can take as much time as they need to take Lock-In Training courses. In addition, fast learners can spend only as much time as they need to take the courses. However, regardless of the time taken to complete the Lock-In Training courses, both the slow learner and the fast learner will have learned the course materials.
- Still another advantage of the Lock-In Training system is that the system allows student users to efficiently relearn any materials that the student user may have forgotten after taking a Lock-In Training course. For example, if a student user has forgotten the 2 nd President of the United States, then the user could retake the Introductory round and/or the Retention rounds of a “Presidents of the United States” Lock-In Training course to rapidly relearn the 2 nd President. The time to retake a Lock-In Training course to relearn forgotten material is a fraction of the time that it takes to initially take the Lock-In Training course. Thus, the student user can rapidly relearn the needed material.
- Section 5.8 discussed how spaced repetition within a Lock-In Training session increases long-term retention of material. Long-term retention can be further increased by spaced repetition of sessions. For example, answering questions on a first day, then re-answering the same questions on second and third days has been found to increase long-term retention of the answers.
- some embodiments of the invention allow a client administrator or a system administrator to enter the number of training days that a student must complete in a Lock-In Training session or course.
- a student user may be required to answer the same questions on 2, 3, 4, 5 or more days. In some embodiments of the invention, the days must be consecutive.
- the days need not be consecutive.
- consecutive training sessions may be required to be completed within a predetermined number of days, such as 2, 3, 4, 5, 6, 7, or more days, to count toward the completion of a Lock-In Training course.
- each training day is configured similarly. For example, if a client administrator enters information into a database that requires three identical training days, then student users may be required to take an Introductory round and successfully complete the Retention rounds on each of the three days. Similarly, a student user may only be required to successfully complete the Retention rounds on each of the three days.
- the training days are configured differently. For example, a student may be required to take an Introductory round and successfully complete the Retention rounds on the first training day. Then, on the second, third, and forth training days, the student user would only be required to successfully compete the Retention rounds.
- a client administrator or a system administrator can optimize the configuration of a Lock-In Training course.
- the above embodiments of the invention utilize a user computer 105 that is coupled to a Lock-In Training Web site 110 via a communications link such as the Internet or an Intranet.
- a communications link such as the Internet or an Intranet.
- Such embodiments of the invention are particularly useful for corporate and government training in which the Lock-In Training courses are configured by client administrators and/or system administrators.
- FIG. 23 Another embodiment of the invention is a stand along computer system that allows a student user to take a Lock-In Training course without being coupled to another computer.
- the computer system 2300 shown in FIG. 23 includes a computer 2310 .
- Examples of such computers include personal computers currently manufactured by Dell Computer Corporation, International Business Machines, Hewlett-Packard Company, and Apple Computer Corporation.
- the computer 2310 includes a conventional audio system 2320 .
- the audio system 2320 is operable to convert a digital data stream into an analog electrical signal that can be output by a speaker, such as a computer speaker or a headphone. Because of the significant size of digital data streams, such streams are commonly compressed and stored in compressed audio streams. Such digital data streams, whether compressed or uncompressed and whether stored in memory or on a disk drive, will be referred to as “audio streams.”
- the audio system 2320 also includes the ability to convert audio electrical signals from a microphone (not shown) into a digital data stream. This digital data stream can be processed by voice recognition software executing on computer 2310 .
- the computer 2310 is coupled to one or more input devices such as a mouse 2330 or a keyboard 2340 .
- the computer 2310 may also use alternative input devices such as touch screens, touch pads, and/or microphones (not shown).
- the computer 2310 may also be coupled to a display device such as a computer monitor 2350 .
- Other computer systems may not be coupled to a display device. For example, such a computer system may output information to a user via a speaker 2360 and/or a printer 2370 .
- the computer 2310 can also be coupled to one or more speakers 2360 .
- the speakers 2360 may be stand-alone computer speakers such as are commonly utilized with desktop computer systems. Alternatively, the speakers 2360 may be integrated into the computer 2310 as is common with modern laptop computer systems. In addition, the speakers 2360 may be headphone speakers that are typically worn by a user.
- the speakers 2360 are operable to convert an electrical signal, which is output from the computer 2310 , into audible tones.
- the computer 2310 may also include a number of other subsystems that are typical in modern computers.
- the computer 2310 may include a network device 2375 , such as an Ethernet card or a modem, that is operable to transfer data to and from other computer systems and/or servers.
- the computer 2310 may include one or more program storage devices, such as Random Access Memory (RAM) 2380 , a floppy disk drive 2385 , a hard disk drive 2387 , a CD disk drive 2390 , and/or a DVD disk drive 2395 .
- Additional program storage devices include flash memory (not shown), floppy disks (not shown), CDROM disks (not shown), and DVD disks (not shown).
- Each of the above program storage devices can be utilized to store computer programs, databases, audio streams, movies, and/or images.
- the computer 2310 is running a Windows operating system, a Unix operating system, a Linux operating system, or an Apple operating system.
- one or more program storage devices store a computer program.
- the computer programs may be downloaded from other computer systems via network device 2375 or may be included in program storage devices, such as floppy disks, flash memory, CDROM disks, or DVD disks, that are inserted into the computer 2310 .
- the computer programs may include or reference one or more Lock-In Training courses, each of which may include a number of sessions, parts, questions, and answers.
- the computer programs may include or reference movies, audio streams, and/or images to ensure appropriate time intervals between question answers.
- the computer programs include computer instructions, that when executed by computer 2310 , allow the user to take one or more Lock-In Training courses, each of which include one or more Introductory rounds and/or Retention rounds.
- the computer programs when executed by the computer 2310 typically display computer screens, such as those shown in FIGS. 2 through 22 on the computer monitor 2350 .
- the computer program may generate and/or display Web documents.
- the computer program may display windows that have similar functionality without using HTTP protocols.
- the computer program may be a Microsoft Windows based C++ program that utilizes DirectX or OpenGL graphics routines to display text and graphics on computer monitor 2350 .
- the computer programs may also receive information from the user via the mouse 2330 , the keyboard 2340 , or another input device, such as microphone, number pad, or touch pad, and update computer screens in response to the received information. For example, if a user enters keywords via the keyboard 2340 , then the computer program receives the keywords and updates computer screen displays in response to those keywords. As a result, the user can select and take Lock-In Training courses at the computer 2310 when the computer 2310 is not connected to any other computer.
- computer 2310 may store information related to the student user's training activities.
- the student user can utilize such information to confirm the student user's training activities. For example, after completing a Lock-In Training course, the student user may provide a file that contains some or all of the information stored in the “User Course,” “User Sessions,” and “User Part” tables of the database shown in FIG. 1B to the student user's teacher.
- computer 2310 may send such information to the teacher's computer or website via network device 2375 . After reviewing the information, the teacher can confirm that the student user successfully completed the assigned Lock-In Training course(s).
- the computer 2310 is not required to have a Web browser. However, if the computer 2310 does include a Web browser and a network device 2375 , then the computer 2310 could replace the user computer 105 in the Lock-In Training system shown in FIG. 1A .
- student users may be required to timely enter personal information to insure that the student, as opposed to another individual, is taking the Lock-In Training course. For example, the student user may be requested to enter the student user's birthday when taking an Introductory round. Similarly, the student user may be requested to enter the student user's mother's maiden name when taking a Retention round.
- the computer program may utilize biometric identifiers during training to insure that the student, as opposed to another individual, is taking the Lock-In Training course.
- a computer program could take a digital picture of the student user using a digital camera (not shown) when the student user is entering in keywords.
- the student user could be requested to periodically place the student user's finger in a fingerprint reader.
- the digital images could be utilized to ensure that the student is not copying answers from another source of information in the Retention rounds.
- Lock-In Training system could be utilized with graphics, symbols, numbers, and/or sounds.
- a question for an elementary school student could be to make the sound that corresponds to a graphic image of a cow. The student could then successfully answer the question by making a “mooing” sound into a microphone attached to a user computer.
- the answer to a question could include words other than English words and/or symbols, such as “!,” and “@.” Additionally, the above disclosure is not intended to limit the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Educational Administration (AREA)
- Educational Technology (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Electrically Operated Instructional Devices (AREA)
Abstract
A Lock-In Training system. The Lock-In Training system can include an appropriately programmed Web site and a user computer. The Lock-In Training system can also include an appropriately programmed stand-alone computer. Some embodiments of the invention allow student users to efficiently learn materials by taking Lock-In Training courses. A Lock-In Training course may include one or more Lock-In Training sessions. These sessions may include one or more Lock-In Training parts. These parts can include a group of questions and answers. The answers can include one or more keywords. A student user can lock-in material by entering keywords in response to questions. The questions may be presented in Introductory rounds and/or Retention rounds on one or more training days.
Description
- This application is a continuation of U.S. patent application Ser. No. 10/815,341, entitled “METHODS OF SELECTING LOCK-IN TRAINING COURSES AND SESSIONS” by inventor Dennis R. Berman, which was filed on Mar. 31, 2004.
- This invention relates to a system and method for a memory building and retention process and, more particularly, to a method and system for helping a user to learn, memorize, and retain unfamiliar materials.
- Learning is an ongoing process in life that requires continuous memorization and retention of new concepts, ideas, terms, names, etc. Although a variety of methods have been developed for building memory, it is a constant search for finding an effective and faster way for enhancing people's memorization process for their daily uses.
- Learning by reading and/or by classroom instruction has been the conventional learning method for centuries. A provided learning material may contain sufficient explanatory contents to help a learner to understand and memorize the subject matter. However, purely reading the learning material and/or receiving classroom instruction related to the material is not the best way to quickly memorize the new concepts contained because a huge portion of the learning material is used not for helping the learner to memorize the concepts, but for helping the learner to understand the concepts. Therefore, the learner may be distracted in her learning process to grasp the gist of the learning material. It is thus not uncommon that although, in a learning process, the concept may have to be explained in detail paragraph after paragraph, the gist of the concept may only hinge on a few keywords. Consequently, to learn or to memorize the new concept depends on how well a learner can memorize the keywords. Therefore, a learning platform designed to help the learner to quickly grasp and master the new concepts extracted from the learning material will significantly speed up the learning process.
- Further, in the context of training, after the learners are expected to have memorized concepts conveyed in the learning material, it is very difficult to benchmark how much of the learning material the learners have actually mastered. For example, a multiple-choice test may be designed and given to the learners to check how well the learners have learned. However, it is well known that it is a common practice for the learner to guess the answer when she encounters a subject that she knows very little about during a multiple-choice exam. She might lack the knowledge to answer the question, but she may be lucky to get the answer right. Further, she may also get some of the answers right just because the answer is clearly shown in the provided choices and she is hinted. As such, the value of the multiple-choice exam is only good to a certain extent. When it is required that the learners must know all the material being taught, or a testing authority must be assured that certain concepts in the learning material must be mastered by the learner, the multiple choice test is obviously not the best choice.
- What is needed, therefore, is a method and system for learning and retaining unfamiliar materials for short- and long-term immediate recall.
- One embodiment of the invention is a Lock-In Training system. The system can include an appropriately programmed Web site and a user computer. The Lock-In Training system can also include an appropriately programmed stand-alone computer. Some embodiments of the invention allow student users to efficiently learn materials by taking Lock-In Training courses. A Lock-In Training course may include one or more Lock-In Training sessions. These sessions may include one or more Lock-In Training parts. These parts can include a group of questions and answers. The answers can include one or more keywords. A student user can lock-in material by entering keywords in response to questions. The questions may be presented in Introductory rounds and/or Retention rounds on one or more training days.
- Other embodiments of the invention include the computer programs and databases that enable student users to take efficient training courses as well as the methods performed by the computer systems during the training courses.
-
FIG. 1A presents a block diagram illustrating the primary components of a system that operates in accordance with some embodiments of the present invention. -
FIG. 1B presents a database. -
FIG. 2 presents a registration screen display. -
FIG. 3 presents another registration screen display. -
FIG. 4 presents yet another registration screen display. -
FIG. 5 presents still another registration screen display. -
FIG. 6 presents a screen display that allows a student user to select a Lock-In Training course. -
FIG. 7 presents a screen display that allows a student user to select a Lock-In Training session. -
FIGS. 8 through 16 present screen displays from an Introductory round of a Lock-In Training course. -
FIG. 17 presents a screen that informs a student that the student user has completed an Introductory round of a Lock-In Training course. -
FIGS. 18 through 22 present screen displays from a Retention round of a Lock-In Training course. -
FIG. 23 presents a block diagram illustrating the primary components of a system that operates in accordance with some embodiments of the present invention. - The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
- The following terms and acronyms are used throughout the detailed description:
- ASP (Active Serve Page). An HTML page that includes one or more small embedded programs, known as scripts, which are processed on a Web server before the HTML page is served to a Web browser. Typically, the Web server utilizes data from a database to build the HTML page before serving the HTML page to the Web browser.
- Cookies. A technology that enables a Web server to retrieve information from a consumer's computer that reveals prior browsing activities of the consumer. The informational item stored on the consumer's computer (typically on the hard drive) is commonly referred to as a “cookie.” Many standard Web browsers support the use of cookies.
- Database. A collection of information organized in such a way that a computer program can store, and/or retrieve desired pieces of information.
- Dynamic HTML. HTML extensions that enable a Web document to react to user input without sending requests to a Web server.
- Element. In markup languages such as HTML, the combination of a set of tags, any content contained between the tags, and any attributes the tags may have. One example of an element is an object.
- Foreign key. A column or combination of columns whose values match the primary key of some other table. See (Primary key and Database).
- HTML (Hypertext Markup Language). A standard coding convention and set of codes for attaching presentation and linking attributes to informational content within documents. During a document authoring stage, the HTML codes (referred to as “tags”) are embedded within the informational content of the document. When the Web document (or HTML document) is subsequently transferred from a Web server to a Web browser, the codes are interpreted by the Web browser and used to parse and display the document. Additionally, in specifying how the Web browser is to display the document, HTML tags can be used to create hyperlinks to other Web documents. For more information on HTML, see Ian S. Graham, The HTML Source Book, John Wiley and Sons, Inc., 1995 (ISBN 0471-11894-4).
- HTTP (Hypertext Transport Protocol). The standard World Wide Web client-server protocol used for the exchange of information (such as HTML documents and client requests for such documents) between a Web browser and a Web server. HTTP includes a number of different types of messages that can be sent from the client to the server to request different types of server actions. For example, a “GET” message, which has the format GET <URL>, causes the server to return the document or file located at the specified URL.
- Hyperlink. A navigational link from one document to another, or from one portion (or component) of a document to another. Typically, a hyperlink is displayed as a highlighted word or phrase that can be selected by clicking on it using a mouse to jump to the associated document or portion.
- Hypertext System. A computer-based informational system in which documents (and possibly other types of data entities) are linked together via hyperlinks to form a consumer navigable “web.”
- Internet. A collection of interconnected (public and/or private) networks that are linked together by a set of standard protocols (such as TCP/IP and HTTP) to form a global, distributed network. (While this term is intended to refer to what is now commonly known as the Internet, it is also intended to encompass variations that may be made in the future, including changes and additions to existing standard protocols.)
- Intranet. A network belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but a firewall surrounding an intranet fends off unauthorized users.
- JavaScript. A scripting language developed by Netscape that enables Web authors to design interactive Web sites. See Dynamic HTML above.
- Object. Any item that can be individually selected and/or manipulated. An object can include hyperlinks, shapes and pictures that appear on a display screen, as well as less tangible software entities.
- Primary Key. In databases, the column or combination of columns that serve(s) as the unique identifier of a specific row in a database table.
- URL (Uniform Resource Locator). A unique address which fully specifies the location of a file or other resource on the Internet. The general format of a URL is “protocol://machine address:port/path/filename.” The port specification is optional, and if the consumer specifies none, the Web browser defaults to the standard port for the protocol. For example, if HTTP is specified as the protocol, the Web browser will use the HTTP default port of 80.
- Web Site. A computer system that serves informational content over a network using the standard protocols of the World Wide Web. Typically, a Web site corresponds to a particular Internet or Intranet domain name, such as “www.trivac.com,” and includes the content associated with a particular organization. As used herein, the term is generally intended to encompass both (i) the hardware/software server components that serve the informational content over the network, and (ii) the “back end” hardware/software components, including any non-standard or specialized components, that interact with the server components to perform services.
- World Wide Web (“Web”). Used to refer generally to both (i) a distributed collection of interlinked, viewable hypertext documents (commonly referred to as Web documents or Web pages) that are accessible via the Internet, and (ii) the client and server software components that provide consumer access to such documents using standardized Internet protocols. Currently, the primary standard protocol for allowing applications to locate and acquire Web documents is HTTP, and the Web pages are encoded using HTML. However, the terms “Web” and “World Wide Web” are intended to encompass future markup languages and transport protocols that may be used in place of (or in addition to) HTML and HTTP.
-
FIG. 1A illustrates a simplified block diagram of auser computer 105 and a Lock-InTraining Web site 110, both of which are linked together by theInternet 115 or an Intranet (not shown). Those skilled in the art will appreciate that the block diagram ofFIG. 1A is simplified to illustrate only those functional elements of interest in describing the present invention. - The
user computer 105 is conventional. Theuser computer 105 may be any type of computing device that allows a consumer to interactively browse Web sites on the World Wide Web via a Web browser. For example, theuser computer 105 may be a personal computer (PC) that runs a Windows operating system, an Apple computer, that runs an Apple operating system, a Web appliance, a hand held computer, or even a telephone. Theuser computer 105 typically includes aWeb browser 120, such as Microsoft's Internet Explorer, which uses the HTTP protocol to communicate with Web servers. As is well known, theWeb browser 120 can request, receive, anddisplay Web documents 125 as well as other data entities, such as audio, video, and/or image documents. If printing of Web documents or other documents is desired, then theuser computer 105 may also include aprinter 130. - Generally, the Lock-In
Training Web site 110 provides functionality for allowing users to learn, memorize, and retain unfamiliar materials. More specifically, the Lock-InTraining Web site 110 includes aWeb server 140 that allows a user to retrieve a plurality ofWeb documents 150. The Lock-In Training Web site also contains acomputer program 145 that posts a series ofWeb documents 150, such as HTML documents and/or Dynamic HTML documents. In some embodiments of the invention, the Lock-In Training Web site generates HTML documents and Dynamic HTML documents from ASP documents and one or more databases, such asdatabase 155. The Lock-InTraining Web site 110 is a web site that allows users to enter and receive data as will be discussed more fully below. Thecomputer program 145 and thedatabase 155 can be stored in program storage devices such as hard disk drives, floppy disk drives, flash memory, DVD disks, CDROM disks, etc. - Generally, the Lock-In Training Web site allows a number of users to take Lock-In Training courses. A Lock-In Training course typically relates to a general subject area. For example, a course may relate to the Presidents of the United States. Such a course can include one or more Lock-In Training sessions, which often relate to more specific subject areas. For example, a course related to the Presidents of the United States could include a first session related to the Presidents before the Civil War and a second session related to the Presidents after the Civil War.
- A Lock-In Training session may include one or more parts. A part typically includes a group of “questions” and “answers.” For example, a question may be “Who was the first President?” Similarly, an answer may be “The first President was George Washington.” Each answer can include one or more keywords, i.e., significant words within the answer that may be utilized to convey the answer. The keywords in the above answer are “first” and “George Washington.”
- When a student user utilizes the Lock-In Training Web site, the user can be introduced to the material to be learned in an Introductory round. In the Introductory round, a student user typically reviews questions and answers, re-types the answers, and then answers the question with or without hints.
- After the student-user completes the Introductory round, the student user can take one or more Retention rounds. The purpose of the Retention rounds is to lock-in the material into the user's long-term memory. In a Retention round, the student user typically answers the questions with or without hints. As will be discussed below, in order to complete the Retention rounds, the student user must successfully answer the questions according to pre-defined criteria.
- As shown in
FIG. 1A , the Lock-InTraining Web site 110 can include adatabase 155. Thisdatabase 155 can contain a number of tables. One example ofdatabase 155 is shown inFIG. 1B . InFIG. 1B , the table names are italicized. In addition, the table primary keys are bolded and the table foreign keys are underlined. As discussed, in Section 5.1, a primary key provides a unique identifier of a specific row in a database table. Similarly, a foreign key is a database column whose value matches the primary key of another table. - One table in the database shown in
FIG. 1B is the “Clients” table. This table can be utilized to store information about Lock-In Training clients. Typical clients may include employers, training institutions, elementary schools, middle schools, high schools, colleges, government agencies, and military branches, among others. The “Clients” table shown inFIG. 1B contains a primary key, “ClientID.” The “Clients” table contains three columns. The first column, “ClientName,” can store the name of a client, such as “IBM,” “Starbucks,” “Palo Alto School System,” etc. The second column, “SessionDays,” can store the number of days of training that a student must take to fully complete a Lock-In Training session or course. For example, a session that includes three days of training could have “SessionDays” set to three. Alternatively, a session that takes four days to complete could have “SessionDays” set to four. Lower values of “SessionDays” require less student time, while higher values of “SessionDays” ensure higher retention of learned materials. Depending upon client preferences, a client can specify, via “SessionDays,” the desired number of training days for courses or sessions taken by the client's students. The third column, “DaySessions,” can be used to control the training sequence of several multi-day sessions. For example, a Lock-In Training course may include three sessions, such as sessions A, B and C, each of which are taken over a number of days. For such a course, a “DaySessions” value of two could indicate that a student must complete the first training day of sessions A and B before taking the second training day of either session A or session B. However, the student could take the first training day of session C before taking any training days of either session A or B. On the other hand, if the. “Day Sessions” value was three, then the student could not take the second training day of sessions A, B, or C until the student has completed the first training day of sessions A, B, and C. Similarly, if the “Day Sessions” value was zero, then a student could take all of the training days of session A before taking any days of sessions B or C. - Another table in the database shown in
FIG. 1B is the “Courses” table. This table is utilized to store information about Lock-In Training courses. The table contains a primary key “CourseID” and two columns. The first column, “CourseName,” can store names of a Lock-In Training course. Example course names include “Presidents of the United States,” “Governors of the States,” and “Largest Cities in Texas.” The second column, “CourseGroup,” can store course groupings. For example, the above three courses could be grouped by a client administrator or by a system administrator under “American History.” - Yet another table in the database shown in
FIG. 1B is the “ClientProfiles” table. The “ClientProfiles” table can be utilized to customize the graphical user interface of Lock-In Training courses for clients. The “ClientProfiles” table contains a primary key “ClientProfile” and four columns. The first column is a foreign key, “ClientID.” The second column “ActiveProfile,” can store data indicating whether a client has an active graphical user interface. For example, if a client desires a customized graphical user interface, then “ActiveProfile” could be set to “true.” On the other hand, if a client does not desire to utilize a custom graphical user interface, then “ActiveProfile” could be set to “false.” The third column, “HeaderImage,” can store a file name that contains a customized image. This customized image can be utilized to create a portion of a customized graphical user interface, such as a custom header. The fourth column, “HeaderLocation,” can store horizontal and vertical screen locations that can be utilized to position the customized image on the computer screen of theuser computer 105. Other embodiments of the database include columns for other images, such as footer images, other image locations, background images, custom color schemes, custom fonts, custom font sizes, custom text, custom objects, and other graphical user interface elements. - Still another table in the database shown in
FIG. 1B is the “ClientCourses” table. This table contains information related to Lock-In Training courses that are associated with a particular client. As shown inFIG. 1B , the “ClientCourses” table contains a primary key “ClientCourse” and two foreign keys: “ClientID” and “CourseID.” - Another table in the database shown in
FIG. 1B is the “Sessions” table. The “Sessions” table provides information about a Lock-In Training session. The “Sessions” table contains a primary key “SessionID.” In addition, the table contains five columns. The first column is a foreign key, “ClientID.” The second column “SessionNum,” can store the number of a session. For example, the first, second, and third sessions of a Lock-In Training course could be indicated by “SessionNum” values of 1, 2, and 3. The third column “SessionTitle,” can store titles of sessions. For example, a title of a session could be “Presidents of the United States before the Civil War.” The fourth column “SessionDescription,” can store descriptions of sessions. For example, a session description could be “The names of the sixteen Presidents of the United States before the Civil War.” The fifth column “LockoutPeriod” can be utilized to inactivate sessions until a specified period of time has passed so that spaced repetition of training sessions can be assured. More specifically, “LockoutPeriod” can store the length of a time period that must transpire between portions of sessions. For example, “LockoutPeriod” could indicate the required time between the completion of a prior day's session and the beginning of a current day's session. Alternatively, “LockoutPeriod” could indicate the required time between the beginning of a prior day's session and the beginning of a current day's session. Thus, “LockoutPeriod” can be utilized to ensure that a student does not take portions of Lock-In Training sessions too rapidly. If such a time period has not transpired, then a session (or a course) can be inactivated so that the student cannot take the remaining portions of the sessions until the “LockoutPeriod” has transpired. As will be discussed below, long-term retention of materials can be increased if spaced repetitions of Lock-In Training sessions occur. - Still another table in the database shown in
FIG. 1B is the “Users” table. This table can be utilized to store information on users of the Lock-In Training system. Typical users include private and public employees, elementary students, middle school students, high school students, college students, military personnel and law enforcement personnel. The “Users” table contains a primary key “UserID.” In addition, the table contains fifteen columns. The first column is a foreign key, “ClientID.” The second and third columns, “FirstName” and “LastName,” can store the first and last names of a user. For example, FirstName could store “John” and “LastName” could store “Smith.” Other embodiments of thedatabase 155 could include an additional column for storing the middle name or the middle initial of users. The fourth and fifth columns “UserName” and “Password,” can be utilized to rapidly login a user into the Lock-In Training system. For example, a user named John Smith could utilize “jsmith” and “Monsoon1$” to rapidly login into the Lock-In Training system. Other embodiments of the invention could also include other columns that contain information utilized to login a user into the Lock-In Training Website. For example, the table could contain columns holding user's biometric information, such as fingerprints, voice patterns, eye patterns, etc. The sixth column, “UserType,” can be utilized to indicate whether the user is a student, a client administrator, a system administrator, or another type of user. Student users take Lock-In Training sessions. As discussed below, the rights and privileges of users can depend upon the user's UserType. Client administrators typically have the ability to configure Lock-In Training courses, add or remove student users, and assign Lock-In Training courses to student users. Similarly, system administrators typically have the ability to add or remove clients and some or all of the rights and privileges of client administrators. The seventh column, “Inactive,” can be utilized to indicate inactive users, such as users that are no longer employed by a client. Such users may include, for example, users that have not accessed the Lock-In Training Web site for a predetermined period of time or users that have a “ClientID” associated with a delinquent client. The eighth and ninth columns of the “Users” table, “ResetPW” and Registered,” can be utilized to store user administrative data. For example, “ResetPW” can be utilized to indicate if thecomputer program 145, a client administrator, or a system administrator assigned the user's password or alternatively if the user has reset the user's password. Thus, if the user has reset the user's password, then “ResetPW” value could be set to “true;” otherwise, the “ResetPW” value could be set to “false.” In addition, “Registered” can be utilized to indicate whether the user has registered with the Lock-InTraining Web site 110. The remaining columns in the “Users” table can hold various information about the user, such as: the user's email, telephone number, street address, city, state, and zip code. - Still another table in the database shown in
FIG. 1B is the “UserCourses” table. This table contains a primary key, “UserCourse,” and eight columns. The first two columns are foreign keys: “UserID” and “CourseID.” The third column, “CourseOrder,” can be utilized to sequence courses for student users. For example, student users may have a number of different courses assigned to them, such as: American History I, American History II, and American History III. These three courses may be assigned “CourseOrder” values of one, two, and three respectively. Thus, the “CourseOrder” values could be utilized to ensure that the student takes American History I before American History II, or American History III. Alternatively, if the courses could be taken in any order, then “CourseOrder” for those courses could be set to zero. The fourth column in the “User Courses” table is “Activated.” The “Activated” value can be utilized to indicate whether a particular course is available to a user. The fifth column in the “User Courses” table is “Completed.” The “Completed” column can be utilized to indicate whether a user has previously completed a course. The final three columns can be utilized to store course enrollment dates, course start (begin) dates, and course completion dates. - Yet another table in the database shown in
FIG. 1B is the “UserSessions” table. The “User Sessions” table can be utilized to store information regarding a user's training session activities. The “User Sessions” table contains a primary key “UserSession.” In addition, the table contains eight columns, which include two foreign keys, “UserID” and “SessionID.” The third column, “DayNum,” can store information relating to the user's training activities. For example, if the user has completed a session's first day of training, then “DayNum” could be one. Similarly, if the user has completed a session's first and second days of training, then “DayNum” could be two. The next two columns, “StartTime” and “EndTime,” could store the start and end times of a user's session activities. These columns could be utilized to determine if a user has complied with a session's “LockoutPeriod” requirement. The seventh column, “Timeouts,” could store the time period since the user has entered any information into theuser computer 105, via computer keyboard, mouse, trackball, touch pad, touch screen, microphone, or otherwise. The final column, “Cancelled,” could indicate that a user's session has been canceled because, for example, the user's “Timeouts” exceeded a predefined time period. - Another table in the database shown in
FIG. 1B is the “Parts” table. This table can store information related to a Lock-In Training session's parts. This table contains a primary key “PartID.” In addition, the table contains three columns, one of which is a foreign key, “SessionID.” The second column, “PartNum,” can be utilized to sequence the parts within a session. For example, a Lock-In Training session may include a number of different parts, such as: “U.S. Presidents 1-8” and “U.S. Presidents 9- 16.” These parts may be assigned “PartNum” values of one and two respectively. Thus, the “PartNum” values could be utilized to ensure that the student user takes “U.S. Presidents 1-8” before “U.S. Presidents 9-16.” Alternatively, if the parts can be taken in any order, then they both could be assigned a “PartNum” of zero. The final column in the Parts table, “PartTitle,” can be utilized to store the title of a part, such as “U.S. Presidents 1-8.” - Still another table in the database shown in
FIG. 1B is the “Questions” table. This table can store information related to questions and answers that will be presented to student users. The “Questions” table includes a primary key, “QuestionID.” In addition, the table includes six columns. The first column is a foreign key, “PartID.” The next three columns can be utilized to store question numbers, question titles, and questions. Thus,question number 1 could have a title “The first President of the United States.” Similarly, “Question”number 1 could be “Who is the first President of the United States?” The fifth column, “Answer,” can be utilized to store the answers to questions. The “Answer” to “Question”number 1 could be “The first President of the United States was George Washington.” The last column in the “Questions” table, “Keywords,” can be used to store the keywords of a question. The keywords for the above “Answer” could be “first,” “George,” and “Washington.” In some embodiments of the invention, the “Answer” includes one or more codes that indicate the keywords. For example, the “Answer” to “Question”number 1 could be “The %%first President of the United States was %%George %%Washington.” In this embodiment of the invention, the “%%” characters could be utilized to indicate a keyword. In such embodiments of the invention, a separate “Keywords” column is not needed because the keywords are identified in the “Answer.” - The last table in the database shown in
FIG. 1B is the “UserPart” table. This table can be used to store information related to users' activities related to taking a Lock-In Training part. This information, combined with the information stored in the “UserSessions” table, can be utilized to allow student users to resume their training at the question, round, part, and session where they previously stopped training. The table includes a primary key, “UserPart,” and thirteen columns. The first two columns, “UserID” and “PartID,” are foreign keys. The third column, “DayNum,” can store information relating to the user's training day activities. For example, if the user has completed the first training day of a part, then “DayNum” could be one. Similarly, if the user has completed the first and second training days of a part, then “DayNum” could be two. The next two columns, “StartTime” and “EndTime,” could be utilized to store the start and end times of a user's part training activities. These columns could also be utilized to determine if a user has complied with a session's “LockoutPeriod” requirement. The table's sixth column, “RoundNum,” can store a student user's current round. For example, “RoundNum” could be zero if the student user is in an Introductory round. Similarly, “RoundNum” could be one if the student user is in a Retention round. In some embodiments of the invention, “RoundNum” could also indicate the number of “Retention” rounds that a user has taken. For example, if the student user has completed the first Retention round, then “RoundNum” would be one. Similarly, if the student user has completed the third Retention round, then “RoundNum” could be set to three. The seventh column, “QNum,” can store a student user's current question number. “RoundNum” and “QNum” can be utilized to determine a student user's location in a particular Lock-In Training part so that the user can efficiently resume training at that location. The eighth column, “Retries,” can store the number of times a student user retried each question in an Introductory round or a Retention round. Thus, “Retries” could be utilized to determine the relative difficulty levels of various questions. The ninth column, “Hints,” can store the total number of times that a student user utilized a hint to answer a question in a round. The tenth column “CompFinish1,” can store the Retention round number in which a student successfully answered a question without a hint in that round. Similarly, the eleventh column, “CompFinish2,” can store the Retention round number in which a student user successfully answered each question a second time without a hint in that round. The twelfth column, “Timeouts,” could store the time period since the user has entered any information into theuser computer 105. The final column, “Cancelled,” could indicate that a user's part has been canceled because, for example, the user's “Timeouts” exceeded a predefined time period. - Some embodiments of the
computer program 145 may utilize multiple databases to store the above information, while other embodiments of thecomputer program 145 utilize only one database, such as thedatabase 155 shown inFIG. 1B , to store such information. - One function that the Lock-In
Training Web site 110 may perform is logging in users into the Lock-InTraining Web site 110. For example, the Lock-In Training Web site'scomputer program 145 andWeb Server 140 may serve a login Web document to auser computer 105. The login Web document may request a user to enter a username and a password. After the user enters a username and a password into theuser computer 105, the user computer'sWeb browser 120 transmits the username and the password to the Lock-InTraining Web site 110. After the Lock-InTraining Web site 110 receives the username and password, thecomputer program 145 compares the username and password to data stored in a database. For example, thecomputer program 145 may compare the username and password to values in the “UserName” and “Password” columns of the Users table in the database shown inFIG. 1B . If the username and password are not found in the database, then the Lock-InTraining Web site 110 may serve another login Web document to theuser computer 105. - On the other hand, if the username and password are found in the database, then the
computer program 145 may retrieve user information from the database, such as for example, “UserType,” “FirstName,” “LastName,” “ResetPW,” “Registered,” “Email,” “Phone,” “Address,” “City,” “State,” and Zip” values from the “Users” table. - If the information retrieved from the database indicates that the user is not registered, then the
computer program 145 may serve a Web document, such asWeb document 200 shown inFIG. 2 , to theuser computer 105.Web document 200 allows a user to enter the user's e-mail address, phone number, street address, city, state and zip code. The information entered by the user is then typically stored in a database, such as for example in the “Users” table of the database shown inFIG. 1B . In addition, after the user has entered the above information, data would typically be stored in thedatabase 155 indicating that the user has been registered. - In some embodiments of the invention, the graphical user interface of
Web document 200 may be based upon data stored in a database. For example, if a user's “ClientID” is Starbucks, the “Client Profiles” table of the database ofFIG. 1B may be accessed, using the Starbuck's “ClientID.” As a result, thecomputer program 145 can retrieve one or more graphic images, image locations, background images, custom color schemes, custom fonts, custom font sizes, custom text, and/or other graphical user interface elements that are unique to Starbucks. Then, the graphical user interface ofWeb document 200, and optionally other Web documents, may include some or all of the retrieved graphical user interface element(s). Similarly, if the user's “ClientID” is IBM, then the graphical user interface ofWeb document 200 and following Web documents may include graphical user interface elements that are unique to IBM. - If the information retrieved from the database indicates that the user has not previously reset the user's password, then the
computer program 145 and theweb server 140 may serve a Web document, such asWeb document 300 shown inFIG. 3 , to theuser computer 105.Web document 300 allows a user to enter and confirm a new password. If the two entered passwords match and optionally meet certain password criteria, such as password length, number of unique character sets in the password, password quality, etc., then the entered password can be stored in the database. In addition, data would typically be stored in the database that indicates that the user's password has been reset. Some embodiments of the invention store the password in plain text. However, other embodiments of the invention store the password in an encrypted format to increase the security of the password. As shown inFIG. 3 ,Web document 300 may also display previously entered user information. Some embodiments of the invention also allow the user to correct or update any displayed user information. - For the convenience of the user, some embodiments of the invention display a Web document, such as
Web document 400 shown inFIG. 4 , that displays the student name, username, and password. Using theprinter 130 attached touser computer 105, this Web document may be printed and securely stored by the user. - In some embodiments of the invention, the
computer program 145 and theweb server 140 serve a Web document, such asWeb document 500 shown inFIG. 5 , that provides the user with a background and an overview of the Lock-In Training process. Similarly, in some embodiments of the invention, thecomputer program 145 and theweb server 140 serve a Web document that displays the terms-of-use of the Lock-In Training Web site. In such embodiments of the invention, the user may be required to click on a button indicating that the user has read and agreed to the terms-of-use before the user is allowed to take any training courses. In some embodiments of the invention, the Web document that displays the terms-of-use also lists relevant patent numbers that cover various portions of the Lock-In Training Web site and other proprietary information. - Another function that the Lock-In
Training Web site 110 may perform is selecting Lock-In Training courses. For example, the Lock-In Training Web site'scomputer program 145 andWeb server 140 may serve a Web document, such asWeb document 600 shown inFIG. 6 , that allows a user to select a particular Lock-In Training course. The Web document may include a number of objects. For example,Web document 600 includes a “Presidents of the United States (2 Sessions, 43 Questions)” object that could be selected by a user to indicate that the user desires to take a Lock-In Training course relating to learning the Presidents of the United States. Similarly,Web document 600 includes “Governors of the States (3 Sessions, 50 questions)” and “Largest Cities in Texas (1 Session, 10 Questions)” objects. - In some embodiments of the invention, the list of Lock-In Training courses displayed in
Web document 600 would be determined by retrieving information from a database. For example, thecomputer program 145 could retrieve the course names from the “User Courses” and “Courses” tables shown in the database ofFIG. 1B . The retrieved courses could then be inserted into a Dynamic HTML Web document by thecomputer program 145, which would then be served touser computer 105. - Some embodiments of the invention also indicate to the user the status of Lock-In Training courses. For example, as shown in
FIG. 6 , if a user has previously completed a Lock-In Training course, as indicated in a “Completed” value in a “User Courses” table, then acheck icon 610 could indicate the status of the course. Similarly, if a course is available, as indicated in an “Activated” value in the “User Courses” table, then anunlocked padlock icon 620 could indicate the status of the course. Likewise, if a course is unavailable, then a lockedpadlock icon 630 could indicate the status of the course. A course may be unavailable because a user has recently completed another course or another session. In some embodiments of the invention, the time that a user has completed a prior session or course is stored in the database. In addition, in some embodiments of the invention, the database stores a lockout period for each course and/or each session. If the time that has elapsed since the user completed a prior session or course is less than the lockout time, then a course may be unavailable. - In some embodiments of the invention only courses having a certain status would be included in the Web document that was served to the user. For example, some embodiments of the invention would only include available courses in Web documents. In other embodiments of the invention, which serve Web documents that include unavailable courses, if the user selects an unavailable course, then a Web document is served that includes an error message explaining that the course is not available and, optionally, the reason for the course's unavailability. Similarly, in some embodiments of the invention, if the user selects a completed course, then a Web document containing (a) a message explaining that the course has been completed and/or (b) a message asking if the user would like to review the course material.
- Another function performed by some embodiments of the invention is selecting a session. After the user has selected a Lock-In Training course, such as the “Presidents of the United States” course, the
computer program 145 could retrieve course, session, part, and question information from database table(s). For example, the sessions of the course, the number of parts in each session, and the number of questions in the session could be retrieved. In addition, the number of training days that the user has completed for each session and the total number of training days for each session could be retrieved. Further, the status of the session (available, unavailable, or completed) may be retrieved. After retrieving the above information, thecomputer program 145 and theWeb server 140 could serve a Web document, such asWeb document 700 shown inFIG. 7 , that allows the user to select a session. The Web document may include a number of objects. For example,Web document 700 includes a “Presidents of the United States before the Civil War” object and a “Presidents of the United States after the Civil War” object. By clicking on one of the above objects, the user could select a Lock-In Training session. In addition to the two session objects,Web document 700 includes a “Return to Main Menu” object. If the user selects that object, then the Lock-InTraining Web server 140 andcomputer program 145 could serve a Web document, such asWeb document 600, that allows the user to select a Lock-In Training course. - Some embodiments of the invention also indicate to the user the status of Lock-In Training sessions. For example, if a user has previously completed a Lock-In Training session, then a check icon could indicate the status of the session. In addition, if a session is available, and hence unlocked, then an unlocked padlock could indicate the status of the session. Similarly, if a session is unavailable, then a locked padlock could indicate the status of the session.
- A session may be unavailable because a user has recently completed another session or another course. In some embodiments of the invention, the time that a user has completed a prior session is stored in the database. In addition, in some embodiments of the invention, the database stores a session lockout period for each course and/or each session. If the time that has elapsed since the user completed a prior session is less than the session lockout time, such as 1, 2, 3, 4, 6, 8, 10, 12, 14, 16, 18, 20, 22, 24, 36, or 48 hours, then the session may be unavailable.
- Similarly, in some embodiments of the invention, the number of sessions that a user has either begun or completed within a predetermined time period is stored in a database. If the number of sessions begun or completed within a predetermined time period, such as 1, 2, 3, 4, 6, 8, 10, 12, 14, 16, 18, 20, 22, 24, 36, or 48 hours, is greater than a predetermined number, such as 1, 2, 3, or 4, sessions, then new sessions may be unavailable to the user.
- In some embodiments of the invention only sessions having a certain status would be included in the Web document that was served to the user. For example, some embodiments of the invention would only include available and completed sessions in Web documents. In some embodiments of the invention, which serve Web documents that include unavailable sessions, if the user selects an unavailable session, a Web document is served that includes an error message explaining that the session is not available and, optionally, the reason for the session's unavailability. For example, if a user has completed two sessions in the last 24 hours and the user selects another session, then a Web document may be served that includes an error explaining that the user must wait a day to take another session because the user has already completed two sessions in one day.
- After a user has selected a Lock-In Training session by clicking on a session object, the
computer program 145 can query a database to determine if the user had previously completed a portion of the session. If the student user had previously partially completed a Lock-In Training session, then thecomputer program 145 may retrieve information that identifies the last part and the last round in which the student user answered a question. In addition, thecomputer program 145 may retrieve information identifying the last question that the student user answered. Then, using the retrieved information, thecomputer program 145 and theWeb server 140 may serve a Web document that allows the user to continue the user's training session in the same part, round, and question that the student user utilized when the student user ceased training. Thus, for example, if a student user stopped a prior Lock-In Training session while working on a particular question in a particular part and round, then the student user could resume the session at that same question, part, and round. - On the other hand, if the student user had not previously completed a portion of a session, then the
computer program 145 and theWeb server 140 may serve an HTML Web document or a Dynamic HTML Web document, such asWeb document 800 shown inFIG. 8 , which allows the student user to begin the user's training session. As shown inFIG. 8 ,Web document 800 presents the student user with the current session title, “Presidents of the United States before the Civil War,” and the current session number, “1.” In addition,Web document 800 presents the user with the current and total number of parts and the current and total number of questions in the current part. Further,Web document 800 informs the user that the user is currently training in an “Introductory Round.” As discussed in Section 5.5, the purpose of the introductory round is to introduce the user to the material that the user will be learning. -
Web document 800 also includes one or more elements that present the user with a question: “Who was the first President?” Similarly,Web document 800 includes one or more elements that present the user with an answer: “The first President was George Washington.” Notice that “first” and “George Washington” are displayed in a bold font inWeb document 800. The bold font is utilized to indicate that “first,” “George” and “Washington” are keywords. As discussed in Section 5.5, keywords indicate the essence of an answer. Thus, by learning the keywords of an answer, a user will have learned the answer. In some embodiments of the invention,Web document 800 identifies the keywords by using a different font color, a different font size, a different font style (bold, italic, underline, etc.), and/or a different font family (Times Roman, Arial, etc.) than are used for non-keywords in the answer. In some embodiments of the invention,Web document 800 identifies the keywords by placing a graphic object around or near the keywords, such as a box or an oval. To continue the Lock-In Training session, the user would typically select the “Press ‘Enter’ to Continue” object. Alternatively, the user could select the “Return to Main Menu” object to return toWeb document 600. - If the user selects the “Press ‘Enter’ to Continue” object, then
Web document 900 shown inFIG. 9 could be displayed on the computer display of theuser computer 105.Web document 900 presents the first question and the complete first answer to the student user. However,Web document 900 also presents a partially completed first answer to the student user. In some embodiments of the invention, as shown inFIG. 9 , the partially completed first answer replaces the keywords with continuous underlines. In other embodiments of the invention, the keywords are replaced with non-continuous underlines. Thus, “first” would be replaced with “_ _ _ _ _.” The advantage of utilizing non-continuous underlines is that the non-continuous underlines provide the user with a small hint: the number of characters in each keyword. Thus, a user seeing “_ _ _ _ _” would understand that the keyword contains 5 characters. In some embodiments of the invention, non-continuous underlines are utilized only in the Introductory round, while continuous underlines or no underlines are utilized in the Retention rounds. - Next, the student user enters the keywords into the
user computer 105 using the completed answer as a guide. In some embodiments of the invention, the student user types characters into a keyboard attached touser computer 105. In other embodiments of the invention, the user utilizes a mouse to select keys that are displayed on a simulated keyboard on a computer display. In still other embodiments of the invention, the student user utilizes a number pad to enter the key words. For example, a user may type “4” to enter “G,” “44” to enter “H,” and “444” to enter “I.” The use of such keyboards to enter characters may be particularly useful when theuser computer 105 is a telephone. In still other embodiments of the invention, the student user would enter the keyword via a tablet and handwriting recognition software and/or via a microphone and voice recognition software. Regardless of the method utilized to enter information, the student user would enter “first” into theuser computer 105.FIG. 10 presents aWeb document 1000 into which the user has entered “first.” In some embodiments of the invention,Web document 1000 identifies the entered keywords by using a different font color, a different font size, a different font style (bold, italic, underline, etc.), and/or a different font family (Times Roman, Arial, etc.) than are used for non-keywords in the answer. In some embodiments of the invention (not shown), the Web document could identify the entered keywords by placing a graphic object, such as a box or an oval, near or around the keywords. - Next, the user would typically enter the keyword “George.” However, if the user enters an incorrect character, such as “r” for the first character of the next keyword, then as shown in
Web document 1100 inFIG. 11 , the incorrect character “r” may be displayed by using a different font color, a different font size, a different font style (bold, italic, underline, etc.), and/or a different font family (Times Roman, Arial, etc.) than are used for correctly entered characters. For example, a Dynamic HTML Web document may display incorrectly entered characters in red, and may display correctly entered characters in blue. As shown inWeb document 1100, the character “r” is displayed in an italic bold font while correctly entered characters are displayed in a regular bold font. In addition, as shown inWeb document 1100, when the user has entered an incorrect character, the Dynamic HTML Web document could display an error message, such as “Check the spelling, letter, or number.” - In some embodiments of the invention, only one incorrect character will be displayed. Thus, after a user types “Thomas” for the keyword “George,” then the Web document would display “s______” because only the last incorrectly entered character would be displayed. However, in other embodiments of the invention, 2, 3, 4, 5, or all incorrect characters could be displayed. Thus, if all incorrect characters were displayed, then after the user enters “Thomas” for the keyword “George,” the Web document would display “Thomas.”
- In some embodiments of the invention, the Web document would display characters that are entered for a keyword in a predetermined combination of upper and lower case characters regardless of the case of the entered characters. For example, if a student user enters “GEORGE” for the keyword “George,” then the Web document would display the entered characters as “George.” Similarly, if the student user enters “Washington” for the keyword “Washington,” then the Web document would display the entered characters as “Washington.”
- In other embodiments of the invention, when a user has correctly entered a character of a keyword, depressing the backspace and/or the delete keys does not remove the correctly entered characters. However, in other embodiments of the invention, depressing one or both of those keys would remove the correctly entered characters from the user computer's display.
- In some embodiments of the invention, the student user is required to enter a space between key words. Thus, the student user would be required to enter a space between “George” and “Washington.” However, in other embodiments of the invention, the student user would not be required to enter a space. Thus, in such embodiments of the invention, the student user could enter “georgewashington” and the Web document would display “George Washington.” Similarly, a student user may not be required to enter a space between “first” and “george” in
Web document 1100. - In some embodiments of the invention, a student user can “jump” between keywords. For example, if a user desires to type “first” and then “Washington,” but not “George,” then the student user could type “first[Tab][Tab]Washington.” The [Tab] characters would allow the student user to skip over the second keyword. Similarly, after typing “first” the student user could utilize the mouse to select the first character in the third keyword. Allowing a student user to enter the information that the user knows and then using that information to enter the remaining keywords can increase the long-term retention of the student user.
- After a user has correctly entered all the keywords in an answer, then, as shown in
Web document 1200 inFIG. 12 , the Dynamic HTML Web document may display a message indicating that the user has correctly entered the keywords. In some embodiments of the invention, after a user has correctly answered a question, a database in the Lock-In Training Website 110 is updated to indicate the successful answer, together with the current part, round, and session. In other embodiments of the invention, this information is stored on a cookie on theuser computer 105. This information, regardless of whether it is stored on the Lock-InTraining Web site 110 or theuser computer 105, can be utilized to allow the student user to easily resume training at a later time. - As shown in
FIG. 12 , after the successful answer of a question, a “Press ‘Enter’ to Continue” object is displayed. This object allows the student user to continue the student user's training. A student user would typically then select the “Press ‘Enter’ to Continue” object. - After the user selects the “Press ‘Enter’ to Continue” object, a Web document, such as
Web document 1300 shown inFIG. 13 , could be displayed. Note thatWeb document 1300 displays-the first question and an incomplete first answer.Web document 1300 does not include a complete answer as didWeb document 1200. Instead,Web document 1300 includes a “Hint” object. - The “Hint” object provides the user with one or more hints to enable the user to easily enter the keywords. For example, in some embodiments of the invention, such as shown in
FIG. 14 , if the user selects the “Hint” object a single time, the Web document would display the first character in each keyword. In some embodiments of the invention, such as shown inFIG. 15 , if the user selects the “Hint” object a second time, the Web document would display the first character in each keyword and the consonants in each keyword. Similarly, if the user selects the “Hint” object a third time, the Web document would display all the keywords. - The above description includes three hints: the first letter of each keyword, the consonants of each keyword, and the complete keywords. Other embodiments of the invention may include fewer or more hints. Such hints could include:
- 1) First character in the xth keyword, where x increases with each selection of the “Hint” object;
- 2) Consonants in the xth keyword, where x increases with each selection of the “Hint” object;
- 3) Complete xth keyword, where x increases with each selection of the “Hint” object;
- 4) Vowels in all keywords;
- 5) Vowels in the xth keyword, where x increases with each selection of the “Hint” object;
- 6) First xth letters in one or more keywords, where x increases with each selection of the “Hint” object;
- 7) Every xth keyword, where x is 2, 3, 4, 5 or 6;
- 8) Complete or partial image hints, where the image is associated with one or more keywords (For example, an image of George Washington would be associated with the keywords “George Washington”);
- 9) Complete or partial sound hints, where the sound is associated with one or more keywords (For example, an audio segment “Fourscore and seven years ago” played without using any hints. In other embodiments of the invention, the user cannot advance unless the user has correctly typed in the keywords using less than 2, 3, 4, or 5 hints. In still other embodiments of the invention, the user cannot advance unless the user has correctly typed in the keywords x times without using any hints, where x is 1, 2, 3, 4, or 5. As shown in
FIG. 16 , after a student user has correctly entered the keywords without using a hint, whether requested by selecting a hint object or automatically generated because of incorrect entries,Web document 1600 displays an indication that the student user has correctly answered the question. In addition,Web document 1600 displays a “Press ‘Enter’ to Continue” object. - In some embodiments of the invention, when a student user selects the “Press ‘Enter’ to Continue” object, the student user advances to a second question in the Introductory round. Thus, Web documents similar to
Web documents 800 through 1600 will be displayed for the second question. In some embodiments of the invention, the information required to generate the Web documents for a second question, such as “Questions” table information, will have been downloaded to theuser computer 105 before the user selects the “Press ‘Enter’ to Continue” object ofFIG. 16 . Thus, the responsiveness of the training system will be optimized. After the student user has correctly answered the second question the required number of times with less than the required number of hints, then, similar Web documents for the remaining questions in the part will be displayed. After the user has completed all the questions in the part, then the student user will have completed the Introductory round for that part. If the Lock-In Training session contains another part, then Web documents similar toWeb documents 800 through 1600 will be displayed for the questions in the other part(s). After the user has completed all the questions in all the parts, then the student user will have completed the Introductory round. - After the student user has completed the Introductory round, then the student user may continue to the Retention rounds. While the purpose of the Introductory round was to introduce the material to the student users, the purpose of the Retention rounds is to lock-in the material into the student user's long-term memory. In some embodiments of the invention, a retention round begins by the
computer program 145 and theWeb server 140 serving a Web document, such asWeb document 1700 shown inFIG. 17 .Web document 1700 informs the student user that the user has completed the Introductory round and has begun the Retention rounds. In addition,Web document 1700 provides the student user with the requirements to complete the Retention rounds. In some embodiments of the invention, the completion requirements are obtained from a database. For example, as shown inFIG. 17 , the completion requirements may be answering each question twice without using the hint button. Thus, if a student user utilizes a hint for a question in a Retention round, then that question will be included in a future Retention round. On the other hand, if a student user has answered a question twice without using a hint, then that question will not be included in future Retention rounds. The student user will continue taking Retention rounds until each question has been answered twice without using any hints. In other embodiments of the invention, the requirements of completing the Retention rounds may be answering each question a different number of times, such as 1, 3, 4, or 5, without using any hints. Similarly, in other embodiments of the invention, the requirements of completing the Retention rounds may be answering each question a predetermined number of times using less than a predetermined number of hints, such as 1, 2, 3, 4, or 5. - After a student user has reviewed
Web document 1700, then the user would typically select the “Press ‘Enter’ to Continue” object. Then, thecomputer program 145 can query a database to determine if the user had previously completed a portion of a Retention round. If the user had previously completed a portion of a Retention round, then thecomputer program 145 may retrieve information that identifies the location that the student user stopped training. Then, using the retrieved information, thecomputer program 145 and theWeb server 140 may serve a Web document that allows the user to continue the user's training session. Thus, for example, if a user stopped a prior session while working on a particular question in a particular Retention round on a particular day of training, then the user could begin the session at that same question, round, and training day. - On the other hand, if the user had not previously completed a portion of a Retention round, then the
computer program 145 and theWeb server 140 may serve a Web document, such asWeb document 1800 shown inFIG. 18 , which allows the user to begin the user's Retention rounds. As shown inFIG. 18 ,Web document 1800 includes an element that presents the user with the current session title, “Presidents of the United States before the Civil War,” and the current session number, “1.” In addition,Web document 1800 presents the user with the current and total number of parts. Further,Web document 1800 informs the user that the user is currently in a “Retention Round.”Web document 1800 also includes a “Hint” object. The “Hint” object provides the student user with one or more hints, as did the “Hint” in the Introductory round. - Unlike the Web documents utilized in the Introductory round,
Web document 1800 includes adynamic process bar 1810. Thedynamic process bar 1810 can indicate the completion status of the Retention rounds. For example, the Retention rounds' completion criteria may be to answer each question two times without the use of a hint. For such a completion criteria, a dynamic process bar could indicate that (1) a question has not been answered without a hint, (2) a question has been answered once without a hint, and (3) a question has been answered twice without a hint. Similarly, if the Retention rounds' completion criteria is to answer each question three times without the use of a hint, then a dynamic process bar could indicate that (1) a question has not been answered without a hint, (2) a question has been answered once without a hint, (3) a question has been answered twice without a hint, and (4) a question has been answered three times without a hint. - Referring to
FIG. 18 , thedynamic process bar 1810 includes sixteen different circles. Each circle has a number directly above the circle that corresponds to a question number. Thus, the circle with “1” above it corresponds to question one. The pattern within the circle corresponds to the status of the question. As shown on the bottom left ofFIG. 18 , a circle pattern with lower-left to upper-right lines indicates that a question “has not been answered without a hint.” Similarly, as shown on the bottom center ofFIG. 18 , a circle pattern with horizontal and vertical lines indicates that a question has been “answered once without a hint.” Likewise, as shown on the bottom right ofFIG. 18 , a circle pattern with diagonal crossing lines indicates that a question has been “answered twice without a hint.” Thus, because all of the circles in thedynamic process bar 1810 have patterns with lower-left to upper-right lines, the dynamic process bar indicates that none of the sixteen questions have been answered without a hint. Thedynamic process bar 1810 can also indicate the current question number. For example, the disk that surrounds circle “1,” indicates that the current question is question one. -
FIG. 19 presents aWeb document 1900 with anotherdynamic process bar 1910. Thisdynamic process bar 1910 indicates that questions one through six have been “answered twice without a hint.” Thedynamic process bar 1910 also indicates that questions seven through ten have been “answered once without a hint” and that questions eleven through sixteen have “not been answered without a hint.” In addition, thedynamic process bar 1910 indicates that the current question is question “10.” - While the dynamic process bars of
FIGS. 18 and 19 utilize different patterns within circles to indicate question status, other graphical elements could be utilized. For example, different colors of solid circles or circle sizes could indicate question status. Similarly, different graphical shapes, such as rectangles, squares, quadrilaterals, triangles, or ellipses, could be utilized to indicate question status. Similarly, text within a graphical shape could be utilized to indicate question status. For example, a circle surrounding a “1” could indicate that the question has been answered once without a hint and a circle surrounding a “2” could indicate that the question has been answered twice without a hint. -
Web document 1900 includes twoconfirmation images confirmation images Confirmation image 1920 indicates that the student user has answered the current question once without using a hint. Theconfirmation image 1930 indicates that the student user still needs to answer the question without using a hint one additional time. - After a student user has completed a Retention round in which the user utilized a hint to answer a question, a Web document, such as
Web document 2000 shown inFIG. 20 , allows the student user to review the student user's progress toward completing the Retention rounds. For example, the Retention rounds' completion criteria may be to answer each question two times without the use of a hint. Thus,element 2010 provides the student user with the number of questions that have been answered once without a hint. Similarly,element 2020 provides student users with the number of questions that the student user has answered twice without a hint. -
Web document 2000 also allows the student to review the student's progress in the last Retention round. As shown inFIG. 20 ,Web document 2000 contains a “Results forRound 2” chart 2030. This chart 2030 contains an entry for each question answered in the last Retention round. The chart 2030 contains an entry for sixteen questions. Thus, the last Retention round included sixteen questions. The chart 2030 also contains a question status indicator for each question. A star indicates that a question was answered without a hint and an “X” indicates that a question was answered with a hint. As shown inFIG. 20 ,Web document 2000 also contains adynamic progress bar 2040. - In some embodiments of the invention, a student user may review questions by selecting either the question number or the question status indicator in the chart 2030. Thus, for example, if a user selects the
star 2050 with a mouse, for example, then a Web document, such asWeb document 2100 shown inFIG. 21 , could be displayed on theuser computer 105.Web document 2100 allows the student user to spend time learning the answer to question one before beginningRetention round 3. After the student user has completed reviewing question one, then the user can redisplayWeb document 2000 by selecting the “Press ‘Enter’ to Continue” object ofWeb document 2100. If the student user desires to review additional questions, then the user may select other question status indicators. When the student user has reviewed the desired questions, and is ready to take the next Retention round, then the student user could select the “Press ‘Enter’ for Next Round” object. Then, the student user could answer the remaining questions (with or without hints). - After the student user has completed the third Retention round, then, in some embodiments of the invention, the student user can review the student user's progress in that round by reviewing a Web document, such as
Web document 2200 shown inFIG. 22 . This Web document indicates that two questions have been answered without a hint once and that eight questions have been answered without a hint twice. Note thatchart 2230 only includes question numbers and question status indicators for questions seven through sixteen. Questions one through six are not included in thechart 2230 because the prior Retention round did not require the student user to answer those questions as those questions had already been answered twice without hints in the first two Retention rounds. Thechart 2230 indicates that the student user answered questions seven and eight without a hint in the last round. Thus, the student user is making progress toward the completion of the Retention rounds. - Typically a student user would continue taking Retention rounds until the student user has met the Retention rounds' completion criteria.
- After the completion of the above-described rounds, the student user would typically take additional parts, sessions, or courses.
- As discussed in Section 5.5, the purpose of the Retention rounds is to help the student user lock-in material into the student user's long-term memory. Thus, the Retention rounds utilize repetition to efficiently train student users. However, the repetition that is emphasized is repetition by the student and not by a teacher. It has been found that a student is more likely to retain material if the student repetitively enters answer keyword(s) into a computer as opposed to hearing a teacher repetitively provide the answer. In addition, it has been found that requesting a student to enter complete answers takes significantly more training time than requesting the student to just enter the keywords of an answer.
- It has also been found that students are more likely to retain material if the answer contains keywords of the question and well as keywords of the answer. For example, a student is likely to retain the answer to “Who was the first President of the United States?” if the student enters the underlined keywords in the following answer: “the first President of the United States was George Washington.” On the other hand, a student it not likely to retain the name of the first President of the United States if the student enters the underlined keywords in the following answer: “George Washington.” While entering such keywords may allow the student to retain the name of a United States President, it will not likely help the student retain the name of the first President of the United States.
- A Lock-In Training session typically includes up to twenty-five questions. Similarly, a Lock-In Training part typically includes up to ten questions. However, the number of questions can vary above those values. As shown in
FIG. 7 , the session entitled “Presidents of the United States before the Civil War” includes sixteen questions. Thus, that session may include only one part of sixteen questions. However, that session could possibly contain two parts of eight questions each. Smaller numbers of questions are often appropriate if the material is more complex. Similarly, larger numbers of questions are often appropriate if the material is less complex. In some embodiments of the invention, a client administrator or a system administrator determines the number of questions in each part and then stores such information in a database, such as the database shown inFIG. 1B . - It has been found that student users can efficiently retain material when they enter answer keywords into a computer in spaced intervals. A student is less likely to retain material if the student enters keywords into a computer in rapid succession. However, if time intervals are inserted between the entering of keywords, then the student is more likely to retain the material. The time intervals need not be too small or too large. Thus, by selecting an appropriate number of questions in a part, the efficiency of training can be increased.
- In other embodiments of the invention, intervening events are utilized to increase the time intervals between the entering of keywords. Examples of such intervening events can include: reading material; watching a movie; listening to audio; viewing an image; or attending to an event occurring between successive questions. As a result, some embodiments of the invention utilize intervening events between question answers. For example, after entering keywords to answer a first question, the user computer may display a short movie, output a short audio stream, and/or display one or more images to the user. In such embodiments, the student user may not be permitted to enter additional keywords until the movie and/or audio stream has terminated. Similarly, in some embodiments of the invention, the user may not be permitted to enter additional keywords until a predetermined period of time has elapsed, such as for example, 30 seconds or 1, 2, 3, 4, 5, 6, 7, 8, 9, or 10 minutes.
- Because the time period between answering questions should not be too long, a Lock-In Training part that contains fifty questions is not likely to lead to long-term retention. The decreased retention results from the fact that the time period between the entering of keywords to a particular question is too long.
- In addition to careful selection of the number of questions in each part, the training environment should be structured, if possible, to control the time intervals between questions. Recall that the time intervals need not be too large. If the training environment includes too many distractions, such as telephone calls, emails, pager pages, and/or conversations, then the efficiency of training may decrease.
- One advantage of the Lock-In Training system is that no tests are required at the completion of training. It has been found that if a student user successfully completes a properly configured Lock-In Training course, as discussed in Section 5.9 below, then the student user will have learned the material in the course. Thus, there is no need to require the student user to take a separate test. By eliminating the testing requirements, student users are likely to be more relaxed and have increased long-term retention of the material.
- Another advantage of the Lock-In Training system is that slow learners can take as much time as they need to take Lock-In Training courses. In addition, fast learners can spend only as much time as they need to take the courses. However, regardless of the time taken to complete the Lock-In Training courses, both the slow learner and the fast learner will have learned the course materials.
- Still another advantage of the Lock-In Training system is that the system allows student users to efficiently relearn any materials that the student user may have forgotten after taking a Lock-In Training course. For example, if a student user has forgotten the 2nd President of the United States, then the user could retake the Introductory round and/or the Retention rounds of a “Presidents of the United States” Lock-In Training course to rapidly relearn the 2nd President. The time to retake a Lock-In Training course to relearn forgotten material is a fraction of the time that it takes to initially take the Lock-In Training course. Thus, the student user can rapidly relearn the needed material.
- Section 5.8 discussed how spaced repetition within a Lock-In Training session increases long-term retention of material. Long-term retention can be further increased by spaced repetition of sessions. For example, answering questions on a first day, then re-answering the same questions on second and third days has been found to increase long-term retention of the answers. Thus, as discussed in Section 5.6, some embodiments of the invention allow a client administrator or a system administrator to enter the number of training days that a student must complete in a Lock-In Training session or course. Thus, in order to compete a Lock-In Training course, a student user may be required to answer the same questions on 2, 3, 4, 5 or more days. In some embodiments of the invention, the days must be consecutive. However, in other embodiments of the invention, the days need not be consecutive. In such embodiments of the invention, consecutive training sessions may be required to be completed within a predetermined number of days, such as 2, 3, 4, 5, 6, 7, or more days, to count toward the completion of a Lock-In Training course.
- In some embodiments of the invention, each training day is configured similarly. For example, if a client administrator enters information into a database that requires three identical training days, then student users may be required to take an Introductory round and successfully complete the Retention rounds on each of the three days. Similarly, a student user may only be required to successfully complete the Retention rounds on each of the three days.
- In other embodiments of the invention, the training days are configured differently. For example, a student may be required to take an Introductory round and successfully complete the Retention rounds on the first training day. Then, on the second, third, and forth training days, the student user would only be required to successfully compete the Retention rounds.
- By configuring the number of training days and the requirements of each training day, a client administrator or a system administrator can optimize the configuration of a Lock-In Training course.
- The above embodiments of the invention utilize a
user computer 105 that is coupled to a Lock-InTraining Web site 110 via a communications link such as the Internet or an Intranet. Such embodiments of the invention are particularly useful for corporate and government training in which the Lock-In Training courses are configured by client administrators and/or system administrators. - Another embodiment of the invention is a stand along computer system that allows a student user to take a Lock-In Training course without being coupled to another computer. One example of such a computer system is shown in
FIG. 23 . Thecomputer system 2300 shown inFIG. 23 includes acomputer 2310. Examples of such computers include personal computers currently manufactured by Dell Computer Corporation, International Business Machines, Hewlett-Packard Company, and Apple Computer Corporation. - The
computer 2310 includes aconventional audio system 2320. Theaudio system 2320 is operable to convert a digital data stream into an analog electrical signal that can be output by a speaker, such as a computer speaker or a headphone. Because of the significant size of digital data streams, such streams are commonly compressed and stored in compressed audio streams. Such digital data streams, whether compressed or uncompressed and whether stored in memory or on a disk drive, will be referred to as “audio streams.” Theaudio system 2320 also includes the ability to convert audio electrical signals from a microphone (not shown) into a digital data stream. This digital data stream can be processed by voice recognition software executing oncomputer 2310. - The
computer 2310 is coupled to one or more input devices such as amouse 2330 or akeyboard 2340. Thecomputer 2310 may also use alternative input devices such as touch screens, touch pads, and/or microphones (not shown). Thecomputer 2310 may also be coupled to a display device such as acomputer monitor 2350. Other computer systems may not be coupled to a display device. For example, such a computer system may output information to a user via aspeaker 2360 and/or aprinter 2370. - The
computer 2310 can also be coupled to one ormore speakers 2360. Thespeakers 2360 may be stand-alone computer speakers such as are commonly utilized with desktop computer systems. Alternatively, thespeakers 2360 may be integrated into thecomputer 2310 as is common with modern laptop computer systems. In addition, thespeakers 2360 may be headphone speakers that are typically worn by a user. Thespeakers 2360 are operable to convert an electrical signal, which is output from thecomputer 2310, into audible tones. - The
computer 2310 may also include a number of other subsystems that are typical in modern computers. For example, thecomputer 2310 may include anetwork device 2375, such as an Ethernet card or a modem, that is operable to transfer data to and from other computer systems and/or servers. In addition, thecomputer 2310 may include one or more program storage devices, such as Random Access Memory (RAM) 2380, afloppy disk drive 2385, ahard disk drive 2387, aCD disk drive 2390, and/or aDVD disk drive 2395. Additional program storage devices include flash memory (not shown), floppy disks (not shown), CDROM disks (not shown), and DVD disks (not shown). Each of the above program storage devices can be utilized to store computer programs, databases, audio streams, movies, and/or images. In some embodiments of the invention, thecomputer 2310 is running a Windows operating system, a Unix operating system, a Linux operating system, or an Apple operating system. - In some embodiments of the invention, one or more program storage devices store a computer program. The computer programs may be downloaded from other computer systems via
network device 2375 or may be included in program storage devices, such as floppy disks, flash memory, CDROM disks, or DVD disks, that are inserted into thecomputer 2310. - The computer programs may include or reference one or more Lock-In Training courses, each of which may include a number of sessions, parts, questions, and answers. In addition, the computer programs may include or reference movies, audio streams, and/or images to ensure appropriate time intervals between question answers. The computer programs include computer instructions, that when executed by
computer 2310, allow the user to take one or more Lock-In Training courses, each of which include one or more Introductory rounds and/or Retention rounds. Thus, the computer programs, when executed by thecomputer 2310 typically display computer screens, such as those shown inFIGS. 2 through 22 on thecomputer monitor 2350. The computer program may generate and/or display Web documents. Alternatively, the computer program may display windows that have similar functionality without using HTTP protocols. For example, the computer program may be a Microsoft Windows based C++ program that utilizes DirectX or OpenGL graphics routines to display text and graphics oncomputer monitor 2350. - The computer programs may also receive information from the user via the
mouse 2330, thekeyboard 2340, or another input device, such as microphone, number pad, or touch pad, and update computer screens in response to the received information. For example, if a user enters keywords via thekeyboard 2340, then the computer program receives the keywords and updates computer screen displays in response to those keywords. As a result, the user can select and take Lock-In Training courses at thecomputer 2310 when thecomputer 2310 is not connected to any other computer. - In some embodiments of the invention,
computer 2310 may store information related to the student user's training activities. Thus, the student user can utilize such information to confirm the student user's training activities. For example, after completing a Lock-In Training course, the student user may provide a file that contains some or all of the information stored in the “User Course,” “User Sessions,” and “User Part” tables of the database shown inFIG. 1B to the student user's teacher. Alternatively,computer 2310 may send such information to the teacher's computer or website vianetwork device 2375. After reviewing the information, the teacher can confirm that the student user successfully completed the assigned Lock-In Training course(s). - The
computer 2310 is not required to have a Web browser. However, if thecomputer 2310 does include a Web browser and anetwork device 2375, then thecomputer 2310 could replace theuser computer 105 in the Lock-In Training system shown inFIG. 1A . - In some embodiments of the invention, student users may be required to timely enter personal information to insure that the student, as opposed to another individual, is taking the Lock-In Training course. For example, the student user may be requested to enter the student user's birthday when taking an Introductory round. Similarly, the student user may be requested to enter the student user's mother's maiden name when taking a Retention round.
- In still other embodiments of the invention, the computer program may utilize biometric identifiers during training to insure that the student, as opposed to another individual, is taking the Lock-In Training course. For example, a computer program could take a digital picture of the student user using a digital camera (not shown) when the student user is entering in keywords. Similarly, the student user could be requested to periodically place the student user's finger in a fingerprint reader. In addition, the digital images could be utilized to ensure that the student is not copying answers from another source of information in the Retention rounds.
- The foregoing descriptions of embodiments of the present invention have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the present invention to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. For example, while the above description utilized questions and answers that included only words, the Lock-In Training system could be utilized with graphics, symbols, numbers, and/or sounds. For example, a question for an elementary school student could be to make the sound that corresponds to a graphic image of a cow. The student could then successfully answer the question by making a “mooing” sound into a microphone attached to a user computer. Similarly, the answer to a question could include words other than English words and/or symbols, such as “!,” and “@.” Additionally, the above disclosure is not intended to limit the present invention.
- The above descriptions of embodiments of the present invention include words such as “first,” “then,” and “next.” These words indicate a sequence of acts. Many of the sequences can be modified within the scope of the invention. Thus, unless the result of a first act is required for a second act, then the language indicating a sequence should not be considered to be a limitation to the invention. Similarly, the phrase “for example,” is intended to be illustrative and not limiting.
- Many of the numerous embodiments described above can be combined to form a very powerful training system. Such combinations are intended to be within the scope of the invention. For example, combining an Internet based Lock-In Training system with a standalone Lock-In Training system would provide a powerful training system.
- While the invention has been described above with reference to certain preferred embodiments of the invention, these embodiments have been presented by way of example only, and are not to limit the scope of the invention. Accordingly the scope of the present invention is defined by the appended claims.
Claims (2)
1-39. (canceled)
40. A program storage device, the program storage device containing computer readable instructions, that when executed by a computer, perform the following acts:
retrieving a keyword, which forms a part of an answer to a question in a training course, from a program storage device;
retrieving a word, which is not a keyword and which forms a second part of the answer to the question, from the program storage device; and
generating a Web document for use in a training course, the Web document including an answer to the question, the answer including the keyword and the word, the keyword being in a first font and the word being in a second font.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/496,246 US20070009876A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/815,341 US7364432B2 (en) | 2004-03-31 | 2004-03-31 | Methods of selecting Lock-In Training courses and sessions |
US11/496,246 US20070009876A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/815,341 Continuation US7364432B2 (en) | 2004-03-31 | 2004-03-31 | Methods of selecting Lock-In Training courses and sessions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070009876A1 true US20070009876A1 (en) | 2007-01-11 |
Family
ID=35006249
Family Applications (12)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/815,341 Expired - Lifetime US7364432B2 (en) | 2004-03-31 | 2004-03-31 | Methods of selecting Lock-In Training courses and sessions |
US11/055,186 Expired - Lifetime US7390191B2 (en) | 2004-03-31 | 2005-02-09 | Computer system configured to sequence multi-day training utilizing a database |
US11/055,306 Abandoned US20050233293A1 (en) | 2004-03-31 | 2005-02-09 | Computer system configured to store questions, answers, and keywords in a database that is utilized to provide training to users |
US11/156,286 Abandoned US20050233291A1 (en) | 2004-03-31 | 2005-06-17 | Lock-in training system utilizing selection objects |
US11/198,946 Abandoned US20050282135A1 (en) | 2004-03-31 | 2005-08-04 | Lock-in training method utilizing the entry of a portion of a keyword |
US11/495,063 Abandoned US20070009873A1 (en) | 2004-03-31 | 2006-07-28 | Lock-in training system |
US11/496,223 Abandoned US20070009875A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
US11/496,198 Abandoned US20070009874A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
US11/496,246 Abandoned US20070009876A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
US11/496,337 Abandoned US20070009878A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
US11/496,293 Abandoned US20070009877A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
US12/212,937 Abandoned US20090023125A1 (en) | 2004-03-31 | 2008-09-18 | Lock-in training system progress display |
Family Applications Before (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/815,341 Expired - Lifetime US7364432B2 (en) | 2004-03-31 | 2004-03-31 | Methods of selecting Lock-In Training courses and sessions |
US11/055,186 Expired - Lifetime US7390191B2 (en) | 2004-03-31 | 2005-02-09 | Computer system configured to sequence multi-day training utilizing a database |
US11/055,306 Abandoned US20050233293A1 (en) | 2004-03-31 | 2005-02-09 | Computer system configured to store questions, answers, and keywords in a database that is utilized to provide training to users |
US11/156,286 Abandoned US20050233291A1 (en) | 2004-03-31 | 2005-06-17 | Lock-in training system utilizing selection objects |
US11/198,946 Abandoned US20050282135A1 (en) | 2004-03-31 | 2005-08-04 | Lock-in training method utilizing the entry of a portion of a keyword |
US11/495,063 Abandoned US20070009873A1 (en) | 2004-03-31 | 2006-07-28 | Lock-in training system |
US11/496,223 Abandoned US20070009875A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
US11/496,198 Abandoned US20070009874A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/496,337 Abandoned US20070009878A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
US11/496,293 Abandoned US20070009877A1 (en) | 2004-03-31 | 2006-07-31 | Lock-in training system |
US12/212,937 Abandoned US20090023125A1 (en) | 2004-03-31 | 2008-09-18 | Lock-in training system progress display |
Country Status (2)
Country | Link |
---|---|
US (12) | US7364432B2 (en) |
CA (1) | CA2469384C (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7210938B2 (en) * | 2001-05-09 | 2007-05-01 | K12.Com | System and method of virtual schooling |
US7752196B2 (en) * | 2004-05-13 | 2010-07-06 | Robert John Rogers | Information retrieving and storing system and method |
ATE434225T1 (en) * | 2004-07-20 | 2009-07-15 | Alcatel Lucent | A METHOD, A NETWORK DOCUMENT DESCRIPTION LANGUAGE, A NETWORK DOCUMENT TRANSITION PROTOCOL AND A COMPUTER SOFTWARE PRODUCT FOR RECOVERING NETWORK DOCUMENTS |
US8147248B2 (en) * | 2005-03-21 | 2012-04-03 | Microsoft Corporation | Gesture training |
US20070069474A1 (en) * | 2005-09-16 | 2007-03-29 | Allen Christopher S | System and method for assisting in classroom education |
US20070065797A1 (en) * | 2005-09-20 | 2007-03-22 | Ross Elgart | System and method of preparing for essay examinations |
US20080026358A1 (en) * | 2006-07-17 | 2008-01-31 | Hsiang-Chia Su | Systemic education module |
US20080059484A1 (en) * | 2006-09-06 | 2008-03-06 | K12 Inc. | Multimedia system and method for teaching in a hybrid learning environment |
US7966309B2 (en) | 2007-01-17 | 2011-06-21 | Google Inc. | Providing relevance-ordered categories of information |
US20080254430A1 (en) * | 2007-04-12 | 2008-10-16 | Microsoft Corporation | Parent guide to learning progress for use in a computerized learning environment |
US8251704B2 (en) | 2007-04-12 | 2012-08-28 | Microsoft Corporation | Instrumentation and schematization of learning application programs in a computerized learning environment |
US8137112B2 (en) | 2007-04-12 | 2012-03-20 | Microsoft Corporation | Scaffolding support for learning application programs in a computerized learning environment |
US8727788B2 (en) * | 2008-06-27 | 2014-05-20 | Microsoft Corporation | Memorization optimization platform |
TWI407393B (en) * | 2008-09-16 | 2013-09-01 | Univ Nat Taiwan Normal | Interactive teaching game automatic production methods and platforms, computer program products, recording media, and teaching game system |
US9713444B2 (en) * | 2008-09-23 | 2017-07-25 | Digital Artefacts, Llc | Human-digital media interaction tracking |
US8589196B2 (en) * | 2009-04-22 | 2013-11-19 | Bank Of America Corporation | Knowledge management system |
US8275797B2 (en) * | 2009-04-22 | 2012-09-25 | Bank Of America Corporation | Academy for the knowledge management system |
US8527328B2 (en) * | 2009-04-22 | 2013-09-03 | Bank Of America Corporation | Operational reliability index for the knowledge management system |
US8266072B2 (en) * | 2009-04-22 | 2012-09-11 | Bank Of America Corporation | Incident communication interface for the knowledge management system |
US8996397B2 (en) * | 2009-04-22 | 2015-03-31 | Bank Of America Corporation | Performance dashboard monitoring for the knowledge management system |
US8924893B2 (en) * | 2009-10-14 | 2014-12-30 | At&T Mobility Ii Llc | Locking and unlocking of an electronic device using a sloped lock track |
US9424444B2 (en) | 2009-10-14 | 2016-08-23 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating integrated messaging, contacts and social media for a selected entity |
WO2011126911A1 (en) * | 2010-03-30 | 2011-10-13 | Authentic8, Inc | Disposable browsers and authentication techniques for a secure online user environment |
US9037387B2 (en) | 2010-06-08 | 2015-05-19 | Toyota Jidosha Kabushiki Kaisha | Control device for internal combustion engine |
WO2012154896A2 (en) * | 2011-05-09 | 2012-11-15 | Delart Technology Services Llc | Method and system for sharing and networking in learning systems |
US20130036360A1 (en) * | 2011-08-01 | 2013-02-07 | Turning Technologies, Llc | Wireless audience response device |
WO2013125861A1 (en) * | 2012-02-20 | 2013-08-29 | 주식회사 노리코리아 | Method and system for providing education service based on knowledge unit, and computer-readable recording medium |
US20140012753A1 (en) | 2012-07-03 | 2014-01-09 | Bank Of America | Incident Management for Automated Teller Machines |
US20150050358A1 (en) * | 2013-08-15 | 2015-02-19 | Regents Of The University Of Minnesota | Implant support composition and methods of use |
TWI509439B (en) * | 2014-05-05 | 2015-11-21 | Han Lin Publishing Co Ltd | Question bank keyword search system and its method |
US20160055604A1 (en) * | 2014-08-22 | 2016-02-25 | SuccessFactors | Providing Learning Programs |
KR102293795B1 (en) * | 2014-09-24 | 2021-08-25 | 삼성전자주식회사 | Method and apparatus for outputting contents and recording medium thereof |
US9919212B2 (en) * | 2014-12-22 | 2018-03-20 | Gree, Inc. | Server apparatus, control method for server apparatus, and program |
US9471668B1 (en) * | 2016-01-21 | 2016-10-18 | International Business Machines Corporation | Question-answering system |
WO2018013180A1 (en) * | 2016-07-15 | 2018-01-18 | Hewlett-Packard Development Company, L.P. | Hint-based queries |
CN113077672B (en) * | 2021-04-22 | 2022-09-06 | 熊卓 | Multi-purpose memory aid device |
Citations (97)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3566482A (en) * | 1968-10-24 | 1971-03-02 | Data Plex Systems | Educational device |
US3606688A (en) * | 1968-07-19 | 1971-09-21 | Associated Research Lab Propri | Method and apparatus for teaching a multiplicity of students |
US3671668A (en) * | 1968-11-18 | 1972-06-20 | Leonard Reiffel | Teaching system employing a television receiver |
US3715811A (en) * | 1970-10-13 | 1973-02-13 | Westinghouse Electric Corp | Remedial branching teaching system |
US4289313A (en) * | 1979-09-07 | 1981-09-15 | Delamontagne Robert P | Management teaching game apparatus and method |
US4690645A (en) * | 1985-08-30 | 1987-09-01 | Epoch Company, Ltd. | Interactive educational device |
US4690644A (en) * | 1984-12-21 | 1987-09-01 | Flanders Robert G | Teaching apparatus, particularly for teaching shorthand |
US4690664A (en) * | 1978-11-02 | 1987-09-01 | Dayco Products, Inc. | Toothed belt |
US4770636A (en) * | 1987-04-10 | 1988-09-13 | Albert Einstein College Of Medicine Of Yeshiva University | Cognometer |
US4817036A (en) * | 1985-03-15 | 1989-03-28 | Brigham Young University | Computer system and method for data base indexing and information retrieval |
US4833610A (en) * | 1986-12-16 | 1989-05-23 | International Business Machines Corporation | Morphological/phonetic method for ranking word similarities |
US4891011A (en) * | 1988-07-13 | 1990-01-02 | Cook Graham D | System for assisting the learning of a subject |
US4895518A (en) * | 1987-11-02 | 1990-01-23 | The University Of Michigan | Computerized diagnostic reasoning evaluation system |
US4958284A (en) * | 1988-12-06 | 1990-09-18 | Npd Group, Inc. | Open ended question analysis system and method |
US5002491A (en) * | 1989-04-28 | 1991-03-26 | Comtek | Electronic classroom system enabling interactive self-paced learning |
US5002865A (en) * | 1985-04-24 | 1991-03-26 | Konica Corporation | Silver halide photographic material |
US5011413A (en) * | 1989-07-19 | 1991-04-30 | Educational Testing Service | Machine-interpretable figural response testing |
US5033969A (en) * | 1989-07-21 | 1991-07-23 | Pioneer Electronic Corporation | Support device for resolving questions about reproduced information |
US5112064A (en) * | 1990-06-13 | 1992-05-12 | Weedman Gail H | Psychology game |
US5141439A (en) * | 1991-12-09 | 1992-08-25 | Cousins Edward J | Keyword teaching and testing method |
US5246375A (en) * | 1991-09-23 | 1993-09-21 | Wouter Goede | Memory aiding device |
US5307266A (en) * | 1990-08-22 | 1994-04-26 | Hitachi, Ltd. | Information processing system and method for processing document by using structured keywords |
US5310349A (en) * | 1992-04-30 | 1994-05-10 | Jostens Learning Corporation | Instructional management system |
US5314340A (en) * | 1990-10-30 | 1994-05-24 | Texas Instruments Incorporated | Electronic teaching apparatus having two-part partially and wholly actuated for indication of correct and incorrect answers |
US5325465A (en) * | 1992-03-04 | 1994-06-28 | Singapore Computer Systems Limited | End user query facility |
US5384703A (en) * | 1993-07-02 | 1995-01-24 | Xerox Corporation | Method and apparatus for summarizing documents according to theme |
US5424947A (en) * | 1990-06-15 | 1995-06-13 | International Business Machines Corporation | Natural language analyzing apparatus and method, and construction of a knowledge base for natural language analysis |
US5437553A (en) * | 1991-04-08 | 1995-08-01 | Collins; Deborah L. | Method and apparatus for automated learning and performance evaluation |
US5442780A (en) * | 1991-07-11 | 1995-08-15 | Mitsubishi Denki Kabushiki Kaisha | Natural language database retrieval system using virtual tables to convert parsed input phrases into retrieval keys |
US5441415A (en) * | 1992-02-11 | 1995-08-15 | John R. Lee | Interactive computer aided natural learning method and apparatus |
US5511793A (en) * | 1992-06-08 | 1996-04-30 | Quantum Development, Inc. | Composite chess game and method |
US5519608A (en) * | 1993-06-24 | 1996-05-21 | Xerox Corporation | Method for extracting from a text corpus answers to questions stated in natural language by using linguistic analysis and hypothesis generation |
US5528491A (en) * | 1992-08-31 | 1996-06-18 | Language Engineering Corporation | Apparatus and method for automated natural language translation |
US5540589A (en) * | 1994-04-11 | 1996-07-30 | Mitsubishi Electric Information Technology Center | Audio interactive tutor |
US5597312A (en) * | 1994-05-04 | 1997-01-28 | U S West Technologies, Inc. | Intelligent tutoring method and system |
US5616033A (en) * | 1994-08-03 | 1997-04-01 | Kerwin; Patrick A. | Speed learning system computer based training |
US5618180A (en) * | 1993-07-09 | 1997-04-08 | Nathanson; Tedd | Method of teaching using a computer |
US5632624A (en) * | 1993-09-22 | 1997-05-27 | Brainchild, Inc. | Electronic study guide |
US5708822A (en) * | 1995-05-31 | 1998-01-13 | Oracle Corporation | Methods and apparatus for thematic parsing of discourse |
US5727950A (en) * | 1996-05-22 | 1998-03-17 | Netsage Corporation | Agent based instruction system and method |
US5749736A (en) * | 1995-03-22 | 1998-05-12 | Taras Development | Method and system for computerized learning, response, and evaluation |
US5768580A (en) * | 1995-05-31 | 1998-06-16 | Oracle Corporation | Methods and apparatus for dynamic classification of discourse |
US5788508A (en) * | 1992-02-11 | 1998-08-04 | John R. Lee | Interactive computer aided natural learning method and apparatus |
US5810605A (en) * | 1994-03-24 | 1998-09-22 | Ncr Corporation | Computerized repositories applied to education |
US5863208A (en) * | 1996-07-02 | 1999-01-26 | Ho; Chi Fai | Learning system and method based on review |
US5885087A (en) * | 1994-09-30 | 1999-03-23 | Robolaw Corporation | Method and apparatus for improving performance on multiple-choice exams |
US5957699A (en) * | 1997-12-22 | 1999-09-28 | Scientific Learning Corporation | Remote computer-assisted professionally supervised teaching system |
US6022221A (en) * | 1997-03-21 | 2000-02-08 | Boon; John F. | Method and system for short- to long-term memory bridge |
US6024577A (en) * | 1997-05-29 | 2000-02-15 | Fujitsu Limited | Network-based education system with capability to provide review material according to individual students' understanding levels |
US6029043A (en) * | 1998-01-29 | 2000-02-22 | Ho; Chi Fai | Computer-aided group-learning methods and systems |
US6039575A (en) * | 1996-10-24 | 2000-03-21 | National Education Corporation | Interactive learning system with pretest |
US6067538A (en) * | 1998-12-22 | 2000-05-23 | Ac Properties B.V. | System, method and article of manufacture for a simulation enabled focused feedback tutorial system |
US6077085A (en) * | 1998-05-19 | 2000-06-20 | Intellectual Reserve, Inc. | Technology assisted learning |
US6112049A (en) * | 1997-10-21 | 2000-08-29 | The Riverside Publishing Company | Computer network based testing system |
US6115683A (en) * | 1997-03-31 | 2000-09-05 | Educational Testing Service | Automatic essay scoring system using content-based techniques |
US6120297A (en) * | 1997-08-25 | 2000-09-19 | Lyceum Communication, Inc. | Vocabulary acquistion using structured inductive reasoning |
US6125358A (en) * | 1998-12-22 | 2000-09-26 | Ac Properties B.V. | System, method and article of manufacture for a simulation system for goal based education of a plurality of students |
US6168440B1 (en) * | 1993-02-05 | 2001-01-02 | National Computer Systems, Inc. | Multiple test item scoring system and method |
US6173251B1 (en) * | 1997-08-05 | 2001-01-09 | Mitsubishi Denki Kabushiki Kaisha | Keyword extraction apparatus, keyword extraction method, and computer readable recording medium storing keyword extraction program |
US6181909B1 (en) * | 1997-07-22 | 2001-01-30 | Educational Testing Service | System and method for computer-based automatic essay scoring |
US6186795B1 (en) * | 1996-12-24 | 2001-02-13 | Henry Allen Wilson | Visually reinforced learning and memorization system |
US6199034B1 (en) * | 1995-05-31 | 2001-03-06 | Oracle Corporation | Methods and apparatus for determining theme for discourse |
US6208832B1 (en) * | 1997-11-14 | 2001-03-27 | Sony Corporation | Learning system with response analyzer |
US6226611B1 (en) * | 1996-10-02 | 2001-05-01 | Sri International | Method and system for automatic text-independent grading of pronunciation for language instruction |
US6254395B1 (en) * | 1998-04-13 | 2001-07-03 | Educational Testing Service | System and method for automated testing of writing skill |
US6256399B1 (en) * | 1992-07-08 | 2001-07-03 | Ncs Pearson, Inc. | Method of distribution of digitized materials and control of scoring for open-ended assessments |
US6267601B1 (en) * | 1997-12-05 | 2001-07-31 | The Psychological Corporation | Computerized system and method for teaching and assessing the holistic scoring of open-ended questions |
US6282404B1 (en) * | 1999-09-22 | 2001-08-28 | Chet D. Linton | Method and system for accessing multimedia data in an interactive format having reporting capabilities |
US6287123B1 (en) * | 1998-09-08 | 2001-09-11 | O'brien Denis Richard | Computer managed learning system and data processing method therefore |
US6288753B1 (en) * | 1999-07-07 | 2001-09-11 | Corrugated Services Corp. | System and method for live interactive distance learning |
US6292792B1 (en) * | 1999-03-26 | 2001-09-18 | Intelligent Learning Systems, Inc. | System and method for dynamic knowledge generation and distribution |
US6295439B1 (en) * | 1997-03-21 | 2001-09-25 | Educational Testing Service | Methods and systems for presentation and evaluation of constructed responses assessed by human evaluators |
US6343935B1 (en) * | 2000-03-01 | 2002-02-05 | Castle Hill Learning Company, Llc | Computerized interactive educational method and apparatus for teaching vocabulary |
US6345270B1 (en) * | 1997-05-26 | 2002-02-05 | Fujitsu Limited | Data management system |
US6356864B1 (en) * | 1997-07-25 | 2002-03-12 | University Technology Corporation | Methods for analysis and evaluation of the semantic content of a writing based on vector length |
US6370355B1 (en) * | 1999-10-04 | 2002-04-09 | Epic Learning, Inc. | Blended learning educational system and method |
US6411924B1 (en) * | 1998-01-23 | 2002-06-25 | Novell, Inc. | System and method for linguistic filter and interactive display |
US20030027122A1 (en) * | 2001-07-18 | 2003-02-06 | Bjorn Stansvik | Educational device and method |
US20030031996A1 (en) * | 2001-08-08 | 2003-02-13 | Adam Robinson | Method and system for evaluating documents |
US6526257B2 (en) * | 2000-06-16 | 2003-02-25 | Kabushiki Kaisha Toshiba | Method and apparatus for distributing electrical question and corresponding video materials |
US20030049592A1 (en) * | 2000-03-24 | 2003-03-13 | Nam-Kyo Park | Database of learning materials and method for providing learning materials to a learner using computer system |
US6551109B1 (en) * | 2000-09-13 | 2003-04-22 | Tom R. Rudmik | Computerized method of and system for learning |
US6553382B2 (en) * | 1995-03-17 | 2003-04-22 | Canon Kabushiki Kaisha | Data management system for retrieving data based on hierarchized keywords associated with keyword names |
US20030077559A1 (en) * | 2001-10-05 | 2003-04-24 | Braunberger Alfred S. | Method and apparatus for periodically questioning a user using a computer system or other device to facilitate memorization and learning of information |
US6554618B1 (en) * | 2001-04-20 | 2003-04-29 | Cheryl B. Lockwood | Managed integrated teaching providing individualized instruction |
US6584470B2 (en) * | 2001-03-01 | 2003-06-24 | Intelliseek, Inc. | Multi-layered semiotic mechanism for answering natural language questions using document retrieval combined with information extraction |
US6585520B1 (en) * | 2001-08-03 | 2003-07-01 | Dennis R. Berman | Method and system for enhancing memorization by using a mnemonic display |
US20030129574A1 (en) * | 1999-12-30 | 2003-07-10 | Cerego Llc, | System, apparatus and method for maximizing effectiveness and efficiency of learning, retaining and retrieving knowledge and skills |
US20040002049A1 (en) * | 2002-07-01 | 2004-01-01 | Jay Beavers | Computer network-based, interactive, multimedia learning system and process |
US20040009462A1 (en) * | 2002-05-21 | 2004-01-15 | Mcelwrath Linda Kay | Learning system |
US6755661B2 (en) * | 2001-01-31 | 2004-06-29 | Fujitsu Limited | Method and system for performing adaptive test |
US6755662B2 (en) * | 2002-03-27 | 2004-06-29 | Fujitsu Limited | Method for presenting most suitable question and apparatus for presenting most suitable question |
US6769917B2 (en) * | 2002-03-27 | 2004-08-03 | Fujitsu Limited | Method for indicating defective part in educational material and apparatus for indicating defective part in educational material |
US20050003336A1 (en) * | 2003-07-02 | 2005-01-06 | Berman Dennis R. | Method and system for learning keyword based materials |
US6892181B1 (en) * | 2000-09-08 | 2005-05-10 | International Business Machines Corporation | System and method for improving the effectiveness of web advertising |
US6898411B2 (en) * | 2000-02-10 | 2005-05-24 | Educational Testing Service | Method and system for online teaching using web pages |
US7074128B2 (en) * | 2001-08-03 | 2006-07-11 | Drb Lit Ltd. | Method and system for enhancing memorization by using a mnemonic display |
Family Cites Families (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US531349A (en) * | 1894-12-25 | Rail-fastening | ||
US3408749A (en) | 1967-04-11 | 1968-11-05 | American Can Co | Branching-instruction teaching device |
US4055907A (en) * | 1976-06-09 | 1977-11-01 | Eugene Murl Henson | Character scanned teaching machine |
US4416454A (en) | 1979-09-07 | 1983-11-22 | Delamontagne Robert P | Management teaching game method |
JPS60148289A (en) * | 1984-01-11 | 1985-08-05 | Canon Inc | Image forming device |
GB2210722B (en) * | 1987-10-08 | 1992-03-25 | Video Technology Electronics L | Electronic instructional apparatus |
JPH021057A (en) | 1988-01-20 | 1990-01-05 | Ricoh Co Ltd | Document retrieving device |
DE4114070C2 (en) * | 1991-04-30 | 2001-07-12 | Hauni Werke Koerber & Co Kg | Glue application device for gluing wrapping paper of a product of the tobacco processing industry |
US6162060A (en) | 1991-08-09 | 2000-12-19 | Texas Instruments Incorporated | System and method for the delivery, authoring, and management of courseware over a computer network |
US5265065A (en) | 1991-10-08 | 1993-11-23 | West Publishing Company | Method and apparatus for information retrieval from a database by replacing domain specific stemmed phases in a natural language to create a search query |
US5692906A (en) | 1992-04-01 | 1997-12-02 | Corder; Paul R. | Method of diagnosing and remediating a deficiency in communications skills |
JPH05324726A (en) | 1992-05-25 | 1993-12-07 | Fujitsu Ltd | Document data classifying device and document classifying function constituting device |
US5565316A (en) * | 1992-10-09 | 1996-10-15 | Educational Testing Service | System and method for computer based testing |
US5475588A (en) | 1993-06-18 | 1995-12-12 | Mitsubishi Electric Research Laboratories, Inc. | System for decreasing the time required to parse a sentence |
JPH0756933A (en) | 1993-06-24 | 1995-03-03 | Xerox Corp | Method for retrieval of document |
US5810599A (en) * | 1994-01-26 | 1998-09-22 | E-Systems, Inc. | Interactive audio-visual foreign language skills maintenance system and method |
US5820386A (en) * | 1994-08-18 | 1998-10-13 | Sheppard, Ii; Charles Bradford | Interactive educational apparatus and method |
US5689716A (en) | 1995-04-14 | 1997-11-18 | Xerox Corporation | Automatic method of generating thematic summaries |
US5694523A (en) | 1995-05-31 | 1997-12-02 | Oracle Corporation | Content processing system for discourse |
US5823788A (en) | 1995-11-13 | 1998-10-20 | Lemelson; Jerome H. | Interactive educational system and method |
IL120622A (en) * | 1996-04-09 | 2000-02-17 | Raytheon Co | System and method for multimodal interactive speech and language training |
IL128979A (en) | 1996-09-25 | 2004-06-20 | Sylvan Learning Systems Inc | Automated testing and electronic instructional delivery and student management system |
JP2760352B1 (en) * | 1996-11-29 | 1998-05-28 | 日本電気株式会社 | Cell search circuit for CDMA |
US5978648A (en) | 1997-03-06 | 1999-11-02 | Forte Systems, Inc. | Interactive multimedia performance assessment system and process for use by students, educators and administrators |
WO1998043223A1 (en) | 1997-03-21 | 1998-10-01 | Educational Testing Service | System and method for on-line essay evaluation |
GB2338583B (en) | 1997-03-28 | 2001-01-03 | Softlight Inc | Evaluation based learning system |
US6632096B1 (en) * | 1997-05-26 | 2003-10-14 | Haruyuki Sumimoto | Method and apparatus for teaching and learning |
US6580157B2 (en) * | 1997-06-10 | 2003-06-17 | Micron Technology, Inc. | Assembly and method for modified bus bar with Kapton™ tape or insulative material in LOC packaged part |
US6155834A (en) | 1997-06-27 | 2000-12-05 | New, Iii; Cecil A. | Data driven interactive testing method, apparatus and article of manufacture for teaching a student to read |
US6311040B1 (en) | 1997-07-31 | 2001-10-30 | The Psychological Corporation | System and method for scoring test answer sheets having open-ended questions |
US6148174A (en) | 1997-11-14 | 2000-11-14 | Sony Corporation | Learning systems with patterns |
JPH11166886A (en) * | 1997-12-04 | 1999-06-22 | Hitachi Ltd | Liquid chromatograph device |
US6471521B1 (en) * | 1998-07-31 | 2002-10-29 | Athenium, L.L.C. | System for implementing collaborative training and online learning over a computer network and related techniques |
DE19943031C5 (en) * | 1998-10-27 | 2013-05-02 | Heidelberger Druckmaschinen Ag | Transmission for driving a printing press |
US6149441A (en) | 1998-11-06 | 2000-11-21 | Technology For Connecticut, Inc. | Computer-based educational system |
US5987443A (en) | 1998-12-22 | 1999-11-16 | Ac Properties B. V. | System, method and article of manufacture for a goal based educational system |
US6029158A (en) | 1998-12-22 | 2000-02-22 | Ac Properties B.V. | System, method and article of manufacture for a simulation enabled feedback system |
US6302698B1 (en) * | 1999-02-16 | 2001-10-16 | Discourse Technologies, Inc. | Method and apparatus for on-line teaching and learning |
US6636241B1 (en) * | 1999-07-27 | 2003-10-21 | International Business Machines Corporation | Method, system and program product for enhancing a computer user's comprehension of visually presented data |
US6662365B1 (en) * | 1999-08-17 | 2003-12-09 | Gateway, Inc. | Unified parental locks |
US20010036619A1 (en) * | 1999-10-28 | 2001-11-01 | Kerwin Patrick A. | Training method |
AU2001229482A1 (en) * | 2000-01-12 | 2001-07-24 | Indivisual Learning, Inc. | Methods and systems for multimedia education |
US6419496B1 (en) * | 2000-03-28 | 2002-07-16 | William Vaughan, Jr. | Learning method |
WO2001080202A2 (en) * | 2000-04-14 | 2001-10-25 | Theanswerpage, Inc. | A system and method for providing educational content over a network |
US6470170B1 (en) | 2000-05-18 | 2002-10-22 | Hai Xing Chen | System and method for interactive distance learning and examination training |
US6461166B1 (en) | 2000-10-17 | 2002-10-08 | Dennis Ray Berman | Learning system with learner-constructed response based testing methodology |
WO2002062339A1 (en) * | 2000-12-08 | 2002-08-15 | Smithkline Beecham Corporation | Antibacterial compounds |
US6978115B2 (en) * | 2001-03-29 | 2005-12-20 | Pointecast Corporation | Method and system for training in an adaptive manner |
US6634887B1 (en) * | 2001-06-19 | 2003-10-21 | Carnegie Mellon University | Methods and systems for tutoring using a tutorial model with interactive dialog |
US6644974B2 (en) * | 2001-07-24 | 2003-11-11 | International Business Machines Corporation | Educational process that produces deliverable document |
JP3995081B2 (en) * | 2002-03-27 | 2007-10-24 | 富士通株式会社 | Learning support method and learning support program |
US20030232312A1 (en) * | 2002-06-14 | 2003-12-18 | Newsom C. Mckeller | Method and system for instantly communicating, translating, and learning a secondary language |
US6832195B2 (en) * | 2002-07-03 | 2004-12-14 | Sony Ericsson Mobile Communications Ab | System and method for robustly detecting voice and DTX modes |
FR2842651B1 (en) * | 2002-07-17 | 2005-07-08 | METHOD FOR SMOOTHING THE CONTOUR OF A USEFUL LAYER OF MATERIAL REFLECTED ON A SUPPORT SUBSTRATE | |
US8491311B2 (en) * | 2002-09-30 | 2013-07-23 | Mind Research Institute | System and method for analysis and feedback of student performance |
-
2004
- 2004-03-31 US US10/815,341 patent/US7364432B2/en not_active Expired - Lifetime
- 2004-05-28 CA CA002469384A patent/CA2469384C/en not_active Expired - Fee Related
-
2005
- 2005-02-09 US US11/055,186 patent/US7390191B2/en not_active Expired - Lifetime
- 2005-02-09 US US11/055,306 patent/US20050233293A1/en not_active Abandoned
- 2005-06-17 US US11/156,286 patent/US20050233291A1/en not_active Abandoned
- 2005-08-04 US US11/198,946 patent/US20050282135A1/en not_active Abandoned
-
2006
- 2006-07-28 US US11/495,063 patent/US20070009873A1/en not_active Abandoned
- 2006-07-31 US US11/496,223 patent/US20070009875A1/en not_active Abandoned
- 2006-07-31 US US11/496,198 patent/US20070009874A1/en not_active Abandoned
- 2006-07-31 US US11/496,246 patent/US20070009876A1/en not_active Abandoned
- 2006-07-31 US US11/496,337 patent/US20070009878A1/en not_active Abandoned
- 2006-07-31 US US11/496,293 patent/US20070009877A1/en not_active Abandoned
-
2008
- 2008-09-18 US US12/212,937 patent/US20090023125A1/en not_active Abandoned
Patent Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3606688A (en) * | 1968-07-19 | 1971-09-21 | Associated Research Lab Propri | Method and apparatus for teaching a multiplicity of students |
US3566482A (en) * | 1968-10-24 | 1971-03-02 | Data Plex Systems | Educational device |
US3671668A (en) * | 1968-11-18 | 1972-06-20 | Leonard Reiffel | Teaching system employing a television receiver |
US3715811A (en) * | 1970-10-13 | 1973-02-13 | Westinghouse Electric Corp | Remedial branching teaching system |
US4690664A (en) * | 1978-11-02 | 1987-09-01 | Dayco Products, Inc. | Toothed belt |
US4289313A (en) * | 1979-09-07 | 1981-09-15 | Delamontagne Robert P | Management teaching game apparatus and method |
US4690644A (en) * | 1984-12-21 | 1987-09-01 | Flanders Robert G | Teaching apparatus, particularly for teaching shorthand |
US4817036A (en) * | 1985-03-15 | 1989-03-28 | Brigham Young University | Computer system and method for data base indexing and information retrieval |
US5002865A (en) * | 1985-04-24 | 1991-03-26 | Konica Corporation | Silver halide photographic material |
US4690645A (en) * | 1985-08-30 | 1987-09-01 | Epoch Company, Ltd. | Interactive educational device |
US4833610A (en) * | 1986-12-16 | 1989-05-23 | International Business Machines Corporation | Morphological/phonetic method for ranking word similarities |
US4770636A (en) * | 1987-04-10 | 1988-09-13 | Albert Einstein College Of Medicine Of Yeshiva University | Cognometer |
US4895518A (en) * | 1987-11-02 | 1990-01-23 | The University Of Michigan | Computerized diagnostic reasoning evaluation system |
US4891011A (en) * | 1988-07-13 | 1990-01-02 | Cook Graham D | System for assisting the learning of a subject |
US4958284A (en) * | 1988-12-06 | 1990-09-18 | Npd Group, Inc. | Open ended question analysis system and method |
US5002491A (en) * | 1989-04-28 | 1991-03-26 | Comtek | Electronic classroom system enabling interactive self-paced learning |
US5011413A (en) * | 1989-07-19 | 1991-04-30 | Educational Testing Service | Machine-interpretable figural response testing |
US5033969A (en) * | 1989-07-21 | 1991-07-23 | Pioneer Electronic Corporation | Support device for resolving questions about reproduced information |
US5112064A (en) * | 1990-06-13 | 1992-05-12 | Weedman Gail H | Psychology game |
US5424947A (en) * | 1990-06-15 | 1995-06-13 | International Business Machines Corporation | Natural language analyzing apparatus and method, and construction of a knowledge base for natural language analysis |
US5307266A (en) * | 1990-08-22 | 1994-04-26 | Hitachi, Ltd. | Information processing system and method for processing document by using structured keywords |
US5314340A (en) * | 1990-10-30 | 1994-05-24 | Texas Instruments Incorporated | Electronic teaching apparatus having two-part partially and wholly actuated for indication of correct and incorrect answers |
US5437553A (en) * | 1991-04-08 | 1995-08-01 | Collins; Deborah L. | Method and apparatus for automated learning and performance evaluation |
US5442780A (en) * | 1991-07-11 | 1995-08-15 | Mitsubishi Denki Kabushiki Kaisha | Natural language database retrieval system using virtual tables to convert parsed input phrases into retrieval keys |
US5246375A (en) * | 1991-09-23 | 1993-09-21 | Wouter Goede | Memory aiding device |
US5141439A (en) * | 1991-12-09 | 1992-08-25 | Cousins Edward J | Keyword teaching and testing method |
US5441415A (en) * | 1992-02-11 | 1995-08-15 | John R. Lee | Interactive computer aided natural learning method and apparatus |
US5788508A (en) * | 1992-02-11 | 1998-08-04 | John R. Lee | Interactive computer aided natural learning method and apparatus |
US5325465A (en) * | 1992-03-04 | 1994-06-28 | Singapore Computer Systems Limited | End user query facility |
US5310349A (en) * | 1992-04-30 | 1994-05-10 | Jostens Learning Corporation | Instructional management system |
US5511793A (en) * | 1992-06-08 | 1996-04-30 | Quantum Development, Inc. | Composite chess game and method |
US6256399B1 (en) * | 1992-07-08 | 2001-07-03 | Ncs Pearson, Inc. | Method of distribution of digitized materials and control of scoring for open-ended assessments |
US5528491A (en) * | 1992-08-31 | 1996-06-18 | Language Engineering Corporation | Apparatus and method for automated natural language translation |
US6168440B1 (en) * | 1993-02-05 | 2001-01-02 | National Computer Systems, Inc. | Multiple test item scoring system and method |
US5519608A (en) * | 1993-06-24 | 1996-05-21 | Xerox Corporation | Method for extracting from a text corpus answers to questions stated in natural language by using linguistic analysis and hypothesis generation |
US5384703A (en) * | 1993-07-02 | 1995-01-24 | Xerox Corporation | Method and apparatus for summarizing documents according to theme |
US5618180A (en) * | 1993-07-09 | 1997-04-08 | Nathanson; Tedd | Method of teaching using a computer |
US5632624A (en) * | 1993-09-22 | 1997-05-27 | Brainchild, Inc. | Electronic study guide |
US5810605A (en) * | 1994-03-24 | 1998-09-22 | Ncr Corporation | Computerized repositories applied to education |
US5540589A (en) * | 1994-04-11 | 1996-07-30 | Mitsubishi Electric Information Technology Center | Audio interactive tutor |
US5597312A (en) * | 1994-05-04 | 1997-01-28 | U S West Technologies, Inc. | Intelligent tutoring method and system |
US5616033A (en) * | 1994-08-03 | 1997-04-01 | Kerwin; Patrick A. | Speed learning system computer based training |
US5885087A (en) * | 1994-09-30 | 1999-03-23 | Robolaw Corporation | Method and apparatus for improving performance on multiple-choice exams |
US6086382A (en) * | 1994-09-30 | 2000-07-11 | Robolaw Corporation | Method and apparatus for improving performance on multiple-choice exams |
US6553382B2 (en) * | 1995-03-17 | 2003-04-22 | Canon Kabushiki Kaisha | Data management system for retrieving data based on hierarchized keywords associated with keyword names |
US5749736A (en) * | 1995-03-22 | 1998-05-12 | Taras Development | Method and system for computerized learning, response, and evaluation |
US5768580A (en) * | 1995-05-31 | 1998-06-16 | Oracle Corporation | Methods and apparatus for dynamic classification of discourse |
US6199034B1 (en) * | 1995-05-31 | 2001-03-06 | Oracle Corporation | Methods and apparatus for determining theme for discourse |
US5708822A (en) * | 1995-05-31 | 1998-01-13 | Oracle Corporation | Methods and apparatus for thematic parsing of discourse |
US5727950A (en) * | 1996-05-22 | 1998-03-17 | Netsage Corporation | Agent based instruction system and method |
US5863208A (en) * | 1996-07-02 | 1999-01-26 | Ho; Chi Fai | Learning system and method based on review |
US6226611B1 (en) * | 1996-10-02 | 2001-05-01 | Sri International | Method and system for automatic text-independent grading of pronunciation for language instruction |
US6039575A (en) * | 1996-10-24 | 2000-03-21 | National Education Corporation | Interactive learning system with pretest |
US6186795B1 (en) * | 1996-12-24 | 2001-02-13 | Henry Allen Wilson | Visually reinforced learning and memorization system |
US6295439B1 (en) * | 1997-03-21 | 2001-09-25 | Educational Testing Service | Methods and systems for presentation and evaluation of constructed responses assessed by human evaluators |
US6526258B2 (en) * | 1997-03-21 | 2003-02-25 | Educational Testing Service | Methods and systems for presentation and evaluation of constructed responses assessed by human evaluators |
US6022221A (en) * | 1997-03-21 | 2000-02-08 | Boon; John F. | Method and system for short- to long-term memory bridge |
US6115683A (en) * | 1997-03-31 | 2000-09-05 | Educational Testing Service | Automatic essay scoring system using content-based techniques |
US6345270B1 (en) * | 1997-05-26 | 2002-02-05 | Fujitsu Limited | Data management system |
US6024577A (en) * | 1997-05-29 | 2000-02-15 | Fujitsu Limited | Network-based education system with capability to provide review material according to individual students' understanding levels |
US6181909B1 (en) * | 1997-07-22 | 2001-01-30 | Educational Testing Service | System and method for computer-based automatic essay scoring |
US6356864B1 (en) * | 1997-07-25 | 2002-03-12 | University Technology Corporation | Methods for analysis and evaluation of the semantic content of a writing based on vector length |
US6173251B1 (en) * | 1997-08-05 | 2001-01-09 | Mitsubishi Denki Kabushiki Kaisha | Keyword extraction apparatus, keyword extraction method, and computer readable recording medium storing keyword extraction program |
US6120297A (en) * | 1997-08-25 | 2000-09-19 | Lyceum Communication, Inc. | Vocabulary acquistion using structured inductive reasoning |
US6112049A (en) * | 1997-10-21 | 2000-08-29 | The Riverside Publishing Company | Computer network based testing system |
US6208832B1 (en) * | 1997-11-14 | 2001-03-27 | Sony Corporation | Learning system with response analyzer |
US6267601B1 (en) * | 1997-12-05 | 2001-07-31 | The Psychological Corporation | Computerized system and method for teaching and assessing the holistic scoring of open-ended questions |
US5957699A (en) * | 1997-12-22 | 1999-09-28 | Scientific Learning Corporation | Remote computer-assisted professionally supervised teaching system |
US6411924B1 (en) * | 1998-01-23 | 2002-06-25 | Novell, Inc. | System and method for linguistic filter and interactive display |
US6029043A (en) * | 1998-01-29 | 2000-02-22 | Ho; Chi Fai | Computer-aided group-learning methods and systems |
US6254395B1 (en) * | 1998-04-13 | 2001-07-03 | Educational Testing Service | System and method for automated testing of writing skill |
US6077085A (en) * | 1998-05-19 | 2000-06-20 | Intellectual Reserve, Inc. | Technology assisted learning |
US6287123B1 (en) * | 1998-09-08 | 2001-09-11 | O'brien Denis Richard | Computer managed learning system and data processing method therefore |
US6125358A (en) * | 1998-12-22 | 2000-09-26 | Ac Properties B.V. | System, method and article of manufacture for a simulation system for goal based education of a plurality of students |
US6067538A (en) * | 1998-12-22 | 2000-05-23 | Ac Properties B.V. | System, method and article of manufacture for a simulation enabled focused feedback tutorial system |
US6292792B1 (en) * | 1999-03-26 | 2001-09-18 | Intelligent Learning Systems, Inc. | System and method for dynamic knowledge generation and distribution |
US6288753B1 (en) * | 1999-07-07 | 2001-09-11 | Corrugated Services Corp. | System and method for live interactive distance learning |
US6282404B1 (en) * | 1999-09-22 | 2001-08-28 | Chet D. Linton | Method and system for accessing multimedia data in an interactive format having reporting capabilities |
US6370355B1 (en) * | 1999-10-04 | 2002-04-09 | Epic Learning, Inc. | Blended learning educational system and method |
US20030129574A1 (en) * | 1999-12-30 | 2003-07-10 | Cerego Llc, | System, apparatus and method for maximizing effectiveness and efficiency of learning, retaining and retrieving knowledge and skills |
US6898411B2 (en) * | 2000-02-10 | 2005-05-24 | Educational Testing Service | Method and system for online teaching using web pages |
US6343935B1 (en) * | 2000-03-01 | 2002-02-05 | Castle Hill Learning Company, Llc | Computerized interactive educational method and apparatus for teaching vocabulary |
US20030049592A1 (en) * | 2000-03-24 | 2003-03-13 | Nam-Kyo Park | Database of learning materials and method for providing learning materials to a learner using computer system |
US6526257B2 (en) * | 2000-06-16 | 2003-02-25 | Kabushiki Kaisha Toshiba | Method and apparatus for distributing electrical question and corresponding video materials |
US6892181B1 (en) * | 2000-09-08 | 2005-05-10 | International Business Machines Corporation | System and method for improving the effectiveness of web advertising |
US6551109B1 (en) * | 2000-09-13 | 2003-04-22 | Tom R. Rudmik | Computerized method of and system for learning |
US6755661B2 (en) * | 2001-01-31 | 2004-06-29 | Fujitsu Limited | Method and system for performing adaptive test |
US6584470B2 (en) * | 2001-03-01 | 2003-06-24 | Intelliseek, Inc. | Multi-layered semiotic mechanism for answering natural language questions using document retrieval combined with information extraction |
US6554618B1 (en) * | 2001-04-20 | 2003-04-29 | Cheryl B. Lockwood | Managed integrated teaching providing individualized instruction |
US20030027122A1 (en) * | 2001-07-18 | 2003-02-06 | Bjorn Stansvik | Educational device and method |
US6585520B1 (en) * | 2001-08-03 | 2003-07-01 | Dennis R. Berman | Method and system for enhancing memorization by using a mnemonic display |
US7074128B2 (en) * | 2001-08-03 | 2006-07-11 | Drb Lit Ltd. | Method and system for enhancing memorization by using a mnemonic display |
US20030031996A1 (en) * | 2001-08-08 | 2003-02-13 | Adam Robinson | Method and system for evaluating documents |
US20030077559A1 (en) * | 2001-10-05 | 2003-04-24 | Braunberger Alfred S. | Method and apparatus for periodically questioning a user using a computer system or other device to facilitate memorization and learning of information |
US6755662B2 (en) * | 2002-03-27 | 2004-06-29 | Fujitsu Limited | Method for presenting most suitable question and apparatus for presenting most suitable question |
US6769917B2 (en) * | 2002-03-27 | 2004-08-03 | Fujitsu Limited | Method for indicating defective part in educational material and apparatus for indicating defective part in educational material |
US20040009462A1 (en) * | 2002-05-21 | 2004-01-15 | Mcelwrath Linda Kay | Learning system |
US20040002049A1 (en) * | 2002-07-01 | 2004-01-01 | Jay Beavers | Computer network-based, interactive, multimedia learning system and process |
US20050003336A1 (en) * | 2003-07-02 | 2005-01-06 | Berman Dennis R. | Method and system for learning keyword based materials |
Also Published As
Publication number | Publication date |
---|---|
US20050233291A1 (en) | 2005-10-20 |
US7364432B2 (en) | 2008-04-29 |
US20050233293A1 (en) | 2005-10-20 |
US20070009873A1 (en) | 2007-01-11 |
US20050221267A1 (en) | 2005-10-06 |
US20070009875A1 (en) | 2007-01-11 |
US20090023125A1 (en) | 2009-01-22 |
US20070009877A1 (en) | 2007-01-11 |
US20050233292A1 (en) | 2005-10-20 |
US20070009874A1 (en) | 2007-01-11 |
CA2469384C (en) | 2009-01-27 |
US7390191B2 (en) | 2008-06-24 |
CA2469384A1 (en) | 2005-09-30 |
US20050282135A1 (en) | 2005-12-22 |
US20070009878A1 (en) | 2007-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7390191B2 (en) | Computer system configured to sequence multi-day training utilizing a database | |
US20080076109A1 (en) | Lock-in training system | |
US6112049A (en) | Computer network based testing system | |
JP6606750B2 (en) | E-learning system | |
US20120231441A1 (en) | System and method for virtual content collaboration | |
Piskurich | Getting the most from online learning: A learner's guide | |
TW201241799A (en) | System and method for adaptive knowledge assessment and learning | |
US20050277102A1 (en) | Methods and systems for interactive learning and other information exchanges, such as for use in a mobile learning environment | |
US20220215776A1 (en) | Language Fluency System | |
CA2607974A1 (en) | System and method for learning languages | |
Papageorgiou et al. | Maintaining access to a large-scale test of academic language proficiency during the pandemic: The launch of TOEFL iBT Home Edition | |
WO2015047424A1 (en) | Personalized learning system and method thereof | |
Mannion | From face-to-face to flipped: strategic adaptation of library instruction during a pandemic | |
JP2006343602A (en) | Learning support system | |
JP2002268527A (en) | Teaching material providing and managing system and teaching material providing and managing method | |
JP6982918B1 (en) | Education support software | |
Boysen et al. | CLASSNET: Automated support of web classes | |
JP2002221892A (en) | Education support system | |
Mukhamejanova | Challenges and Benefits of Using a Qualitative Survey to Study Prospective Teachers’ Meaning Making Process | |
Favaloro | Are Internet Self-Efficacy and Ethical and Legal Self-Efficacy Related in Counselors? | |
Yearwood | A comparative analysis of interactive multimedia and instructor-led demonstration in teaching operation of networked computers | |
Ryu | An experimental investigation on the effects of learning style and presentation methods on knowledge acquisition in a university classroom environment | |
Fansler | A taxonomy of asynchronous online education: Establishing the phenomenon | |
Peters | Self-regulated learning and the Internet: Volitional control while searching for information in a hyper-based learning environment that contains intentional distracters | |
Van de Keere | Building basic skills for e-learning: Adults with developmental disabilities go online |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BERMAN, DENNIS R, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNOR:DRB LIT LTD.;REEL/FRAME:019181/0279 Effective date: 20070101 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: DRB LIT LTD., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BERMAN, DENNIS R.;REEL/FRAME:032370/0618 Effective date: 20140131 |