To allow External Examiners access to module information, assessment requirements and samples of student work, you will need to do the following:
...
To allow External Examiners access to module information, assessment requirements and samples of student work, you will need to do the following:
...
Please note, you cannot record a Teams call, it has to be in a meeting.
When you are in your Teams meeting, select the More icon at the top of the page, and select Record and transcribe > Start recording....
Conditional formatting is a feature that has a variety of uses. Mainly surrounding different ways of displaying data corresponding to the value found within the cell or range of data. This can help you visualise the data faster...
With Microsoft Forms you can create a form, such as a survey or quiz, invite others to respond to it using almost any web browser or mobile device, see real-time results as they're submitted, use built-in analytics to evaluate responses, and export results to Excel for additional analysis or...
This page contains broad information around the following:
On University computers the Staff intranet is the home page for both Chrome and Edge or it can be accessed from the Start menu.
On personal devices you can access it by visiting staffnet.chi.ac.uk, or from the Staff/student links on the main website....
Hybrid Teaching is where timetabled teaching is delivered where participants (tutors and/or students) are at the same time in the classroom and online. The hybrid model of teaching and learning uses both online and in-person options in a purposeful way. Not only does this model give increased...
The restrict access feature enables lecturers to restrict the availability of any activity or even a course section according to certain conditions such as user, dates, grade obtained, group or activity completion.
For example if you need to set up an assignment link for specific students...
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
Self-service machines are available to issue, renew and return books, using your campus ID card. Follow the on-screen instructions at the...