Blog Archives

How do we blacklist spam mail in the form of comment?

There are occasion that some one keep on bombarding your blog with lenghty “comment” in enormous quantity, you can mark it as “SPAM” by: In the dashboard view, click “Settings” > Discussion > Comment Blacklist > Enter the IP Address or any

Posted in Latest News

MS PowerPoint 2013 – Pass through obstacles

Another experiment with MS PowerPoint: Kan, Sumitra Fong Kuen. (2014). MS PowerPoint 2013 – Pass through obstacle. Read More … >

Posted in Latest News

MS PowerPoint – Text Effects

Another experiment with text animation with MS PowerPoint:   Kan, Sumitra Fong Kuen. (2014). MS PowerPoint 2010: Demo text effect. Read More … >

Posted in Latest News

Shooting Star Effect in PowerPoint

Just trying out special effects in PowerPoint. Kan, Sumitra Fong Kuen. (2014). Shooting Star.  

Posted in Latest News

What have you learned from the blog creation process?

What have you gained from the process of doing this assignment? Theory and concept application? Technical skills acquired? Values that were internalized? Perception of Integrating ICT, especially Web 2.0 technology in teaching and learning? What have you learned from your

Posted in Latest News

Why are you required to apply instructional design model(s) in your assignment?

Well, this is a step by step guide for you to build your blog and create your teaching and learning resources! If you use the ADDIE model, definitely you know what you want to do with the blog: Analysis (need

Posted in Latest News

The code of conduct for a TEACHER

We have CHOSEN the teaching profession, and willingly SIGNED the contract to receive the training programme. Are we mentally prepared and psychologically committed to become a TEACHER? A teacher trains and prepares the citizens as: future leaders who are capable and wise

Posted in Latest News

Plagiarism is UNETHICAL!

We are using online Plagiarism Checker to detect any COPY AND PASTE of the original article into the essay WITHOUT ACKNOWLEDGEMENT! Unfortunately, I came across such unethical acts among TLS2 students! We do refer to articles for information but need

Posted in Latest News

Referencing style and resources in your assignment

The generally accepted practice is: Read the first hand information, i.e. the original author and his (her) genuine work. When an author quotes the other author’s works and ideas, based on his(her) perception and opinion, he(she) had  selectively highlighting certain ideas and

Posted in Latest News

Do not disclose personal details online

Learn and embrace the good practice such as revealing little or no personal details at all online! The personal details such as IC number, birthday, hand phone number, address, your where about, relationship, feelings and activities which are too personal

Posted in Latest News


The Present Moment!

white-blue-peacockMay this experience of Integrating ICT in the teaching and learning for enhancing the process be an enjoyable one!

Carañce nādhigaccheyya
seyyaṃ sadisamattano,
ekacariyaṃ daḷhaṃ kayirā;
natthi bāle sahāyatā.

Should a seeker not find
a companion who is better or equal,
let one resolutely pursue a solitary course;
there is no fellowship with the fool.

Dhammapada 5.61

Recent Comments

    Blog Traffic


    Pages|Hits |Unique

    • Last 24 hours: 0
    • Last 7 days: 0
    • Last 30 days: 0
    • Online now: 0
    fabricant de lanterneaux