Posted on August 26, 2019
…enter the name, title, and e-mail of the person who completed this questionnaire. Name: ___________________________________________ Title: ___________________________________________ E-mail: ___________________________________________ General Comments: 15. May we contact you to obtain additional information…
Posted on November 21, 2019
…an institution to be considered or not for a Designation. 5. There are two columns for your comments. The column for “Confidential Review Comments (Feedback to the Institution)” will be…
Posted on February 5, 2019
…ity connection self -reflection educate action understand communicate curiosity challenge create achievement connection self -reflection understand communicate l isten learn access quality action educate action understand communicate l isten learn…
…work through their questions and issues. I provide written feedback on the process assignments using the comment option in the Wiki I use for the course (pbworks.com). This assignment can…
Posted on September 4, 2018
…must be implemented by a group of players, rather than individuals. About a 9 minute read. http://eaves.ca/2013/11/07/what-werewolf-teaches-us-about-trust-security/ Video A one-hour run through video of a game being played. https://www.youtube.com/watch?v=oO35zA8Uua4 …