Which of the following are the characteristics of criteron‐referenced‐interpretation of test scores? A. Achievement of specific skills or concepts by each individual learner is assessed. B. Instructional objectives are based on identified skills, rather than on broader learning. C. Test‐items discriminate between examinees in terms of their relative postions in the group tested. D. Scores are expressed in terms of percentile ranks or stanines to ensure inter‐examinee comparison. E. An examinee can compare his own performance in terms of development of skills over testing occasions. Choose the correct answer from the options given below.

Which of the following are the characteristics of criteron‐referenced‐interpretation of test scores? A. Achievement of specific skills or concepts by each individual learner is assessed. B. Instructional objectives are based on identified skills, rather than on broader learning. C. Test‐items discriminate between examinees in terms of their relative postions in the group tested. D. Scores are expressed in terms of percentile ranks or stanines to ensure inter‐examinee comparison. E. An examinee can compare his own performance in terms of development of skills over testing occasions. Choose the correct answer from the options given below. Correct Answer A, B and E

The reference standard is the test, combination of tests, or procedure that is considered the best available method of categorising participants in a study of diagnostic test accuracy as having or not having a target condition. 

Key Points

  • The criterion-referenced test definition states that this type of assessment compares a student’s academic achievement to a set of criteria or standards.
  • This norm or criteria is established before candidates begin the test
  • Usually, schools or districts set the standard as a percentage. The test-taker’s score shows how far they’ve progressed toward the approved standard.
  • If they miss the mark, they must work harder.

Important Points

  • Criterion-referenced evaluations are used in schools to examine specific knowledge and abilities that students have most likely gained.
  • This determines how close they are to mastering a standard. They allow teachers to assess how they can assist students improve in specific areas and the teacher can compare the performance in terms of development of skills over testing occasions.
  • Criterion-referenced evaluations will show you where your learners are in terms of an accepted standard, allowing you to tailor instructions and assistance for students. 
  • Criterion-referenced assessment examples include driving tests, end-of-unit exams in school, clinical skill competency tools, etc.

Thus A, B and E points are valid in context to criterion reference test.

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.