Which of the following statements represent best relation between teaching and learning? I) Real learning takes place when memory level teaching takes place. II) Teaching and learning go together. III) If there is no teaching there won't be learning. IV) The aim of lecturing ensure learning.

Which of the following statements represent best relation between teaching and learning? I) Real learning takes place when memory level teaching takes place. II) Teaching and learning go together. III) If there is no teaching there won't be learning. IV) The aim of lecturing ensure learning. Correct Answer II, IV

In the teaching and learning process, communication between a teacher and a student is concerned with the transmission of a message either to increase a student's knowledge or to change his attitudes, his beliefs, or his behavior in some way. Learning can be defined as a process of acquiring knowledge or changing attitudes, behavior, or beliefs by interaction with outside events. 

Teaching-learning Process

  • Teaching is a social act because the teacher has to interact with many persons in his/her profession. He/she has to play diverse roles like a planner, facilitator, co-creator of knowledge, leader in the classroom and outside the classroom, manager, counselor, and apart from that, a true human being. learning as a personal act holds that every individual is responsible for his or her own learning. Every child learns at his/her own pace and constructs his/her knowledge actively.
  • Teaching is an interaction and is triadic in nature because It is a product of interactions between three components of the triadic model; Teaching, subject matter, and learning. Learning is an active engagement in acquiring the knowledge and experience related to the particular subject domain.

Important Points

  • Teaching is a process that involves a series of actions leading to certain outcomes (learning). Teaching, like any other concept, involves certain characteristics. Student learning depends on the quality of teaching to a great extent. Successful teachers know that students pay attention to what they teach.​ Therefore, The aim of lecturing ensures learning.
  • Learning and teaching go hand in hand – Teaching is the process of imparting information and Learning is the process of receiving knowledge vice-a-versa.

Key Points

  • Learning is a lifelong process that can take place without teaching as well, Learning can be done independently through introspection, experience, discovery.
  • Teaching and learning take place at three levels progressively- memory level of teaching, understanding level of teaching, and reflective level of teaching. All three levels are independently important in this process.

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.