ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Students Shocked to Learn Their Online Teaching Assistant is Actually AI

Students Shocked to Learn Their Online Teaching Assistant is Actually AI

More students today are earning online degrees than ever before. Thanks to online learning management systems, the classroom experience can marginally be replicated in an online environment. One of the biggest problems associated with online teaching, however, is that students have trouble getting the attention they deserve. Enter: Artificially intelligent teaching assistants.

Teaching assistants have traditionally acted as an aid to the professor who’s teaching the class. Depending on the professor’s workload, they would handle duties like administering tests, handing out homework assignments, and most important of all, helping students who need questions answered or don’t fully understand the topic at hand. If students don’t get this attention, they often will find themselves stressed to the point of dropping out or failing the class.

In order to fill this deficit in assistance, universities have been experimenting with artificially intelligent “robots” that are capable of helping students get the help they need. Jill Watson, a robot used as a TA for a Knowledge-Based Artificial Intelligence class at the Georgia Institute of Technology, was built to help students grasp the core curriculum of the class. In fact, she was so helpful that the students didn’t even know she was a robot!

For those unfamiliar with how online teaching works, most learning systems use a discussion board interface that allows students to ask questions and receive help from TAs or the professor. ComputerWorld reports that the KBAI class is offered every semester and sees roughly 10,000 messages in its online forums, all of which need an answer. Naturally, this is far too many questions for any one professor to respond to, so implementing TAs and AI was a natural step forward.

Ashok Goel, the professor in charge of teaching the KBAI class, and his team of graduate students, trained Jill on the 40,000 potential questions that have been asked since the class was first introduced in the fall of 2014. As you might expect, students ask a ton of questions, with many of them being the same, which makes AI an attractive choice for responding to these inquiries.

Jill’s first few weeks working as a TA were a bit rocky. Her answers were often unrelated to the topic or taken out of context based on keywords. Once the engineers who designed her tinkered with her a bit, she was capable of answering questions accurately about 97 percent of the time. ComputerWorld states: “Initially, the human TAs would upload her successful responses to the students, but by the end of March, Jill didn’t need any assistance. She wrote to the class directly if she was 97 percent positive her answer was correct.”

This recent technology is also being used for many businesses. Utilizing automated “chatbot” solutions, businesses can divert some of their basic support to a carefully programmed AI. This AI is simply taught to look for certain keywords in questions, and then pulls up the appropriate answer to help the customer. In the event that the chatbot’s resources are exhausted and it can’t help the customer, it will drive the customer to a live person for a more hands-on approach. These solutions are reachable for small businesses, too - many of them just require time and careful planning to set up, so if you are tracking the types of questions that often bog down your customer service, you can automate them.

As the ability to differentiate between a robot and a human continues to decrease, what’s next for the world of artificial intelligence? Will we have AI teachers in the future? Can this be considered a good development? Share your thoughts in the comments, and be sure to subscribe to ClearView IT’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Communication Managed IT Services Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Passwords Disaster Recovery Holiday Browser Apps Windows 10 IT Support Managed Service Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Gadgets Networking Windows Workplace Strategy Artificial Intelligence Managed IT services Server WiFi Bandwidth Encryption Blockchain Mobile Device Management Business Technology App Virtualization Information Spam Remote Budget Gmail History Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Data Security Cybercrime Wi-Fi BDR Big Data Conferencing Health Analytics Access Control Save Money Patch Management Voice over Internet Protocol Compliance Remote Monitoring Help Desk Employer-Employee Relationship Hacking Cost Management IT Management Training Document Management Remote Computing Vendor Hacker Vulnerabilities Customer Service Unified Threat Management Firewall Mobile Office Augmented Reality Word Project Management BYOD Managed Services IBM Website Computing Search... Data loss Best Practice Vendor Management Hard Drive Retail Alert Legal Hiring/Firing Outlook Applications Password Data storage Money Windows 11 Chrome Social Monitoring Sports Travel SaaS DDoS Virtual Reality Healthcare Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Remote Workers iPhone Cleaning Mobile Computing Maintenance Education Windows 7 Cortana Free Resource Robot Content Filtering Marketing Running Cable How To Websites Router Storage Meetings Mobility The Internet of Things YouTube Twitter Google Maps Scam Law Enforcement End of Support Data Breach Laptop Printer User VPN Update Virtual Desktop Virtual Machines Computer Repair Experience Google Docs Bluetooth Taxes Multi-factor Authentication Distributed Denial of Service Professional Services Office Tips Memory PowerPoint Private Cloud Administration Saving Time Disaster Presentation Physical Security Managed Services Provider Computers Bitcoin Specifications Virtual Private Network Politics IT Consultant Settings Lithium-ion battery Telephone Machine Learning Customer Relationship Management Current Events Start Menu Computer Care Co-Managed IT Solid State Drive Downloads Excel Solutions Processors Entertainment Vulnerability Integration Chromebook Software as a Service Drones Images 101 Display Data Protection Automobile Virtual Assistant How To Employees Avoiding Downtime Wireless Technology Microchip HIPAA eWaste Flexibility Holidays Processor Downtime Tech Terms Hack Cooperation Safety Identity Theft Video Conferencing Notifications Managed IT Digital Unified Communications Administrator SharePoint News Medical IT Text Messaging Proactive IT Digital Payment User Tip Shopping Legislation Evernote Paperless Network Management SQL Server Bring Your Own Device Worker Access PCI DSS Licensing Emails Humor Fake News Supply Chain Time Management Inbound Marketing Music Public Cloud Proxy Server Gig Economy Business Communications Service Level Agreement Internet Service Provider Computing Infrastructure Azure Staffing IP Address Spyware Management Regulations Compliance Device security Managed IT Service Audit Wireless Headphones Memes Botnet Microsoft Excel Workplace File Sharing Tech Human Resources Going Green Net Neutrality Business Cards Rental Service Redundancy Electronic Payment Micrsooft Flash Cache Error Financial Data IT Scams Telephone Systems Unified Threat Management Business Growth Workers Bookmark Risk Management Term Google Apps Download Piracy Recovery Competition Phone System CCTV Telework HTML Printing Nanotechnology Communitications LiFi Microsoft 365 Cables Banking Touchscreen Entrepreneur Google Wallet Browsers Smartwatch Google Play Computer Malfunction Upload Procurement Software License Documents Messenger Emergency Application Deep Learning Vendor Mangement Business Intelligence Social Network FinTech Screen Reader IT Assessment Point of Sale Business Metrics Hosted Solution Samsung Computer Accessories Data Analysis CES Security Cameras Webcam Trends Supply Chain Management Mobile Technology Value Securty Books Uninterrupted Power Supply Shortcuts Domains Language Business Mangement Society Customer Resource management Organization Devices Cyber security Smart Devices Tip of the week Tablets Fileless Malware Visible Light Communication Gamification Remote Working Company Culture Reading Monitors Google Calendar Be Proactive Windows 8 Supercomputer Telephone System AI Regulations Trend Micro Backup and Disaster Recovery Electronic Health Records Transportation Virus Directions Digital Security Cameras Public Speaking Displays Advertising Motion Sickness Content Desktop Wasting Time Relocation Streaming Media Comparison Modem Workplace Strategies Work/Life Balance Google Drive Troubleshooting Tech Support Electronic Medical Records Accountants eCommerce Database Surveillance Keyboard Videos Hard Drives Corporate Profile Managing Costs Knowledge In Internet of Things Television SSID Telephony intranet Employer Employee Relationship Health IT Equifax Tactics Development Hard Drive Disposal Employer/Employee Relationships Wireless Hacks Shortcut Network Congestion Cabling Media Heating/Cooling Writing Tablet Environment G Suite Username Virtual Machine Reliable Computing Windows XP Mouse Freedom of Information Smart Technology VoIP Business Owner Social Networking Tracking Reviews Startup Optimization Addiction email scam Teamwork Navigation 2FA Web Server Data Storage Mobile Security Hypervisor Scalability

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?