Browse Definitions :
Definition

computer-based training (CBT)

Computer-based training (CBT) is any course of instruction whose primary means of delivery is a computer. A CBT course (sometimes called courseware ) may be delivered via a software product installed on a single computer, through a corporate or educational intranet, or over the Internet as Web-based training . CBT can be used to teach almost any conceivable subject, but it is especially popular for computer-related studies. People often take advantage of CBT to learn how to run a particular computer application, such as Microsoft Excel , or to learn a computer programming language, such as Visual Basic .

See also: Fast Guide to Tutorials and Training

This was last updated in March 2011

Continue Reading About computer-based training (CBT)

Join the conversation

4 comments

Send me notifications when other members comment.

Please create a username to comment.

In computer based training the current trend is what?
Cancel
I Don't know about current trend computer based training
Cancel
Ok the use of computer based training

Cancel
Yes, computer based training is the current trend. Industry 4.0 is already revolutionizing the training method with most advanced CBT and VR AR technologies. 

Check www.navconsystems.com they develop CBT for the aerospace and defence. See their YouTube video its interesting.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close