GRADUATE STUDENT EVALUATION
Please attach the student’s cv listing awards and scholarships, publications, and student service contributions.
To be filled out by student
Name | Evaluation Date | ||||
Cumulative Graduate GPA | Expected graduation date | ||||
Date enrolled |
Date Program filed |
||||
Advisor |
Committee names |
||||
Dates the committee met |
|||||
Title or subject of thesis project |
List teaching experience. Include course number, semester, and responsibility.
Animal Science Masters Student Competencies
Please identify the student’s performance level on the scalar below taking into account their stage
in graduate work.
Advanced knowledge of area of emphasis: Thorough knowledge of area of emphasis as reflected by academic performance, ability to cite relevant scientific literature, and ability to integrate information from different sources.
1
Poor |
2 | 3
Adequate and acceptable |
4 | 5
Exceptional |
Competency in collection, analysis, and reporting of data in their area of emphasis: Ability to organize and collect data accurately and precisely, analyze collected information statistically, and summarize important information in oral and written form.
1
Poor |
2 | 3
Average and acceptable |
4 | 5
Exceptional |
An appreciation of the scientific method and ethical practice in data collection, analysis, and reporting: Understanding of the scientific method and the importance of ethical practices in data collection, analysis and reporting.
1
Poor |
2 | 3
Average and acceptable |
4 | 5
Excellent |
Professional conduct. Student conducts himself/herself in a professional manner in interactions with others. Student is respectful of others.
1
Poor |
2 | 3
Professional in most situations |
4 | 5
Professional manner in all situations |
Competency in oral communication: Student can communicate ideas, concepts, research findings, and questions using appropriate vocabulary and scientific presentation skills.
1
Difficulty |
2 | 3
Average ability |
4 | 5
Exceptional ability |
Competency in scholarly writing: Student can write and depict scientific data, in a clear, organized, accurate fashion. Extensive editing of grammar, spelling, sentence structure, and organization should not be needed.
1
Student has difficulty writing coherently |
2 | 3
Average ability |
4 | 5
Student displays exceptional writing abilities. |
Comments on competencies
Comment on improvement since last evaluation
RECOMMENDATIONS
|
- Probable success in completing degree requirements.
SIGNATURES
Committee Chair Agree Disagree Comments by Committee
|
TO BE SIGNED BY STUDENT: Signature only indicates you have read this evaluation. You may attach your own comments. | |
This evaluation has been discussed with me. | Name |
Date |
Animal Sciences Computing Policy
COMPUTER & NETWORK USE POLICY
(Visit https://policies.wsu.edu/prf/index/manuals/ to view all WSU policies.)
Please read the following excerpt from WSU’s Electronic Publishing Policy and sign your name to indicate you have been informed of this policy. The Department of Animal Sciences reserves the right to deny access to anyone violating the terms of this agreement.
APPROPRIATE USE
WSU’s computer resources, information technologies, and networks may be used for legitimate WSU purposes only. Thus, appropriate use of WSU’s computer resources, information technologies, and networks includes:
Students: All appropriate use by students related to completion of WSU class assignments or their education at WSU; and
Employees: All appropriate use by faculty, administrators, and staff directly related to instruction, research, and scholarly, professional, and administrative endeavors on behalf of WSU or within the scope of WSU employment. Students while working in their WSU employment capacities will be governed by policies for employees.
INAPPROPRIATE USE
WSU computer resources, information technologies, and networks shall NOT be used for:
- Utilizing network bandwidth to download files (movies, music, ) unrelated to any WSU or student educational purpose;
- Supporting, establishing, or conducting any private business operation or commercial activity;
- Attempting to gain unauthorized access to any portion of the system or using WSU computer resources, information technologies, and networks as a staging area to attempt to gain unauthorized access to any other system or account;
- Violating WSU’s policy of prohibiting discrimination against individuals on the basis of race, sex (including sexual harassment), religion, age, color, creed, national or ethnic origin, physical, mental, or sensory disability, marital status, sexual orientation, and status as a Vietnam-era or disabled Veteran;
- Intentionally disseminating, accessing, or providing a hyperlink to obscenity, as that term is defined by the law, unless such activities are directly related to an employee’s legitimate research or scholarship purpose or to a student’s completion of an academic requirement;
- Sending unsolicited electronic mail (e.g., “spam”) in violation of Washington law or in quantities that interfere with WSU’s or another’s Senders who anticipate sending large numbers of unsolicited electronic mail messages at one time are responsible for consulting with the appropriate server administrator prior to determine whether or not the sending of the mail is likely to cause a malfunction in a server;
- Engaging in political activities that violate state law (state law prohibits the use of state facilities or public resources for the purposes of assisting in an election campaign or for the promotion or opposition to a ballot proposition);
- Destroying, altering, compromising the integrity or security, or making inaccessible WSU computer resources, information technologies, and networks when such uses are not authorized;
- Utilizing WSU resources with the purpose of intentionally interfering with others’ use of computing resources, information technologies, or network resources or conduct of WSU business;
- Compromising the privacy of users of the computer resources, information technologies, and networks;
- Violating copyright law (thus, information technology and network users who do not hold the copyright on a work must have permission to publish information, graphics, cartoons, photographs, or other material, or the publication must be otherwise permitted under copyright law);
- Violating trademark law;
- Violating any federal, state, or local law;
- Copying of software in violation of a license or when copying is not authorized; or
- Violating WSU Expressing opposition to any WSU policy using computer resources, information technologies, and networks is not a violation of WSU policy.
I have read and understand the Appropriate/Inappropriate Use Policy Signature