Descriptor
Source
Publication Type
Books | 1 |
Collected Works - General | 1 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Media Staff | 4 |
Practitioners | 4 |
Administrators | 3 |
Teachers | 3 |
Location
Canada | 3 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Naidu, Som, Ed. – 2003
This book explores the creative opportunities offered by information and communications technology (ICT), and provides an authoritative survey of the ways in which ICT is currently transforming core teaching functions. The contributed chapters in this book are organizes around these core processes of learning and teaching: subject matter…
Descriptors: Computer Mediated Communication, Computer Uses in Education, Educational Development, Educational Practices
Harley, Dwight; Wendel, Terry – 1999
This study presents preliminary information about how Alberta school jurisdictions are currently providing technical support to schools and administrative offices. The focus of the study is on costs, planning and management practices, and key issues. Six "case study" jurisdictions were examined in depth, and a questionnaire was used to…
Descriptors: Access to Computers, Case Studies, Computer Uses in Education, Educational Administration
Adamyk, Linda; Dach, Edna – 1999
To successfully create a Web site, schools and jurisdictions must plan for the site's content, design and development and learn the principles of effective page design. This report contains technical advice on implementing and managing Web site development in schools. Following an introduction which discusses functions of jurisdiction and school…
Descriptors: Access to Computers, Computer System Design, Computer Uses in Education, Copyrights
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software