NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 12 results Save | Export
Ware, Willis H. – EDUCOM, 1984
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Descriptors: Computer Science, Higher Education, Information Systems, Privacy
Bean, Margaret H., Ed. – 1985
This bibliography covers computer engineering and computer architecture for all sizes of computers. Not covered are areas of mathematical computer science or publications dealing specifically with microcomputers. This document is a survey of information sources in computer engineering and is intended to identify those core resources which can help…
Descriptors: College Science, Computer Science, Computer Science Education, Educational Technology
Rousseau, Rosemary, Comp. – 1985
With new developments constantly occurring in computer science, it is difficult for anyone to keep up with the changes and the material being published in the field. This document is a survey of information sources in computer science and is intended to identify those core resources which can help engineers and librarians to find information about…
Descriptors: College Science, Computer Science, Computer Science Education, Educational Technology
Hecht, Herbert – 1982
This publication provides guidance for the introduction of computer software tools within agencies of the United States government or within other installations where there has been little or no prior use of software tools. From a survey of current tool usage, it is concluded that the greatest obstacles to effective use of software tools are…
Descriptors: Check Lists, Computer Programs, Computer Science, Guidelines
Peer reviewed Peer reviewed
Diskin, Gregory M.; Michalak, Thomas J. – Library Hi Tech, 1985
Describes the Information Function of the LS/2000 integrated library system at Carnegie-Mellon University. Existing and planned functions, screen displays, and selection options (announcements, guides to book locations, library hours, access to library guides and bibliographies, library policies and services) are illustrated. Footnotes are…
Descriptors: College Libraries, Computer Science, Display Systems, Higher Education
Aveney, Brian, Ed. – 1984
Developed from presentations given at a 3-day invitational meeting of 31 leading online catalog designers from both public and private sectors in North America, these papers provide information about online catalogs--their present form, their use, and the questions that need to be considered in their future refinement. All of the papers in this…
Descriptors: Academic Libraries, Cataloging, Computer Science, Guidelines
Dutro, Kenneth R. – 1983
The use of computer assisted programs in career exploration and occupational information is well documented. Various phases of the vocational counseling process, i.e., diagnostic evaluation, program planning, career exploration, case management, and program evaluation, offer similarly promising opportunities for computerization. Using the…
Descriptors: Career Choice, Career Counseling, Caseworker Approach, Computer Assisted Testing
McCredie, John W., Ed. – 1983
Ten case studies that describe the planning process and strategies employed by colleges who use computing and communication systems are presented, based on a 1981-1982 study conducted by EDUCOM. An introduction by John W. McCredie summarizes several current and future effects of the rapid spread and integration of computing and communication…
Descriptors: Budgets, Case Studies, College Planning, Computer Assisted Instruction
Federal Bureau of Investigation, Washington, DC. National Crime Information Center. – 1992
This document is the first volume of a two-volume set of lesson plans which together make up a complete training package for full-service terminal operators. The lesson plans are designed to ensure that a state's National Crime Information Center (NCIC) training program meets Advisory Policy Board standards. (NCIC is a nationwide computerized…
Descriptors: Competency Based Education, Computer Science, Computers, Crime
Federal Bureau of Investigation, Washington, DC. National Crime Information Center. – 1992
This document is the second volume of a two-volume set of lesson plans that together make up a complete training package for full-service terminal operators. The lesson plans are designed to ensure that a state's National Crime Information Center (NCIC) training program meets Advisory Policy Board standards. (NCIC is a nationwide computerized…
Descriptors: Competency Based Education, Computer Science, Computers, Crime
Illinois State Univ., Normal. – 1987
This guide, which is one in the "Exploration" series of curriculum guides intended to assist junior high and middle school industrial educators in helping their students explore diverse industrial situations and technologies used in industry, deals with exploring computer technology. The following topics are covered in the individual…
Descriptors: Behavioral Objectives, Computer Literacy, Computer Oriented Programs, Computer Science
Loock, Joan W.; Schmitt, Bette – 2000
This document, which is intended for teachers of high school-level business education courses, contains both the academic standards for business education in Wisconsin secondary schools that were disseminated in 1998 and learning activities to enable students to meet the standards. The activities were developed for students completing grade 12 and…
Descriptors: Academic Standards, Adult Education, Behavioral Objectives, Business Administration