Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
Source
Author
Publication Type
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
Audience
| Practitioners | 110 |
| Teachers | 37 |
| Administrators | 30 |
| Media Staff | 21 |
| Researchers | 12 |
| Policymakers | 10 |
| Community | 3 |
| Students | 3 |
| Parents | 1 |
Location
| Canada | 4 |
| Illinois | 2 |
| Greece (Athens) | 1 |
| Mississippi | 1 |
| Missouri | 1 |
| United Kingdom | 1 |
| United Kingdom (England) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dede, Christopher J.; And Others – 1985
The first of five sections in this report places intelligent computer-assisted instruction (ICAI) in its historical context through discussions of traditional computer-assisted instruction (CAI) linear and branching programs; TICCIT and PLATO IV, two CAI demonstration projects funded by the National Science Foundation; generative programs, the…
Descriptors: Artificial Intelligence, Computer Assisted Instruction, Computer Software, Computer System Design
Reese, Jean – 1999
This book is a reference guide to more than 100 Internet books. The book is divided into six chapters covering: (1) general Internet books; (2) books for educators and librarians; (3) books for parents, children, and students; (4) books for use in curriculum development; (5) juvenile fiction; and (6) books for web page design and creation. Within…
Descriptors: Adolescent Literature, Books, Childrens Literature, Computer System Design
Peer reviewedCole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewedMartin, Ron G. – Library Hi Tech, 1989
Describes guidelines for an online public access catalog (OPAC) workstation that will support the terminal, printer, and other peripherals. Workstation dimensions, lighting, wire management, printer and paper, acoustical treatment, seating, storage for books and coats, wastebasket, and interior decoration are addressed. Flexibility and simplicity…
Descriptors: Academic Libraries, Computer Peripherals, Computer System Design, Design Requirements
Peer reviewedJaffe, Lee David; Watkins, Steven G. – CD-ROM Professional, 1992
Presents selection and design considerations to help libraries make informed decisions about hardware configurations of CD-ROM systems. Highlights include CD-ROM configurations, including single drive workstations, daisychains, and jukeboxes; network configurations, including remote access; microcomputer features; CD-ROM drive selection; and…
Descriptors: Access to Information, Computer Networks, Computer System Design, Cost Effectiveness
United Nations Centre for Regional Development, Nagoya (Japan). – 1986
This report on an expert meeting, which was held to consider the training needs of local and regional planners in developing countries in the use and application of information systems and technology, presents both a report of the meeting and a summary of the proceedings. The meeting report includes a brief introduction, the conclusions reached…
Descriptors: Computer System Design, Course Descriptions, Developing Nations, Information Systems
Peer reviewedCantor, Scott – Library Hi Tech, 1997
DCE (Distributed Computing Environment) is a collection of services, tools, and libraries for building the infrastructure necessary for distributed computing within an enterprise. This articles discusses the Open Software Foundation (OSF); the components of DCE, including the Directory and Security Services, the Distributed Time Service, and the…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Services
Matey, John G. – School Business Affairs, 1990
Outlines a systematic approach for evaluating the needs and potential problems involved when school districts seek to update their current information systems. Considers the following components: financial, technical, computer literacy, and information system management infrastructure. (MLF)
Descriptors: Computer Literacy, Computer System Design, Computer Uses in Education, Elementary Secondary Education
Peer reviewedHelander, Martin G.; Palanivel, Thiagarajan – Impact of Science on Society, 1992
Addresses research results and controversies concerning the ergonomic design of computer work stations ranging from the traditional concerns with anthropometric fashions, work posture, and visual performance to the recent considerations about human information processing capacities and awareness of problem-solving strategies. (eight references)…
Descriptors: Computer Software Development, Computer System Design, Design Requirements, Human Factors Engineering
Taylor, Arlene G. – 1999
This book addresses the history, theory, and practices of the organization of recorded information. Chapter 1, "Organization in Human Endeavors," looks at the basic human need to organize and how it is approached in various environments. Chapter 2, "Retrieval Tools," is concerned with the formats and functions of basic…
Descriptors: Classification, Computer System Design, Information Industry, Information Management
Dean, Michael F. – 1989
This working paper provides suggestions and considerations for anyone contemplating the electronic collection of data on foreign scholars (as distinct from international students). It is noted that, because the Immigration and Naturalization Service requires employment verification and immigration information such as country of citizenship and…
Descriptors: College Faculty, Computer System Design, Data Collection, Data Processing
Guthrie, Hugh – 1987
This report defines the functions of computer-managed learning (CML) as (1) test generation, correction, and analysis; (2) record keeping and reporting; (3) routing learners through a set of learning activities; and (4) charting learner progress for a variety of purposes. It then describes the hardware characteristics and configuration of three…
Descriptors: Check Lists, Computer Assisted Testing, Computer Managed Instruction, Computer Software
Peterson, Kenneth D. – 1987
The expert system computer simulation detailed in this report is designed to investigate patterns of valuing in decision-making about dossiers of performance data used in teacher promotion evaluations. The knowledge base for the simulation consists of 111 questions organized into 117 rules. The questions and linked advice were derived from…
Descriptors: Computer Simulation, Computer Software, Computer System Design, Data Analysis
Fehling, Eric E. – 1998
This manual provides teachers, with very little or no technology experience, with a step-by-step guide for developing the necessary skills for creating a class Web Page. The first part of the manual is devoted to the thought processes preceding the actual creation of the Web Page. These include looking at other Web Pages, deciding what should be…
Descriptors: Computer Graphics, Computer Oriented Programs, Computer System Design, Design Requirements
Peer reviewedRae, John – Computers and Education, 1990
Describes a case study approach to teaching database design principles to undergraduate students that is based on a library database. Topics discussed include database management systems, relational models, entity relationship models, many-to-many relationships, normalization, and producing a working database. (three references) (LRW)
Descriptors: Case Studies, Computer Science Education, Computer System Design, Database Management Systems


