NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Cheers, Hayden; Lin, Yuqing – Computer Science Education, 2023
Background and Context: Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, such tools do not identify plagiarism, nor suggest what assignment submissions are suspicious of plagiarism. Source code plagiarism…
Descriptors: Plagiarism, Programming, Computer Science Education, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Frede, Christiane; Knobelsdorf, Maria – Computer Science Education, 2021
Background and Context: Considerable numbers of Computer science (CS) undergraduate majors struggle in Theory of Computation (ToC) courses, which strengthen bimodality beliefs of student performance. Reasons for students struggling are assumed to be manifold but substantial ground is based on studies providing singular insights into this matter.…
Descriptors: Computer Science Education, Academic Achievement, Introductory Courses, Computation
Peer reviewed Peer reviewed
Direct linkDirect link
Hao, Qiang; Smith, David H., IV; Ding, Lu; Ko, Amy; Ottaway, Camille; Wilson, Jack; Arakawa, Kai H.; Turcan, Alistair; Poehlman, Timothy; Greer, Tyler – Computer Science Education, 2022
Background and Context: automated feedback for programming assignments has great potential in promoting just-in-time learning, but there has been little work investigating the design of feedback in this context. Objective: to investigate the impacts of different designs of automated feedback on student learning at a fine-grained level, and how…
Descriptors: Computer Science Education, Feedback (Response), Teaching Methods, Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Martínez, Salvador; Wimmer, Manuel; Cabot, Jordi – Computer Science Education, 2020
Background and Context: Reports suggest plagiarism is a common occurrence in universities. While plagiarism detection mechanisms exist for textual artifacts, this is less so for non-code related ones such as software design artifacts like models, metamodels or model transformations. Objective: To provide an efficient mechanism for the detection of…
Descriptors: Plagiarism, Identification, Computer Software, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Worsley, Marcelo; Bar-El, David – Computer Science Education, 2022
Background and Context: Making is celebrated for bringing exciting tools and learning opportunities to non-traditional designers. However, people with disabilities may find themselves excluded from many making activities and makerspaces. This exclusion is present in making and computer science more broadly. Objective: We describe a university…
Descriptors: Inclusion, Students with Disabilities, College Students, Shared Resources and Services
Peer reviewed Peer reviewed
Direct linkDirect link
Moskal, Adon Christian Michael; Wass, Rob – Computer Science Education, 2019
Background and Context: Encouraging undergraduate programming students to think more about their software development processes is challenging. Most programming courses focus on coding skill development and mastering programming language features; subsequently software development processes (e.g. planning, code commenting, and error debugging) are…
Descriptors: Computer Software, Undergraduate Students, Programming, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Willman, Salla; Lindén, Rolf; Kaila, Erkki; Rajala, Teemu; Laakso, Mikko-Jussi; Salakoski, Tapio – Computer Science Education, 2015
Computer aided assessment systems enable the collection of exact time and date information on students' activity on a course. These activity patterns reflect students' study habits and these study habits further predict students' likelihood to pass or fail a course. By identifying such patterns, those who design the courses can enforce positive…
Descriptors: Foreign Countries, Study Habits, Introductory Courses, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Kinnunen, Paivi; Simon, Beth – Computer Science Education, 2012
This article provides insight into how computing majors experience the process of doing programming assignments in their first programming course. This grounded theory study sheds light on the various processes and contexts through which students constantly assess their self-efficacy as a programmer. The data consists of a series of four…
Descriptors: Grounded Theory, Majors (Students), Assignments, Self Efficacy
Peer reviewed Peer reviewed
Direct linkDirect link
Bati, Tesfaye Bayu; Gelderblom, Helene; van Biljon, Judy – Computer Science Education, 2014
The challenge of teaching programming in higher education is complicated by problems associated with large class teaching, a prevalent situation in many developing countries. This paper reports on an investigation into the use of a blended learning approach to teaching and learning of programming in a class of more than 200 students. A course and…
Descriptors: Foreign Countries, Teaching Methods, Blended Learning, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Cummins, Stephen; Burd, Liz; Hatch, Andrew – Computer Science Education, 2011
This article presents an investigation into the usage of shareable feedback tags as a way of delivering feedback to three different cohorts of programming students. A series of research questions are examined; these include investigating any perceived benefit from students using feedback tags and exploring how students interact with their…
Descriptors: Feedback (Response), Programming, Investigations, Student Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
Archibald, J. K.; Fife, W. S. – Computer Science Education, 2007
Embedded systems are increasingly pervasive, and the creation of reliable controlling software offers unique challenges. Embedded software must interact directly with hardware, it must respond to events in a time-critical fashion, and it typically employs concurrency to meet response time requirements. This paper describes an innovative course…
Descriptors: Computer Software, Troubleshooting, Undergraduate Students, Undergraduate Study