Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Networks | 2 |
| Protocol Analysis | 2 |
| Access to Information | 1 |
| Active Learning | 1 |
| Case Studies | 1 |
| College Students | 1 |
| Computer Security | 1 |
| Computer Software | 1 |
| Data Collection | 1 |
| Data Interpretation | 1 |
| Databases | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wu, Jiang – ProQuest LLC, 2011
A transaction-consistent global checkpoint of a database records a state of the database which reflects the effect of only completed transactions and not the results of any partially executed transactions. This thesis establishes the necessary and sufficient conditions for a checkpoint of a data item (or the checkpoints of a set of data items) to…
Descriptors: Databases, Computer Networks, Performance, Evaluation
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics

Direct link
Peer reviewed
