Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Knowledge Level | 5 |
Programming | 5 |
Coding | 2 |
Computer Science Education | 2 |
Evaluation Methods | 2 |
Job Skills | 2 |
African American Students | 1 |
After School Programs | 1 |
Attitudes | 1 |
Behavior Rating Scales | 1 |
Blacks | 1 |
More ▼ |
Source
ProQuest LLC | 5 |
Author
Giacobe, Nicklaus A. | 1 |
Hundley, Jacqueline Holliday | 1 |
Meen Chul Kim | 1 |
Monique Woodard | 1 |
O'Horo, Neal O. | 1 |
Publication Type
Dissertations/Theses -… | 5 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Alabama | 1 |
Pennsylvania (Philadelphia) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Monique Woodard – ProQuest LLC, 2023
This mixed methods study examines the creativity of Black girls as they learned to code virtual environments in an afterschool program. The afterschool program, West Philly Tech Camp/Black Girls in Computing was a nine-week program in which students learned to code a virtual chatbot using Python. The program's design was guided by culturally…
Descriptors: Students, Blacks, African American Students, Females
Meen Chul Kim – ProQuest LLC, 2021
In this dissertation, I argue that web development can play a pivotal role in developing computational thinking as well as provide a stepping stone to an advanced mastery of computation. The preceding literature has extensively examined not only how learners practice computational thinking with a wide array of programming languages, but also how…
Descriptors: Programming, Computer Science Education, Mental Computation, Thinking Skills
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Hundley, Jacqueline Holliday – ProQuest LLC, 2012
Although the two-year curriculum guide includes coverage of all eight software engineering core topics, the computer science courses taught in Alabama community colleges limit student exposure to the programming, or coding, phase of the software development lifecycle and offer little experience in requirements analysis, design, testing, and…
Descriptors: Community Colleges, College Curriculum, Computer Science Education, Computer Software
O'Horo, Neal O. – ProQuest LLC, 2013
The purpose of this quantitative survey study was to test the Leontief input/output theory relating the input of IT certification to the output of the English-speaking U.S. human resource professional perceived IT professional job performance. Participants (N = 104) rated their perceptions of IT certified vs. non-IT certified professionals' job…
Descriptors: Information Technology, Certification, Human Resources, Professional Personnel