Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
ALA Editions | 1 |
Book Report | 1 |
CD-ROM Professional | 1 |
Chronicle of Higher Education | 1 |
Journal of Computing in… | 1 |
Journal of Information Science | 1 |
Microcomputers for… | 1 |
Technology Connection | 1 |
Author
Bielefield, Arlene | 2 |
Cheeseman, Lawrence | 2 |
Barclay, Donald A. | 1 |
Britz, J. J. | 1 |
Dixon, Ross | 1 |
Farmer, Lesley S. J. | 1 |
Hazari, Sunil | 1 |
Howe, Walt | 1 |
Humbert, Roxann A. | 1 |
Jensen, Mary Brandt | 1 |
Kapperman, Gaylen | 1 |
More ▼ |
Publication Type
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Location
United Kingdom | 2 |
California | 1 |
Utah | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
National Literacy Act 1991 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Wilson, David L. – Chronicle of Higher Education, 1995
College faculty and students wishing to establish Internet connections are offered basic information on software selection for making direct connections, browsing the information services, and making indirect connections through on-line services. (MSE)
Descriptors: Access to Information, Computer Software, Computer Software Selection, Computers
Smallwood, Carol, Ed. – ALA Editions, 2011
There's no shortage of library management books out there--but how many of them actually tackle the little details of day-to-day management, the hard-to-categorize things that slip through the cracks of a larger handbook? "Library Management Tips that Work" does exactly that, addressing dozens of such issues facing library managers, including: (1)…
Descriptors: Library Administration, Time Management, Guides, Personnel Management
Simpson, Carol – Book Report, 1996
Guides librarians in evaluating "filtering" software which schools may purchase for restricting access to potentially inappropriate Internet sites. This article discusses the workings of filtering programs and practical and ethical questions such as: how sites are restricted, who decides, and whether transactions are monitored.…
Descriptors: Access to Information, Computer Software Evaluation, Computer Software Selection, Consumer Protection
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Nevada State Attorney General's Office, Carson City. – 1999
This booklet is intended to provide parents with some critical information to help monitor and control their child's behavior on the Internet. Highlights include: the need for ground rules; how to gain knowledge about the Internet; what the Internet is; the World Wide Web; Internet Relay Chat (IRC); Usenet groups and e-mail; some red flags;…
Descriptors: Access to Information, Child Behavior, Children, Computer Software

McMurdo, George – Journal of Information Science, 1996
Describes HTML (HyperText Markup Language) and its use on the Internet's World Wide Web, including main HTML tags and their syntaxes. Alternatives to HTML, such as Adobe's Acrobat software and Sun's new Java application language, are briefly described. (Author/LRW)
Descriptors: Access to Information, Computer Software, Hypermedia, Internet
Klatt, Edward C.; And Others – 1995
This guide reviews the basic principles of Internet exploration for the novice user, describing various functions and utilizing "onscreen" displays. The introduction explains what the Internet is, and provides historical information. The introduction is followed by a listing of Internet hardware and software (freeware and shareware),…
Descriptors: Access to Information, Computer Software, Electronic Mail, Information Systems

Hazari, Sunil – Journal of Computing in Higher Education, 1994
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
Descriptors: Access to Information, Computer Networks, Computer Software, Higher Education
Lambert, Steve; Howe, Walt – 1993
This clear and simple handbook is a guide to use of the Internet. For readers without free Internet access through work or school, the book includes membership and 5 hours of time on Delphi Internet Services Corporation, a widely used commercial access to the Internet. Chapters review the following: (1) an introduction to the Internet; (2) ways to…
Descriptors: Access to Information, Computer Software, Electronic Mail, File Transfer Protocol
Minnesota State Dept. of Education, St. Paul. – 1989
Arguing that much of the information needed in the future will be available only online, using computers, modems, and telephone lines, this four-part guide is designed to provide the basic information on online communication that is needed by beginners. The introduction to the guide includes a definition of online communication, a rationale for…
Descriptors: Access to Information, Computer Software Reviews, Courseware, Curriculum Development
Britz, J. J. – Microcomputers for Information Management, 1996
Assesses the impact of technology on privacy. Discusses electronic monitoring of people in the workplace; interception and reading of e-mail messages; merging of databases which contain personal information; rise in the number of hackers; and the development of software that makes the decoding of digital information virtually impossible. Presents…
Descriptors: Access to Information, Computer Software, Confidentiality, Databases
Barclay, Donald A. – 2000
This book, while necessarily concerning itself with computer technology, approaches technology as a tool for providing public-service and helps librarians and others effectively manage public-access computers. The book is organized to progress from more technological to more managerial topics. The first chapter--which answers the question, "What…
Descriptors: Access to Information, Computer Software, Information Services, Information Systems
National Inst. for Literacy, Washington, DC. – 1994
The National Institute for Literacy (NIFL) was charged with developing a National Literacy Database. This manual contains standards, guidelines, and a framework to be used when adding literacy resources to the National Literacy Information and Communication Network. As more state literacy resource centers (SLRCs) and literacy organizations…
Descriptors: Access to Information, Cataloging, Computer Software, Databases
Further Education Development Agency, London (England). – 1997
The Further Education (FE) sector in the United Kingdom has devoted time, energy, and resources in recent years to the development and improvement of information systems known as management-information systems. This report presents the findings of a research project on the use of management-information systems in student tracking. The project was…
Descriptors: Access to Information, Colleges, Computer Software, Database Management Systems

Koren, Judy – CD-ROM Professional, 1992
The first of two articles on multiuser access to CD-ROM databases examines options that do not involve a local area network (LAN). Hardware and software requirements, advantages, and disadvantages for several alternatives are described. A product and company directory is included. (MES)
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Peripherals
Previous Page | Next Page ยป
Pages: 1 | 2