NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)1
Education Level
Higher Education1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 53 results Save | Export
Beecher, Henry – Wilson Library Bulletin, 1989
Presents a basic orientation to the functions and capabilities of disk operating systems (DOS), aimed at the nontechnically oriented user of IBM personal computers and compatible microcomputers. Areas discussed include booting up, the use of floppy and hard disks, file storage and manipulation, and directories. Further readings are provided. (CLB)
Descriptors: Computer System Design, Floppy Disks, Information Storage, Microcomputers
Peer reviewed Peer reviewed
Schreier, E. M.; Uslan, M. M. – Journal of Visual Impairment and Blindness, 1991
The review examines six personal computer-based optical character recognition (OCR) systems designed for use by blind and visually impaired people. Considered are OCR components and terms, documentation, scanning and reading, command structure, conversion, unique features, accuracy of recognition, scanning time, speed, and cost. (DB)
Descriptors: Blindness, Computer System Design, Microcomputers, Reading
Knezek, Gerald A. – Computing Teacher, 1988
Reviews the historical evolution of computer-assisted instruction (CAI) and discusses recent advances in intelligent systems. Intelligent tutoring systems are described from the system designer's and learner's perspectives, and possible future applications are considered. A list of existing intelligent CAI systems is provided. (14 references) (CLB)
Descriptors: Artificial Intelligence, Computer Assisted Instruction, Computer System Design, Courseware
Peer reviewed Peer reviewed
Ross, Peter – Journal of Computer Assisted Learning, 1987
Discusses intelligent tutoring systems (ITS), one application of artificial intelligence to computers used in education. Basic designs of ITSs are described; examples are given including PROUST, GREATERP, and the use of simulation with ITSs; protocol analysis is discussed; and 38 prototype ITSs are listed. (LRW)
Descriptors: Artificial Intelligence, Computer Assisted Instruction, Computer Simulation, Computer System Design
Pannell, Dorothy V. – School Business Affairs, 1991
Describes selecting and installing a computerized point of sale for a district food service program; the equipment needed and preferred; and the training of trainers, managers, and cashiers. Also discusses the direct benefits and side benefits of the system. (MLF)
Descriptors: Computer Oriented Programs, Computer System Design, Cost Effectiveness, Food Service
Friedland, Marc – School Business Affairs, 1990
Many school business officials have turned to computer equipment leasing. A lease arrangement permits administrators to stretch annual budgets, to appropriate funds, and to easily upgrade or change equipment. Another alternative to high-cost computer purchase is to buy or lease used equipment. (MLF)
Descriptors: Computer System Design, Computer Uses in Education, Computers, Cost Effectiveness
Peer reviewed Peer reviewed
Bernstein, Lynne – Volta Review, 1989
Design considerations for speech training systems include the types of information about speech to be used in training, whether acoustic or physiologic; and the use of models of speech production, whether partially perceptual and partially knowledge-based or explicit data-based models. A taxonomy of speech training systems is presented.…
Descriptors: Classification, Computer Oriented Programs, Computer System Design, Deafness
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Peer reviewed Peer reviewed
Spoerri, Peter – Journal of Computers in Mathematics and Science Teaching, 1990
Describes the use of a logic circuit simulator to design a computer in an introductory computer course. Discusses the design of a sequence generator, control circuits, and testing of a computer's instruction set. (YP)
Descriptors: College Science, Computer Science, Computer System Design, Computers
Peer reviewed Peer reviewed
Valauskas, Edward J. – Information Technology and Libraries, 1988
Describes an automation project at the Merriam Center Library in which Apple Macintoshes were introduced as library workstations. The implementation process, staff involvement and reactions, and current configurations and applications of the workstations are discussed. An appendix provides a comparison of current microcomputer based workstations…
Descriptors: Comparative Analysis, Computer System Design, Equipment Evaluation, Library Automation
Peer reviewed Peer reviewed
Breeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewed Peer reviewed
Martin, Ron G. – Library Hi Tech, 1989
Describes guidelines for an online public access catalog (OPAC) workstation that will support the terminal, printer, and other peripherals. Workstation dimensions, lighting, wire management, printer and paper, acoustical treatment, seating, storage for books and coats, wastebasket, and interior decoration are addressed. Flexibility and simplicity…
Descriptors: Academic Libraries, Computer Peripherals, Computer System Design, Design Requirements
Peer reviewed Peer reviewed
Jaffe, Lee David; Watkins, Steven G. – CD-ROM Professional, 1992
Presents selection and design considerations to help libraries make informed decisions about hardware configurations of CD-ROM systems. Highlights include CD-ROM configurations, including single drive workstations, daisychains, and jukeboxes; network configurations, including remote access; microcomputer features; CD-ROM drive selection; and…
Descriptors: Access to Information, Computer Networks, Computer System Design, Cost Effectiveness
Peer reviewed Peer reviewed
Cantor, Scott – Library Hi Tech, 1997
DCE (Distributed Computing Environment) is a collection of services, tools, and libraries for building the infrastructure necessary for distributed computing within an enterprise. This articles discusses the Open Software Foundation (OSF); the components of DCE, including the Directory and Security Services, the Distributed Time Service, and the…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Services
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4