NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 24 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Gonzalez, Fernando – Education and Information Technologies, 2023
The study of robotics has become a popular course among many educational programs, especially as a technical elective. A significant part of this course involves having the students learn how to program the movement of a robotic arm by controlling the velocity of its individual joint motors, a topic referred to as joint programming. They must…
Descriptors: Robotics, Educational Technology, Technology Uses in Education, Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Peer reviewed Peer reviewed
Direct linkDirect link
Lunn, Stephanie; Ross, Monique; Hazari, Zahra; Weiss, Mark Allen; Georgiopoulos, Michael; Christensen, Kenneth – ACM Transactions on Computing Education, 2022
Despite increasing demands for skilled workers within the technological domain, there is still a deficit in the number of graduates in computing fields (computer science, information technology, and computer engineering). Understanding the factors that contribute to students' motivation and persistence is critical to helping educators,…
Descriptors: Educational Experience, Prediction, Identification (Psychology), Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Maral Kargarmoakhar; Monique Ross; Zahra Hazari; Stephen Secules; Mark Allen Weiss; Michael Georgiopoulos; Kenneth Christensen; Tiana Solis – ACM Transactions on Computing Education, 2024
While computing programs in the U.S. are experiencing growth in enrollment trends, they are still grappling with matters related to retention and persistence of computing undergraduates. One construct identified by scholars as having an impact on persistence in computing is computing identity, which is shaped by constructs such as recognition,…
Descriptors: Communities of Practice, Scholarships, Computer Science Education, Self Concept
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Acharya, Sushil; Manohar, Priyadarshan A.; Wu, Peter Y. – Information Systems Education Journal, 2019
Software Verification and Validation (SV&V) is proven to be an effective approach to ensure software quality. Yet it is not commonly deployed in industry practices. We started a project intent on building a sustainable community skilled in SV&V. The fundamental objective is the transformation of undergraduate education in software…
Descriptors: Computer Science Education, Computer Software, Undergraduate Study, School Business Relationship
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ferris, Kaitlyn A.; Century, Jeanne; Zuo, Huifang – International Journal of Computer Science Education in Schools, 2021
This article reports on implementation of a problem-based learning intervention developed with the intention of finding time for computer science (CS) in the elementary school day. This study investigated differences in effects on students in particular socio-demographic groups using a quasi-experimental design. We first provide an overview of the…
Descriptors: Equal Education, Computer Science Education, Elementary School Students, Intervention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
George, Joey F.; Marett, Kent – Journal of Information Systems Education, 2019
Changes to degree programs in Information Systems are often attributed to quickly-evolving technology and the subsequent changing needs of the employers who hire IS graduates. In this paper, we explore other social and economic factors that were the inspiration for curriculum changes by assigning them to one of four eras in the IS timeline. Using…
Descriptors: Curriculum Development, Programming, Computer Science Education, Bachelors Degrees
Peer reviewed Peer reviewed
Direct linkDirect link
Thomas, Debra Kelly; Milenkovic, Lisa; Marousky, Annamargareth – Science and Children, 2019
Computer science (CS) and computational thinking (a problem-solving process used by computer scientists) teach students design, logical reasoning, and problem solving--skills that are valuable in life and in any career. Computational thinking (CT) concepts such as decomposition teach students how to break down and tackle a large complex problem.…
Descriptors: Computation, Thinking Skills, Computer Simulation, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Clarke, Peter J.; Davis, Debra L.; Chang-Lau, Raymond; King, Tariq M. – ACM Transactions on Computing Education, 2017
Software continues to affect a major part of our daily lives, including the way we use our phones, home appliances, medical devices, and cars. The pervasiveness of software has led to a growing demand for software developers over the next decade. To ensure the high quality of software developed in industry, students being trained in software…
Descriptors: Computer Software, Undergraduate Students, Computer Science Education, Online Catalogs
Peer reviewed Peer reviewed
Direct linkDirect link
Griffiths, Barry J. – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2015
For countries to remain competitive in the global economy, it is important to cultivate the next generation of native mathematicians. However, this goal has been increasingly challenging in the United States where, despite the tremendous increase in university enrollment during recent decades, the number of students studying mathematics has…
Descriptors: Summer Programs, Mathematics Education, Program Effectiveness, Academically Gifted
Peer reviewed Peer reviewed
Direct linkDirect link
Buchanan, Sarah; Laviola, Joseph J., Jr. – ACM Transactions on Computing Education, 2014
We present CSTutor, a sketch-based interface designed to help students understand data structures, specifically Linked Lists, Binary Search Trees, AVL Trees, and Heaps. CSTutor creates an environment that seamlessly combines a user's sketched diagram and code. In each of these data structure modes, the user can naturally sketch a data structure on…
Descriptors: Computer Science Education, Visual Aids, Computer Uses in Education, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Fiore, Stephen M.; Rodriguez, Walter E.; Carstens, Deborah S. – Journal of STEM Education: Innovations and Research, 2012
This paper presents a framework for facilitating communication among STEM project teams that are geographically dispersed in synchronous or asynchronous online courses. The framework has been developed to: (a) improve how engineering and technology students and faculty work with collocated and geographically-dispersed teams; and (b) to connect the…
Descriptors: Educational Technology, Cooperation, Internet, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Van Name, Barry – Tech Directions, 2012
There is a battlefield where no quarter is given, no mercy shown, but not a single drop of blood is spilled. It is an arena that witnesses the bringing together of high-tech design and manufacture with the outpouring of brute force, under the remotely accessed command of some of today's brightest students. This is the world of battling robots, or…
Descriptors: Females, Engineering, Computer Assisted Design, High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Barnes, Cynthia; Cavaliere, Frank – Education, 2009
Metadata is information about computer-generated documents that is often inadvertently transmitted to others. The problems associated with metadata have become more acute over time as word processing and other popular programs have become more receptive to the concept of collaboration. As more people become involved in the preparation of…
Descriptors: Metadata, Ethics, Internet, Word Processing
Previous Page | Next Page ยป
Pages: 1  |  2