Descriptor
Source
Author
Abbott, Elizabeth | 1 |
Anderson, Paul S. | 1 |
Beckstead, David | 1 |
Beecher, Henry | 1 |
Bernstein, Lynne | 1 |
Bitter, Gary G. | 1 |
Breeding, Michael | 1 |
Brienne, Deborah | 1 |
Cantor, Scott | 1 |
Champine, George A. | 1 |
Chen, J-G | 1 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 38 |
Media Staff | 8 |
Administrators | 7 |
Teachers | 7 |
Researchers | 6 |
Policymakers | 5 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Beecher, Henry – Wilson Library Bulletin, 1989
Presents a basic orientation to the functions and capabilities of disk operating systems (DOS), aimed at the nontechnically oriented user of IBM personal computers and compatible microcomputers. Areas discussed include booting up, the use of floppy and hard disks, file storage and manipulation, and directories. Further readings are provided. (CLB)
Descriptors: Computer System Design, Floppy Disks, Information Storage, Microcomputers
Pannell, Dorothy V. – School Business Affairs, 1991
Describes selecting and installing a computerized point of sale for a district food service program; the equipment needed and preferred; and the training of trainers, managers, and cashiers. Also discusses the direct benefits and side benefits of the system. (MLF)
Descriptors: Computer Oriented Programs, Computer System Design, Cost Effectiveness, Food Service
Computer-Based Speech Training for Profoundly Hearing-Impaired Children: Some Design Considerations.

Bernstein, Lynne – Volta Review, 1989
Design considerations for speech training systems include the types of information about speech to be used in training, whether acoustic or physiologic; and the use of models of speech production, whether partially perceptual and partially knowledge-based or explicit data-based models. A taxonomy of speech training systems is presented.…
Descriptors: Classification, Computer Oriented Programs, Computer System Design, Deafness

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data

Spoerri, Peter – Journal of Computers in Mathematics and Science Teaching, 1990
Describes the use of a logic circuit simulator to design a computer in an introductory computer course. Discusses the design of a sequence generator, control circuits, and testing of a computer's instruction set. (YP)
Descriptors: College Science, Computer Science, Computer System Design, Computers

Breeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet
Dede, Christopher J.; And Others – 1985
The first of five sections in this report places intelligent computer-assisted instruction (ICAI) in its historical context through discussions of traditional computer-assisted instruction (CAI) linear and branching programs; TICCIT and PLATO IV, two CAI demonstration projects funded by the National Science Foundation; generative programs, the…
Descriptors: Artificial Intelligence, Computer Assisted Instruction, Computer Software, Computer System Design

Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
United Nations Centre for Regional Development, Nagoya (Japan). – 1986
This report on an expert meeting, which was held to consider the training needs of local and regional planners in developing countries in the use and application of information systems and technology, presents both a report of the meeting and a summary of the proceedings. The meeting report includes a brief introduction, the conclusions reached…
Descriptors: Computer System Design, Course Descriptions, Developing Nations, Information Systems

Cantor, Scott – Library Hi Tech, 1997
DCE (Distributed Computing Environment) is a collection of services, tools, and libraries for building the infrastructure necessary for distributed computing within an enterprise. This articles discusses the Open Software Foundation (OSF); the components of DCE, including the Directory and Security Services, the Distributed Time Service, and the…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Services
Taylor, Arlene G. – 1999
This book addresses the history, theory, and practices of the organization of recorded information. Chapter 1, "Organization in Human Endeavors," looks at the basic human need to organize and how it is approached in various environments. Chapter 2, "Retrieval Tools," is concerned with the formats and functions of basic…
Descriptors: Classification, Computer System Design, Information Industry, Information Management
Guthrie, Hugh – 1987
This report defines the functions of computer-managed learning (CML) as (1) test generation, correction, and analysis; (2) record keeping and reporting; (3) routing learners through a set of learning activities; and (4) charting learner progress for a variety of purposes. It then describes the hardware characteristics and configuration of three…
Descriptors: Check Lists, Computer Assisted Testing, Computer Managed Instruction, Computer Software
Hazari, Sunil I. – Computing Teacher, 1991
Local area networks (LANs) are systems of computers and peripherals connected together for the purposes of electronic mail and the convenience of sharing information and expensive resources. In planning the design of such a system, the components to consider are hardware, software, transmission media, topology, operating systems, and protocols.…
Descriptors: Computer Networks, Computer Peripherals, Computer Software, Computer System Design

Chen, J-G; Hou, C-A – Journal of Visual Impairment and Blindness, 1991
VITAL (Vision Impaired Task and Assignment Lexicon) is an integrated computerized system that performs workplace design tasks for visually impaired workers. VITAL consists of three modules: ergonomics consultation, disability index, and work measurement. Evaluation indicated that VITAL could be used as a tool to help nonprofessional vocational…
Descriptors: Computer Assisted Design, Computer System Design, Human Factors Engineering, Man Machine Systems
Regional Development Dialogue, 1987
This issue of Regional Development Dialogue contains selected papers presented at an expert meeting sponsored by the United Nations Centre for Regional Development on training in information systems for local and regional planning in developing countries. The following papers are included: (1) "Information System for Local and Regional…
Descriptors: Computer System Design, Course Descriptions, Developing Nations, Information Systems