NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 110 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Andrew Pilsch – Learning, Media and Technology, 2024
This article considers what 'minimal' might mean in the context of using minimal computing tools in the humanities classroom. Specifically, it recounts experiences teaching students to make websites using Jekyll, a popular minimal website generation tool, using different understandings of 'minimal.' In one, students were encouraged to use a Web…
Descriptors: Educational Technology, Technology Uses in Education, Humanities Instruction, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Ciganik, Shari; McDaniel, Michael – PRIMUS, 2021
Prospective teachers and cryptography students use programming, statistics and guile to enrich both their courses.
Descriptors: Preservice Teachers, Elementary School Teachers, Technology, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Oscar Karnalim; Hapnes Toba; Meliana Christianti Johan – Education and Information Technologies, 2024
Artificial Intelligence (AI) can foster education but can also be misused to breach academic integrity. Large language models like ChatGPT are able to generate solutions for individual assessments that are expected to be completed independently. There are a number of automated detectors for AI assisted work. However, most of them are not dedicated…
Descriptors: Artificial Intelligence, Academic Achievement, Integrity, Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
David Hemer – Australian Mathematics Education Journal, 2023
Whilst there has been significant focus on STEM in Australian education for several years, there has been very little focus on the integration of Digital Technologies (especially coding) with the other STEM disciplines. Similarly, high school mathematics education remains largely a standalone discipline. This paper describes a full year…
Descriptors: Coding, High School Teachers, Mathematics Education, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh Jin; Tai-Yin Chi; Brenda Mak – Journal of Information Systems Education, 2024
This paper presents the Screencast-Based Assessment Technique (SBAT) for a mobile app development curriculum in the information systems discipline. SBAT was implemented as a midterm take-home exam in which students design and develop an app project based on their own interests, passions, or ambitions. In addition to coding, students must create…
Descriptors: Technology Uses in Education, Computer Oriented Programs, Handheld Devices, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Weiss, Charles J. – Journal of Chemical Education, 2021
Scientific computing and computer literacy are increasingly important skills for chemistry students to learn, but despite this need, there is an absence of chemistry-specific texts available for teaching the subject. This article introduces a freely available textbook released under a Creative Commons license for use in an undergraduate scientific…
Descriptors: Science Instruction, Chemistry, College Science, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
Mark Johnson; Rafiq Saleh – Interactive Learning Environments, 2024
Educational assessment is inherently uncertain, where physiological, psychological and social factors play an important role in establishing judgements which are assumed to be "absolute". AI and other algorithmic approaches to grading of student work strip-out uncertainty, leading to a lack of inspectability in machine judgement and…
Descriptors: Artificial Intelligence, Evaluation Methods, Technology Uses in Education, Man Machine Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Basuhail, Abdullah Ahmad – Canadian Journal of Learning and Technology, 2020
This paper presents an approach to implement learning objects for teaching and learning problem-solving techniques based on computer programming. The demonstrated approach exploits computer-based interactive animations and computer graphics. The main feature of this approach is its simplicity for exploring the concepts and structures of the…
Descriptors: Resource Units, Teaching Methods, Programming, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Clauhs, Matthew – Music Educators Journal, 2021
Recognizing that music teachers may struggle to implement songwriting activities in a classroom, and that iconic notation provides an opportunity to increase access to school music for all students, the purpose of this article is to share one model of songwriting activities in a music technology class using chord diagrams, beat grids, and keyboard…
Descriptors: Music Education, Music Techniques, Music Activities, Musical Instruments
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alves, Francisco Regis Vieira; Machado Vieira, Renata Passos – International Electronic Journal of Mathematics Education, 2020
The work deals with the study of the roots of the characteristic polynomial derived from the Leonardo sequence, using the Newton fractal to perform a root search. Thus, Google Colab is used as a computational tool to facilitate this process. Initially, we conducted a study of the Leonardo sequence, addressing it fundamental recurrence,…
Descriptors: Mathematical Concepts, Teaching Methods, Visualization, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Kubsch, Marcus; Hamerski, Patti C. – Physics Teacher, 2022
Energy is a disciplinary core idea and a cross-cutting concept in the K-12 Framework for Science Education and the Next Generation Science Standards (NGSS). As numerous authors point out, the energy model in these standards emphasizes the connections between energy and systems. Using energy ideas to interpret or make sense of phenomena means…
Descriptors: Energy, Science Instruction, Scientific Concepts, Models
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8