NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
Program for International…1
What Works Clearinghouse Rating
Showing 1 to 15 of 724 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Radek Pelánek – ACM Transactions on Computing Education, 2025
Learning environments for programming education need a comprehensive task set that guides students from basic programming concepts to complex challenges. For creating such a task set, it is beneficial to utilize the concept of a design space--a systematic mapping of design dimensions and choices along these dimensions. We propose an iterative…
Descriptors: Computer Science Education, Programming, Design, Task Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Gianmarc Grazioli; Adam Ingwerson; David Santiago Jr.; Patrick Regan; Heekun Cho – Journal of Chemical Education, 2023
Computational chemistry instructional activities are often based around students running chemical simulations via a graphical user interface (GUI). GUI-based activities offer many advantages, as they enable students to run chemical simulations with a few mouse clicks. Although these activities are excellent for introducing students to the…
Descriptors: Computation, Chemistry, Teaching Methods, Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh Jin; Tai-Yin Chi; Brenda Mak – Journal of Information Systems Education, 2024
This paper presents the Screencast-Based Assessment Technique (SBAT) for a mobile app development curriculum in the information systems discipline. SBAT was implemented as a midterm take-home exam in which students design and develop an app project based on their own interests, passions, or ambitions. In addition to coding, students must create…
Descriptors: Technology Uses in Education, Computer Oriented Programs, Handheld Devices, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Baosen Zhang; Ariana Frkonja-Kuczin; Zhong-Hui Duan; Aliaksei Boika – Journal of Chemical Education, 2023
Computer vision (CV) is a subfield of artificial intelligence (AI) that trains computers to understand our visual world based on digital images. There are many successful applications of CV including face and hand gesture detection, weather recording, smart farming, and self-driving cars. Recent advances in computer vision with machine learning…
Descriptors: Classification, Laboratory Equipment, Visual Aids, Optics
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Hai; Wang, Shouhong – Journal of Information Systems Education, 2023
NoSQL databases have been used in organizations for decades. Few database textbooks on the market, however, have suitable materials about NoSQL beyond general introductions for typical business students. In fact, users of the typical NoSQL systems on the software market need to have certain computer programming skills. This teaching tip introduces…
Descriptors: Databases, Programming, Computer Science Education, Business Administration Education
Peer reviewed Peer reviewed
Direct linkDirect link
Shaltayev, Dmitriy – Decision Sciences Journal of Innovative Education, 2021
In this article, we describe the use of linear programming in conjunction with an online simulation game in an undergraduate supply chain management class. Supply chain management is a required course for students enrolled in a Business Administration program with a concentration in management. It delivers a broad overview of the supply chain…
Descriptors: Undergraduate Students, Educational Games, Computer Simulation, Computer Games
Peer reviewed Peer reviewed
Direct linkDirect link
Madhav Sharma; Andy Bowman – Journal of Information Systems Education, 2025
"Not only SQL" (NoSQL) databases have become widespread across organizations, enabling sophisticated, data-driven applications to be highly available, distributed, and cloud-based, such as e-commerce, social media, online multiplayer games, and video streaming. However, NoSQL is still sparsely found in MIS and analytics curricula. This…
Descriptors: Educational Technology, Technology Integration, Databases, Data Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Peggy P. – New Directions for Teaching and Learning, 2023
Many introductory computer science (CS) courses are intended to address the increased demand for computer literacy and the development of cross-cutting concepts and practices of computational thinking (CT). Colleges and universities offer introductory CS courses every semester toward this end. The issue is centered on how to support CT learning in…
Descriptors: Introductory Courses, Computer Science Education, Computer Literacy, Thinking Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Modesti, Paolo – Informatics in Education, 2020
As the number of software vulnerabilities discovered increases, the industry is facing difficulties to find specialists to cover the vacancies for security software developers. Considering relevant teaching and learning theories, along with existing approaches in software security education, we present the pedagogic rationale and the concrete…
Descriptors: Computer Security, Computer Software, Computer Science Education, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Kynigos, Chronis; Grizioti, Marianthi – British Journal of Educational Technology, 2020
Although there is wide rhetoric that programming should be learnt by all as an element of computational thinking (CT), in practice, it is mostly implemented narrowly as an end in itself consisting of routine practice and traditional testing of the ability to code. This paper discusses a way in which programming could be seen through a wider…
Descriptors: Educational Games, Thinking Skills, Computation, Affordances
Peer reviewed Peer reviewed
Direct linkDirect link
Fuchimoto, Kazuma; Ishii, Takatoshi; Ueno, Maomi – IEEE Transactions on Learning Technologies, 2022
Educational assessments often require uniform test forms, for which each test form has equivalent measurement accuracy but with a different set of items. For uniform test assembly, an important issue is the increase of the number of assembled uniform tests. Although many automatic uniform test assembly methods exist, the maximum clique algorithm…
Descriptors: Simulation, Efficiency, Test Items, Educational Assessment
Peer reviewed Peer reviewed
Direct linkDirect link
Joel S. Steele; Kevin J. Grimm – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Structural Equation Modeling (SEM) continues to grow in popularity with numerous articles, books, courses, and workshops available to help researchers become proficient with SEM quickly. However, few resources are available to help users gain a deep understanding of the analytic steps involved in SEM, with even fewer providing reproducible syntax…
Descriptors: Structural Equation Models, Programming, Orthographic Symbols, Syntax
Peer reviewed Peer reviewed
Direct linkDirect link
Lakshminarayanan, Srinivasan; Rao, N. J. – Higher Education for the Future, 2022
There are many grey areas in the interpretation of academic integrity in the course on Introduction to Programming, commonly known as CS1. Copying, for example, is a method of learning, a method of cheating and a reuse method in professional practice. Many institutions in India publish the code in the lab course manual. The students are expected…
Descriptors: Integrity, Cheating, Duplication, Introductory Courses
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  49