NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Chung, Gregory K. W. K.; Baker, Eva L.; Brill, David G.; Sinha, Ravi; Saadat, Farzad; Bewley, William L. – National Center for Research on Evaluation, Standards, and Student Testing (CRESST), 2006
A critical first step in developing training systems is gathering quality information about a trainee's competency in a skill or knowledge domain. Such information includes an estimate of what the trainee knows prior to training, how much has been learned from training, how well the trainee may perform in future task situations, and whether to…
Descriptors: Distance Education, Skill Analysis, Knowledge Level, Prior Learning
Hinga, Sophia W.; Chen, Linlin Irene – 1998
With the assistance of learning technology consultants in the Technology Teaching and Learning Center (TTLC) at the University of Houston-Downtown (Texas), professors have shifted their paradigms and are taking the leap to use more high-risk World Wide Web technologies in their courses. One that has become a hallmark is delivering exams via the…
Descriptors: Authoring Aids (Programming), Computer Assisted Testing, Computer Managed Instruction, Computer Security