NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 241 to 255 of 9,066 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ghosh, Biswadip – Information Systems Education Journal, 2022
This case is a narrative of the acquisition of HIRA, a healthcare IT startup, by Conversant, a large global consulting powerhouse from a few years back. The clash of two different company cultures, their conflicting business strategies, different IT infrastructures, and very different customer sets created significant challenges in their…
Descriptors: Information Technology, Entrepreneurship, Organizational Change, Business
Peer reviewed Peer reviewed
Direct linkDirect link
Wohak, Kirsten; Frank, Martin – Teaching Mathematics and Its Applications, 2022
Undeniably omnipresent in our everyday lives, electronic signal compression is a classical example that illustrates the ubiquity of mathematics in high-end technology and sciences. When dealing with piles of files, it is essential that each file takes up as little storage space as possible while maintaining quality. The cloud-based--available…
Descriptors: High School Students, Acoustics, Algebra, Mathematics Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Uzal, Gürcan – Turkish Online Journal of Educational Technology - TOJET, 2022
Arduino is easy to use because it is a simple system. In addition, since Arduino has an open source code system, it is a system that is open to everyone's use, can be developed and can be easily implemented. Anyone who wants to use Arduino can buy and use the necessary parts for their application. It is a platform that can be very useful in the…
Descriptors: Computer Software, Open Source Technology, Technology Uses in Education, Physics
Peer reviewed Peer reviewed
Direct linkDirect link
Semiu Salawu; Jo Lumsden; Yulan He – International Journal of Bullying Prevention, 2022
A negative consequence of the proliferation of social media is the increase in online abuse. Bullying, once restricted to the playground, has found a new home on social media. Online social networks on their part have intensified efforts to tackle online abuse, but unfortunately, such is the scale of the problem that many young people are still…
Descriptors: Computer Mediated Communication, Bullying, Computer Software, Computational Linguistics
Peer reviewed Peer reviewed
Direct linkDirect link
Arthur M. Halpern; Yingbin Ge; Eric D. Glendening – Journal of Chemical Education, 2022
FINDIF is a Windows application that numerically solves the one-dimensional (1D) Schrödinger equation and displays the eigenstates, eigenvalues, and probability density of the system. FINDIF accepts both nonperiodic and periodic 1D potential energy functions as input and uses the finite difference method to evaluate the energy of the quantum…
Descriptors: Computer Software, Quantum Mechanics, Chemistry, Visualization
Peer reviewed Peer reviewed
Direct linkDirect link
Mark F. Thouin; William E. Hefley – Journal of Information Systems Education, 2024
The product owner role is one of three key roles in the Scrum software development process. Industry demand for product owners is growing exponentially, and educators need effective techniques for teaching students the knowledge, skills, and competencies required to be effective product owners. To address this need, this Teaching Tip describes how…
Descriptors: Computer Software, Experiential Learning, Computer Simulation, Graduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sunil Hazari – Journal of Educational Research and Practice, 2024
In this article, I present a justification for implementing AI literacy courses in higher education. I explore the ethical concerns and biases surrounding AI technologies, highlighting the importance of critical analysis and responsible use of AI. I then propose a conceptual framework, focusing on awareness, skill development, and the practical…
Descriptors: Artificial Intelligence, Higher Education, Critical Thinking, Innovation
Peer reviewed Peer reviewed
Direct linkDirect link
Nguyen, Kim V.; Tansan, Merve; Newcombe, Nora S. – Journal of Cognition and Development, 2023
Research on spatial navigation is essential to understanding how mobile species adapt to their environments. Such research increasingly uses virtual environments (VEs) because, although VE has drawbacks, it allows for standardization of procedures, precision in measuring behaviors, ease in introducing variation, and cross-investigator…
Descriptors: Computer Simulation, Spatial Ability, Navigation, Research Methodology
Peer reviewed Peer reviewed
Direct linkDirect link
Malhotra, Ruchika; Massoudi, Massoud; Jindal, Rajni – Education and Information Technologies, 2023
In recent years, universities have been developing more robust competency-based classes for students in Science, Technology, Engineering, and Mathematics (STEM). Competency-based education (CBE) is based on outcomes and is student-centred, creating a better learning experience. This paper provides context for competency-based education over a…
Descriptors: STEM Education, Competency Based Education, Teaching Methods, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Velasco, Richard Carlos L.; Degner, Kate – Mathematics Teacher: Learning and Teaching PK-12, 2023
The purpose of this article is to demonstrate how students' mathematics identities were developed and how their agency was fostered through the use of a mathematical action technology (MAT), Desmo, during stages of learning beyond noticing and wondering. The authors describe how they enacted an eighth-grade mathematics lesson depicting students…
Descriptors: Self Concept, Mathematics Instruction, Teaching Methods, Grade 8
Peer reviewed Peer reviewed
Direct linkDirect link
Donald Conant – Journal of Education for Business, 2023
For years, researchers have recognized the expectation within the business community that business school graduates possess a working knowledge of spreadsheet applications. Academics continue to seek effective ways to teach these skills in an academic setting. This exercise uses Wordle, a five-letter word guessing game, to teach students…
Descriptors: School Business Relationship, College Students, Business Education, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Pérez-Núñez, Antonio – Hispania, 2023
ChatGPT employs a deep learning (DL) model constructed using artificial neural networks and designed to analyze input data and extract increasingly complex features (Hu and Buehler 2023). Its chatbot interface makes it easy to use, requiring just a prompt to generate a response from the model. It is capable of producing fluent text in multiple…
Descriptors: Spanish, Second Language Learning, Second Language Instruction, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Elizabeth S. Thrall; Fernando Martinez Lopez; Thomas J. Egg; Seung Eun Lee; Joshua Schrier; Yijun Zhao – Journal of Chemical Education, 2023
Given the growing prevalence of computational methods in chemistry, it is essential that undergraduate curricula introduce students to these approaches. One such area is the application of machine learning (ML) techniques to chemistry. Here we describe a new activity that applies ML regression analysis to the common physical chemistry laboratory…
Descriptors: Chemistry, Physics, Science Laboratories, Scientific Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Ferguson, Sarah L.; Moore, E. Whitney G.; Hull, Darrell M. – International Journal of Behavioral Development, 2020
The present guide provides a practical guide to conducting latent profile analysis (LPA) in the Mplus software system. This guide is intended for researchers familiar with some latent variable modeling but not LPA specifically. A general procedure for conducting LPA is provided in six steps: (a) data inspection, (b) iterative evaluation of models,…
Descriptors: Statistical Analysis, Computer Software, Data Analysis, Goodness of Fit
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Modesti, Paolo – Informatics in Education, 2020
As the number of software vulnerabilities discovered increases, the industry is facing difficulties to find specialists to cover the vacancies for security software developers. Considering relevant teaching and learning theories, along with existing approaches in software security education, we present the pedagogic rationale and the concrete…
Descriptors: Computer Security, Computer Software, Computer Science Education, Programming
Pages: 1  |  ...  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  21  |  ...  |  605