Publication Date
| In 2026 | 0 |
| Since 2025 | 8 |
| Since 2022 (last 5 years) | 63 |
| Since 2017 (last 10 years) | 147 |
| Since 2007 (last 20 years) | 316 |
Descriptor
Source
Author
| Hutchison, Amy | 3 |
| Baker, Rachel | 2 |
| Chenail, Ronald J. | 2 |
| Chua, Boon Liang | 2 |
| Dee, Thomas | 2 |
| Edwards, Richard | 2 |
| Estapa, Anne | 2 |
| Evans, Brent | 2 |
| Fesler, Lily | 2 |
| MacKinnon, Gregory R. | 2 |
| Mayhew, Matthew J. | 2 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 26 |
| Researchers | 10 |
| Media Staff | 5 |
| Practitioners | 5 |
| Policymakers | 4 |
| Administrators | 3 |
| Counselors | 2 |
| Students | 2 |
| Parents | 1 |
| Support Staff | 1 |
Location
| Australia | 9 |
| California | 9 |
| Canada | 6 |
| United States | 5 |
| Pennsylvania | 3 |
| Spain | 3 |
| United Kingdom | 3 |
| Alabama | 2 |
| Austria | 2 |
| France | 2 |
| Greece | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Individuals with Disabilities… | 1 |
| Individuals with Disabilities… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedDiamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks
Peer reviewedKlinger, S. – Journal of Computer Assisted Learning, 1999
Using case study methodology, this paper examines how pairs of first-time high school student users navigated through a multimedia geography CD-ROM together. Discusses coding methods for student activity; student interaction; dialog analysis; multimedia literacy; and further research needs. (Author/LRW)
Descriptors: Case Studies, Coding, Geography, High Schools
Chua, Boon Liang – Australian Mathematics Teacher, 2006
This article describes Cryptography, defined as the science of encrypting and deciphering messages written in secret codes, it has played a vital role in securing information since ancient times. There are several cryptographic techniques and many make extensive use of mathematics to secure information. The author discusses an activity built…
Descriptors: Matrices, Mathematics Activities, Secondary School Teachers, Secondary School Students
Grimm, Floyd M., III; And Others – 1990
Responding to the rapid development and often prohibitive costs of new classroom instruction technology, a group of interested faculty at Harford Community College (HCC), in Maryland, formed three Interactive Video (IV) Teams to explore the possibilities of using existing computer hardware and software at the college for interactive video…
Descriptors: Business Education, Coding, Community Colleges, Computer Assisted Instruction
Armstrong, Sara; Warlick, David – Technology & Learning, 2004
This article focuses on the challenge of educators in keeping up with an information environment that has changed dramatically in the past 10 years. Thus, it is crucial that when teaching literacy to students, educators emphasize skills that reflect the information environment of the present, not the past. With the information age comes a whole…
Descriptors: Multimedia Instruction, Information Skills, Computer Uses in Education, Computer Literacy
Darrell, Meece W.; Jacquelyn, Mize – Online Submission, 1993
This manual describes the procedures for administering and coding the enactive social knowledge interview for preschool children. This interview is comprised of two segments, an enactive procedure and a reflective procedure using line drawings. The purpose of this interview is to assess preschooler's responses to hypothetical social situations.…
Descriptors: Preschool Children, Social Cognition, Measures (Individuals), Interviews
Peer reviewedHockey, Susan – Library Trends, 1994
Discussion of the growth of electronic texts in the humanities focuses on issues that libraries should consider regarding collection development policies for electronic texts. Existing texts and applications are described; markup, or encoding schemes, are explained; cataloging is discussed; and software issues are considered. (Contains 27…
Descriptors: Academic Libraries, Cataloging, Coding, Computer Assisted Instruction
Peer reviewedWestburg, Laura – Dimensions of Early Childhood, 1994
Describes the use of electronic mail and coded messages by two five-year olds in an early childhood class, examining the effects of early literacy on social interaction. Suggests that teachers need to create a classroom culture that offers authentic, meaningful experiences for children and that reflect real-life uses of literacy. (MDM)
Descriptors: Case Studies, Classroom Environment, Coding, Computer Uses in Education
Watts, Tom – College and University, 2006
Oregon State University (OSU) has held discussions over the past several years between Enrollment Services, Central Computing and the Finance Support Offices, and departments on campus that offer non-credit coursework, about the possibility of incorporating non-credit related records into the same information system that houses regular credit.…
Descriptors: Student Records, Information Systems, Noncredit Courses, Recordkeeping
Pitti, Daniel V. – Journal of Archival Organization, 2005
The emergence of computer and network technologies has presented the archival profession with daunting challenges as well as inspiring opportunities. Archivists have been actively imagining and realizing the application of advanced technologies to their professional functions and activities. Using advanced technologies, archivists have been…
Descriptors: Archives, Documentation, Influence of Technology, Technological Advancement
Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages
Peer reviewedSigmon, Neil P. – Mathematics and Computer Education, 1997
Demonstrates the use of technology to enhance the appreciation of applications involving abstract algebra. The symbolic manipulator Maple can perform computations required for a linear cryptosystem. One major benefit of this process is that students can encipher and decipher messages using a linear cryptosystem without becoming confused and…
Descriptors: Algebra, Coding, College Mathematics, Computer Assisted Instruction
Hunt, E. Stephen – 1994
The Comparative Database System (CDS) provides a means for coding and using data on U.S. and international postsecondary educational activity and behavior. CDS permits education-data users to obtain accurate and reliable comparative data on postsecondary education questions. This document contains a discussion of the development of CDS, a detailed…
Descriptors: Coding, Comparative Analysis, Comparative Education, Data Analysis
Edwards, Michael Todd – Contemporary Issues in Technology and Teacher Education (CITE Journal), 2006
In this paper are discussed recent efforts to provide preservice mathematics teachers with opportunities to connect elementary teaching methods and content with the content and methods of secondary school mathematics. Through an in-depth exploration of the game, Shut the Box, preservice elementary and secondary mathematics teachers thoughtfully…
Descriptors: Preservice Teachers, Mathematics Teachers, Elementary School Teachers, Secondary School Teachers
Sutton, Brett – Illinois Libraries, 1994
Discusses technical advances that affect the delivery of electronic versions of world literature to libraries. Topics include the creation and dissemination of electronic text and the use of extended character codes and markup language to preserve the form and structure of printed text. (13 references) (KRN)
Descriptors: Coding, Computer Networks, Electronic Publishing, Electronic Text

Direct link
