NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 31 to 45 of 2,166 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Pelánek, Radek; Effenberger, Tomáš – Computer Science Education, 2022
Background and Context: Block-based programming is a popular approach to teaching introductory programming. Block-based programming often works in the context of microworlds, where students solve specific puzzles. It is used, for example, within the Hour of Code event, which targets millions of students. Objective: To identify design guidelines…
Descriptors: Programming, Computer Science Education, Puzzles, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Rafi Santo; Aman Yadav; David Phelps – ACM Transactions on Computing Education, 2024
Those working toward equitable K-12 computing education in the United States have always had their work cut out for them: understanding how best to teach, developing robust curricula, designing novel tools, building teacher capacity, and supporting systemic change in schools to bring equitable computing education to young people. Collectively,…
Descriptors: Computer Science Education, Elementary Secondary Education, Public Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
W. Paige Hall; Kevin Cantrell – Journal of Chemical Education, 2024
Human-driven carbon emissions have resulted in increased levels of dissolved carbon dioxide in the Earth's oceans. This dissolved carbon dioxide reacts with water to form carbonic acid, which impacts ocean acidity as well as the solubility of carbonate-containing compounds, with far-reaching impacts on marine ecosystems and the human communities…
Descriptors: Programming Languages, Computer Science Education, Chemistry, Marine Biology
Peer reviewed Peer reviewed
Direct linkDirect link
Stanja, Judith; Gritz, Wolfgang; Krugel, Johannes; Hoppe, Anett; Dannemann, Sarah – British Journal of Educational Technology, 2023
Formative assessment is considered to be helpful in students' learning support and teaching design. Following Aufschnaiter's and Alonzo's framework, formative assessment practices of teachers can be subdivided into three practices: eliciting evidence, interpreting evidence and responding. Since students' conceptions are judged to be important for…
Descriptors: Formative Evaluation, Student Attitudes, Learning Analytics, Student Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Wagler, Adam – Journal of Advertising Education, 2023
What role does advertising play in product development as part of owned media? For three years, a capstone advertising campaign course collaborated with STEM courses to form interdisciplinary teams composed of advertising, engineering, and computer science. The study provides insight into how teams can be more entrepreneurial by building on the…
Descriptors: Advertising, Capstone Experiences, Interdisciplinary Approach, Cooperative Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Tedre, Matti; Pajunen, John – ACM Transactions on Computing Education, 2023
A rich body of empirically grounded results and a solid theory base have often been viewed as signs of a mature discipline. Many disciplines have frequently debated what they should accept as legitimate kinds of theories, the proper roles of theory, and appropriate reference disciplines. Computing education research (CER) in particular has seen a…
Descriptors: Educational Theories, Computer Science Education, Educational Research, Educational Philosophy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Dragan Zlatkovic´; Miljana Ðordevic´ Zlatkovic´; Niko Radulovic´ – Journal of Chemical Education, 2023
Herein, we present a program implemented in Python that utilizes a simple complete-search algorithm to determine the geometry of a lanthanide-substrate (LS) complex. The program serves as a practical project in a programming course for chemistry students, specifically aimed at illustrating fundamental concepts such as decision-making, repetition,…
Descriptors: Programming, Problem Solving, Chemistry, Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Allison S. Theobold; Megan H. Wickstrom; Stacey A. Hancock – Journal of Statistics and Data Science Education, 2024
Despite the elevated importance of Data Science in Statistics, there exists limited research investigating how students learn the computing concepts and skills necessary for carrying out data science tasks. Computer Science educators have investigated how students debug their own code and how students reason through foreign code. While these…
Descriptors: Computer Science Education, Coding, Data Science, Statistics Education
Peer reviewed Peer reviewed
Direct linkDirect link
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bende, Imre – Acta Didactica Napocensia, 2022
Understanding data structures is fundamental for mastering algorithms. In order to solve problems and tasks, students must be able to choose the most appropriate data structure in which the data is stored and that helps in the process of the solution. Of course, there is no single correct solution, but in many cases, it is an important step to…
Descriptors: Programming, Computer Science Education, Data, Visual Aids
Peer reviewed Peer reviewed
Direct linkDirect link
Badea, Gabriel; Popescu, Elvira – Education and Information Technologies, 2022
Peer assessment plays an important part in education, fostering involvement and critical thinking skills for the students, while reducing the grading workload for the teacher. However, research on review allocation mechanisms in the context of peer assessment is relatively scarce in the literature. Although the first electronic peer assessment…
Descriptors: Peer Evaluation, Review (Reexamination), Student Evaluation, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Dayae Yang; Theodore J. Kopcha – International Journal of Designs for Learning, 2022
Computer programming has become an essential part of K12 education, promoted as a way for students to engage in computational thinking that helps develop students' ability to analyze and solve problems and prepare them for future careers. Tabletop board games are seen as an effective means to help students learn computer programming. Several board…
Descriptors: Educational Games, Design, Programming, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frank Lee; Clinton Baxter – Information Systems Education Journal, 2023
The Cross Industry Standard Process for Data Mining (CRISP-DM) framework was developed in the 1990s and has been widely used as the most relevant and comprehensive leading principle for conducting analytics projects. Despite the wide acceptance and adoption of the CRISP-DM framework, the current business analytics discipline often focuses on the…
Descriptors: Artificial Intelligence, Court Litigation, Data Analysis, Information Systems
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  145