NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 781 to 795 of 2,166 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Burgstahler, Sheryl – ACM Transactions on Computing Education, 2011
Universal design (UD), a concept that grew from the field of architecture, has recently emerged as a paradigm for designing instructional methods, curriculum, and assessments that are welcoming and accessible to students with a wide range of characteristics, including those related to race, ethnicity, native language, gender, age, and disability.…
Descriptors: Academic Accommodations (Disabilities), Disabilities, Teaching Methods, Inclusion
Peer reviewed Peer reviewed
Direct linkDirect link
Venables, Anne; Tan, Grace – Journal of Information Technology Education, 2009
Higher education programs need to prepare their graduates for the practical challenges they can expect to face upon entering the workforce. Students can be better prepared if their academic learning is reinforced through authentic workplace experience, where the link between theory and professional practice can be realized. Increasingly, such…
Descriptors: Industry, Program Effectiveness, Education Work Relationship, Foreign Countries
Mejia, Robin – Chronicle of Higher Education, 2008
The need for colleges to graduate students who understand computer security is growing. The Internet Crime Complaint Center, a partnership of the FBI; the National White Collar Crime Center; and the Bureau of Justice Assistance, in the Department of Justice, reported more than 90,000 crimes in 2007, with reported financial losses of almost…
Descriptors: College Students, Crime Prevention, Computer Security, Internet
Peer reviewed Peer reviewed
DeSieno, Robert P. – Journal of College Science Teaching, 1986
Traces the evolution and development of computer use and reviews the circumstances that influenced the selection of computing resources at liberal arts colleges. Characterizes the time eras of the computer age and projects factors that could influence computer policy and equipment choice. (ML)
Descriptors: Colleges, Computer Literacy, Computer Science, Computer Science Education
Peer reviewed Peer reviewed
Abernethy, Janet – Canadian Library Journal, 1984
Public libraries have vital role to play in introducing computer technology through provision of equipment, programs, and elementary instruction to users of all ages. Creative and resourceful approaches to budgeting and establishing policies and procedures will be required. Canadian public libraries (Oakville, Etobicoke, Aurora, Toronto) provide…
Descriptors: Children, Computer Literacy, Computer Science, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Archibald, J. K.; Fife, W. S. – Computer Science Education, 2007
Embedded systems are increasingly pervasive, and the creation of reliable controlling software offers unique challenges. Embedded software must interact directly with hardware, it must respond to events in a time-critical fashion, and it typically employs concurrency to meet response time requirements. This paper describes an innovative course…
Descriptors: Computer Software, Troubleshooting, Undergraduate Students, Undergraduate Study
Peer reviewed Peer reviewed
Barker, Brian H.; And Others – NASSP Bulletin, 1980
The combination of computer and arena scheduling at Lindbergh High School in Renton (Washington) gives students the best of both systems. (Author/MLF)
Descriptors: Computer Science, School Registration, Secondary Education
Peer reviewed Peer reviewed
Scheines, Richard; Spirtes, Peter; Glymour, Clark; Meek, Christopher; Richardson, Thomas – Multivariate Behavioral Research, 1998
The TETRAD for constraint-based aids to causal model specification project and related work in computer science aims to apply standards of rigor and precision to the problem of using data and background knowledge to make inferences about a model's specifications. Several algorithms that are implemented in the TETRAD II program are presented. (SLD)
Descriptors: Algorithms, Computer Science, Inferences, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Caspersen, Michael E.; Kolling, Michael – ACM Transactions on Computing Education, 2009
Programming is recognized as one of seven grand challenges in computing education. Decades of research have shown that the major problems novices experience are composition-based---they may know what the individual programming language constructs are, but they do not know how to put them together. Despite this fact, textbooks, educational…
Descriptors: Programming Languages, Computer Software, Educational Practices, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Shinagel, Michael – Continuing Higher Education Review, 2008
The Sunday, August 1, 1993 edition of the "Washington Post" featured the headline: "Indians, Foreigners Build Silicon Valley in Bangalore." In the article, Bangalore, a city of more than four million people, was described as "an island of relative affluence and social stability in this ancient land." Multinational…
Descriptors: Credentials, Graduate Students, Indians, Continuing Education
Taylor, Jacqui – Psychology Teaching Review, 2008
The aim of this paper is two-fold. The first aim is to discuss some observations gained from teaching psychology to computing students, highlighting both the wide range of areas where psychology is relevant to computing education and the topics that are relevant at different stages of students' education. The second aim is to consider findings…
Descriptors: Computer Science, Psychology, Majors (Students), Interdisciplinary Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Steiger, David M. – Journal of Information Systems Education, 2008
This case focuses on learning by applying the four integrating mechanisms of Nonaka's knowledge creation theory: socialization, externalization, combination and internalization. In general, such knowledge creation and internalization (i.e., learning) is critical to database students since they will be expected to apply their specialized database…
Descriptors: Constructivism (Learning), Epistemology, Information Technology, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
White, James D.; Carpenter, Jenna P. – PRIMUS, 2008
Louisiana Tech University has an integrated science curriculum for its mathematics, chemistry, physics, computer science, biology-research track and secondary mathematics and science education majors. The curriculum focuses on the calculus sequence and introductory labs in biology, physics, and chemistry. In the introductory biology laboratory…
Descriptors: Education Majors, Laboratory Experiments, Laboratory Safety, Physics
Pages: 1  |  ...  |  49  |  50  |  51  |  52  |  53  |  54  |  55  |  56  |  57  |  ...  |  145