NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Education Consolidation…1
Assessments and Surveys
Test of English as a Foreign…1
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Winans, Michael D. – RELC Journal: A Journal of Language Teaching and Research, 2021
Grammarly's Tone Detector is included in the free version of the application and is available for major phone and computer program platforms. Its strength is in helping students compose pragmatically appropriate texts which could substantially increase their confidence and the feeling of autonomy. It accomplishes this by providing writers with…
Descriptors: Grammar, Phrase Structure, Computer Software, Writing (Composition)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Unnam, Abhishek; Takhar, Rohit; Aggarwal, Varun – International Educational Data Mining Society, 2019
Email has become the most preferred form of business communication. Writing "good" email has become an essential skill required in the industry. "Good" email writing not only facilitates clear communication, but also makes a positive impression on the recipient, whether it be one's colleague or a customer. The aim of this paper…
Descriptors: Grading, Electronic Mail, Feedback (Response), Written Language
Peer reviewed Peer reviewed
Direct linkDirect link
Ross, Spencer M. – Journal of Marketing Education, 2019
Past research has found that students and instructors may be disaffected with many of the most widely used learning management systems (LMS). Other research has found that Millennials and post-Millennials have come to expect open and frequent communication and technologies that facilitate greater teamwork in their business careers. The purpose of…
Descriptors: Marketing, Management Systems, Learner Engagement, Learning Experience
Peer reviewed Peer reviewed
Direct linkDirect link
Jo, Il-Hyun – Asia Pacific Education Review, 2009
This study investigates the effect of the presentation of social network diagrams on virtual team members' interaction behavior via e-mail. E-mail transaction data from 22 software developers in a Korean IT company was analyzed and depicted as diagrams by social network analysis (SNA), and presented to the members as an intervention. Results…
Descriptors: Intervention, Network Analysis, Social Networks, Communities of Practice
Peer reviewed Peer reviewed
Direct linkDirect link
Chodorow, Martin; Gamon, Michael; Tetreault, Joel – Language Testing, 2010
In this paper, we describe and evaluate two state-of-the-art systems for identifying and correcting writing errors involving English articles and prepositions. Criterion[superscript SM], developed by Educational Testing Service, and "ESL Assistant", developed by Microsoft Research, both use machine learning techniques to build models of article…
Descriptors: Grammar, Feedback (Response), Form Classes (Languages), Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Peterson, Holly – Innovate: Journal of Online Education, 2007
Institutions of higher education are constantly examining new ways of using technology to teach students. Just as importantly, those institutions are also finding new ways to use technology and the Internet to keep and develop connections with alumni and parents. What new opportunities does this technology offer, how can it be used effectively,…
Descriptors: Higher Education, Alumni, Computer Mediated Communication, Newsletters
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Wodarz, Nan – School Business Affairs, 2001
A computer virus is a program that replicates itself, in conjunction with an additional program that can harm a computer system. Common viruses include boot-sector, macro, companion, overwriting, and multipartite. Viruses can be fast, slow, stealthy, and polymorphic. Anti-virus products are described. (MLH)
Descriptors: Computer Security, Computer Software, Electronic Mail, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Al-Hashash, Saad – Indian Journal of Applied Linguistics, 2007
Many researchers have investigated several aspects of using Computer Assisted Language Learning (CALL) applications and presented many advantages for using CALL in TESL setting (i.e. where English is taught as a second language). In this paper, the author aims to illustrate how CALL applications would improve substantially the process of teaching…
Descriptors: Electronic Learning, Computer Assisted Instruction, English (Second Language), Second Language Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Swettenham, Steve – International Review of Research in Open and Distance Learning, 2006
An RSS feed is a list of topics made available from a webpage via a standard XML file format known as RSS, an abbreviation of either Really Simple Syndication or Rich Site Summary (Wikipedia, 2006). The end-user subscribes to their favorite Internet content site via RSS-aware software. Once subscribed, announcements with appropriate links are…
Descriptors: Evaluation, Internet, Electronic Mail, Foreign Countries
Diedriech, David; Colvin, Nathaniel – Association of Small Computer Users in Education (ASCUE), 2004
In early 2003, DePauw University recognized the need to upgrade their existing email system, which was rapidly exceeding its capacity. The decision was made to convert the entire campus to Novell's GroupWise solution for email. This presentation will focus on the options considered as well as some of the issues involved, and then discuss the…
Descriptors: Electronic Mail, College Students, Small Colleges, College Faculty
Van Horn, Royal – Phi Delta Kappan, 2000
Peeping software takes several forms and can be used on a network or to monitor a certain computer. E-Mail Plus, for example, hides inside a computer and sends exact copies of incoming or outgoing e-mail anywhere. School staff with monitored computers should demand e-mail privacy. (MLH)
Descriptors: Computer Software, Electronic Mail, Elementary Secondary Education, Internet
Roberts, Paul A. – Principal, 1997
An array of desktop technologies, including integrated word processing software, presentation software, database software, electronic mail, and Internet search engines, can make a principal's life easier and more challenging. Administrators should devote sufficient time and commitment to honing their skills, sharing their knowledge via hands-on…
Descriptors: Computer Software, Computer Uses in Education, Educational Technology, Electronic Mail
Palfrey, Sue – Principal, 1999
With a Web site, teachers and administrators can communicate with parents, committee members can share documents, students can publish newspapers and other work, and parents can e-mail teachers. Planners should browse other schools' sites, utilize volunteer workers, select appropriate software and equipment, and avoid copyright and updating…
Descriptors: Committees, Communication (Thought Transfer), Computer Software, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Morales, Cesareo; Knezek, Gerald; Christensen, Rhonda – Computers in the Schools, 2008
The Technology Proficiency Self-Assessment (TPSA) questionnaire was administered to 978 elementary and middle school teachers from Mexico City, and 932 elementary and middle school teachers from the Dallas, Texas, metroplex in the USA, in order to examine self-efficacy similarities and differences for technology proficiency self-appraisals in a…
Descriptors: Self Efficacy, Foreign Countries, Educational Technology, Middle School Teachers
Previous Page | Next Page ยป
Pages: 1  |  2  |  3