Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Information Systems Education… | 4 |
Author
Anderson, Nicole | 1 |
Bajracharya, Biju Raja | 1 |
Gomillion, David L. | 1 |
Gondi, Vamsi | 1 |
Hua, David | 1 |
Marquardson, Jim | 1 |
McMaster, Kirby | 1 |
Sambasivam, Samuel E. | 1 |
Serapiglia, Anthony | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Tests/Questionnaires | 2 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gondi, Vamsi; Hua, David; Bajracharya, Biju Raja – Information Systems Education Journal, 2021
In the age of COVID-19, traditional teaching techniques are under scrutiny. Most concepts and labs in the area of information technology are intended to be taught face-to-face in labs using clusters and networking infrastructure. Simulation software's such as uCertify, Pearson online, etc.., are good alternative, but are not always a viable…
Descriptors: Computer Science Education, Computer Software, Computer Simulation, Information Technology
Marquardson, Jim; Gomillion, David L. – Information Systems Education Journal, 2019
Simulated environments can provide a convenient, effective way to teach skills. Simulations have been used for decades to teach skills such as piloting aircraft. As technology has improved, it has become feasible to simulate many other tasks. Recent advances in virtual and augmented reality provide new avenues for expanding training using…
Descriptors: Computer Simulation, Teaching Methods, Transfer of Training, Introductory Courses
Serapiglia, Anthony – Information Systems Education Journal, 2016
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
Descriptors: Competition, Undergraduate Students, Computer Security, Information Security
McMaster, Kirby; Sambasivam, Samuel E.; Anderson, Nicole – Information Systems Education Journal, 2010
In demand paging virtual memory systems, the page fault rate of a process varies with the number of memory frames allocated to the process. When an increase in the number of allocated frames leads to an increase in the number of page faults, Belady's anomaly is said to occur. In this paper, we present a probability model for Belady's anomaly. We…
Descriptors: Probability, Models, Computer Science Education, Information Systems