NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Huh, Joo Hee – ProQuest LLC, 2012
I criticize the typewriting model and linear writing structure of Microsoft Word software for writing in the computer. I problematize bodily movement in writing that the error of the software disregards. In this research, writing activity is viewed as bodily, spatial and mediated activity under the premise of the unity of consciousness and…
Descriptors: Computer Software Evaluation, Word Processing, Writing (Composition), Writing Processes
Bowman, Charles Robert – ProQuest LLC, 2012
Improving student performance is the goal of any chemistry educator. With the proliferation of internet technologies in recent years, educators have been struggling with providing effective learning materials to students online. These materials also have not always had the intended effect of improving student performance. Either students do not…
Descriptors: Study Habits, Student Attitudes, Correlation, Schematic Studies
Jabba Molinares, Daladier – ProQuest LLC, 2009
Communication underwater is challenging because of the inherent characteristics of the media. First, common radio frequency (RF) signals utilized in wireless communications cannot be used under water. RF signals are attenuated in such as way that RF communication underwater is restricted to very few meters. As a result, acoustic-based…
Descriptors: Acoustics, Internet, Telecommunications, Information Technology
Geist, Lori A. – ProQuest LLC, 2010
Team collaboration is necessary to fully support school-age students who use assistive technology (AT). Teams should include the student, his or her family, and school professionals. Unfortunately, team collaboration is often not realized due to constraints that range from scheduling conflicts and language barriers to lack of defined roles and…
Descriptors: Educational Planning, Computer Mediated Communication, Individualized Education Programs, Disabilities
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Martinez, Ray Earl – ProQuest LLC, 2010
This investigation is an exploratory study of the use of a metacognitive software tool in a social supportive learning environment. The tool combined metacognitive knowledge and regulation functionality embedded within the content of an eight week online graduate education course. Twenty-three learners, who were practicing teachers, used the tool.…
Descriptors: Electronic Learning, Graduate Study, Education Courses, Online Courses