NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Marjorie Anderson – ProQuest LLC, 2021
This project was the creation of a student support site to address student knowledge and skills needs at CC. The purpose of the project was to create on-demand training and frequently-asked-question pages. The site can be updated and expanded as needed. Lack of knowledge is a prevalent issue impacting student success in college. Current literature…
Descriptors: Community Colleges, Learning Management Systems, Programming, Web Sites
Charles D. Woods – ProQuest LLC, 2020
This study explores the phenomenon of computational thinking indicated by the use of Bloom's taxonomy's cognitive domain verbs in the Scratch community, the online, collaborative environment for the Scratch Visual Programming Language (VPL). A corpus of 660,984 words from three Scratch community sub-forums provide the data for this study. By…
Descriptors: Mental Computation, Thinking Skills, Discussion Groups, Programming
Scott Brown, Jennifer Ashley – ProQuest LLC, 2018
The cognitive apprenticeship framework melds situated, authentic learning with social learning theory. The learning strategies included in a cognitive apprenticeship are modeling, coaching, scaffolding, articulation, reflection, and exploration. Previous research indicates that the most beneficial strategy for the learner is coaching, and is also…
Descriptors: Reflection, Coaching (Performance), Peer Teaching, Asynchronous Communication
Black, August – ProQuest LLC, 2011
The research presented in this dissertation studies and describes how technical standards, protocols, and application programming interfaces (APIs) shape the aesthetic, functional, and affective nature of our most dominant mode of online communication, the World Wide Web (WWW). I examine the politically charged and contentious battle over browser…
Descriptors: Internet, Web Browsers, Standards, Economic Factors
Jabba Molinares, Daladier – ProQuest LLC, 2009
Communication underwater is challenging because of the inherent characteristics of the media. First, common radio frequency (RF) signals utilized in wireless communications cannot be used under water. RF signals are attenuated in such as way that RF communication underwater is restricted to very few meters. As a result, acoustic-based…
Descriptors: Acoustics, Internet, Telecommunications, Information Technology
Livingstone, Randall M. – ProQuest LLC, 2012
The purpose of this study was to explore the codependencies of the social and technical structures that yield Wikipedia the website and Wikipedia the community. In doing so, the research investigated the implications of such a sociotechnical system for the maintenance of the project and the emergence of collective intelligence. Using a theoretical…
Descriptors: Social Networks, Qualitative Research, Encyclopedias, Collaborative Writing
Ali, Qasim – ProQuest LLC, 2009
Collective communication allows efficient communication and synchronization among a collection of processes, unlike point-to-point communication that only involves a pair of communicating processes. Achieving high performance for both kernels and full-scale applications running on a distributed memory system requires an efficient implementation of…
Descriptors: Workstations, Mathematics, Computer System Design, Programming
Mowafi, Yaser Abdallah – ProQuest LLC, 2009
Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…
Descriptors: Decision Support Systems, Computer System Design, Computer Mediated Communication, Data
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis