Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Knowledge Level | 5 |
| Programming | 5 |
| Coding | 2 |
| Computer Science Education | 2 |
| Evaluation Methods | 2 |
| Job Skills | 2 |
| African American Students | 1 |
| After School Programs | 1 |
| Attitudes | 1 |
| Behavior Rating Scales | 1 |
| Blacks | 1 |
| More ▼ | |
Source
| ProQuest LLC | 5 |
Author
| Giacobe, Nicklaus A. | 1 |
| Hundley, Jacqueline Holliday | 1 |
| Meen Chul Kim | 1 |
| Monique Woodard | 1 |
| O'Horo, Neal O. | 1 |
Publication Type
| Dissertations/Theses -… | 5 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
| Two Year Colleges | 1 |
Audience
Location
| Alabama | 1 |
| Pennsylvania (Philadelphia) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Monique Woodard – ProQuest LLC, 2023
This mixed methods study examines the creativity of Black girls as they learned to code virtual environments in an afterschool program. The afterschool program, West Philly Tech Camp/Black Girls in Computing was a nine-week program in which students learned to code a virtual chatbot using Python. The program's design was guided by culturally…
Descriptors: Students, Blacks, African American Students, Females
Meen Chul Kim – ProQuest LLC, 2021
In this dissertation, I argue that web development can play a pivotal role in developing computational thinking as well as provide a stepping stone to an advanced mastery of computation. The preceding literature has extensively examined not only how learners practice computational thinking with a wide array of programming languages, but also how…
Descriptors: Programming, Computer Science Education, Mental Computation, Thinking Skills
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Hundley, Jacqueline Holliday – ProQuest LLC, 2012
Although the two-year curriculum guide includes coverage of all eight software engineering core topics, the computer science courses taught in Alabama community colleges limit student exposure to the programming, or coding, phase of the software development lifecycle and offer little experience in requirements analysis, design, testing, and…
Descriptors: Community Colleges, College Curriculum, Computer Science Education, Computer Software
O'Horo, Neal O. – ProQuest LLC, 2013
The purpose of this quantitative survey study was to test the Leontief input/output theory relating the input of IT certification to the output of the English-speaking U.S. human resource professional perceived IT professional job performance. Participants (N = 104) rated their perceptions of IT certified vs. non-IT certified professionals' job…
Descriptors: Information Technology, Certification, Human Resources, Professional Personnel

Direct link
