NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Meets WWC Standards with or without Reservations2
Showing 391 to 405 of 423 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Isaías, Pedro, Ed.; Hui, Wendy, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and poster of the 6th International Conference on Educational Technologies 2019 (ICEduTech 2019), which has been organised by the International Association for Development of the Information Society and co-organised by the Lingnan University, in Hong Kong, February 8-10, 2019. ICEduTech is the scientific…
Descriptors: Educational Technology, Elementary School Students, Reflection, Computer Mediated Communication
Ohler, Jason – Learning & Leading with Technology, 2010
The Information Age has been built, in part, on the belief that more information is always better. True to that sentiment, people have found ways to make a lot of information available to the masses--perhaps more than anyone ever imagined. The goal of the Semantic Web, often called Web 3.0, is for users to spend less time looking for information…
Descriptors: Internet, Technological Advancement, Mass Media, Information Dissemination
Peer reviewed Peer reviewed
Direct linkDirect link
Roy, Geoffrey G. – Journal on Educational Resources in Computing, 2006
Designing and explaining programs are often difficult tasks, especially when novices are involved. It also concerns more experienced programmers when complex algorithms need to be carefully explained and documented as part of software development.Good practice suggests that code and documentation be tightly coupled; but there are only a few…
Descriptors: Programming, Computer Software, Mathematics, Models
Tan, Lin – ProQuest LLC, 2009
Commenting source code has long been a common practice in software development. This thesis, consisting of three pieces of work, made novel use of the code comments written in natural language to improve software reliability. Our solution combines Natural Language Processing (NLP), Machine Learning, Statistics, and Program Analysis techniques to…
Descriptors: Computer Software, Coding, Reliability, Improvement
Peer reviewed Peer reviewed
Duval, Beverly K.; Main, Linda – Library Software Review, 1995
Provides a succinct guide to building a home page. Overview includes the main Hypertext Mark-up Language (HTML) tags, plus examples of their use; forms and clickable maps; new HTML 3.0 tags; and pointers to sites that contain HTML editors, graphics, backgrounds, and music. Five figures illustrate the text. (JKP)
Descriptors: Authoring Aids (Programming), Coding, Computer Software, Guides
Peer reviewed Peer reviewed
Direct linkDirect link
Newby, Michael; Nguyen, ThuyUyen – Journal of Information Systems Education, 2007
Programming assignments are used to assess a student's understanding of the theoretical aspect of programming and their ability to put that theory into practice. When assigning programs for students to complete, it is necessary to make sure that the problem is well specified, realistic, yet is able to be completed in a relatively short period of…
Descriptors: Assignments, Problem Solving, Programming, Information Technology
Buchanan, Larry – MultiMedia Schools, 1996
Defines HyperText Markup Language (HTML) as it relates to the World Wide Web (WWW). Describes steps needed to create HTML files on a UNIX system and to make them accessible via the WWW. Presents a list of basic HTML formatting codes and explains the coding used in the author's personal HTML file. (JMV)
Descriptors: Access to Information, Authoring Aids (Programming), Coding, Guidelines
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Wegerif, Rupert; McLaren, Bruce M.; Chamrada, Marian; Scheuer, Oliver; Mansour, Nasser; Miksatko, Jan; Williams, Mriga – Computers & Education, 2010
This paper reports on an aspect of the EC funded Argunaut project which researched and developed awareness tools for moderators of online dialogues. In this study we report on an investigation into the nature of creative thinking in online dialogues and whether or not this creative thinking can be coded for and recognized automatically such that…
Descriptors: Creativity, Creative Thinking, International Programs, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Chinn, Donald; Vandegrift, Tammy – Journal on Educational Resources in Computing, 2008
This article provides an analysis of student responses to an exercise used in a computer ethics and a software engineering course to raise awareness of issues related to hiring, including issues of professional responsibility and diversity. Students from two different universities were asked to evaluate four candidates for two positions in a…
Descriptors: Personnel Selection, Evaluation Criteria, Inferences, Ethics
Breeding, Marshall – Computers in Libraries, 2006
It seems that everyone is talking about Web 2.0. This new vision of the Web enables greater interactivity, more user control of information, radical personalization, the development of online communities, and more democratic management of information. Supporting technologies include blogs, wikis, RSS, podcasts, tagging, XML, and Web services.…
Descriptors: Internet, Electronic Libraries, Information Technology, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Joy, Mike; Griffiths, Nathan; Boyatt, Russell – Journal on Educational Resources in Computing, 2005
Computer programming lends itself to automated assessment. With appropriate software tools, program correctness can be measured, along with an indication of quality according to a set of metrics. Furthermore, the regularity of program code allows plagiarism detection to be an integral part of the tools that support assessment. In this paper, we…
Descriptors: Plagiarism, Evaluation Methods, Programming, Feedback (Response)
Peer reviewed Peer reviewed
Direct linkDirect link
Feldman, Yishai A. – Journal on Educational Resources in Computing, 2005
Computer science students need to learn how to write high-quality software. An important methodology for achieving quality is design-by-contract, in which code is developed together with its specification, which is given as class invariants and method pre- and postconditions. This paper describes practical experience in teaching design-by-contract…
Descriptors: Teacher Effectiveness, Computer Software, Programming, Computer Science
Peer reviewed Peer reviewed
Sullivan, Megan – Science Teacher, 2005
For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…
Descriptors: Information Skills, Programming, Internet, Computer Security
Pages: 1  |  ...  |  19  |  20  |  21  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29