NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 76 to 90 of 4,569 results Save | Export
Ma, Xiao – ProQuest LLC, 2018
Current network design problems can be solved by offline or online methods. Offline methods are criticized for their complexity and in flexibility, whereas online methods lack guaranteed optimality. Non-blocking properties, which are typically studied in switching structures, could be used to evaluate the capability of a switching structure to…
Descriptors: Computer Networks, Design, Graphs, Mathematics
Peer reviewed Peer reviewed
Direct linkDirect link
Jordi Guitart; Juan José Costa – Interactive Learning Environments, 2024
The pandemic situation banned the presence of teachers and students in the classrooms disrupting the typical teaching process. Videoconferencing services have been used successfully for lectures, but they are insufficient for hands-on laboratories where the physical presence is a requirement (i.e. to access specific hardware). Enabling remote…
Descriptors: Distance Education, Laboratories, Computer Networks, Videoconferencing
Peer reviewed Peer reviewed
Direct linkDirect link
Bordewieck, Martin; Elson, Malte – Applied Cognitive Psychology, 2021
Troubleshooting is a particular problem-solving process comprising error detection, fault diagnosis, and system restoration. Since automation of systems has become increasingly complex and ubiquitous, troubleshooting skills are crucial to maintain safety and security in a variety of contexts. The planned study aims at examining troubleshooting…
Descriptors: Problem Solving, Error Patterns, Visual Aids, Cognitive Style
Hinchman, David B. – US Government Accountability Office, 2022
The COVID-19 pandemic forced schools across the nation to increase their reliance on IT to deliver educational instruction to students. This amplified the vulnerability of K-12 schools to potentially serious cyberattacks. The US Government Accountability Office (GAO) was asked to review cybersecurity in K-12 schools. The objectives of this report…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Government Role
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Huvila, Isto – Information Research: An International Electronic Journal, 2019
Introduction: This study investigates the implications of the interplay of multiple information infrastructures to learning and conducting work and to its related information work practices, and how the materialities of work and its infrastructures play into their intermingling. Method: The present study is based on an ethnography of a week-long…
Descriptors: Ethnography, Archaeology, Undergraduate Students, Graduate Students
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Emery-Wetherell, Meaghan; Wang, Ruoyao – Assessment & Evaluation in Higher Education, 2023
Over four semesters of a large introductory statistics course the authors found students were engaging in contract cheating on Chegg.com during multiple choice examinations. In this paper we describe our methodology for identifying, addressing and eventually eliminating cheating. We successfully identified 23 out of 25 students using a combination…
Descriptors: Computer Assisted Testing, Multiple Choice Tests, Cheating, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Ciuffoletti, Augusto – IEEE Transactions on Education, 2021
Contribution: A technical course in a multidisciplinary university program has to provide high-level skills, with limited lecturing hours and student background. This article investigates the principles for its design and reports about a study case. Background: The overall course organization needs to address specific learning targets and teaching…
Descriptors: Curriculum Design, Course Organization, Computer Networks, Course Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Mat Bettinson; Steven Bird – Language Documentation & Conservation, 2021
Mobile apps have the potential to support collaborative fieldwork even where web connectivity is unreliable or unavailable. To explore this potential, we developed portable network infrastructure and custom-made field tool apps. We deployed this solution in remote communities in the far north of Australia, in connection with co-located cooperative…
Descriptors: Language Research, Documentation, Language Maintenance, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Viktoriia V. Sydorenko; Inna O. Akhnovska; Sergiy V. Smirnov; Igor A. Verbovskyi; Olha V. Melnychuk – Journal of Education and Learning (EduLearn), 2024
The research is focused on a comprehensive analysis of digitalization as a prerequisite for higher education modernization. The authors of this article consider the digital divide as a component of information inequality, which has a technological nature and presupposes unequal opportunities for access, use, and production of information and…
Descriptors: Educational Improvement, Higher Education, Digital Literacy, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Kezia Herman Mkwizu; Ritimoni Bordoloi – Asian Association of Open Universities Journal, 2024
Purpose: Inclusive growth in the education sector is still a major challenge in some countries because of limited access to technologies and internet connectivity, among other reasons. However, as a technology, augmented reality (AR) is expected to be widely used in the field of education in the future. The main purpose of this paper is to explore…
Descriptors: Physical Environment, Simulated Environment, Synthesis, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Glassman, Michael – Educational Philosophy and Theory, 2019
Since early development of information technologies, in particular computers and the Internet, there has been tension between those who believe these new technologies and their applications they have been mired in tension. Originally conceived and developed as tools for enabling high level, nonhierarchal engagement in problem-solving and…
Descriptors: Online Courses, Information Technology, Computer Networks, Learner Engagement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Ronny Pacheco – ProQuest LLC, 2020
Motivated by applications in health care systems, this study focused on queueing network models with instances of simultaneous resource possession under capacity restrictions in different stages. Customers during service at certain nodes in the first-level or primary system may simultaneously need service from a second-level server. In this…
Descriptors: Engineering, Engineering Technology, Computer Networks, Resource Allocation
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  305