NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wanjun Chen; Prasert Ruannakarn – Higher Education Studies, 2024
CIPP, as a decision-oriented new model of curriculum evaluation, is suitable for the evaluation needs of information-based physical education courses. The evaluation of teaching in information-based physical education courses based on the CIPP model is divided into four categories: context evaluation, input evaluation, process evaluation, and…
Descriptors: Information Technology, Technology Integration, Physical Education, Course Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Nariman, Saniya; Alzhanov, Aitugan; Doguchaeva, Svetlana – Interactive Learning Environments, 2023
The study is devoted to the definition of educational effects of introducing the Content and Language Integrated Learning (CLIL) technology in master's programs. A pedagogical model of teaching the CLIL methodology is described; the development of the "CLIL for IT teachers" course is based on it. An experiment that involved 62 graduate…
Descriptors: Content and Language Integrated Learning, Information Technology, Computer Science Education, Communicative Competence (Languages)
Flint D. Million – ProQuest LLC, 2023
The education of students on existing and emerging technologies in higher education environments requires access to complex software. The rise of the Bring Your Own Device (BYOD) phenomenon in many postsecondary educational institutions, along with the increasing complexity of technological coursework, creates challenges for students needing…
Descriptors: Information Technology, Information Science, Business Education, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Juho Kahila; Henriikka Vartiainen; Matti Tedre; Eetu Arkko; Anssi Lin; Nicolas Pope; Ilkka Jormanainen; Teemu Valtonen – Informatics in Education, 2024
The integration of artificial intelligence (AI) topics into K-12 school curricula is a relatively new but crucial challenge faced by education systems worldwide. Attempts to address this challenge are hindered by a serious lack of curriculum materials and tools to aid teachers in teaching AI. This article introduces the theoretical foundations and…
Descriptors: Personal Autonomy, Data, Children, Creativity
Peer reviewed Peer reviewed
Direct linkDirect link
Sakibayev, Spartak; Sakibayev, Razakh; Sakibayeva, Bela – Interactive Technology and Smart Education, 2019
Purpose: Nowadays, when mobile devices are actively evolving and penetrating the various spheres of human activity they have a potential to modernize and facilitate the sphere of IT education as well. This paper aims to test the hypothesis stating that introduction of mobile technology to the college-level database course for future IT specialists…
Descriptors: Technology Uses in Education, Handheld Devices, Computer Oriented Programs, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Oyelere, Solomon Sunday; Suhonen, Jarkko; Wajiga, Greg M.; Sutinen, Erkki – Education and Information Technologies, 2018
The study focused on the application of the design science research approach in the course of developing a mobile learning application, MobileEdu, for computing education in the Nigerian higher education context. MobileEdu facilitates the learning of computer science courses on mobile devices. The application supports ubiquitous, collaborative,…
Descriptors: Foreign Countries, Undergraduate Students, Electronic Learning, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Soares, Andrey – Information Systems Education Journal, 2014
App Inventor has been used successfully to teach introduction to programming course for CS/IS/IT and Non-CS majors. Now, researchers are looking on how to include the tool in the curriculum of more advanced computing courses. This paper presents some Issues, Challenges and Opportunities observed while teaching courses on Mobile Application…
Descriptors: Teaching Methods, Programming, Computer Science Education, Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hua, David M. – Information Systems Education Journal, 2013
The demand for qualified information technology professionals remains high despite downturns in the economy. It is imperative to provide students with a curriculum that provides a broad foundation in information technology knowledge, skills, and abilities. Students also need access to specialized technologies and learning materials to develop the…
Descriptors: Cost Effectiveness, Online Vendors, Instructional Materials, Information Technology
Peer reviewed Peer reviewed
Graham, Peter; Karlsson, Goran – European Journal of Engineering Education, 1987
Described are the developments of a computing environment, the general training in the use of information technology, the training of specialists in computer science and engineering, and the use of information technology as an aid in the education process at the Royal Institute of Technology in Stockholm. (RH)
Descriptors: Computer Assisted Instruction, Computer Oriented Programs, Computer Science, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark; Press, Larry – Information Systems Education Journal, 2010
Computer literacy has evolved from writing simple BASIC programs to using desktop productivity applications. The shift from mainframe to personal computer brought about the need to rethink computer literacy courses to introduce basic skills and familiarity using desktop productivity applications. While these skills remain important, the recent…
Descriptors: Computer Literacy, Web 2.0 Technologies, Information Technology, Computer Science Education
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
Peer reviewed Peer reviewed
Demaid, Adrian; Edwards, Lyndon – European Journal of Engineering Education, 1987
Discusses the nature and current state of knowledge-based systems and expert systems. Describes an expert system from the viewpoints of a computer programmer and an applications expert. Addresses concerns related to materials selection and forecasts future developments in the teaching of materials engineering. (ML)
Descriptors: Artificial Intelligence, Computer Oriented Programs, Computer Science Education, Courseware
Atkins, D. E.; Olsen, Leslie A. – Engineering Education, 1986
Presents an overview of the Computer-Aided Engineering Network (CAEN) of the University of Michigan. Describes its arrangement of workstations, communication networks, and servers. Outlines the factors considered in hardware and software decision making. Reviews the program's impact on students. (ML)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Science, Computer Uses in Education
Weiser, Mark – Scientific American, 1991
Described are some of the ways in which computers can enter invisibly into people's lives. The social issues that embodied virtuality will engender are discussed. The hardware and software, connected by wires, radio waves, and infrared that will allow this to occur are described. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Previous Page | Next Page ยป
Pages: 1  |  2  |  3