NotesFAQContact Us
Collection
Advanced
Search Tips
Source
Education and Information…28
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 28 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Wilson Libardo Pantoja Yépez; Julio Ariel Hurtado Alegría; Ajay Bandi; Arvind W. Kiwelekar – Education and Information Technologies, 2024
The ability to define, evaluate, and implement software architectures is a fundamental skill for software engineers. However, teaching software architecture can be challenging as it requires students to be involved in real-context projects with high degrees of complexity. This involves making trade-off decisions among several quality attributes.…
Descriptors: Computer Software, Training, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Guozhu Ding; Xiangyi Shi; Shan Li – Education and Information Technologies, 2024
In this study, we developed a classification system of programming errors based on the historical data of 680,540 programming records collected on the Online Judge platform. The classification system described six types of programming errors (i.e., syntax, logical, type, writing, misunderstanding, and runtime errors) and their connections with…
Descriptors: Programming, Computer Science Education, Classification, Graphs
Peer reviewed Peer reviewed
Direct linkDirect link
Macak, Martin; Kruzelova, Daniela; Chren, Stanislav; Buhnova, Barbora – Education and Information Technologies, 2021
Understanding the processes in education, such as the student learning behavior within a specific course, is a key to continuous course improvement. In online learning systems, students' learning can be tracked and examined based on data collected by the systems themselves. However, it is non-trivial to decide how to extract the desired students'…
Descriptors: Student Projects, Learning Analytics, Data Collection, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Fadip Audu Nannim; Nnenna Ekpereka Ibezim; Basil C. E. Oguguo; Emmanuel Chinweike Nwangwu – Education and Information Technologies, 2024
This study investigated the effect of project-based Arduino robot application on students' computational thinking skills development in robotics programming course using the quasi-experimental research design. The participants consist of 73 students in tertiary institutions in South-East Nigeria that offer Computer and Robotics Education…
Descriptors: Robotics, Computation, Thinking Skills, Skill Development
Peer reviewed Peer reviewed
Direct linkDirect link
Gutiérrez, Luz E.; Guerrero, Carlos A.; López-Ospina, Héctor A. – Education and Information Technologies, 2022
This study describes the most relevant problems and solutions found in the literature on teaching and learning of object-oriented programming (OOP). The identification of the problem was based on tertiary studies from the IEEE Xplore, Scopus, ACM Digital Library and Science Direct repositories. The problems and solutions identified were ranked…
Descriptors: Programming, Comprehension, Computer Science Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Zhadyra Akhatayeva; Kakim Sagindykov; Bazarbek Mukushev; Nurgul Kurmangaliyeva; Ardak Karipzhanova – Education and Information Technologies, 2024
The goal of the study is to create Visual Basic and MATHCAD apps to create programs that show the core force using physical forces as an example. The research subjects are high school teachers and students; the inherent context is high school STEM courses. Programs for computer visualization have been developed, and theoretical investigations have…
Descriptors: High School Teachers, High School Students, STEM Education, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Maseko, Melody; Zhou, Tinashe Gwendolyn; Tsokota, Theo – Education and Information Technologies, 2020
Failure of IT projects has risen to become an eyesore for most organisations. This is often attributed to the 'mum effect'- an individual's reluctance to report the exact position of troubled software projects. With the increasing digitalization of operations by most State Universities in Zimbabwe, the mum effect has the potential to rise to…
Descriptors: News Reporting, Information Technology, State Universities, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Shao-Chen Chang; Charoenchai Wongwatkit – Education and Information Technologies, 2024
As computational thinking becomes increasingly essential, the challenge of designing effective teaching approaches to foster students' abilities in this area persists, especially for higher order thinking skills. This study addresses this challenge by proposing and implementing a peer assessment-based Scrum project (PA-SP) learning approach in…
Descriptors: Peer Evaluation, Computer Science Education, Programming, Mental Computation
Peer reviewed Peer reviewed
Direct linkDirect link
Kuo, Yu-Chen; Chen, Yun-An – Education and Information Technologies, 2023
With the development of science and technology, the demand for programmers has increased. However, learning computer programs is not an easy task. It might cause a significant impact on programming if misconceptions exist at the beginning of the study. Hence, it is important to discover and correct them immediately. Chatbots are effective teaching…
Descriptors: Programming, Artificial Intelligence, Computer Science Education, Misconceptions
Peer reviewed Peer reviewed
Direct linkDirect link
Mamedova, Larisa; Rukovich, Alexander; Likhouzova, Tetiana; Vorona-Slivinskaya, Lubov – Education and Information Technologies, 2023
The World Health Organization announced the COVID-19 pandemic, which led to considerable disruption of the global education system and required an early adaptation of the educational process. In addition to the resumption of the educational process, it was necessary to preserve the academic performance of students of higher educational…
Descriptors: Academic Achievement, Engineering Education, Chemistry, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Marowka, Ami – Education and Information Technologies, 2018
Python is gaining popularity in academia as the preferred language to teach novices serial programming. The syntax of Python is clean, easy, and simple to understand. At the same time, it is a high-level programming language that supports multi programming paradigms such as imperative, functional, and object-oriented. Therefore, by default, it is…
Descriptors: Computer Science Education, Programming Languages, Computer Software, Engineering Education
Peer reviewed Peer reviewed
Direct linkDirect link
Aimicheva, G.; Kopeyev, Zh.; Ordabayeva, Zh.; Tokzhigitova, N.; Akimova, S. – Education and Information Technologies, 2020
The article is devoted to the issues of teaching mobile application development and, as a consequence, training of highly qualified in-demand mobile developers. Nowadays, training professional mobile developers is a crucial task all over the world. The researchers emphasize the complexity of mobile application development associated with its…
Descriptors: Teaching Methods, Telecommunications, Handheld Devices, Undergraduate Students
Previous Page | Next Page »
Pages: 1  |  2