NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Adkins, Meredith C.; Lucas, Kathleen C. – Electronic Library, 1986
This checklist provides guidance on how to measure adequacy of control and security of computer systems, identifies areas of risk, raises management and user awareness of their stewardship responsibilities, and reviews issues relative to system documentation, maintenance, integrity, and reliability. (MBR)
Descriptors: Check Lists, Computer Software, Cost Effectiveness, Integrity
Guthrie, Hugh – 1987
This report defines the functions of computer-managed learning (CML) as (1) test generation, correction, and analysis; (2) record keeping and reporting; (3) routing learners through a set of learning activities; and (4) charting learner progress for a variety of purposes. It then describes the hardware characteristics and configuration of three…
Descriptors: Check Lists, Computer Assisted Testing, Computer Managed Instruction, Computer Software
Peer reviewed Peer reviewed
Quinn, Kenneth – Reference Services Review, 1990
Briefly describes available expert system shells and identifies evaluation criteria relevant to the use of a shell by libraries. Areas discussed include ease of use by system developers and end users, detachability of finished systems, and costs. A glossary is provided. (10 references) (CLB)
Descriptors: Authoring Aids (Programing), Check Lists, Computer Software, Costs