Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Networks | 3 |
| Computer Software | 3 |
| Troubleshooting | 3 |
| Electronic Learning | 2 |
| Attention | 1 |
| Bayesian Statistics | 1 |
| Case Studies | 1 |
| Classification | 1 |
| Computer Interfaces | 1 |
| Computer Science Education | 1 |
| Computer Security | 1 |
| More ▼ | |
Author
| Abdel-Maksoud, Nahed F. | 1 |
| Behrens, John T. | 1 |
| Benson, Martin | 1 |
| Calico, Tiago | 1 |
| Crawford, Aaron V. | 1 |
| Dicerbo, Kristen E. | 1 |
| Fay, Derek | 1 |
| Kunze, Katie L. | 1 |
| Levy, Roy | 1 |
| Miller, Steven E. | 1 |
| Mislevy, Robert J. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Reports - Descriptive | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Egypt | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Abdel-Maksoud, Nahed F. – International Journal of Education and Practice, 2018
Virtualization technology has been around for many years, and its use is increasingly becoming common in education, in general and in computing fields, in particular. This can be attributed partly to its potential to reduce costs, boost efficiency and overcome limited resources through its virtual applications such as servers, storage devices and…
Descriptors: Electronic Learning, Educational Environment, Educational Quality, Instructional Effectiveness
Rupp, Andre A.; Levy, Roy; Dicerbo, Kristen E.; Sweet, Shauna J.; Crawford, Aaron V.; Calico, Tiago; Benson, Martin; Fay, Derek; Kunze, Katie L.; Mislevy, Robert J.; Behrens, John T. – Journal of Educational Data Mining, 2012
In this paper we describe the development and refinement of "evidence rules" and "measurement models" within the "evidence model" of the "evidence-centered design" (ECD) framework in the context of the "Packet Tracer" digital learning environment of the "Cisco Networking Academy." Using…
Descriptors: Computer Networks, Evidence Based Practice, Design, Instructional Design
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks

Peer reviewed
Direct link
