Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 3 |
Computer Software | 3 |
Troubleshooting | 3 |
Electronic Learning | 2 |
Attention | 1 |
Bayesian Statistics | 1 |
Case Studies | 1 |
Classification | 1 |
Computer Interfaces | 1 |
Computer Science Education | 1 |
Computer Security | 1 |
More ▼ |
Author
Abdel-Maksoud, Nahed F. | 1 |
Behrens, John T. | 1 |
Benson, Martin | 1 |
Calico, Tiago | 1 |
Crawford, Aaron V. | 1 |
Dicerbo, Kristen E. | 1 |
Fay, Derek | 1 |
Kunze, Katie L. | 1 |
Levy, Roy | 1 |
Miller, Steven E. | 1 |
Mislevy, Robert J. | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Egypt | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Abdel-Maksoud, Nahed F. – International Journal of Education and Practice, 2018
Virtualization technology has been around for many years, and its use is increasingly becoming common in education, in general and in computing fields, in particular. This can be attributed partly to its potential to reduce costs, boost efficiency and overcome limited resources through its virtual applications such as servers, storage devices and…
Descriptors: Electronic Learning, Educational Environment, Educational Quality, Instructional Effectiveness
Rupp, Andre A.; Levy, Roy; Dicerbo, Kristen E.; Sweet, Shauna J.; Crawford, Aaron V.; Calico, Tiago; Benson, Martin; Fay, Derek; Kunze, Katie L.; Mislevy, Robert J.; Behrens, John T. – Journal of Educational Data Mining, 2012
In this paper we describe the development and refinement of "evidence rules" and "measurement models" within the "evidence model" of the "evidence-centered design" (ECD) framework in the context of the "Packet Tracer" digital learning environment of the "Cisco Networking Academy." Using…
Descriptors: Computer Networks, Evidence Based Practice, Design, Instructional Design
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks