Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Networks | 4 |
| Computer Software | 4 |
| Course Descriptions | 4 |
| Computer Assisted Instruction | 3 |
| Computer Science Education | 2 |
| Introductory Courses | 2 |
| Adult Basic Education | 1 |
| Assignments | 1 |
| Basic Skills | 1 |
| Classroom Environment | 1 |
| Classroom Techniques | 1 |
| More ▼ | |
Author
| Bhunia, Swarup | 1 |
| Fraser, Catherine C. | 1 |
| Goldstein, Ira | 1 |
| Massey, Nancy | 1 |
| Paul, Shubhra Deb | 1 |
| Yang, Shuo | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 2 |
| Opinion Papers | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Florida | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
What! No GUI? -- Teaching a Text Based Command Line Oriented Introduction to Computer Science Course
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewedFraser, Catherine C. – Unterrichtspraxis/Teaching German, 1999
Students in a third-year introduction to German literature course chatted over networked computers, using "FirstClass" software. A brief description of the course design is provided with detailed information on how the three chat sessions were organized. (Author/VWL)
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Computer Networks, Computer Software
Massey, Nancy – 1998
The report documents some of the uses of computers and computer software in North Carolina adult basic skills and literacy education programs. It includes articles on: the role and activities of the North Carolina Literacy Resource Center; a hosiery industry initiative to provide computer-assisted vocational English-as-a-Second-Language training;…
Descriptors: Adult Basic Education, Basic Skills, Classroom Environment, Classroom Techniques


