NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Harmon, Paul – Performance and Instruction, 1984
Considers three powerful techniques--heuristics, context trees, and search via backward chaining--that a knowledge engineer might employ to develop an expert system to automate performance engineering, i.e., the branch of instructional technology that focuses on the problems of business and industry. (MBR)
Descriptors: Algorithms, Artificial Intelligence, Computer Software, Educational Technology
Shakirova, Dilyara; And Others – 1990
This paper describes an approach to instruction and learning processes in professional training schools using microcomputers and computer assisted instruction (CAI). It is argued that the use of computers in education changes existing approaches to teaching and learning by focusing on the structure of the information being taught, the organization…
Descriptors: Algorithms, Computer Assisted Instruction, Computer Software, Creative Thinking
Peer reviewed Peer reviewed
Peled, Zimra; And Others – Journal of Educational Computing Research, 1992
Proposes a taxonomy to aid decision makers in selecting computer software consistent with their educational values regarding the nature of instruction and the use of information technology, based on beliefs about human development and learning. Characteristics of instruction, properties of software, and the congruence between them are discussed.…
Descriptors: Algorithms, Classification, Computer Assisted Instruction, Computer Software
Boody, Charles G., Ed. – Journal of Computer-Based Instruction, 1986
Six articles on music and computing address development of computer-based music technology, computer assisted instruction (CAI) in ear training and music fundamentals, a machine-independent data structure for musical pitch relationship representation, touch tablet input device in a melodic dictation CAI game, and systematic evaluation strategies…
Descriptors: Algorithms, Artificial Intelligence, Computer Assisted Instruction, Computer Software
Peer reviewed Peer reviewed
Canino, Casilda; Cicchelli, Terry – Journal of Educational Computing Research, 1988
Describes aptitude treatment interaction study that used the cognitive styles field dependence and independence matched with computerized algorithmic and discovery treatments to determine mathematics achievement on a criterion-referenced test. Posttest mathematics scores and student responses to the computer are analyzed, and mastery learning is…
Descriptors: Algorithms, Analysis of Covariance, Aptitude Treatment Interaction, Computer Assisted Instruction