NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Luterbach, Kenneth J. – Educational Technology, 2013
Educational technologists may advance the state of the field by increasing capacity to develop software tools and instructional applications. Presently, few academic programs in educational technology require even a single computer programming course. Further, the educational technologists who develop software generally work independently or in…
Descriptors: Computer Software, Educational Technology, Programming, Capacity Building
Peer reviewed Peer reviewed
Bakar, Ab. Rahim bin; Mohamed, Shamsiah – Computers & Education, 1998
A Malaysian study investigating the preparedness of vocational and technology teachers to integrate computer technology found that teachers were not knowledgeable about computers or computer software and thought they were not skillful in using spreadsheets, word processing, desktop publishing, database management, and programming software. Most…
Descriptors: Computer Literacy, Computer Oriented Programs, Computer Software, Databases