NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
According to the National Safety Council, 63 million computers became obsolete in 2005 alone, and it is estimated that the total number in storage in 2007 numbers upwards of 500 million computers (Earth 911, 2007). This article describes the steps that one should take before disposing of an obsolete computer. First and foremost, all personal…
Descriptors: Conservation (Environment), Computers, Computer Security, Access to Information
Peer reviewed Peer reviewed
Caverly, David C.; Broderick, Bill – Journal of Developmental Education, 1993
Explains how to access the Internet, discussing hardware and software considerations, connectivity, and types of access available to users. Describes the uses of electronic mail; TELNET, a method for remotely logging onto another computer; and anonymous File Transfer Protocol (FTP), a method for downloading files from a remote computer. (MAB)
Descriptors: Access to Information, Computer Networks, Computer Peripherals, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rajendran, L.; Venkatesan, M.; Kanthimathi, S. – Journal of Educational Technology, 2005
Going digital is the way to minimize handling of damaged materials, but the imaging process is demanding and must be done with oversight by preservation staff and with a high enough level of quality to ensure the reusability of the archival electronic file for as long as possible. This paper focuses on the scope and needs of digital preservation,…
Descriptors: Electronic Libraries, Library Materials, Archives, Preservation