Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computers | 5 |
Programming | 5 |
Information Systems | 3 |
Information Technology | 3 |
Computer Software | 2 |
Teaching Methods | 2 |
Action Research | 1 |
Business | 1 |
Business Administration… | 1 |
Case Studies | 1 |
College Faculty | 1 |
More ▼ |
Source
Electronic Journal of… | 1 |
Information Systems Education… | 1 |
Journal of Experimental… | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Author
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
South Africa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Weisberg, Steven M.; Schinazi, Victor R.; Ferrario, Andrea; Newcombe, Nora S. – Journal of Experimental Psychology: Learning, Memory, and Cognition, 2023
Relying on shared tasks and stimuli to conduct research can enhance the replicability of findings and allow a community of researchers to collect large data sets across multiple experiments. This approach is particularly relevant for experiments in spatial navigation, which often require the development of unfamiliar large-scale virtual…
Descriptors: Programming, Error Patterns, Computer Simulation, Spatial Ability
Waguespack, Leslie J. – Information Systems Education Journal, 2011
As punishment in the biblical story of Moses the slaves were told they had to make bricks without straw. This was impossible because bricks made without straw had the appearance of strength and function but could not withstand the proof of actual use. The slaves' punishment was therefore not only to make bricks, but also to find the straw on their…
Descriptors: Information Systems, Computer Science Education, Computer Software, Design
Simkin, Mark G. – Journal of Information Systems Education, 2008
Data-validation routines enable computer applications to test data to ensure their accuracy, completeness, and conformance to industry or proprietary standards. This paper presents five programming cases that require students to validate five different types of data: (1) simple user data entries, (2) UPC codes, (3) passwords, (4) ISBN numbers, and…
Descriptors: Computers, Computer Oriented Programs, Programming, Information Technology
Muganda, Nixon; Joubert, Pieter, Jr.; Toit, Jacques Du; Johnson, Roy – Electronic Journal of Research in Educational Psychology, 2012
Introduction: This paper examines the persistent problematic issue of engaging business students in teaching computer programming. Studies continue to document challenges in teaching computer programming and various methods have been proposed with varying degrees of success. From an educator's perspective, the concern is how to engage students to…
Descriptors: Computer Assisted Instruction, Computers, Stakeholders, Teaching Methods
Gill, T. Grandon; Holton, Carolyn F. – Journal of Information Technology Education, 2006
In this paper, a required introductory programming course being taught to MIS undergraduates using the C++ programming language is described. Two factors make the objectives of the course--which are to provide students with an exposure to the logical organization of the computer in addition to teaching them basic programming logic--particularly…
Descriptors: Group Activities, Management Information Systems, Student Diversity, Occupational Aspiration