NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
GED Testing Service, 2018
The manual is presented in the form of a policy grid. The grid includes a consolidated list of General Educational Development (GED) Testing Service policies regarding the GED® test and overall GED® program. The grid combines all of the policies into one unified table and supersedes any prior policy manual.
Descriptors: High School Equivalency Programs, Equivalency Tests, Testing Programs, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Hayes, Deborah; Eclavea, Elaine; Dreith, Susan; Habte, Bereket – Volta Review, 2012
This manuscript describes a pilot project in which infants in Guam who refer on newborn hearing screening receive diagnostic audiological evaluation conducted by audiologists in Colorado over the Internet (telepractice). The evaluation is completed in real time using commercially-available software and personal computers to control the diagnostic…
Descriptors: Infants, Clinical Diagnosis, Audiology, Auditory Evaluation
Data Quality Campaign, 2010
To address key policy and programmatic questions and help improve student and system performance, states must work to link data across the early childhood, postsecondary and workforce (P-20/workforce) spectrum and share this information with appropriate stakeholders. This issue brief highlights current efforts in California, Florida, Indiana, and…
Descriptors: Stakeholders, State Programs, Program Descriptions, Education Work Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy