Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
Journal on Educational… | 6 |
Author
Douce, Christopher | 1 |
Greitzer, Frank L. | 1 |
Huston, Kristy | 1 |
Kuchar, Olga Anna | 1 |
Kuittinen, Marja | 1 |
Livingstone, David | 1 |
Nugent, Gwen | 1 |
Orwell, James | 1 |
Parsons, Simon | 1 |
Sajaniemi, Jorma | 1 |
Samal, Ashok | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 3 |
Reports - Evaluative | 3 |
Education Level
Adult Education | 1 |
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sajaniemi, Jorma; Kuittinen, Marja; Tikansalo, Taina – Journal on Educational Resources in Computing, 2008
Students' understanding of object-oriented (OO) program execution was studied by asking students to draw a picture of a program state at a specific moment. Students were given minimal instructions on what to include in their drawings in order to see what they considered to be central concepts and relationships in program execution. Three drawing…
Descriptors: Freehand Drawing, Programming, Student Development, Misconceptions
Greitzer, Frank L.; Kuchar, Olga Anna; Huston, Kristy – Journal on Educational Resources in Computing, 2007
Serious games use entertainment principles, creativity, and technology to meet government or corporate training objectives, but these principles alone will not guarantee that the intended learning will occur. To be effective, serious games must incorporate sound cognitive, learning, and pedagogical principles into their design and structure. In…
Descriptors: Training Objectives, Educational Technology, Educational Principles, Design Requirements
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology
Douce, Christopher; Livingstone, David; Orwell, James – Journal on Educational Resources in Computing, 2005
Systems that automatically assess student programming assignments have been designed and used for over forty years. Systems that objectively test and mark student programming work were developed simultaneously with programming assessment in the computer science curriculum. This article reviews a number of influential automatic assessment systems,…
Descriptors: Electronic Learning, Programming, Curriculum, Computer Science
Sklar, Elizabeth; Parsons, Simon; Stone, Peter – Journal on Educational Resources in Computing, 2004
In the education literature, team-based projects have proven to be an effective pedagogical methodology. We have been using "RoboCup" challenges as the basis for class projects in undergraduate and masters level courses. This article discusses several independent efforts in this direction and presents our work in the development of shared…
Descriptors: Computer Science Education, Computer Science, Shared Resources and Services, Robotics
Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – Journal on Educational Resources in Computing, 2005
Closed laboratories are becoming an increasingly popular approach to teaching introductory computer science courses, as they facilitate structured problem-solving and cooperation. However, most closed laboratories have been designed and implemented without embedded instructional research components for constant evaluation of the laboratories'…
Descriptors: Computer Science Education, Student Needs, Research Design, Laboratories