NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 49 results Save | Export
Flint D. Million – ProQuest LLC, 2023
The education of students on existing and emerging technologies in higher education environments requires access to complex software. The rise of the Bring Your Own Device (BYOD) phenomenon in many postsecondary educational institutions, along with the increasing complexity of technological coursework, creates challenges for students needing…
Descriptors: Information Technology, Information Science, Business Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Sangwin, Christopher J.; O'Toole, Claire – International Journal of Mathematical Education in Science and Technology, 2017
This paper reports a study which investigated the extent to which undergraduate mathematics students in the United Kingdom are currently taught to programme a computer as a core part of their mathematics degree programme. We undertook an online survey, with significant follow-up correspondence, to gather data on current curricula and received…
Descriptors: Mathematics Curriculum, Mathematics Instruction, Programming, Foreign Countries
Snyder, Robin M. – Association Supporting Computer Users in Education, 2017
The author has attended and presented at most ASCUE meetings since 1994, and has worked professionally in research and development, industry, military, government, business, and private and public academia--moving between computer science, software engineering, and business fields at both the undergraduate and graduate level, and even running…
Descriptors: Computer Science, Computer Software, Information Technology, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Karamete, Aysen – Educational Research and Reviews, 2015
This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…
Descriptors: Computer Science, Educational Technology, Student Teacher Attitudes, Reliability
Pai, Vinay – ProQuest LLC, 2011
The increasing popularity of high-bandwidth Internet connections has enabled new applications like the online delivery of high-quality audio and video content. Conventional server-client approaches place the entire burden of delivery on the content provider's server, making these services expensive to provide. A peer-to-peer approach allows end…
Descriptors: Video Technology, Program Effectiveness, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Wu, Ye-Chi; Ma, Lee Wei; Jiau, Hewijin Christine – Educational Technology & Society, 2013
Programming assignments are commonly used in computer science education to encourage students to practice target concepts and evaluate their learning status. Ensuring students are engaged in such assignments is critical in attracting and retaining students. To this end, WebHat, a service-based program evaluation platform, is introduced in this…
Descriptors: Assignments, Computer Science, Program Evaluation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
O'Grady, Michael J. – ACM Transactions on Computing Education, 2012
Computer Science (CS) is a relatively new disciple and how best to introduce it to new students remains an open question. Likewise, the identification of appropriate instructional strategies for the diverse topics that constitute the average curriculum remains open to debate. One approach considered by a number of practitioners in CS education…
Descriptors: Educational Strategies, Problem Based Learning, Teaching Methods, Computer Science
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Shelley, Mack, Ed.; Akcay, Hakan, Ed.; Ozturk, Omer Tayfur, Ed. – International Society for Technology, Education, and Science, 2022
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on March 24-27, 2022 in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, to discuss theoretical and…
Descriptors: Educational Technology, Technology Uses in Education, Computer Peripherals, Equipment
Peer reviewed Peer reviewed
Direct linkDirect link
Devedzic, V.; Milenkovic, S. R. – IEEE Transactions on Education, 2011
This paper describes the authors' experience of teaching agile software development to students of computer science, software engineering, and other related disciplines, and comments on the implications of this and the lessons learned. It is based on the authors' eight years of experience in teaching agile software methodologies to various groups…
Descriptors: Computer Software, Computer Science, Engineering, College Faculty
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Denner, Jill; Werner, Linda; Ortiz, Eloy – Computers & Education, 2012
Computer game programming has been touted as a promising strategy for engaging children in the kinds of thinking that will prepare them to be producers, not just users of technology. But little is known about what they learn when programming a game. In this article, we present a strategy for coding student games, and summarize the results of an…
Descriptors: Females, Computer Uses in Education, Computers, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Waguespack, Leslie J. – Information Systems Education Journal, 2011
As punishment in the biblical story of Moses the slaves were told they had to make bricks without straw. This was impossible because bricks made without straw had the appearance of strength and function but could not withstand the proof of actual use. The slaves' punishment was therefore not only to make bricks, but also to find the straw on their…
Descriptors: Information Systems, Computer Science Education, Computer Software, Design
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4