Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Storage Devices | 4 |
Computer Uses in Education | 4 |
Information Technology | 4 |
Computer System Design | 3 |
Computer Software | 2 |
Data | 2 |
Foreign Countries | 2 |
Internet | 2 |
Technology Planning | 2 |
Academic Achievement | 1 |
Case Method (Teaching… | 1 |
More ▼ |
Author
Basak, P. C. | 1 |
Bennett, Cedric | 1 |
Day, David J. | 1 |
Khanna, Pankaj | 1 |
Lallie, Harjinder Singh | 1 |
Lawson, Phillip | 1 |
Schneider, Edward | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
India | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Khanna, Pankaj; Basak, P. C. – Turkish Online Journal of Distance Education, 2011
It is proposed to establish an Integrated Distance Education System in India by designing modern technology based information communication network, connecting all its ODL (Open and Distance Learning) institutions to the headquarters of the ODL system in India. The principle roles to be performed by such a system have been discussed; according to…
Descriptors: Foreign Countries, Distance Education, Educational Technology, Cost Effectiveness
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration

Schneider, Edward – CALICO Journal, 1987
Describes possible applications of optical memory developments to language education. Discusses Compact Disk Read-Only Memory and Compact Disk-Interactive, their strengths, weaknesses, targeted markets, and educational applications. (LMO)
Descriptors: Computer Assisted Instruction, Computer Storage Devices, Computer Uses in Education, Educational Environment