NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fagan, Bryan J.; Payne, Bryson R. – Proceedings of the Interdisciplinary STEM Teaching and Learning Conference, 2017
The US Bureau of Labor Statistics predicts over 8 million job openings in IT and computing, including 1 million cybersecurity postings, over the current five-year period. This paper presents lessons learned in preparing middle-school students in rural Georgia for future careers in computer science/ IT by teaching computer programming in the free,…
Descriptors: Programming Languages, Teaching Methods, Computer Science Education, Open Source Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Huynh, Minh; Ghimire, Prashant – Journal of Information Technology Education: Innovations in Practice, 2015
As mobile devices become prevalent, there is always a need for apps. How hard is it to develop an app, especially a cross-platform app? The paper shares an experience in a project that involved the development of a student services web app that can be run on cross-platform mobile devices. The paper first describes the background of the project,…
Descriptors: Handheld Devices, Computer Oriented Programs, Computer Software, Open Source Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Tang, Stephen; Hanneghan, Martin – Journal of Interactive Learning Research, 2011
Game-based learning harnesses the advantages of computer games technology to create a fun, motivating and interactive virtual learning environment that promotes problem-based experiential learning. Such an approach is advocated by many commentators to provide an enhanced learning experience than those based on traditional didactic methods.…
Descriptors: Computer Software, Educational Technology, Teaching Methods, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology