Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Source
ACM Transactions on Computing… | 2 |
Author
Archer, Ricky | 1 |
Cooper, Stephen | 1 |
Qadah, Yaseen | 1 |
Vega, Percy | 1 |
Xu, Jinsheng | 1 |
Yu, Huiming | 1 |
Yuan, Xiaohong | 1 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Secondary Education | 1 |
Audience
Location
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cooper, Stephen – ACM Transactions on Computing Education, 2010
This article explores the major design characteristics (both pedagogic as well as technical) that helped to shape Alice 2. It identifies several strengths of Alice as well as several weaknesses. An example problem is solved in Alice, covering many of the design characteristics. Finally, the effects and impacts of Alice instruction are presented,…
Descriptors: Computer Software, Computer Assisted Instruction, Computer Science Education, Programming
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study