NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Juraj Hromkovic; Regula Lacher – Informatics in Education, 2025
The design of algorithms is one of the hardest topics of high school computer science. This is mainly due to the universality of algorithms as solution methods that guarantee the calculation of a correct solution for all potentially infinitely many instances of an algorithmic problem. The goal of this paper is to present a comprehensible and…
Descriptors: Algorithms, Computer Science Education, High School Students, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Haipeng Wan; Xue Zhang; Xinxue Yang; Shan Li – Education and Information Technologies, 2024
This study investigated the impact of problematization-oriented scaffolding and structuring-oriented scaffolding, incorporated within instructional videos, on students' computational thinking and their performance in programming education. We recruited 86 participants from three senior classes at a high school. Each of the three classes was…
Descriptors: Scaffolding (Teaching Technique), Instructional Design, Thinking Skills, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pishtari, Gerti; Prieto, Luis P.; Rodriguez-Triana, Maria Jesus; Martinez-Maldonado, Roberto – Journal of Learning Analytics, 2022
This research was triggered by the identified need in literature for large-scale studies about the kinds of designs that teachers create for mobile learning (m-learning). These studies require analyses of large datasets of learning designs. The common approach followed by researchers when analyzing designs has been to manually classify them…
Descriptors: Scaling, Classification, Context Effect, Telecommunications
Peer reviewed Peer reviewed
Dios, R.; Geller, J. – Computers & Education, 1998
Focuses on identifying the educational effects of "activity oriented" instructional techniques. Examines which instructional methods produce enhanced learning and comprehension. Discusses the problem of learning "sorting algorithms," a major topic in every Computer Science curriculum. Presents a low-tech, hands-on teaching method for sorting…
Descriptors: Active Learning, Algorithms, Computer Science Education, Experiential Learning
Vadaparty, K.; And Others – 1994
This paper presents the implications of an ongoing project on the design and development of multimedia instructional material for teaching and learning computer science topics at both graduate and undergraduate levels. Important pedagogical requirements that CAI software should satisfy include: (1) animation of the changes in tree topologies; (2)…
Descriptors: Algorithms, Animation, Computer Assisted Instruction, Computer Science Education