NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Callihan, Steven E. – Internet World, 1996
Offers advice for choosing an Internet provider: consider the amount of time, effort, and expertise one has, coupled with the complexity of the Web page, which impact price and choice of provider; and question providers about server speed, ports, architecture, traffic levels, fee structures, and registration of domain names. Lists 33 Web presence…
Descriptors: Computer Networks, Computer Peripherals, Costs, Guidelines
Peer reviewed Peer reviewed
Forcheri, Paolo; Molfino, Maria Teresa; Quarati, Alfonso – British Journal of Educational Technology, 2000
Presents an experimental approach for devising training measures to help small and medium enterprises in Italy effectively use teleconferencing tools. Highlights include interviews and surveys that determined training needs; computer tools used, including networks, the Internet, and the World Wide Web; and guidelines to make training more…
Descriptors: Computer Networks, Foreign Countries, Guidelines, Instructional Effectiveness
1997
This 43-minute videotape is part of the on-going Internet education series exploring the fascinating resources of the Internet. It was produced directly for those in society that did not have computers growing up. One exceptional point of the video is its simple approach. It demonstrates World Wide Web, e-mail and other Internet applications.…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Oriented Programs, Electronic Mail
Howden, Norman – 1997
This manual offers guidance for librarians on every aspect of local area networking from start-up through maintenance and trouble shooting. This second edition has been revised to include information on: definition and explication of TCP/IP; Novell 4.0; Internet connection gear; equipment capable of handling Web access; Windows NT and Windows for…
Descriptors: Computer Networks, Guidelines, Information Management, Internet
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Woodruff, Barbara A. – 1995
This report describes a project conducted for the following purposes: (1) research the new technologies that will be part of the upcoming information boom, popularly referred to as the "information superhighway"; (2) interview technical professionals in the scientific field to find out their feelings and predictions on the technology;…
Descriptors: Adult Basic Education, Computer Literacy, Computer Networks, Computer Software
Maddux, Cleborne D.; Johnson, D. LaMont – Educational Technology, 1997
Guidelines for educational Web sites are discussed: determining the purpose; providing essential identifiers; determining page length; revising; establishing Internet Child Safety rules; providing a model for observing copyright law; providing links to home pages; using professional language; using images judiciously; assuring the page looks good…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer System Design, Computer Uses in Education
Offutt, Elizabeth Rhodes; Offutt, Charles R. – 1996
This book provides guidelines on how to use the Internet, discusses the educational benefits of the Internet, and includes several activities in seven subject areas for grades K-6. The book is divided into two parts: "Entering a New World" and "Integrating Internet Resources Throughout the Curriculum." The first part provides a…
Descriptors: Computer Networks, Computer Uses in Education, Educational Technology, Elementary Education
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks