NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
North Carolina State Dept. of Public Instruction, Raleigh. Div. of Vocational Education Services. – 1993
This guide focuses on use of the North Carolina Vocational Competency Achievement Tracking System (VoCATS)-designated software in the instructional management process. (VoCATS is a competency-based, computer-based instructional management system that allows the collection of data on student performance achievement prior to, during, and following…
Descriptors: Academic Achievement, Competence, Competency Based Education, Computer Managed Instruction