NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Pequeno, Jaildo Tavares; Fonseca, Benjamim; Lopes, Joaquim Bernardino Oliveira – European Journal of Engineering Education, 2022
This study contributes to learning improvement in practical classes in Computer Network technology courses, using the Physical Technological Laboratory (PTL) as a tool. Multimodal narration content analysis was used, which aggregates and organises the data collected in the PTL environment. Based on the results, we infer that both the student and…
Descriptors: Science Instruction, Laboratories, Computer Networks, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Recalde, Jordi Mogas; Palau, Ramon; Galés, Neus Lorenzo; Gallon, Ray – International Journal of Mobile and Blended Learning, 2020
This paper presents results of a focus group that gathered data from principals of several public schools in Catalonia regarding the educational impact of Industry 4.0 technologies. Conclusions and recommendations are drawn from qualitative analysis with a view to improving smart classrooms via educational innovation. Results show that the schools…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Public Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita – Educational Technology & Society, 2017
More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…
Descriptors: Experimental Groups, Control Groups, Comparative Analysis, Academic Achievement
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Delialioglu, Omer; Cakir, Hasan; Bichelmeyer, Barbara A.; Dennis, Alan R.; Duffy, Thomas M. – Turkish Online Journal of Educational Technology - TOJET, 2010
This study investigates the factors impacting the achievement of adult learners in a technology certificate program on computer networks. We studied 2442 participants in 256 institutions. The participants were older than age 18 and were enrolled in the Cisco Certified Network Associate (CCNA) technology training program as "non-degree" or…
Descriptors: Adult Learning, Adult Students, Program Effectiveness, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Gkatzidou, Stavroula; Pearson, Elaine – Australasian Journal of Educational Technology, 2009
With the rapid development of wireless networks and mobile technologies and the increasing adoption of mobile learning, the need for "anywhere, anytime and any device" access to information becomes more evident. This has influenced the design of learning objects. The small but developing literature on vodcasting indicates its potential…
Descriptors: Access to Information, Program Effectiveness, Educational Technology, Telecommunications
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Peer reviewed Peer reviewed
Direct linkDirect link
Platt, Richard G.; Carper, William B.; McCool, Michael – Journal of Information Systems Education, 2010
In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…
Descriptors: Information Technology, Internet, Case Studies, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Noble, Howard; Curtis, Daniel; Tang, Kang – EDUCAUSE Quarterly, 2009
The government of the United Kingdom has set a target to reduce CO2 emissions by at least 34 percent from 1990 levels by 2020. The Carbon Reduction Commitment (CRC) will require all large public and private sector organizations across the U.K. to cut carbon emissions and report total CO2 emissions annually so that the data can be published in a…
Descriptors: Energy Conservation, Computers, Foreign Countries, Technological Advancement
Peer reviewed Peer reviewed
Direct linkDirect link
Cakir, Hasan; Delialioglu, Omer; Dennis, Alan; Duffy, Thomas – AACE Journal, 2009
Student achievement gap between urban and suburban regions are a major issue in U.S. schools. Technology enhanced learning environments that support teaching and learning process with advanced technology may close this achievement gap. This paper examines the impact of student and school factors with an emphasis on schools' geographic location on…
Descriptors: Academic Achievement, Instructional Materials, Geographic Location, Educational Environment
Peer reviewed Peer reviewed
Direct linkDirect link
So, Koon Keung Teddy – Australian Educational Computing, 2004
In 2002, the Honk Kong government launched a pilot scheme "e-school bag" promoting the use of wireless technology in ten primary and ten secondary schools for classroom teaching and learning. In 2003, a secondary school successfully received a grant from the Quality Education Fund (QEF) to implement a wireless network for outdoor field…
Descriptors: Field Trips, Information Technology, Foreign Countries, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Beyers, R. N. – South African Journal of Higher Education, 2007
The purpose of the study was to demonstrate that two schools which were geographically separated could be digitally included using broadband radio connections, interactive white-boards and other technologies to enable virtual interactive and collaborative lessons. The project was established to overcome a transport problem of bussing learners from…
Descriptors: Grade 10, Computer Mediated Communication, Influence of Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Kozma, Robert; McGhee, Ray; Quellmalz, Edys; Zalles, Dan – International Journal of Educational Development, 2004
In response to this digital divide between developed and developing countries in their use of computers to prepare students for the global economy, the World Bank and, subsequently, the World Links organization provided schools in developing countries with networked computers and training that supports integration of ICT into teaching. This…
Descriptors: Developed Nations, Developing Nations, Access to Computers, Computer Uses in Education
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Previous Page | Next Page »
Pages: 1  |  2