NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 5,506 to 5,520 of 5,778 results Save | Export
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime
Peer reviewed Peer reviewed
Donohoe, L. Joyce – AMATYC Review, 1992
Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)
Descriptors: Algorithms, Coding, Computer Assisted Instruction, Mathematical Applications
Peer reviewed Peer reviewed
Zimmerman, Don H. – Research on Language and Social Interaction, 1993
Drummond and Hopper's article in this issue, "Back Channels Revisited," is argued to have decontextualized Jefferson's acknowledgement token phenomenon. The need for careful coding protocols for research on conversational practices is discussed. (eight references) (LB)
Descriptors: Coding, Contrastive Linguistics, Data Analysis, Discourse Analysis
Peer reviewed Peer reviewed
Wieder, D. Lawrence – Research on Language and Social Interaction, 1993
It is suggested that the conventional coding procedures of experimental social psychology miss critical (identifying, defining, or constitutive) features of conversation analysis' phenomena because the procedures present the analyst with two different sets of entities; i.e., they are incommensurable. (20 references) (LB)
Descriptors: Coding, Contrastive Linguistics, Discourse Analysis, Language Research
Peer reviewed Peer reviewed
Canfield, Merle L.; And Others – Journal of Consulting and Clinical Psychology, 1991
Introduces computerized coding procedure that rates words and utterances in terms of emotion, cognition, and contract, as well as contingency method of analyzing verbal interactions. Rating procedure and contingency correlation analyses using transcripts of sessions conducted by three therapists with one client found that therapists' utterances…
Descriptors: Affective Behavior, Coding, Cognitive Processes, Computers
Peer reviewed Peer reviewed
Rourke, Liam; Anderson, Terry; Garrison, D. Randy; Archer, Walter – Journal of Distance Education, 1999
Discusses computer conferencing in higher education, presents a community of inquiry model that includes benefits of computer conferencing, and discusses social presence, defined as the ability of learners to project themselves socially and affectively into a community of inquiry. Topics include teacher immediacy, coding, and content analysis of…
Descriptors: Affective Behavior, Coding, Computer Assisted Instruction, Content Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Haarhoff, Leith – Program: Electronic Library and Information Systems, 2005
Purpose: To describe the open-source solution developed by Culturenet Cymru, for the Welsh Books Council, for presenting digitised books and other printed material online. Design/methodology/approach: The challenges faced in the implementation of a pilot e-book collection of nine out-of-print books is described. Findings: The adoption of a number…
Descriptors: Pilot Projects, Foreign Countries, Books, Electronic Publishing
Peer reviewed Peer reviewed
Direct linkDirect link
Perfect, Timothy J.; Stark, Louisa-Jayne; Tree, Jeremy J.; Moulin, Christopher J. A.; Ahmed, Lubna; Hutter, Russell – Journal of Memory and Language, 2004
Retrieval-induced forgetting is the failure to recall a previously studied word following repeated retrieval of a related item. It has been argued that this is due to retrieval competition between practiced and unpracticed items, which results in inhibition of the non-recalled item, detectable with an independent cue at final test. Three…
Descriptors: Cues, Recall (Psychology), Coding, Inhibition
Peer reviewed Peer reviewed
Direct linkDirect link
Gilmore, Grover C.; Royer, Fred L.; Gruhn, Joseph J.; Esson, Michael J. – Intelligence, 2004
Substitution tests have a long history in psychology because of their simplicity of administration and their sensitivity to individual differences related to complex cognitive performance. Despite their widespread use there is no agreement on what the substitution test measures. The present study approached this question by applying a method of…
Descriptors: Individual Differences, Symbols (Mathematics), Visual Stimuli, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Griffin, Marlynn M.; Robinson, Daniel H.; Sarama, Julie – Educational Technology Research and Development, 2005
The conjoint retention hypothesis (CRH) claims that students recall more text information when they study geographic maps in addition to text than when they study text alone, because the maps are encoded spatially (Kulhavy, Lee, & Caterino, 1985). This claim was recently challenged by Griffin and Robinson (2000), who found no advantage for maps…
Descriptors: Retention (Psychology), Hypothesis Testing, Recall (Psychology), Maps
Peer reviewed Peer reviewed
Direct linkDirect link
Miville, Marie L.; Constantine, Madonna G.; Baysden, Matthew F.; So-Lloyd, Gloria – Journal of Counseling Psychology, 2005
The current study explored essential themes of racial identity development among 10 self-identified multiracial adults from a variety of racial backgrounds. Participants were interviewed using a semistructured protocol, and the interviews were recorded, transcribed, and then coded for themes by research team members. Four primary themes were…
Descriptors: Social Environment, Reference Groups, Racial Identification, Case Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Masse, Louise C.; Eason, Karen E.; Tortolero, Susan R.; Kelder, Steven H. – Measurement in Physical Education and Exercise Science, 2005
This study assessed agreement between participants' rating (PMET) and compendium coding (CMET) of estimating physical activity intensity in a population of older minority women. As part of the Women on the Move study, 224 women completed a 7-day activity diary and wore an accelerometer for 7 days. All activities recorded were coded using PMET and…
Descriptors: Physical Activity Level, Comparative Analysis, Computation, Older Adults
Peer reviewed Peer reviewed
Direct linkDirect link
Luckner, John L.; Velaski, Ann – American Annals of the Deaf, 2004
Families provide the building blocks for the development of healthy, happy, competent children. The purpose of the present study was to identify and interview healthy families of children who were deaf. The researchers were interested in identifying factors that contribute to families' health as well as in collecting suggestions for other families…
Descriptors: Health Behavior, Family (Sociological Unit), Children, Deafness
Peer reviewed Peer reviewed
Direct linkDirect link
Clausen, Mary C. – Mathematics Teacher, 2005
The problem of solving mathematical equations can be quite tough for some students hence they face a great difficulty when applying ideas to the actual process. Students in algebra classes are taught coding in which they write down what they will need to do to solve the equation and this coding makes the students more adept at solving equations…
Descriptors: Children, Cognitive Development, Equations (Mathematics), Algebra
Chua, Boon Liang – Australian Mathematics Teacher, 2006
This article describes Cryptography, defined as the science of encrypting and deciphering messages written in secret codes, it has played a vital role in securing information since ancient times. There are several cryptographic techniques and many make extensive use of mathematics to secure information. The author discusses an activity built…
Descriptors: Matrices, Mathematics Activities, Secondary School Teachers, Secondary School Students
Pages: 1  |  ...  |  364  |  365  |  366  |  367  |  368  |  369  |  370  |  371  |  372  |  ...  |  386