NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 4,006 to 4,020 of 10,814 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Tsompanoudi, Despina; Satratzemi, Maya; Xinogalos, Stelios – IEEE Transactions on Education, 2016
The results presented in this paper contribute to research on two different areas of teaching methods: distributed pair programming (DPP) and computer-supported collaborative learning (CSCL). An evaluation study of a DPP system that supports collaboration scripts was conducted over one semester of a computer science course. Seventy-four students…
Descriptors: Computer Uses in Education, Cooperative Learning, Computer Science Education, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Mironova, Olga; Amitan, Irina; Vendelin, Jelena; Vilipõld, Jüri; Saar, Merike – Interactive Technology and Smart Education, 2016
Purpose: This paper aims to present a teaching approach to achieve the most personal support for students with different backgrounds and preferences in studying an Informatics course. Design/Methodology/Approach: The presented methodology is based on the main principles of flexible and blended learning. The authors considered three main aspects:…
Descriptors: Electronic Learning, College Freshmen, Information Science Education, College Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sahin, Muhittin; Kisla, Tarik – Turkish Online Journal of Educational Technology - TOJET, 2016
The aim of this research is to analyze university students' attitudes towards personalized learning environments with respect to the independent variables of gender, age, university, year of study, knowledge about the environment, participation in the environment and being willing to participate in the environment. The correlative survey model is…
Descriptors: Foreign Countries, College Students, Correlation, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Khinkanina, Alla L.; Serova, Olga E. – International Journal of Environmental and Science Education, 2016
The results of the empirical investigation of the characteristics of value and professional orientation of the students taking studies in social and computer engineering related fields are presented. The types of value structure uncovered depend on the students' attitudes to the values significant for the professional evolution (active mode of…
Descriptors: Foreign Countries, College Students, Student Attitudes, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawler, James; Molluzzo, John C. – Contemporary Issues in Education Research, 2016
Bullying is considered to be omnipresent in business firms and prevalent in entrepreneurial firms in information systems and in departments of information systems in industry. Entrepreneurialism and narcissism of personalities in the information systems profession may be perceived as especially predisposed to bullying. The authors of this paper…
Descriptors: Bullying, Knowledge Level, Information Systems, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Brooks, Stoney; Taylor, Joseph – Journal of Education for Business, 2016
The authors explore the differences between traditional, book-based methods of teaching Excel and online, platform-supported methods by comparing teaching students in different locations, with and without online support. As Excel is a critical skill for business majors, the authors investigate which methods and locations provide the highest…
Descriptors: Conventional Instruction, Computer Software, Computer Science, Online Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Parks, Rachida F.; Hall, Chelsea A. – Information Systems Education Journal, 2016
This case study consists of a real database project for a charter school--Scholar's Academy--and provides background information on the school and its cafeteria processing system. Also included are functional requirements and some illustrative data. Students are tasked with the design and development of a database for the purpose of improving the…
Descriptors: Database Design, Systems Development, Case Studies, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Ott, Claudia; Robins, Anthony; Shephard, Kerry – ACM Transactions on Computing Education, 2016
Learning the first programming language is challenging for many students. High failure rates and bimodally distributed grades lead to a pedagogical interest in supporting students in first-year programming courses (CS1). In higher education, the important role of feedback for guiding the learning process and improving the learning outcome is…
Descriptors: Feedback (Response), Programming, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Kunkle, Wanda M.; Allen, Robert B. – ACM Transactions on Computing Education, 2016
Learning to program, especially in the object-oriented paradigm, is a difficult undertaking for many students. As a result, computing educators have tried a variety of instructional methods to assist beginning programmers. These include developing approaches geared specifically toward novices and experimenting with different introductory…
Descriptors: Teaching Methods, Programming, Programming Languages, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Chao, Lee – International Journal of Distance Education Technologies, 2012
The objective of this article is to facilitate mobile teaching and learning by providing an alternative course material deployment method. This article suggests a course material deployment platform for small universities or individual instructors. Different from traditional course material deployment methods, the method discussed deploys course…
Descriptors: Teaching Methods, Computer Science, Electronic Learning, Science Curriculum
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David – Information Systems Education Journal, 2014
This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…
Descriptors: Case Studies, Information Security, Computer Security, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Allinjawi, Arwa A.; Al-Nuaim, Hana A.; Krause, Paul – ACM Transactions on Computing Education, 2014
Students often face difficulties while learning object-oriented programming (OOP) concepts. Many papers have presented various assessment methods for diagnosing learning problems to improve the teaching of programming in computer science (CS) higher education. The research presented in this article illustrates that although max-min composition is…
Descriptors: Programming, Computer Science Education, Student Problems, Higher Education
Educational Horizons, 2014
Pat Yongpradit is the director of education at Code.org. He leads all education efforts, including professional development and curriculum creation, and he builds relationships with school districts. Pat joined "Educational Horizons" to talk about why it is important to teach computer science--even for non-computer science teachers. This…
Descriptors: Computer Science Education, Programming, Interviews, Elementary School Students
Bourrie, David Michael – ProQuest LLC, 2014
Although a great deal of work has been done to develop new educational innovations, in the field of engineering, few innovations have found widespread acceptance in the classroom. Therefore, frameworks that conceptualize the interactions among the variables that influence successful dissemination are critical. In this dissertation, dissemination…
Descriptors: STEM Education, Educational Innovation, Prediction, Readiness
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Taherkhani, Ahmad; Malmi, Lauri – Journal of Educational Data Mining, 2013
In this paper, we present a method for recognizing algorithms from students programming submissions coded in Java. The method is based on the concept of "programming schemas" and "beacons". Schemas are high-level programming knowledge with detailed knowledge abstracted out, and beacons are statements that imply specific…
Descriptors: Programming, Mathematics, Computer Science Education, Methods
Pages: 1  |  ...  |  264  |  265  |  266  |  267  |  268  |  269  |  270  |  271  |  272  |  ...  |  721