NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 616 to 630 of 4,561 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
DiCerbo, Kristen E. – Journal of Information Technology Education, 2007
Students bring prior knowledge to their learning experiences. This prior knowledge is known to affect how students encode and later retrieve new information learned. Teachers and content developers can use information about students' prior knowledge to create more effective lessons and materials. In many content areas, particularly the sciences,…
Descriptors: Concept Mapping, Network Analysis, Prior Learning, Cognitive Structures
Peer reviewed Peer reviewed
Direct linkDirect link
Berman, Francine – EDUCAUSE Review, 2008
Providing an evolving foundation for 21st-century research and education, cyberinfrastructure is both a focus for invention and an accelerator of innovation, linked through a trajectory that begins with design and evolves to broad-based use. (Contains 1 figure, 1 table and 11 notes.)
Descriptors: Computer Networks, Internet, Technological Advancement, Computer Mediated Communication
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gray, Lucinda; Thomas, Nina; Lewis, Laurie – National Center for Education Statistics, 2010
This report provides national data on the availability and use of educational technology among teachers in public elementary and secondary schools during the winter and spring of 2009. The data are the results of a national teacher-level survey that is one of a set that includes district, school, and teacher surveys on educational technology.…
Descriptors: Educational Technology, Technology Uses in Education, Public Schools, Elementary Schools
Dixit, R. K. – Online Submission, 2010
This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…
Descriptors: Diabetes, Computers, Computer Science, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Jie Chi; Lin, Yi Lung – Educational Technology & Society, 2010
When using mobile devices in support of learning activities, students gain mobility, but problems arise when group members share information. The small size of the mobile device screen becomes problematic when it is being used by two or more students to share and exchange information. This problem affects interactions among group members. To…
Descriptors: Electronic Learning, Student Attitudes, Pretests Posttests, Achievement Tests
Peer reviewed Peer reviewed
Direct linkDirect link
Selber, Stuart A. – College Composition and Communication, 2009
Academic institutions mediate online literacy practices in meaningful and significant ways. This essay explores the nature of that mediational process, using a visual-spatial method to map out and conceptualize dynamics and structures that have a bearing on the work of composition. A key argument is that composition teachers are intellectually…
Descriptors: Computer Uses in Education, Criticism, College Administration, Influence of Technology
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Coe Regan, Jo Ann R.; Youn, Eric J. – Journal of Social Work Education, 2008
Distance education in social work has grown significantly due to the use of interactive television and computer networks. Given the recent developments in delivering distance education utilizing Web-based technology, this article presents a literature review focused on identifying generational trends in the development of Web-based learning…
Descriptors: Distance Education, Educational Technology, Clinical Experience, Internet
Eisenberg, Mike – Library Journal, 2008
The Web 2.0 "buzz" starts with new technologies such as virtual worlds, cell phones and handheld devices that offer 24/7 web access, tagging, social networks, and blogs and brings together various web capabilities in unique combinations. Web 2.0, however, is about much more than the technology--it is about a change in focus to participation, user…
Descriptors: Information Science Education, Information Needs, Libraries, Information Science
Peer reviewed Peer reviewed
Direct linkDirect link
Eriksson, Miikka J.; Vuojarvi, Hanna; Ruokamo, Heli – Australasian Journal of Educational Technology, 2009
This study explores whether university students find that laptop computers and networks increase flexibility and effectiveness of studying. Special attention has been paid to non-traditional students who have extra commitments, such as taking care of children or term-time employment. Questionnaire data was collected from students who had the…
Descriptors: Student Attitudes, College Students, Study Habits, Questionnaires
Peer reviewed Peer reviewed
Direct linkDirect link
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Witt, Michael – Telecommunications, 1995
Discusses Internet protocol (IP) and subnets and describes how IP may operate over asynchronous transfer mode (ATM). Topics include TCP (transmission control protocol), ATM cells and adaptation layers, a basic architectural model for IP over ATM, address resolution, mapping IP to a subnet technology, and connection management strategy. (LRW)
Descriptors: Computer Networks, Telecommunications
Pages: 1  |  ...  |  38  |  39  |  40  |  41  |  42  |  43  |  44  |  45  |  46  |  ...  |  305