NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 5,056 to 5,070 of 7,857 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Castro-Schez, J. J.; del Castillo, E.; Hortolano, J.; Rodriguez, A. – IEEE Transactions on Education, 2009
Educational software tools are considered to enrich teaching strategies, providing a more compelling means of exploration and feedback than traditional blackboard methods. Moreover, software simulators provide a more motivating link between theory and practice than pencil-paper methods, encouraging active and discovery learning in the students.…
Descriptors: Foreign Countries, Computer Software, Data Analysis, Web Based Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Cox, G. W.; Hughes, W. E., Jr.; Etzkorn, L. H.; Weisskopf, M. E. – IEEE Transactions on Education, 2009
This paper presents the results of an analysis of indicators that can be used to predict whether a student will succeed in a Computer Science Ph.D. program. The analysis was conducted by studying the records of 75 students who have been in the Computer Science Ph.D. program of the University of Alabama in Huntsville. Seventy-seven variables were…
Descriptors: Case Studies, Prediction, Computer Science Education, Doctoral Degrees
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Hsinchun; Li, Xin; Chau, M.; Ho, Yi-Jen; Tseng, Chunju – IEEE Transactions on Education, 2009
With the advent of the World Wide Web, many business applications that utilize data mining and text mining techniques to extract useful business information on the Web have evolved from Web searching to Web mining. It is important for students to acquire knowledge and hands-on experience in Web mining during their education in information systems…
Descriptors: Class Activities, Information Systems, Internet, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ritzhaupt, Albert D. – ACM Transactions on Computing Education, 2009
This article provides an overview of the challenges in implementing a game development course with limited resources in computing curricula. An approach to a holistic game development course is outlined in terms of its organization, software, and instructional methods. The course had 23 students enrolled in its first offering and was…
Descriptors: Educational Strategies, Reliability, Cooperative Learning, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Caspersen, Michael E.; Kolling, Michael – ACM Transactions on Computing Education, 2009
Programming is recognized as one of seven grand challenges in computing education. Decades of research have shown that the major problems novices experience are composition-based---they may know what the individual programming language constructs are, but they do not know how to put them together. Despite this fact, textbooks, educational…
Descriptors: Programming Languages, Computer Software, Educational Practices, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Dyson, Laurel Evelyn; Litchfield, Andrew; Lawrence, Elaine; Raban, Ryszard; Leijdekkers, Peter – Australasian Journal of Educational Technology, 2009
This article reports on an m-learning research agenda instituted at our university in order to explore how mobile technology can enhance active, experiential learning. Details of the implementation and results of four areas of m-learning are presented: mobile supported fieldwork, fostering interactivity in large lectures with mobile technology,…
Descriptors: Experiential Learning, Case Studies, Program Implementation, Curriculum Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Paz, Tamar; Leron, Uri – Journal for Research in Mathematics Education, 2009
Functions are all around us, disguised as actions on concrete objects. Composition of functions, too, is all around us, because these actions can be performed in succession, the output of one serving as the input for the next. In terms of Gray and Tall's (2001) "embodied objects" or Lakoff and Nunez's (2000) "mathematical idea…
Descriptors: Concept Formation, Mathematics Instruction, Mathematical Concepts, Algebra
Peer reviewed Peer reviewed
Westley, John W. – Business Education Forum, 1976
In addition to the input/output record format, the program flowchart, the program listing, and the program test output, eight documentation items are suggested in order that they may serve as a base from which to start teaching program documentation. (Author/AG)
Descriptors: Computer Science Education, Data Processing, Programing
Hannigan, Joseph T.; Engvall, Richard E. – 1970
GRADES OR AGES: No mention. SUBJECT MATTER: Computer programing. ORGANIZATION AND PHYSICAL APPEARANCE: The guide is divided into seven chapters, each of which is in outline form with numerous diagrams and charts. It is mimeographed and looseleaf-bound with a paper cover. OBJECTIVES AND ACTIVITIES: No objectives are mentioned. Each of the seven…
Descriptors: Computer Science Education, Curriculum Guides, Programing
Peer reviewed Peer reviewed
Thomas, Rex A. – AEDS Journal, 1976
Describes an instrument created to measure the general level of computer literacy of high school students and to obtain baseline data on student awareness of computer concepts. (Author/IRT)
Descriptors: Computer Science Education, High Schools, Tests
Fingar, Peter – AEDS Monitor, 1976
The use of overhead transparencies can enhance the whole-to-parts method of teaching computer concepts.
Descriptors: Computer Science Education, Teaching Methods, Transparencies
Peer reviewed Peer reviewed
Direct linkDirect link
Stauffer, Karen; Lin, Fuhua; Koole, Marguerite – International Journal of Distance Education Technologies, 2008
This article presents a methodology for developing learning objects for web-based courses using the IMS Learning Design (IMS LD) specification. We first investigated the IMS LD specification, determining how to use it with online courses and the student delivery model, and then applied this to a Unit of Learning (UOL) for online computer science…
Descriptors: Web Based Instruction, Educational Technology, Technology Uses in Education, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Hanks, Brian – Journal on Educational Resources in Computing, 2008
In a study of the types of problems encountered by students that led them to seek assistance, Robins et al. [2006] found that the most common problems were related to trivial mechanics. The students in this study worked by themselves on their programming exercises. This article discusses a replication of the Robins et al. study in which the…
Descriptors: Problems, Programming, Peer Relationship, Teamwork
Pages: 1  |  ...  |  334  |  335  |  336  |  337  |  338  |  339  |  340  |  341  |  342  |  ...  |  524