Publication Date
| In 2026 | 0 |
| Since 2025 | 434 |
| Since 2022 (last 5 years) | 2022 |
| Since 2017 (last 10 years) | 3995 |
| Since 2007 (last 20 years) | 6141 |
Descriptor
Source
Author
| Barnes, Tiffany | 22 |
| Armoni, Michal | 18 |
| Yadav, Aman | 17 |
| Gal-Ezer, Judith | 16 |
| Malmi, Lauri | 15 |
| Xinogalos, Stelios | 15 |
| Soh, Leen-Kiat | 14 |
| Frydenberg, Mark | 13 |
| Hazzan, Orit | 13 |
| Kafai, Yasmin B. | 13 |
| Howe, Richard D. | 12 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 724 |
| Teachers | 401 |
| Researchers | 151 |
| Policymakers | 97 |
| Administrators | 71 |
| Students | 66 |
| Media Staff | 11 |
| Parents | 9 |
| Community | 6 |
| Counselors | 1 |
| Support Staff | 1 |
| More ▼ | |
Location
| Turkey | 251 |
| Australia | 167 |
| United Kingdom | 153 |
| Canada | 131 |
| China | 118 |
| Taiwan | 118 |
| California | 115 |
| United States | 96 |
| Germany | 88 |
| Spain | 81 |
| Finland | 78 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Paz, Tamar; Leron, Uri – Journal for Research in Mathematics Education, 2009
Functions are all around us, disguised as actions on concrete objects. Composition of functions, too, is all around us, because these actions can be performed in succession, the output of one serving as the input for the next. In terms of Gray and Tall's (2001) "embodied objects" or Lakoff and Nunez's (2000) "mathematical idea…
Descriptors: Concept Formation, Mathematics Instruction, Mathematical Concepts, Algebra
Peer reviewedWestley, John W. – Business Education Forum, 1976
In addition to the input/output record format, the program flowchart, the program listing, and the program test output, eight documentation items are suggested in order that they may serve as a base from which to start teaching program documentation. (Author/AG)
Descriptors: Computer Science Education, Data Processing, Programing
Hannigan, Joseph T.; Engvall, Richard E. – 1970
GRADES OR AGES: No mention. SUBJECT MATTER: Computer programing. ORGANIZATION AND PHYSICAL APPEARANCE: The guide is divided into seven chapters, each of which is in outline form with numerous diagrams and charts. It is mimeographed and looseleaf-bound with a paper cover. OBJECTIVES AND ACTIVITIES: No objectives are mentioned. Each of the seven…
Descriptors: Computer Science Education, Curriculum Guides, Programing
Leaf, William A. – 1971
SLIP (Symmetric List Processing) is a list processing system designed to be added to a higher order language (PL-1 in this version) so that the user has available to him list processing powers. The primary value of such a system is its data handling power. Through SLIP, one can set up lists of data, scan those lists, alter them, and read or write…
Descriptors: Computer Science, Data Processing, Programing Languages
Peer reviewedNewsted, Peter R.; Wynne, Bayard E. – International Journal of Man-Machine Studies, 1976
An Interactive Decision System (AIDS) is described as a computer-based technique to rationalize the judgment process. This technique is intended to allow a typical manager to make decisions with more complete use of information available and fewer loose ends than is usually the case. (Author)
Descriptors: Computer Science, Interaction, Man Machine Systems
Peer reviewedGannon, John D. – International Journal of Man-Machine Studies, 1976
Recently a number of experiments have been performed whose aim was to compare programming language features to determine which programming language features programmers found difficult to use. This paper examines these experiments in light of the evidence that programming language designers would find most useful. (Author)
Descriptors: Computer Science, Evaluation, Experiments, Programing Languages
Peer reviewedThomas, Rex A. – AEDS Journal, 1976
Describes an instrument created to measure the general level of computer literacy of high school students and to obtain baseline data on student awareness of computer concepts. (Author/IRT)
Descriptors: Computer Science Education, High Schools, Tests
Fingar, Peter – AEDS Monitor, 1976
The use of overhead transparencies can enhance the whole-to-parts method of teaching computer concepts.
Descriptors: Computer Science Education, Teaching Methods, Transparencies
Peer reviewedSuchoff, Benjamin – Journal of Research in Music Education, 1971
Computer applications in music, especially with regard to research in music folklore, are discussed. (CK)
Descriptors: Computer Science, Creativity, Music, Musical Composition
Harris, Fredric A. – Amer J Occup Therapy, 1970
Descriptors: Computer Science, Information Processing, Neurological Organization
NJEA Review, 1982
Working definitions of words related to the theory and use of computers are presented to introduce the novice to terminology. The glossary is not designed to be exhaustive. (Author/CM)
Descriptors: Computer Science, Computers, Data Processing, Definitions
Peer reviewedRudd, David – Mathematics and Computer Education, 1983
Ada is a programing language developed for the Department of Defense, with a registered trademark. It was named for Ada Augusta, coworker of Charles Babbage and the world's first programer. The Department of Defense hopes to prevent variations and to establish Ada as a consistent, standardized language. (MNS)
Descriptors: Computer Science, Computers, Programing, Programing Languages
Manley, Will – Wilson Library Bulletin, 1982
Assesses current trend among librarians to invent, compute, chart, and publish myriads of library statistics with the aid of newly installed computerized systems. (EJS)
Descriptors: Computer Science, Information Systems, Libraries, Statistics

Direct link
