NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 661 to 675 of 4,561 results Save | Export
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Stewart; Vallance, Michael – Computers & Education, 2008
This paper summarises the outcomes of research that recorded and interpreted change in pre-service teachers' pedagogical beliefs when immersed in unique synchronous networked collaboration. The pre-service teachers were involved in the design and implementation of synchronous networked tasks, supported by the theoretical and pragmatic application…
Descriptors: Constructivism (Learning), Technology Integration, Educational Technology, Teacher Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Alberta Advanced Education and Technology, 2009
The graduate of the Communication Technician apprenticeship program is a certified journeyperson who will be able to: (1) supervise, train and coach apprentices; (2) use a thorough knowledge of electrical and electronic theory and its application to communication and associated equipment used in the telecommunication industry; (3) understand…
Descriptors: Foreign Countries, Paraprofessional Personnel, Apprenticeships, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Matoria, Ram Kumar; Upadhyay, P. K.; Moni, Madaswamy – Program: Electronic Library and Information Systems, 2007
Purpose: To describe the development of the library management system, e-Granthalaya, for public libraries in India. This is an initiative of the Indian government's National Informatics Centre (NIC). The paper outlines the challenges and the potential of a full-scale deployment of this software at a national level. Design/methodology/approach:…
Descriptors: Public Libraries, Library Automation, Foreign Countries, Computer Networks
Schweizer, Heidi; Kossow, Ben – Gifted Child Today, 2007
This article features the WebQuest, an inquiry-oriented activity in which some or all of the information that learners interact with comes from resources on the Internet. WebQuests, when properly constructed, are activities, usually authentic in nature, that require the student to use Internet-based resources to deepen their understanding and…
Descriptors: Internet, Computer Mediated Communication, Multimedia Materials, Computer Networks
Liss, Alan – Telecommunications, 1996
Discusses bandwidth on demand technologies, including frame relay and ISDNs (integrated services digital networks). Topics include tariff policies; lack of standards; market conditions; growth in the Internet market and the World Wide Web; and the growing need for remote access. (LRW)
Descriptors: Computer Networks, Standards, World Wide Web
Galbreath, Jeremy – Educational Technology, 1997
Provides an update on the standards that are governing digital multimedia technology. Highlights include symmetrical multimedia standards that include a variety of compression and transmission schemes; asymmetrical multimedia standards that includes compressed digital motion video and still images; applications sharing; networks; and the Internet.…
Descriptors: Computer Networks, Internet, Photographs, Standards
Enderle, Jerry – School Planning & Management, 2003
Discusses issues of security for school computer networks, including protection against viruses and hackers. (EV)
Descriptors: Computer Networks, Computer Security, School Security
Watson, Linda – Vocational Education Journal, 1994
Looks at the Texas Education Network (TENET), a computer network that allows students to communicate with students all over the country. Describes projects used in a business education classroom. (JOW)
Descriptors: Business Education, Computer Networks, Secondary Education
Berry, John; Quinn, Judy – Library Journal, 1991
Discusses the 1991 White House Conference on Library and Information Services (WHCLIS). Topics discussed include conference issues, including keynote speakers, procedural difficulties, and the failure to attract media attention; and substantive issues, including a recommendation to establish an office to focus on children and youth literacy, and…
Descriptors: Computer Networks, Conferences, Literacy, Problems
Peer reviewed Peer reviewed
Gyori, Ladislao Pablo – Visible Language, 1996
Presents a manifesto proposing the creation of a new kind of poetry--virtual poetry--that exists only in electronic space and computer networks. States that this new poetry is interactive, animated, hyper-linked, and navigational. (PA)
Descriptors: Computer Networks, Electronic Text, Hypermedia, Poetry
Bloomquist, Jane; Musa, Atif – Technology & Learning, 2004
Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…
Descriptors: Educational Technology, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Lozano-Hemmer, Rafael; Gomez-Pena, Guillermo – Aztlan: A Journal of Chicano Studies, 2004
The leaked documents of the tech-illa network are investigated. It was unclear that if the information was left in the cracked server on purpose, to be distributed by the hackers as a decoy.
Descriptors: Internet, Computer Networks, Computer Security, Crime
Villano, Matt – Technology & Learning, 2005
In this article, the author presents the latest wireless equipments available in market. For starters, wireless networks offer mobility and flexibility: users of laptops, PDAs, tablet PCs, and wireless Voice over IP telephones can move freely about campus while staying connected to the Internet. There are two kinds of wireless networks: ad-hoc, or…
Descriptors: Telecommunications, Computer Networks, Internet, Computer Security
Pages: 1  |  ...  |  41  |  42  |  43  |  44  |  45  |  46  |  47  |  48  |  49  |  ...  |  305