NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 5,056 to 5,070 of 7,868 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Yarosh, Svetlana; Guzdial, Mark – Journal on Educational Resources in Computing, 2008
Learning computing with respect to the context of its use has been linked in previous reports to student motivation in introductory Computer Science (CS) courses. In this report, we consider the role of context in a second course. We present a case study of a CS2 data structures class that uses a media computation context. In this course, students…
Descriptors: Relevance (Education), Learner Engagement, Instructional Design, Case Studies
Mejia, Robin – Chronicle of Higher Education, 2008
The need for colleges to graduate students who understand computer security is growing. The Internet Crime Complaint Center, a partnership of the FBI; the National White Collar Crime Center; and the Bureau of Justice Assistance, in the Department of Justice, reported more than 90,000 crimes in 2007, with reported financial losses of almost…
Descriptors: College Students, Crime Prevention, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Cheong, France – Journal of Information Technology Education, 2008
While delivering the Intelligent Systems course, an elective course in the Master of Business Information Technology program at RMIT University, it was felt that there was a learning issue as students' learning seemed to be superficial. This perception was based on the questions students asked in class and the mechanical attitude they adopted…
Descriptors: Foreign Countries, Problem Based Learning, Metacognition, Graduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Benander, Alan C.; Benander, Barbara A. – Journal of Information Systems Education, 2008
Educators have been using the Towers of Hanoi problem for many years as an example of a problem that has a very elegant recursive solution. However, the elegance and conciseness of this solution can make it difficult for students to understand the amount of computer time required in the execution of this solution. And, like many recursive computer…
Descriptors: Computer Science Education, Information Systems, Programming, Active Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gaspar, Alessio; Langevin, Sarah; Boyer, Naomi; Armitage, William – Informatics in Education, 2010
This qualitative study explores how using Peer Learning Forums (PLF) in an online asynchronous computer programming course can be analyzed to derive information about Student Activity Focus (SAF) for adult Information Technology students. Three instruments are proposed to assist instructors classify questions posted by students on these forums,…
Descriptors: Asynchronous Communication, Qualitative Research, Learning Activities, Classification
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Kordaki, Maria – Computers & Education, 2010
This paper presents both the design and the pilot formative evaluation study of a computer-based problem-solving environment (named LECGO: Learning Environment for programming using C using Geometrical Objects) for the learning of computer programming using C by beginners. In its design, constructivist and social learning theories were taken into…
Descriptors: Feedback (Response), Constructivism (Learning), Formative Evaluation, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Tangney, Brendan; Oldham, Elizabeth; Conneely, Claire; Barrett, Stephen; Lawlor, John – IEEE Transactions on Education, 2010
This paper describes a model for computer programming outreach workshops aimed at second-level students (ages 15-16). Participants engage in a series of programming activities based on the Scratch visual programming language, and a very strong group-based pedagogy is followed. Participants are not required to have any prior programming experience.…
Descriptors: Foreign Countries, Computer Software, Programming Languages, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Tenenberg, Josh; McCartney, Robert – Journal on Educational Resources in Computing, 2007
This issue is devoted to the curriculum guidelines from the Liberal Arts Computer Science Consortium. These guidelines provide a coherent and important model for computing education within a liberal arts context, giving primacy to critical reason, rigorous methods, and student engagement in the research process. In this regard, they are at the…
Descriptors: Guidelines, Computer Science, Liberal Arts, College Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Archibald, J. K.; Fife, W. S. – Computer Science Education, 2007
Embedded systems are increasingly pervasive, and the creation of reliable controlling software offers unique challenges. Embedded software must interact directly with hardware, it must respond to events in a time-critical fashion, and it typically employs concurrency to meet response time requirements. This paper describes an innovative course…
Descriptors: Computer Software, Troubleshooting, Undergraduate Students, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Armoni, Michal; Gal-Ezer, Judith – Computer Science Education, 2007
Non-determinism is one of the most important, yet abstract, recurring concepts of Computer Science. It plays an important role in Computer Science areas such as formal language theory, computability theory, distributed computing, and operating systems. We conducted a series of studies on the perception of non-determinism. In the current research,…
Descriptors: Computer Science, Scientific Concepts, Computer Science Education, Abstract Reasoning
Peer reviewed Peer reviewed
Westley, John W. – Business Education Forum, 1976
In addition to the input/output record format, the program flowchart, the program listing, and the program test output, eight documentation items are suggested in order that they may serve as a base from which to start teaching program documentation. (Author/AG)
Descriptors: Computer Science Education, Data Processing, Programing
Hannigan, Joseph T.; Engvall, Richard E. – 1970
GRADES OR AGES: No mention. SUBJECT MATTER: Computer programing. ORGANIZATION AND PHYSICAL APPEARANCE: The guide is divided into seven chapters, each of which is in outline form with numerous diagrams and charts. It is mimeographed and looseleaf-bound with a paper cover. OBJECTIVES AND ACTIVITIES: No objectives are mentioned. Each of the seven…
Descriptors: Computer Science Education, Curriculum Guides, Programing
Peer reviewed Peer reviewed
Thomas, Rex A. – AEDS Journal, 1976
Describes an instrument created to measure the general level of computer literacy of high school students and to obtain baseline data on student awareness of computer concepts. (Author/IRT)
Descriptors: Computer Science Education, High Schools, Tests
Fingar, Peter – AEDS Monitor, 1976
The use of overhead transparencies can enhance the whole-to-parts method of teaching computer concepts.
Descriptors: Computer Science Education, Teaching Methods, Transparencies
Pages: 1  |  ...  |  334  |  335  |  336  |  337  |  338  |  339  |  340  |  341  |  342  |  ...  |  525