Publication Date
| In 2026 | 0 |
| Since 2025 | 424 |
| Since 2022 (last 5 years) | 2009 |
| Since 2017 (last 10 years) | 3982 |
| Since 2007 (last 20 years) | 6128 |
Descriptor
Source
Author
| Barnes, Tiffany | 22 |
| Armoni, Michal | 18 |
| Yadav, Aman | 17 |
| Gal-Ezer, Judith | 16 |
| Malmi, Lauri | 15 |
| Xinogalos, Stelios | 15 |
| Soh, Leen-Kiat | 14 |
| Frydenberg, Mark | 13 |
| Hazzan, Orit | 13 |
| Kafai, Yasmin B. | 13 |
| Howe, Richard D. | 12 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 724 |
| Teachers | 401 |
| Researchers | 151 |
| Policymakers | 97 |
| Administrators | 71 |
| Students | 66 |
| Media Staff | 11 |
| Parents | 9 |
| Community | 6 |
| Counselors | 1 |
| Support Staff | 1 |
| More ▼ | |
Location
| Turkey | 251 |
| Australia | 167 |
| United Kingdom | 153 |
| Canada | 131 |
| China | 118 |
| Taiwan | 118 |
| California | 114 |
| United States | 96 |
| Germany | 88 |
| Spain | 81 |
| Finland | 78 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Speedie, Stuart M.; Sanders, Susan – 1974
"Data Management and Decision Making" is a set of instructional materials designed to teach practicing and potential educational administrators about the uses of operations research in educational administration. It consists of five units--"Operations Research in Education,""PERT/CPM: A Planning and Analysis…
Descriptors: Computer Science, Computer Science Education, Cost Effectiveness, Decision Making
Peer reviewedMerritt, Susan M. – Mathematics and Computer Education, 1988
Argues that education in computer science in secondary schools has not kept pace with curriculum developments for college programs. Suggests definitions to be agreed upon and ways to close the gap between secondary and college programs. (PK)
Descriptors: Articulation (Education), Computer Literacy, Computer Science, Computer Science Education
Kolata, Gina – Discover, 1984
Examines social influences which discourage women from pursuing studies in computer science, including monopoly of computer time by boys at the high school level, sexual harassment in college, movies, and computer games. Describes some initial efforts to encourage females of all ages to study computer science. (JM)
Descriptors: College Science, Computer Science, Computer Science Education, Females
Ali, Sanwar – Mathematics and Computer Education, 2005
Teaching is a scholarly activity and a life-long learning process with no single method or pedagogy that is always most effective. Applications of teaching pedagogies properly vary from content-based to discipline-based areas. In this paper, various teaching pedagogies, including scaffolding, concept mapping, constructivism, and learning…
Descriptors: Teacher Effectiveness, Problem Based Learning, Learning Strategies, Constructivism (Learning)
Novak, Gordon S., Jr. – 1982
GLISP is a LISP-based language which provides high-level language features not found in ordinary LISP. The GLISP language is implemented by means of a compiler which accepts GLISP as input and produces ordinary LISP as output. This output can be further compiled to machine code by the LISP compiler. GLISP is available for several LISP dialects,…
Descriptors: Computer Programs, Computer Science, Guides, Programing
Hedges, William D. – Educational Technology, 1976
The theme of this article concerns the sketching in of a number of the factors in man's evolutionary interaction with tools, leading toward the predicted eventuality in his development, the replacement of man by machines. (Author)
Descriptors: Computer Science, Human Factors Engineering, Man Machine Systems, Technological Advancement
Tharp, Alan L.; And Others – Journal of Computer-Based Instruction, 1975
A description of a computerized system for acquiring basic knowledge. Augmented transition networks, which provide the formalism for the language analysis, are explained. (Author/HB)
Descriptors: Computer Assisted Instruction, Computer Science, Programed Tutoring, Programing Languages
Lippey, Gerald – Journal of Computer-Based Instruction, 1975
A listing of some possible pitfalls that can deter the effective development activities of computer managed instruction. (HB)
Descriptors: Computer Assisted Instruction, Computer Science, Curriculum Development, Educational Development
Pengoy, Ruann E. – Journal of Computer-Based Instruction, 1974
Barriers to the flexible and efficient provision of user services are identified in the typical administrative organization of university computer centers. (Author)
Descriptors: Computer Science, Educational Facilities, Models, Program Administration
Daykin, P. N.; And Others – Educational Technology, 1975
Descriptors: Computer Assisted Instruction, Computer Science, Instructional Systems, Study
Lien, Ronald L. – Educational Technology, 1974
Descriptors: Computer Assisted Instruction, Computer Science, Cost Effectiveness, Instruction
Pengoy, Ruann E. – Journal of Computer-Based Instruction, 1974
Barriers to the flexible and efficient provision of user services are identified in the typical administrative organization of university computer centers. (Author)
Descriptors: Computer Science, Educational Facilities, Models, Program Administration
Skavaril, Russell V. – Journal of Computer-Based Instruction, 1974
This paper describes in detail the instruction of an introductory statistics course using the computer not only for tutorial CAI support, but also for the generation of statistical exercises and answers and for its capabilities as a tool to help students complete data analyses. (Author)
Descriptors: Computer Assisted Instruction, Computer Science, Course Descriptions, Statistical Analysis
Peer reviewedHartson, H. Rex – Journal of the American Society for Information Science, 1974
A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)
Descriptors: Automatic Indexing, Computer Science, Confidentiality, Data Processing
Lederman, Barbara J. – Journal of Computer-Based Instruction, 1975
Useful programming tricks are suggested to allow the reduction of many equations and non-polynomial-like expressions and the subsequent application of the mathematical algorithms. (Author)
Descriptors: Algebra, Algorithms, Computer Programs, Computer Science

Direct link
