NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 7,771 to 7,785 of 10,618 results Save | Export
Ng, Kwong Bor; Park, Soyeon; Burnett, Kathleen – Proceedings of the ASIS Annual Meeting, 1997
Examines the different concepts and orientations of the two major approaches to the role of metadata in the digital library (library science-oriented bibliographic control and computer science-oriented data management), and proposes an integrated concept of metadata to facilitate the merging of these two approaches. Discusses ongoing efforts to…
Descriptors: Bibliographic Databases, Cataloging, Computer Science, Electronic Libraries
Peer reviewed Peer reviewed
Richardson, John T. E.; Price, Linda – British Journal of Educational Technology, 2003
Describes use of the Course Experience Questionnaire (CEQ) and a short form of the Approaches to Studying Inventory (ASI) to students at the Open University (United Kingdom) who were taking online courses in computer science. Results showed approaches to studying in online courses are strongly associated with students' perceptions of the course…
Descriptors: Computer Science Education, Distance Education, Foreign Countries, Higher Education
Peer reviewed Peer reviewed
Swain, Sandra L.; Harvey, Douglas M. – TechTrends, 2002
Advocates single-sex computer instruction as a temporary alternative educational program to provide middle school and secondary school girls with access to computers, to present girls with opportunities to develop positive attitudes towards technology, and to make available a learning environment conducive to girls gaining technological skills.…
Descriptors: Access to Computers, Computer Attitudes, Computer Science Education, Females
Wanat, Thomas – Chronicle of Higher Education, 1997
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Descriptors: College Students, Computer Science, Computer Security, Crime
Peer reviewed Peer reviewed
Nordenbo, Sven Erik – Scandinavian Journal of Educational Research, 1990
A procedure--"theophrastisation"--is described to present empirical results of an investigation clearly so that teachers can apply them. Other normative implications of empirical research are discussed with reference to a previous study of adult computer novices. Perspectives on adult education in general are discussed. (SLD)
Descriptors: Adult Education, Adults, Computer Science Education, Information Technology
Benander, Alan; And Others – Collegiate Microcomputer, 1989
Discussion of the use of computer aided instruction (CAI) and instructional software in college level courses highlights an automatic problem generator, AUTOGEN, that was written for computer science students learning assembly language. Design of the software is explained, and student responses are reported. (nine references) (LRW)
Descriptors: Computer Assisted Instruction, Computer Science Education, Courseware, Drills (Practice)
Peer reviewed Peer reviewed
Kvande, Elin; Rasmussen, Bente – European Journal of Engineering Education, 1989
Discusses the possibility that changing the arrangement of computer courses from association with technical and mathematical subjects to a broader course based on social subjects and arts will lead to an increase in the proportion of women studying and working in the computer field. (Author/YP)
Descriptors: College Science, Computer Science, Course Selection (Students), Engineering
Peer reviewed Peer reviewed
Spoerri, Peter – Journal of Computers in Mathematics and Science Teaching, 1990
Describes the use of a logic circuit simulator to design a computer in an introductory computer course. Discusses the design of a sequence generator, control circuits, and testing of a computer's instruction set. (YP)
Descriptors: College Science, Computer Science, Computer System Design, Computers
Peer reviewed Peer reviewed
McCrank, Lawrence J. – International Information and Library Review, 1994
Discusses the recent evolution of the field of historical information science. Topics include the integration of the historical and the information sciences; the International Association for Computing and History; and the 1993 conference of the Association of History and Computing. An annotated bibliography of eight pertinent publications is…
Descriptors: Annotated Bibliographies, Computer Science, Conferences, Historical Interpretation
Peer reviewed Peer reviewed
Gray, John S. – Journal of Computing in Higher Education, 1994
A detailed analysis and computer-based solution to a puzzle addressing the arrangement of dominoes on a grid is presented. The problem is one used in a college-level data structures or algorithms course. The solution uses backtracking to generate all possible answers. Details of the use of backtracking and techniques for mapping abstract problems…
Descriptors: Algorithms, Computer Assisted Instruction, Computer Science Education, Computer Software
Peer reviewed Peer reviewed
Smith, Bruce W.; Lancaster, Ann-Marie – Journal of Studies in Technical Careers, 1995
At Bowling Green State University, the faculty-based cooperative education program in computer science has broadened faculty perception of co-op's personal and professional development potential. Survey responses from 69 of 118 alumni validate the contribution of the program to their work experience and individual development. (SK)
Descriptors: Academic Education, Computer Science Education, Cooperative Education, Educational Benefits
Peer reviewed Peer reviewed
McWeeney, Mark G. – Research Strategies, 1992
Describes a computer-assisted instruction (CAI) program used to teach DOS commands. Pretest and posttest results for 65 graduate students using the program are reported, and it is concluded that the CAI program significantly aided the students. Sample screen displays for the program and several questions from the pre/posttest are included. (nine…
Descriptors: Computer Assisted Instruction, Computer Science Education, Courseware, Higher Education
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime
Peer reviewed Peer reviewed
Subotnik, Rena F. – Journal for the Education of the Gifted, 1993
This interview with Joseph Bates, a computer scientist at Carnegie Mellon University (Pennsylvania), recounts his development as a highly gifted child who entered Johns Hopkins University (Maryland) after the seventh grade. Doctor Bates describes his family background, his reaction to radical acceleration, his attitudes toward heterogeneous…
Descriptors: Ability Identification, Acceleration (Education), Attitudes, Computer Science
Peer reviewed Peer reviewed
Woolf, Beverly Park – Educational Technology, Research and Development, 1992
Discusses the integration of instructional science and computer science. Topics addressed include motivation for building knowledge-based systems; instructional design issues, including cognitive models, representing student intentions, and student models and error diagnosis; representing tutoring knowledge; building a tutoring system, including…
Descriptors: Computer Assisted Instruction, Computer Science, Computer System Design, Discourse Analysis
Pages: 1  |  ...  |  515  |  516  |  517  |  518  |  519  |  520  |  521  |  522  |  523  |  ...  |  708