NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 7,876 to 7,890 of 10,618 results Save | Export
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science
Bowen, C. R. – 1971
Because technically oriented nations are spending billions of dollars on research and development, by 1980 school administrators will be operating in a society saturated with new information and devices to handle it (i.e., computer-based terminals in homes, offices, and schools hooked up to telephones, videos, and radios). However, the pressing…
Descriptors: Administrator Education, Administrators, Computer Science, Educational Objectives
Papert, Seymour; Solomon, Cynthia – 1970
Students learned to plan and write complex computer programs by writing a program for playing NIM, a game in which two players alternatively remove one, two, or three sticks from an original pile of 21, with the player taking the last one being the winner. The primary teaching purpose was to develop the idea that a final goal--i.e., winning--could…
Descriptors: Computer Programs, Computer Science Education, Computers, Educational Games
Calgary Univ. (Alberta). – 1971
The proceedings contain papers given by the members of the chapter who come from both the University and Business environments. Some operational indexing, bibliographic, SDI and Retrospective Search Systems which include CAN/SDI, Compendex, TEXT-PAC, SIS II & III, KWOC and FAMULUS are discussed. Also included are papers on two projects…
Descriptors: Annual Reports, Automation, Computer Science, Information Processing
National Academy of Engineering, Washington, DC. Commission on Education. – 1969
A two-day conference was held in 1969 with industrial representatives and COSINE members to examine the impact that computer technology has had upon the practice of engineering in industry and to assess the meaning of these changes upon the structure of electrical engineering education. The major conclusions and recommendations of the meeting may…
Descriptors: College Science, Computer Science, Conference Reports, Curriculum Development
Boorman, Joyce, Ed.; Harris, Dorothy, Ed. – 1973
The Binational Dance Conference was organized into three focal themes--verities, values, and visions in dance--to emphasize the known and accepted worth and value of dance, and to stimulate through knowledge and idea exchange, imaginative directions for dance in the future of both the United States and Canada. This thematic structure is also the…
Descriptors: Aesthetic Education, Computer Science, Dance, Dance Therapy
Kirby, Paul J.; Gardner, Edward M. – 1976
The evolution of a self-contained test scoring terminal is presented. The rationale for the design is presented along with an evolutionary description of the requirements for the system. The sequence of software and hardware tools, which were developed in order to build the device, are also described in this report. The resulting device, which…
Descriptors: Autoinstructional Aids, Computer Programs, Computer Science, Individual Testing
Peer reviewed Peer reviewed
Brown, Theodore; Jacobs, Barry – Computers and Education, 1978
Describes a separate course section dedicated to the needs of social scientists which is embedded within an introductory course in computer science. The special needs of the students and steps taken to satisfy those needs are delineated. (Author/CMV)
Descriptors: Computer Programs, Computer Science Education, Course Descriptions, Curriculum Development
Braun, Ludwig – Calculators/Computers Magazine, 1978
This is the first of three parts of a report that evaluates the present state of development of microcomputer and video-disc technologies as they relate to education. (MN)
Descriptors: Computer Assisted Instruction, Computer Science, Computers, Educational Technology
Peer reviewed Peer reviewed
Ingoldsby, Tim C. – Physics Teacher, 1978
Describes a process of getting familiar with microcomputers, and how to put together a mainframe computer for school use. (GA)
Descriptors: Computer Science, Computers, Costs, Instruction
Johnson, Deborah G. – Professional Engineer, 1978
Computer professionals are beginning to look toward codes of ethics and legislation to control the use of software. A project has been established at Rensselaer Polytechnic Institute to develop teaching materials on computer ethics. (BB)
Descriptors: Codes of Ethics, Computer Science Education, Curriculum Development, Engineering Education
Peer reviewed Peer reviewed
Barth, Marvin – Business Education Forum, 1978
Key elements of a business data processing program at the high school level includes relevant curriculum, the active support and involvement of business, interested students, and qualified faculty. The article discusses these elements and the need for program acceptance and evaluation. (MF)
Descriptors: Business Education, Computer Science Education, Curriculum Development, Data Processing
Peer reviewed Peer reviewed
Powell, Martin R. – Mathematics in School, 1978
A situation in which shoppers are waiting in supermarket check-out lines is simulated to determine an optimum number of check-outs using data on the number of shoppers and the serving time. (MN)
Descriptors: Computer Programs, Computer Science Education, Elementary Secondary Education, Food Stores
Ingersoll, Alfred C. – Professional Engineer, 1978
A report on continuing education in engineering and mathematics at UCLA and the extent to which computer applications are dominating the scene. (BB)
Descriptors: Computer Science Education, Computers, Continuing Education, Engineering Education
Peer reviewed Peer reviewed
Virunurm, Valdeko; Gaunt, Roger N. – New Directions for Institutional Research, 1977
Sophisticated computer technology now allows for increasingly adaptable privacy safeguards. Various protection mechanisms are described, including password technology and encryption techniques, and administrative guidelines are offered. (Editor/LBH)
Descriptors: Computer Science, Confidential Records, Consumer Protection, Data Collection
Pages: 1  |  ...  |  522  |  523  |  524  |  525  |  526  |  527  |  528  |  529  |  530  |  ...  |  708