Publication Date
In 2025 | 243 |
Since 2024 | 814 |
Since 2021 (last 5 years) | 2305 |
Since 2016 (last 10 years) | 4009 |
Since 2006 (last 20 years) | 6028 |
Descriptor
Source
Author
Barnes, Tiffany | 22 |
Armoni, Michal | 18 |
Yadav, Aman | 17 |
Gal-Ezer, Judith | 16 |
Malmi, Lauri | 15 |
Xinogalos, Stelios | 15 |
Soh, Leen-Kiat | 14 |
Frydenberg, Mark | 13 |
Hazzan, Orit | 13 |
Kafai, Yasmin B. | 13 |
Howe, Richard D. | 12 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 722 |
Teachers | 398 |
Researchers | 149 |
Policymakers | 95 |
Administrators | 71 |
Students | 66 |
Media Staff | 11 |
Parents | 9 |
Community | 6 |
Counselors | 1 |
Support Staff | 1 |
More ▼ |
Location
Turkey | 247 |
Australia | 164 |
United Kingdom | 153 |
Canada | 127 |
Taiwan | 117 |
California | 113 |
China | 112 |
United States | 95 |
Germany | 86 |
Spain | 79 |
Finland | 76 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards with or without Reservations | 2 |
Does not meet standards | 1 |
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science
Bowen, C. R. – 1971
Because technically oriented nations are spending billions of dollars on research and development, by 1980 school administrators will be operating in a society saturated with new information and devices to handle it (i.e., computer-based terminals in homes, offices, and schools hooked up to telephones, videos, and radios). However, the pressing…
Descriptors: Administrator Education, Administrators, Computer Science, Educational Objectives
Papert, Seymour; Solomon, Cynthia – 1970
Students learned to plan and write complex computer programs by writing a program for playing NIM, a game in which two players alternatively remove one, two, or three sticks from an original pile of 21, with the player taking the last one being the winner. The primary teaching purpose was to develop the idea that a final goal--i.e., winning--could…
Descriptors: Computer Programs, Computer Science Education, Computers, Educational Games
Calgary Univ. (Alberta). – 1971
The proceedings contain papers given by the members of the chapter who come from both the University and Business environments. Some operational indexing, bibliographic, SDI and Retrospective Search Systems which include CAN/SDI, Compendex, TEXT-PAC, SIS II & III, KWOC and FAMULUS are discussed. Also included are papers on two projects…
Descriptors: Annual Reports, Automation, Computer Science, Information Processing
National Academy of Engineering, Washington, DC. Commission on Education. – 1969
A two-day conference was held in 1969 with industrial representatives and COSINE members to examine the impact that computer technology has had upon the practice of engineering in industry and to assess the meaning of these changes upon the structure of electrical engineering education. The major conclusions and recommendations of the meeting may…
Descriptors: College Science, Computer Science, Conference Reports, Curriculum Development
Boorman, Joyce, Ed.; Harris, Dorothy, Ed. – 1973
The Binational Dance Conference was organized into three focal themes--verities, values, and visions in dance--to emphasize the known and accepted worth and value of dance, and to stimulate through knowledge and idea exchange, imaginative directions for dance in the future of both the United States and Canada. This thematic structure is also the…
Descriptors: Aesthetic Education, Computer Science, Dance, Dance Therapy
Kirby, Paul J.; Gardner, Edward M. – 1976
The evolution of a self-contained test scoring terminal is presented. The rationale for the design is presented along with an evolutionary description of the requirements for the system. The sequence of software and hardware tools, which were developed in order to build the device, are also described in this report. The resulting device, which…
Descriptors: Autoinstructional Aids, Computer Programs, Computer Science, Individual Testing

Brown, Theodore; Jacobs, Barry – Computers and Education, 1978
Describes a separate course section dedicated to the needs of social scientists which is embedded within an introductory course in computer science. The special needs of the students and steps taken to satisfy those needs are delineated. (Author/CMV)
Descriptors: Computer Programs, Computer Science Education, Course Descriptions, Curriculum Development
Braun, Ludwig – Calculators/Computers Magazine, 1978
This is the first of three parts of a report that evaluates the present state of development of microcomputer and video-disc technologies as they relate to education. (MN)
Descriptors: Computer Assisted Instruction, Computer Science, Computers, Educational Technology

Ingoldsby, Tim C. – Physics Teacher, 1978
Describes a process of getting familiar with microcomputers, and how to put together a mainframe computer for school use. (GA)
Descriptors: Computer Science, Computers, Costs, Instruction
Johnson, Deborah G. – Professional Engineer, 1978
Computer professionals are beginning to look toward codes of ethics and legislation to control the use of software. A project has been established at Rensselaer Polytechnic Institute to develop teaching materials on computer ethics. (BB)
Descriptors: Codes of Ethics, Computer Science Education, Curriculum Development, Engineering Education

Barth, Marvin – Business Education Forum, 1978
Key elements of a business data processing program at the high school level includes relevant curriculum, the active support and involvement of business, interested students, and qualified faculty. The article discusses these elements and the need for program acceptance and evaluation. (MF)
Descriptors: Business Education, Computer Science Education, Curriculum Development, Data Processing

Powell, Martin R. – Mathematics in School, 1978
A situation in which shoppers are waiting in supermarket check-out lines is simulated to determine an optimum number of check-outs using data on the number of shoppers and the serving time. (MN)
Descriptors: Computer Programs, Computer Science Education, Elementary Secondary Education, Food Stores
Ingersoll, Alfred C. – Professional Engineer, 1978
A report on continuing education in engineering and mathematics at UCLA and the extent to which computer applications are dominating the scene. (BB)
Descriptors: Computer Science Education, Computers, Continuing Education, Engineering Education

Virunurm, Valdeko; Gaunt, Roger N. – New Directions for Institutional Research, 1977
Sophisticated computer technology now allows for increasingly adaptable privacy safeguards. Various protection mechanisms are described, including password technology and encryption techniques, and administrative guidelines are offered. (Editor/LBH)
Descriptors: Computer Science, Confidential Records, Consumer Protection, Data Collection