NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Tobin, Kenneth – Australian Mathematics Teacher, 1984
Presents a sample lesson plan (suitable for grades 6-10) and examples of other problems useful in teaching data processing skills. The plan (focusing on planning investigations, data collection, and data processing) is based on the Data Processing Operation Guide, a 10-step model of intellectual operations that can be used in problem solving. (JN)
Descriptors: Data Processing, Elementary School Mathematics, Intermediate Grades, Lesson Plans
Peer reviewed Peer reviewed
Ascher, Marcia – Mathematics Magazine, 1992
Discusses two mathematical ideas that come from the Incan and Mayan cultures: (1) the quipus, an Incan recordkeeping tool that encoded data via a logical-numerical system on spatial arrays of colored, knotted cords; and (2) the link between recording time and counting in the Mayan culture. (MDH)
Descriptors: Coding, Data Processing, Foreign Culture, Higher Education
Peer reviewed Peer reviewed
Woodrow, Janice E. J. – Journal of Computers in Mathematics and Science Teaching, 1986
Describes the use of the Apple Macintosh and MULTIPLAN spreadsheet to record and analyze test data. Provides step-by-step instructions on data entry, item difficulty and discrimination calculations, test reliability, score distribution, and graphing of distributions. (JM)
Descriptors: Computers, Courseware, Data Analysis, Data Processing
Peer reviewed Peer reviewed
Bright, George W. – Arithmetic Teacher, 1989
Illustrates how teachers or students can use spreadsheets. Shows the layouts, formulas, and data of two cases: budget manager and data manager. Seven references are listed. (YP)
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Data Processing, Elementary Education
Peer reviewed Peer reviewed
Wright, Marie A. – Mathematics Teacher, 1993
Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)
Descriptors: Coding, Cryptography, Data Processing, Enrichment Activities
National Council of Teachers of Mathematics, Inc., Reston, VA. – 1988
This publication is composed of documentation material and a user's guide for the software used in this course. The materials in this book are extracted from an introductory college mathematics course designed to prepare high school students who have completed Algebra 2 for the variety of mathematics courses encountered in college. The principal…
Descriptors: Computer Oriented Programs, Computer Software, Computer Uses in Education, Courseware