Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 53 |
| Since 2017 (last 10 years) | 106 |
| Since 2007 (last 20 years) | 240 |
Descriptor
Source
Author
| Stamper, John | 4 |
| Bozeman, William C. | 3 |
| Campbell, Sally | 3 |
| Fellmy, William R. | 3 |
| Freeman, Raoul J. | 3 |
| Groff, Warren H. | 3 |
| Horn, Richard | 3 |
| Leigh, William | 3 |
| Penrod, James I. | 3 |
| Skudrna, Vincent J. | 3 |
| Spuck, Dennis W. | 3 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 141 |
| Administrators | 49 |
| Teachers | 45 |
| Researchers | 35 |
| Media Staff | 8 |
| Policymakers | 4 |
| Students | 2 |
| Community | 1 |
| Counselors | 1 |
| Support Staff | 1 |
Location
| Australia | 14 |
| United Kingdom | 10 |
| Canada | 8 |
| Georgia | 6 |
| Turkey | 6 |
| Japan | 5 |
| North Carolina | 5 |
| United States | 5 |
| California | 4 |
| China | 4 |
| Greece | 4 |
| More ▼ | |
Laws, Policies, & Programs
| Freedom of Information Act | 1 |
| No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
| Autism Diagnostic Observation… | 1 |
| SAT (College Admission Test) | 1 |
| Vineland Adaptive Behavior… | 1 |
What Works Clearinghouse Rating
Tesler, Lawrence G. – Scientific American, 1991
The changes in the relationship between the computer and user from that of an isolated productivity tool to than of an active collaborator in the acquisition, use, and creation of information, as well as a facilitator of human interaction are discussed. The four paradigms of computing are compared. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Peer reviewedWright, Marie A. – Mathematics Teacher, 1993
Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)
Descriptors: Coding, Cryptography, Data Processing, Enrichment Activities
Walker, James C. – School Business Affairs, 1991
Computer system hard drives will fail at some time. Stresses preparing to cope with emergencies that cannot be prevented, including making arrangements for use of an alternative computer in case of system failure. Outlines requirements for a computer environment; explains that backup is the key to disaster recovery. Describes four public domain…
Descriptors: Accident Prevention, Computer Centers, Computer Software Evaluation, Computer System Design
Peer reviewedMeir, Daniel D.; Lazinger, Susan S. – Information Technology and Libraries, 1998
Reports on a survey measuring the performance of a merging algorithm used to generate the now-defunct ULM (Union List of Monographs) file for ALEPH, Israel's research library network. Discusses automatic detection and merging of duplicate bibliographic records, problems created by lack of a standard for Hebrew spelling, and methods for measuring…
Descriptors: Algorithms, Bibliographic Databases, Bibliographic Records, Data Processing
Peer reviewedAlvord, David J.; Tack, Leland R.; Dallam, Jerald W. – College and University, 1998
Describes the development of Project EASIER, a collaborative electronic-data interchange for networking Iowa local school districts, education agencies, community colleges, universities, and the Department of Education. The primary goal of this project is to develop and implement a system for collection of student information for state and federal…
Descriptors: Data Processing, Government School Relationship, Higher Education, Information Management
Loh, Shiu-Chang; And Others – Association for Literary and Linguistic Computing Bulletin, 1978
A practical machine translation system called CULT (Chinese University Language Translator), capable of translating Chinese mathematical texts into readable English, has been developed during the period 1969-1977 at the Chinese University of Hong Kong. Programs for the system are written in Standard FORTRAN and run on the ICL1904A computer system.…
Descriptors: Algorithms, Automatic Indexing, Chinese, Computational Linguistics
Lytle, Richard H. – Information Management Review, 1988
Reviews the development of information resource management philosophies, methodologies, and techniques over the past five years. Areas that need improvement are discussed, including information resource management techniques, methodologies, research and educational bases, and professional associations. (13 references) (CLB)
Descriptors: Data Processing, Educational Objectives, Information Science, Information Services
Peer reviewedJensen, Carl B. – AEDS Journal, 1985
Description of a validated computer assisted instruction (CAI) program (The Addition Tutorial) illustrates how four critical components for instruction--learning principles application to instructional design; sufficient database; adequate motivational system; and delivery system which provides teacher learning environment control--might be…
Descriptors: Academic Achievement, Addition, Computer Assisted Instruction, Courseware
Peer reviewedMazman, Samuel – NACADA Journal, 1985
Articulation programs and agreements between institutions have become more frequent and problem-free as both sender and receiver recognize that a smooth transition benefits both interests. Eight banks of cross walk data were created in a computer system in Michigan schools. (MLW)
Descriptors: Academic Advising, Articulation (Education), College Credits, College Students
Peer reviewedYucha, Carolyn; Reigeluth, Charles M. – Computers and Education, 1983
Educational applications include computer programs to individualize instruction and create clinical simulations; computer use to extend classrooms to rural areas, provide continuing education, and individualized testing; and courses in computer applications in health care. Applications in practice and administration include directing and recording…
Descriptors: Administration, Computer Assisted Instruction, Computer Literacy, Computer Programs
Duplass, James A. – CASE Currents, 1983
To implement a computer software system successfully, a college development officer must learn all about it, control its development rather than let computer center staff take control, define the system needs and elements, study software contracts carefully before signing, reorganize the office to accommodate computing needs, and make necessary…
Descriptors: College Administration, Computer Literacy, Computer Oriented Programs, Computer Programs
Hollowell, David E. – CAUSE/EFFECT, 1978
A major information systems planning study undertaken by Boston University and recommendations that were made to enable the university to meet the new demands and changing priorities of educational management are discussed. (BH)
Descriptors: Case Studies, College Administration, College Planning, Computer Science
Penrod, James I.; Craft, Larry N. – CAUSE/EFFECT, 1978
The planning, design, and implementation of an information system at Pepperdine University in California is described. The difficulties of total redesign and new programing of a management information system are explained and recommendations for this process are made. (BH)
Descriptors: Case Studies, Change Strategies, College Administration, Computer Science
Donald, A. Wayne – CAUSE/EFFECT, 1979
The major information systems at Virginia Polytechnic Institute and State University are described. The use of the feedback and feedforward controls in planning and projecting administrative functions is examined. (Author/BH)
Descriptors: Administration, Administrator Role, Case Studies, Computers
Peer reviewedYeany, Russell H.; Capie, William – Science Education, 1979
Presents a description of a set of data processing operations and an instrument for analyzing the teaching of data collection and manipulation. The functions and reliability of the Data Processing Observed Guide (DPOG) developed for this purpose are also included. (HM)
Descriptors: Behavior Patterns, Data Processing, Educational Assessment, Educational Research


