Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 4 |
Descriptor
Source
| Information Systems Education… | 4 |
Author
| Anderson, Nicole | 1 |
| Bajracharya, Biju Raja | 1 |
| Gomillion, David L. | 1 |
| Gondi, Vamsi | 1 |
| Hua, David | 1 |
| Marquardson, Jim | 1 |
| McMaster, Kirby | 1 |
| Sambasivam, Samuel E. | 1 |
| Serapiglia, Anthony | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Tests/Questionnaires | 2 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gondi, Vamsi; Hua, David; Bajracharya, Biju Raja – Information Systems Education Journal, 2021
In the age of COVID-19, traditional teaching techniques are under scrutiny. Most concepts and labs in the area of information technology are intended to be taught face-to-face in labs using clusters and networking infrastructure. Simulation software's such as uCertify, Pearson online, etc.., are good alternative, but are not always a viable…
Descriptors: Computer Science Education, Computer Software, Computer Simulation, Information Technology
Marquardson, Jim; Gomillion, David L. – Information Systems Education Journal, 2019
Simulated environments can provide a convenient, effective way to teach skills. Simulations have been used for decades to teach skills such as piloting aircraft. As technology has improved, it has become feasible to simulate many other tasks. Recent advances in virtual and augmented reality provide new avenues for expanding training using…
Descriptors: Computer Simulation, Teaching Methods, Transfer of Training, Introductory Courses
Serapiglia, Anthony – Information Systems Education Journal, 2016
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
Descriptors: Competition, Undergraduate Students, Computer Security, Information Security
McMaster, Kirby; Sambasivam, Samuel E.; Anderson, Nicole – Information Systems Education Journal, 2010
In demand paging virtual memory systems, the page fault rate of a process varies with the number of memory frames allocated to the process. When an increase in the number of allocated frames leads to an increase in the number of page faults, Belady's anomaly is said to occur. In this paper, we present a probability model for Belady's anomaly. We…
Descriptors: Probability, Models, Computer Science Education, Information Systems

Peer reviewed
