Publication Date
| In 2026 | 1 |
| Since 2025 | 44 |
| Since 2022 (last 5 years) | 191 |
| Since 2017 (last 10 years) | 355 |
| Since 2007 (last 20 years) | 431 |
Descriptor
Source
Author
| Bers, Marina Umaschi | 7 |
| Barnes, Tiffany | 4 |
| Abdullahi Yusuf | 3 |
| Ching, Yu-Hui | 3 |
| Clarke-Midura, Jody | 3 |
| Joy, Mike | 3 |
| Kynigos, Chronis | 3 |
| Lee, Victor R. | 3 |
| Shumway, Jessica F. | 3 |
| Zhanxia Yang | 3 |
| Baldwin, Sally | 2 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 11 |
| Media Staff | 2 |
| Researchers | 2 |
| Policymakers | 1 |
| Practitioners | 1 |
Location
| Turkey | 15 |
| Australia | 5 |
| Japan | 5 |
| Spain | 5 |
| United Kingdom (England) | 5 |
| California | 4 |
| China | 4 |
| Italy | 4 |
| Canada | 3 |
| Cyprus | 3 |
| Finland | 3 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
Peer reviewedDuval, Beverly K.; Main, Linda – Library Software Review, 1995
Provides a succinct guide to building a home page. Overview includes the main Hypertext Mark-up Language (HTML) tags, plus examples of their use; forms and clickable maps; new HTML 3.0 tags; and pointers to sites that contain HTML editors, graphics, backgrounds, and music. Five figures illustrate the text. (JKP)
Descriptors: Authoring Aids (Programming), Coding, Computer Software, Guides
Roy, Geoffrey G. – Journal on Educational Resources in Computing, 2006
Designing and explaining programs are often difficult tasks, especially when novices are involved. It also concerns more experienced programmers when complex algorithms need to be carefully explained and documented as part of software development.Good practice suggests that code and documentation be tightly coupled; but there are only a few…
Descriptors: Programming, Computer Software, Mathematics, Models
Tan, Lin – ProQuest LLC, 2009
Commenting source code has long been a common practice in software development. This thesis, consisting of three pieces of work, made novel use of the code comments written in natural language to improve software reliability. Our solution combines Natural Language Processing (NLP), Machine Learning, Statistics, and Program Analysis techniques to…
Descriptors: Computer Software, Coding, Reliability, Improvement
Buchanan, Larry – MultiMedia Schools, 1996
Defines HyperText Markup Language (HTML) as it relates to the World Wide Web (WWW). Describes steps needed to create HTML files on a UNIX system and to make them accessible via the WWW. Presents a list of basic HTML formatting codes and explains the coding used in the author's personal HTML file. (JMV)
Descriptors: Access to Information, Authoring Aids (Programming), Coding, Guidelines
Newby, Michael; Nguyen, ThuyUyen – Journal of Information Systems Education, 2007
Programming assignments are used to assess a student's understanding of the theoretical aspect of programming and their ability to put that theory into practice. When assigning programs for students to complete, it is necessary to make sure that the problem is well specified, realistic, yet is able to be completed in a relatively short period of…
Descriptors: Assignments, Problem Solving, Programming, Information Technology
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Wegerif, Rupert; McLaren, Bruce M.; Chamrada, Marian; Scheuer, Oliver; Mansour, Nasser; Miksatko, Jan; Williams, Mriga – Computers & Education, 2010
This paper reports on an aspect of the EC funded Argunaut project which researched and developed awareness tools for moderators of online dialogues. In this study we report on an investigation into the nature of creative thinking in online dialogues and whether or not this creative thinking can be coded for and recognized automatically such that…
Descriptors: Creativity, Creative Thinking, International Programs, Coding
Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages
Joy, Mike; Griffiths, Nathan; Boyatt, Russell – Journal on Educational Resources in Computing, 2005
Computer programming lends itself to automated assessment. With appropriate software tools, program correctness can be measured, along with an indication of quality according to a set of metrics. Furthermore, the regularity of program code allows plagiarism detection to be an integral part of the tools that support assessment. In this paper, we…
Descriptors: Plagiarism, Evaluation Methods, Programming, Feedback (Response)
Chinn, Donald; Vandegrift, Tammy – Journal on Educational Resources in Computing, 2008
This article provides an analysis of student responses to an exercise used in a computer ethics and a software engineering course to raise awareness of issues related to hiring, including issues of professional responsibility and diversity. Students from two different universities were asked to evaluate four candidates for two positions in a…
Descriptors: Personnel Selection, Evaluation Criteria, Inferences, Ethics
Feldman, Yishai A. – Journal on Educational Resources in Computing, 2005
Computer science students need to learn how to write high-quality software. An important methodology for achieving quality is design-by-contract, in which code is developed together with its specification, which is given as class invariants and method pre- and postconditions. This paper describes practical experience in teaching design-by-contract…
Descriptors: Teacher Effectiveness, Computer Software, Programming, Computer Science
Peer reviewedSullivan, Megan – Science Teacher, 2005
For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…
Descriptors: Information Skills, Programming, Internet, Computer Security
Breeding, Marshall – Computers in Libraries, 2006
It seems that everyone is talking about Web 2.0. This new vision of the Web enables greater interactivity, more user control of information, radical personalization, the development of online communities, and more democratic management of information. Supporting technologies include blogs, wikis, RSS, podcasts, tagging, XML, and Web services.…
Descriptors: Internet, Electronic Libraries, Information Technology, Programming
Desantes, Blanca – Journal of Archival Organization, 2005
This paper argues that there is a need for specific standards for the description of archive repositories. With this objective in mind a DTD has been created, called Encoded Archival Guide (EAG) that provides an electronic format for the storage, publication and exchange of information related to archive repositories. The different elements and…
Descriptors: Archives, Writing Instruction, Coding, Information Technology
Hu, Xiangen, Ed.; Barnes, Tiffany, Ed.; Hershkovitz, Arnon, Ed.; Paquette, Luc, Ed. – International Educational Data Mining Society, 2017
The 10th International Conference on Educational Data Mining (EDM 2017) is held under the auspices of the International Educational Data Mining Society at the Optics Velley Kingdom Plaza Hotel, Wuhan, Hubei Province, in China. This years conference features two invited talks by: Dr. Jie Tang, Associate Professor with the Department of Computer…
Descriptors: Data Analysis, Data Collection, Graphs, Data Use

Direct link
