Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
CAUSE/EFFECT | 1 |
Campus Technology | 1 |
Internet World | 1 |
Journal of Developmental… | 1 |
Program: Electronic Library… | 1 |
Technology & Learning | 1 |
Telecommunications | 1 |
Author
Branzburg, Jeffrey | 1 |
Broderick, Bill | 1 |
Callihan, Steven E. | 1 |
Caverly, David C. | 1 |
Chaputula, Aubrey Harvey | 1 |
Coffield, Kate | 1 |
Demski, Jennifer | 1 |
Flanagan, Patrick | 1 |
Hallisey, Joanne | 1 |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 6 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Malawi | 1 |
Michigan | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chaputula, Aubrey Harvey – Program: Electronic Library and Information Systems, 2012
Purpose: The purpose of this research is to look at the state, adoption and use of ICTs by students and academic staff at Mzuzu University. Design/methodology/approach: The research used a survey method whose study population included students, academic and library staff. Data for the study were collected using an interview guide and…
Descriptors: Foreign Countries, College Students, College Faculty, Computer Uses in Education
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Callihan, Steven E. – Internet World, 1996
Offers advice for choosing an Internet provider: consider the amount of time, effort, and expertise one has, coupled with the complexity of the Web page, which impact price and choice of provider; and question providers about server speed, ports, architecture, traffic levels, fee structures, and registration of domain names. Lists 33 Web presence…
Descriptors: Computer Networks, Computer Peripherals, Costs, Guidelines

Caverly, David C.; Broderick, Bill – Journal of Developmental Education, 1993
Explains how to access the Internet, discussing hardware and software considerations, connectivity, and types of access available to users. Describes the uses of electronic mail; TELNET, a method for remotely logging onto another computer; and anonymous File Transfer Protocol (FTP), a method for downloading files from a remote computer. (MAB)
Descriptors: Access to Information, Computer Networks, Computer Peripherals, Computer Software
Hallisey, Joanne – CAUSE/EFFECT, 1998
Reengineering efforts, vendor consolidation, and rising costs prompted the Massachusetts Institute of Technology to convert its computer resale store to an online catalog that allows students, faculty, and staff to purchase equipment and software through a World Wide Web interface. The transition has been greeted with a mixed reaction. The next…
Descriptors: Computer Networks, Computer Peripherals, Computer Software, Database Management Systems
General Accounting Office, Washington, DC. Health, Education, and Human Services Div. – 1998
This document contains a letter to members of the United States Senate reporting the information gathered from a study of five school districts' experiences funding technology programs. Appendices, which comprise the majority of the document, include the project scope and evaluation, and the reports from each school district. The five school…
Descriptors: Access to Computers, Computer Networks, Computer Peripherals, Educational Finance
Flanagan, Patrick – Telecommunications, 1996
Synthesizes opinions of experts regarding technologies deemed most likely to enter the telecommunications mainstream by 1998, including: (1) the Java programming language; (2) voice- over frame relay; (3) virtual local area networks (LANs); (4) cable modems; (5) gigabit LANs; (6) Internet appliances; (7) personal satellite phones; (8) intranets;…
Descriptors: Communications Satellites, Computer Networks, Computer Peripherals, Data Processing
Coffield, Kate – 1996
This paper traces an educator's experiences with computers over a span of 20 years, and describes the computerization of and concomitant obstacles faced by the Humanities department at the American University in Cairo, Egypt (AUC). The computerization of AUC began in the 1980s, with workstations mainly in the science, math, engineering, and…
Descriptors: Computer Literacy, Computer Networks, Computer Peripherals, Computer Uses in Education