Publication Date
| In 2026 | 0 |
| Since 2025 | 151 |
| Since 2022 (last 5 years) | 647 |
| Since 2017 (last 10 years) | 1328 |
| Since 2007 (last 20 years) | 1888 |
Descriptor
| Computer Science Education | 2031 |
| Programming | 1790 |
| Foreign Countries | 728 |
| Teaching Methods | 652 |
| Programming Languages | 572 |
| Computer Software | 469 |
| Student Attitudes | 433 |
| College Students | 359 |
| Instructional Effectiveness | 357 |
| Introductory Courses | 351 |
| Undergraduate Students | 329 |
| More ▼ | |
Source
Author
| Xinogalos, Stelios | 13 |
| Barnes, Tiffany | 11 |
| Laakso, Mikko-Jussi | 10 |
| Çakiroglu, Ünal | 8 |
| Malmi, Lauri | 7 |
| Bers, Marina Umaschi | 6 |
| Cetin, Ibrahim | 6 |
| Karnalim, Oscar | 6 |
| Kwon, Kyungbin | 6 |
| Lavy, Ilana | 6 |
| Luxton-Reilly, Andrew | 6 |
| More ▼ | |
Publication Type
Education Level
Location
| Turkey | 103 |
| Taiwan | 45 |
| China | 36 |
| Finland | 31 |
| Greece | 27 |
| Australia | 26 |
| Spain | 23 |
| United Kingdom | 23 |
| Brazil | 22 |
| Israel | 22 |
| Sweden | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 1 |
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology
Dabbagh, Nada; Blijd, Cecily Williams – Journal of Educational Multimedia and Hypermedia, 2009
This study is a third in a series of studies that examined students' information seeking and problem solving behaviors while interacting with one of two types of web-based representations of an ill-structured instructional design case: hierarchical (tree-like) and heterarchical (network-like). A Java program was used to track students' hypermedia…
Descriptors: Medical Education, Graduate Students, Quasiexperimental Design, Problem Based Learning
Spiegelman, Marsha; Glass, Richard – Journal of Educational Technology Systems, 2009
Gaming and social networking define the millennial student. This research focuses on an evolving collaboration between 2 faculty members of different disciplines who merged Web 2.0 and game scenarios to infuse research techniques as integral components of math/computer science courses. Blogs and wikis facilitated student-faculty interaction beyond…
Descriptors: Research Skills, College Faculty, College Students, Mathematics Instruction
Marcus, Robert L.; Robertson, Douglass – 1998
Central State University (Ohio), under a contract with Nichols Research Corporation, has developed a World Wide web based workshop on high performance computing entitled "IBN SP2 Parallel Programming Workshop." The research is part of the DoD (Department of Defense) High Performance Computing Modernization Program. The research…
Descriptors: Algorithms, Computer Assisted Instruction, Computer Science Education, Computer System Design
Nash, Jane Gradwohl; Bravaco, Ralph J.; Simonson, Shai – Computer Science Education, 2006
The purpose of this study was to assess structural knowledge change across a two-week workshop designed to provide high-school teachers with training in Java and Object Oriented Programming. Both before and after the workshop, teachers assigned relatedness ratings to pairs of key concepts regarding Java and Object Oriented Programming. Their…
Descriptors: Concept Mapping, Cognitive Structures, Workshops, Programming
Sicilia, Miguel-Angel – Computer Science Education, 2006
A considerable amount of experiences in teaching object-oriented concepts using the Java language have been reported to date, some of which describe language pitfalls and concrete learning difficulties. In this paper, a number of additional issues that have been experienced as difficult for students to master, along with approaches intended to…
Descriptors: Learning Problems, Learning Strategies, Programming, Programming Languages
Holmboe, Christian – Computer Science Education, 2005
Constructing a data model for a problem area requires identifying and formulating some symbolic representation of the concepts involved, their characteristics, and the relationships between them. Taking a socio-cultural perspective on learning, analysis of classroom dialog is used to identify cognitive challenges met by novice students of data…
Descriptors: Concept Formation, Concept Teaching, Psycholinguistics, Metalinguistics
Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages
Parlante, Nick – JCSE Online, 2001
Describes a Web site called Nifty Assignments that offers assignments for computer science education. Topics include programming assignments; student appeal; appropriateness for high school classes; and links to other related Web sites. (LRW)
Descriptors: Assignments, Computer Science Education, Higher Education, Programming
Simon, Beth; Bouvier, Dennis; Chen, Tzu-Yi; Lewandowski, Gary; McCartney, Robert; Sanders, Kate – Computer Science Education, 2008
We report on responses to a series of four questions designed to identify pre-existing abilities related to debugging and troubleshooting experiences of novice students before they begin programming instruction. The focus of these questions include general troubleshooting, bug location, exploring unfamiliar environments, and describing students'…
Descriptors: Troubleshooting, Teaching Methods, Computer Science Education, Programming
Wuttke, Heinz-Dietrich; Henke, Karsten – Interactive Technology and Smart Education, 2009
Purpose: The content, provided in learning management systems (LMS), is often text oriented as in a usual textbook, extended by some animations and links. Hands on activities and experiments are not possible. The paper aims to give an overview about the concept to couple smart simulation and assessment tools with an LMS to provide a more…
Descriptors: Feedback (Response), Experiential Learning, Student Evaluation, Teaching Methods
Sun, Shanghua; Joy, Mike; Griffiths, Nathan – Journal of Interactive Learning Research, 2007
Adaptive learning and teaching strategies are increasingly demanded in order to improve the efficiency and effectiveness of the education process, but few intelligent education systems exist, which are dynamic and able to satisfy individual students' requirements. In an attempt to overcome these limitations, we have developed a multi-agent…
Descriptors: Teaching Methods, Efficiency, Educational Research, Cognitive Style
Nunes, Miguel Baptista, Ed.; McPherson, Maggie, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers of the International Conference e-Learning 2016, which was organised by the International Association for Development of the Information Society, 1-3 July, 2016. This conference is part of the Multi Conference on Computer Science and Information Systems 2016, 1-4 July. The e-Learning (EL) 2016 conference aims…
Descriptors: Professional Associations, Conferences (Gatherings), Electronic Learning, Computer Science Education
Lancaster, Thomas; Culwin, Fintan – Computer Science Education, 2004
Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and…
Descriptors: Foreign Countries, Plagiarism, College Students, Student Evaluation
Keppens, Jeroen; Hay, David – Computer Science Education, 2008
A key challenge of effective teaching is assessing and monitoring the extent to which students have assimilated the material they were taught. Concept mapping is a methodology designed to model what students have learned. In effect, it seeks to produce graphical representations (called concept maps) of the concepts that are important to a given…
Descriptors: Concept Mapping, Programming, Teaching Methods, Educational Assessment

Peer reviewed
Direct link
