NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
Program for International…1
What Works Clearinghouse Rating
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Allan, Denise; Vettese, Samantha; Thompson, Paul – Design and Technology Education, 2018
In this article, the researchers investigate different ways in which school age, 'generation net' children learn, through non-linear, mediated, collaborative 'making' environments, enabled by informal club settings and online 'builder' gaming and groups. In addition to this, the study will investigate these learning methods in relation to…
Descriptors: Design, Learning Processes, Clubs, Informal Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chai, Ching Sing; Wong, Lung-Hsiang; Sim, Seok Hwa; Deng, Feng – Turkish Online Journal of Educational Technology - TOJET, 2012
Computer-based writing is already a norm to a large extent in social communication for any major language around the world. From this perspective, it would be pedagogically sound for students to master the Chinese input system as early as possible. This poses some challenges to students in Singapore, most of which are learning Chinese as a second…
Descriptors: Foreign Countries, Writing (Composition), Chinese, Writing Tests
Peer reviewed Peer reviewed
Rajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet
Peer reviewed Peer reviewed
Pagell, Ruth A. – Electronic Library, 1996
The Center for Business Information and the Goizueta Business School at Emory University (Georgia) tested desktop videoconferencing as a means to deliver reference services, including consultation, documentation, training, and sharing of CD-ROM databases. Provides a brief overview of the technology, describes project beta testing, and discusses…
Descriptors: Access to Information, Computer Mediated Communication, Computer Peripherals, Computer Software
Gündüz, Nazli – Online Submission, 2005
This article will provide an overview of computers; an overview of the history of CALL, its pros and cons, the internet, World Wide Web, Multimedia, and research related to the uses of computers in the language classroom. Also, it also aims to provide some background for the beginners on using the Internet in language classes today. It discusses…
Descriptors: Computer Assisted Instruction, Second Language Learning, Second Language Instruction, Educational History
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection