Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
Author
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
Education Level
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Grade 3 | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Primary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ugur Orhan; Eda Demirhan – International Journal of Education in Mathematics, Science and Technology, 2025
The aim of the current study is to develop a detailed understanding of how thirdgrade primary school students construct 3D printers in their minds based on their initial knowledge about 3D printers. This study, which was conducted with a phenomenological design, is one of the qualitative research methods. The participants of the study consisted of…
Descriptors: Elementary School Students, Cognitive Structures, Computer Peripherals, Grade 3
Melanie B. Berkmen; Melisa Balla; Mikayla T. Cavanaugh; Isabel N. Smith; Misael Eduardo Flores-Artica; Abby M. Thornhill; Julia C. Lockart; Celeste N. Peterson – Biochemistry and Molecular Biology Education, 2025
Biochemistry and molecular biology students are asked to understand and analyze the structures of small molecules and complex three-dimensional (3D) macromolecules. However, most tools to help students learn molecular visualization skills are limited to two-dimensional (2D) images on screens and in textbooks. The virtual reality (VR) App Nanome,…
Descriptors: Technology Uses in Education, Computer Simulation, Computer Oriented Programs, Science Instruction
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security

Peer reviewed
Direct link
