NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 10,966 to 10,980 of 28,052 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Gerard, Joseph G.; Gerard, Reena Lederman; Casile, Maureen – Journal of Educational Technology Systems, 2010
Understanding what hybrid space is, much less understanding what happens in that virtual realm, can raise difficult questions. For example, our campus's question "How do we define hybrid?" has kept us busy and guessing for over a year now. In this article, we offer a few suggestions on how to proceed with hybrid issues, including how to deal with…
Descriptors: Case Studies, Educational Technology, Computer Software, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Goff, John Eric; Carre, Matt J. – European Journal of Physics, 2010
We performed experiments in which a soccer ball was launched from a machine while two high-speed cameras recorded portions of the trajectory. Using the trajectory data and published drag coefficients, we extracted lift coefficients for a soccer ball. We determined lift coefficients for a wide range of spin parameters, including several spin…
Descriptors: Team Sports, Physics, Scientific Principles, College Science
Peer reviewed Peer reviewed
Direct linkDirect link
Peterlin, Primoz – European Journal of Physics, 2010
Two methods of data analysis are compared: spreadsheet software and a statistics software suite. Their use is compared analysing data collected in three selected experiments taken from an introductory physics laboratory, which include a linear dependence, a nonlinear dependence and a histogram. The merits of each method are compared. (Contains 7…
Descriptors: Physics, Introductory Courses, Science Instruction, College Science
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kurilovas, Eugenijus; Dagiene, Valentina – Electronic Journal of e-Learning, 2010
The main research object of the paper is investigation and proposal of the comprehensive Learning Object Repositories (LORs) quality evaluation tool suitable for their multiple criteria decision analysis, evaluation and optimisation. Both LORs "internal quality" and "quality in use" evaluation (decision making) criteria are analysed in the paper.…
Descriptors: Electronic Learning, Architecture, Opinions, Evaluation Criteria
Siegle, Del – Gifted Child Today, 2010
In a time of budget cuts and limited funding, purchasing and installing the latest software on classroom computers can be prohibitive for schools. Many educators are unaware that a variety of free software options exist, and some of them do not actually require installing software on the user's computer. One such option is cloud computing. This…
Descriptors: Computer Software, Computers, Educational Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Hu, J.; Haffner, M.; Yoder, S.; Scott, M.; Reehal, G.; Ismail, M. – IEEE Transactions on Education, 2010
The semiconductor industry is lacking qualified integrated circuit (IC) test engineers to serve in the field of mixed-signal electronics. The absence of mixed-signal IC test education at the collegiate level is cited as one of the main sources for this problem. In response to this situation, the Department of Electrical and Computer Engineering at…
Descriptors: Feedback (Response), Course Objectives, Academic Achievement, Laboratories
Peer reviewed Peer reviewed
Direct linkDirect link
Malone, Patrick S.; Lamis, Dorian A.; Masyn, Katherine E.; Northrup, Thomas F. – Multivariate Behavioral Research, 2010
The gateway drug model is a popular conceptualization of a progression most substance users are hypothesized to follow as they try different legal and illegal drugs. Most forms of the gateway hypothesis are that "softer" drugs lead to "harder," illicit drugs. However, the gateway hypothesis has been notably difficult to…
Descriptors: Drug Use, Models, Statistical Analysis, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Neuper, Walther – International Journal for Technology in Mathematics Education, 2010
Two kinds of software, CAS and DGS, are starting to work towards mutual integration. This paper envisages common grounds for such integration based on principles of computer theorem proving (CTP). Presently, the CTP community seems to lack awareness as to which of their products' features might serve mathematics education from high-school to…
Descriptors: Mathematics Education, Computer Software, Educational Technology, Job Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Cuadra, D.; Maqueda, A. I.; Castro, E.; Fernandez, P. M. – IEEE Transactions on Education, 2010
Conceptual models are applied as the first step in software design methodologies for collecting the semantics involved in the universe of discourse. Nevertheless, the abstraction process creates some misunderstandings for novice designers, such as difficulties in modeling some constructs and in understanding the semantics that they represent. This…
Descriptors: Foreign Countries, Database Design, Models, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, Soon-Mook – International Journal of Testing, 2010
CEFA 3.02(Browne, Cudeck, Tateneni, & Mels, 2008) is a factor analysis computer program designed to perform exploratory factor analysis. It provides the main properties that are needed for exploratory factor analysis, namely a variety of factoring methods employing eight different discrepancy functions to be minimized to yield initial…
Descriptors: Factor Structure, Computer Software, Factor Analysis, Research Methodology
Peer reviewed Peer reviewed
Direct linkDirect link
Hosack, Bradford – TechTrends: Linking Research and Practice to Improve Learning, 2010
This paper expands the boundaries of video annotation in education by outlining the need for extended interaction in online video use, identifying the challenges faced by existing video annotation tools, and introducing Video-ANT, a tool designed to create text-based annotations integrated within the time line of a video hosted online. Several…
Descriptors: Internet, Video Technology, Computer Software, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Walker, John – Studies in Higher Education, 2010
Student plagiarism in colleges and universities has become a controversial issue in recent years. A key problem has been the lack of reliable empirical data on the frequency, nature and extent of plagiarism in student assignments. The aim of the study described here was to provide this data. Patterns of plagiarism were tracked in two university…
Descriptors: Curriculum Development, Assignments, Plagiarism, Business Administration Education
Peer reviewed Peer reviewed
Direct linkDirect link
Brunsell, Eric; Horejsi, Martin – Science Teacher, 2010
Probeware is the combination of sensors and software connected to a computer or handheld device. At the heart of probeware is a digital sensor that measures a particular physical parameter. One or more sensors are plugged into an interface, a calculator, and a handheld device. With the click of a button, probeware collects and graphs data in real…
Descriptors: Educational Technology, Computer Uses in Education, Computer Software, Handheld Devices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Penn-Edwards, Sorrel – Qualitative Report, 2010
The qualitative research methodology of phenomenography has traditionally required a manual sorting and analysis of interview data. In this paper I explore a potential means of streamlining this procedure by considering a computer aided process not previously reported upon. Two methods of lexicological analysis, manual and automatic, were examined…
Descriptors: Qualitative Research, Research Methodology, Computer Software, Computers
Pages: 1  |  ...  |  728  |  729  |  730  |  731  |  732  |  733  |  734  |  735  |  736  |  ...  |  1871