NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 12,421 to 12,435 of 28,061 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
van Harmelen, M. – Interactive Learning Environments, 2008
Increasingly, there is a shared understanding that the educational approach driving the development of Personal Learning Environments (PLEs) is one of learner empowerment and facilitation of the efforts of self-directed learners. This approach fits well with concepts of social constructivism, constructionism, and the development and execution of…
Descriptors: Constructivism (Learning), Experiments, Educational Environment, Independent Study
Peer reviewed Peer reviewed
Direct linkDirect link
Christie, Derek – Teaching Statistics: An International Journal for Teachers, 2008
This article shows how to use Microsoft Excel to get data from the Internet into a statistically usable form.
Descriptors: Computer Literacy, Internet, Information Technology, Information Skills
Technology & Learning, 2008
In this article, four directors discuss the security challenges that keep them worried and what they do about it. Dwayne Alton describes how his school district, IT School District of Lee County, Fort Meyers, Florida, collaborated with Cisco and installed an intrusion detection system which alerts IT staff when someone creates their own access…
Descriptors: Computer Security, School Districts, Information Technology, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Stock, S. E.; Davies, D. K.; Wehmeyer, M. L.; Palmer, S. B. – Journal of Intellectual Disability Research, 2008
Background: There are over two billion telephones in use worldwide. Yet, for millions of Americans with intellectual disabilities (ID), access to the benefits of cellphone technology is limited because of deficits in literacy, numerical comprehension, the proliferation of features and shrinking size of cellphone hardware and user interfaces.…
Descriptors: Mental Retardation, Computer Software, Educational Technology, Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Zhang, Zhiyong; McArdle, John J.; Wang, Lijuan; Hamagami, Fumiaki – Structural Equation Modeling: A Multidisciplinary Journal, 2008
Bayesian methods are becoming very popular despite some practical difficulties in implementation. To assist in the practical application of Bayesian methods, we show how to implement Bayesian analysis with WinBUGS as part of a standard set of SAS routines. This implementation procedure is first illustrated by fitting a multiple regression model…
Descriptors: Bayesian Statistics, Computer Software, Monte Carlo Methods, Multiple Regression Analysis
De Groff, Amy Begg – Computers in Libraries, 2008
Librarians role as partners in education is to instruct customers on how to find information. Their purpose is to get information to customers. Often, that takes the form of delivering a book. Sometimes, it is accomplished by typing a URL into a web browser, reading text, and copying some of it into a text document for manipulation and…
Descriptors: Computer Software, Public Libraries, Instructional Materials, Access to Information
Foster, Andrea – Chronicle of Higher Education, 2008
At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…
Descriptors: Computer Software, Confidential Records, Student Records, Computer Security
Peer reviewed Peer reviewed
Littlefield, Stanley P. – Community College Review, 1986
Evaluates and provides technical information concerning The Smart System, version 3.0, by Innovative Software. (DMM)
Descriptors: Computer Software, Computer Software Reviews, Microcomputers
Nam, Ta Thanh; Trinh, Lap Q. – Journal on English Language Teaching, 2012
In Vietnamese secondary education, translation and visuals are traditionally used as major techniques in teaching new English lexical items. Responding to the Vietnamese government policy issued in 2008 on using IT for a quality education, the application of PowerPoint has been considered the most prevalent type of technology used in the…
Descriptors: Vocabulary Development, Pretests Posttests, Computer Software, Questionnaires
Bowman, Charles Robert – ProQuest LLC, 2012
Improving student performance is the goal of any chemistry educator. With the proliferation of internet technologies in recent years, educators have been struggling with providing effective learning materials to students online. These materials also have not always had the intended effect of improving student performance. Either students do not…
Descriptors: Study Habits, Student Attitudes, Correlation, Schematic Studies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Durdu, Levent; Özden, Yasar Muhammed; Delialioglu, Ömer – Online Submission, 2012
Language learning, especially second language learning requires systematic practice and repetition. Students are introduced with the new words in class sessions and they practice them via traditional methods such as continuously writing the direct meaning of the word or using flash cards. Computers have the potential to bring more attractive and…
Descriptors: Web Based Instruction, Teaching Methods, Second Language Learning, Second Language Instruction
Hixson, Nate – West Virginia Department of Education, 2012
We conducted an evaluation study of the Middle School Algebra Readiness Initiative, a middle school mathematics intervention that was implemented in two West Virginia school districts during the 2011-2012 school year. In participating middle schools, the Carnegie Learning MATHia® software intervention and accompanying classroom curriculum were…
Descriptors: Middle Schools, Algebra, Secondary School Mathematics, Mathematics Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Akbiyik, Cenk – Educational Technology & Society, 2012
Throughout this study, tutorial and demonstration methods in photo editing instruction were compared. The instruction method was the independent variable of the study while cognitive load, state anxiety level, student performance, student achievement, and task duration were dependent variables. The research was conducted with 62 undergraduate…
Descriptors: Foreign Countries, Computer Assisted Instruction, Educational Technology, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Mang, Colin F.; Wardley, Leslie J. – Journal of Information Technology Education: Innovations in Practice, 2012
This paper explores the integration of tablets, such as the Apple iPad, in university classes and provides recommendations for other instructors to consider when adopting tablet technology. During the trial conducted in the summer of 2011 using iPads, we found that tablets had both academic and social uses, which should be considered when using…
Descriptors: Handheld Devices, Technology Integration, Laptop Computers, Computer Software
Pages: 1  |  ...  |  825  |  826  |  827  |  828  |  829  |  830  |  831  |  832  |  833  |  ...  |  1871