NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 14,386 to 14,400 of 28,057 results Save | Export
Peer reviewed Peer reviewed
Craven, Timothy C. – Information Processing & Management, 2001
Discusses automatic indexing methods and describes the development of a prototype computerized abstractor's assistant. Highlights include the text network management system, TEXNET; phrase selection that follows indexing; phrase display, including Boolean capabilities; results of preliminary testing; and availability of TEXNET software. (LRW)
Descriptors: Abstracting, Automatic Indexing, Computer Software, Phrase Structure
Lippincott, Jenifer – Training, 1998
Offers three strategies that will make the job of training employees to use new software easier: (1) understand the business need that the software is addressing; (2) synchronize the development of training and support materials with the software development cycle; and (3) choose the appropriate training approach for the software application.…
Descriptors: Computer Literacy, Computer Software, Job Training, Trainers
Peer reviewed Peer reviewed
Childs, Ruth A.; Chen, Wen-Hung – Applied Psychological Measurement, 1999
Provides procedures for obtaining comparable item parameter estimates from the MULTILOG and PARSCALE programs for two polytomous Item Response Theory models, F. Samejima's graded response model (1969) and E. Muraki's generalized partial credit model (1992). (SLD)
Descriptors: Computer Software, Estimation (Mathematics), Item Response Theory
Peer reviewed Peer reviewed
Lambert, Joyce C.; Lousteau, Carolyn L.; Mochetta, Page T. – T.H.E. Journal, 2001
Discusses the security of computerized test files based on a survey of collegiate educators and offers recommendations to make tests more secure. Highlights include passwords; firewalls; keeping test files offline rather than on a hard drive; encryption; and using software to write over files rather than just deleting them. (LRW)
Descriptors: Computer Security, Computer Software, Higher Education, Surveys
Peer reviewed Peer reviewed
Barreau, Deborah K. – Library & Information Science Research, 2001
Discusses transaction systems that are designed for rapid data entry and task completion, and describes a study of three organizations that use commercial off-the-shelf software (COTS) products for providing customer service as well as for processing transactions. Concludes that organizations made do with systems designed for one application to…
Descriptors: Computer Software, Keyboarding (Data Entry), Media Adaptation
Peer reviewed Peer reviewed
Direct linkDirect link
Micale, Biagio; Pennisi, Mario – International Journal of Mathematical Education in Science and Technology, 2005
In this article quadrilaterals with concurrent maltitudes are characterized. A generalization of the maltitudes is given, and a larger family of quadrilaterals for which an analogous property of concurrency holds is determined and studied.
Descriptors: Mathematics, Geometric Concepts, Computer Software, Plane Geometry
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Wares, Arsalan – International Journal of Mathematical Education in Science and Technology, 2004
Students' difficulty with reasoning and justification in the context of proofs in geometry has been well documented. Studies reveal that many of the ideas that students are asked to prove are known to be true, and therefore, the process of such proof is likely to remain meaningless and purposeless. The implication of this claim is that students…
Descriptors: Mathematical Logic, Geometry, Computer Software, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson-Laird, P. N.; Girotto, Vittorio; Legrenzi, Paolo – Psychological Review, 2004
This article presents a theory of how individuals reason from inconsistency to consistency. The theory is based on 3 main principles. First, individuals try to construct a single mental model of a possibility that satisfies a current set of propositions, and if the task is impossible, they infer that the set is inconsistent. Second, when an…
Descriptors: Computer Software, Causal Models, Thinking Skills, Theories
Peer reviewed Peer reviewed
Direct linkDirect link
Stvan, Laurel Smith – Computers in the Schools, 2005
Through small-scale sampling of relevant specialized texts to craft hands-on inferential vocabulary tasks, both students and teachers can benefit from corpus linguistic information. By discovering ways to collect and access real data, second-language teachers can create topic-specific corpora and use software to sort and highlight the data to…
Descriptors: Computer Software, Vocabulary Development, English (Second Language)
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Peer reviewed Peer reviewed
Direct linkDirect link
Ateyeh, Khaldoun; Lockemann, Peter C. – Educational Technology & Society, 2006
No longer can courseware providers deal with one homogeneous target group, one learning form and possibly one pedagogical approach. Instead they must develop a broad range of courseware, each serving its specific target group, each adjusted to a specific learning and teaching form, each appealing to its own learning and teaching scenario, and each…
Descriptors: Courseware, Programming, Computer Software, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hongyi Wang – Journal of Chemical Education, 2005
A study uses the ChemDraw nuclear magnetic resonance spectroscopy (NMR) tool to process 15 para-substituted benzoic acids and generate (super 13)C NMR chemical shifts of C1 through C5. The data were plotted against their pK[subscript a] value and a fairly good linear fit was found for pK[subscript a] versus delta[subscript c1].
Descriptors: Physics, Computer Software, Chemistry, Spectroscopy
Peer reviewed Peer reviewed
Direct linkDirect link
Morton, David A.; Foreman, K. Bo; Goede, Patricia A.; Bezzant, John L.; Albertine, Kurt H. – Advances in Physiology Education, 2007
The methods for authoring and distributing course content are undergoing substantial changes due to advancement in computer technology. Paper has been the traditional method to author and distribute course content. Paper enables students to personalize content through highlighting and note taking but does not enable the incorporation of multimedia…
Descriptors: Educational Technology, Course Content, Medical Education, Medicine
Meisch, Allison; Hamilton, Jennifer; Chen, Eva; Quintanilla, Priscilla; Fong, Pauline; Gray-Adams, Karen; Petta, Ian; Thornton, Nancy – Westat, 2011
This report summarizes the results of the Newark, New Jersey, Striving Readers program for project Years 1, 2, 3, 4, and 5. This report updates one analysis (3 years); the remainder of the impacts and implementation findings are for Year 4. The Striving Readers Grant addresses the unmet needs of middle school students reading 2 or more years below…
Descriptors: Reading Difficulties, Reading Programs, Program Evaluation, Intervention
Pages: 1  |  ...  |  956  |  957  |  958  |  959  |  960  |  961  |  962  |  963  |  964  |  ...  |  1871