NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 11,116 to 11,130 of 28,057 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hager, Lisa D. – Teaching of Psychology, 2011
To understand the relevance of cognitive psychology, students in a cognitive psychology course were required to complete a detailed plan for a public service announcement focusing on environmental issues. The final exam was a Microsoft Office PowerPoint presentation incorporating at least eight concepts from the course. Students in the course…
Descriptors: Public Service, Cognitive Psychology, Educational Methods, Sustainable Development
Peer reviewed Peer reviewed
Direct linkDirect link
Maor, Dorit; Currie, Jan; Drewry, Rachel – European Journal of Special Needs Education, 2011
Assistive technologies are often promoted to schools, parents and educators as tools to assist students with special needs by providing a compensatory value, to remediate learning problems and to promote personal independence. These technologies range from simple spellcheckers to more complex speech recognition systems and educational software.…
Descriptors: Spelling, Assistive Technology, Disabilities, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Kreiner, Svend – Applied Psychological Measurement, 2011
To rule out the need for a two-parameter item response theory (IRT) model during item analysis by Rasch models, it is important to check the Rasch model's assumption that all items have the same item discrimination. Biserial and polyserial correlation coefficients measuring the association between items and restscores are often used in an informal…
Descriptors: Item Analysis, Correlation, Item Response Theory, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Stelma, Juup – Instructional Science: An International Journal of the Learning Sciences, 2011
This paper presents an ecological model of developing researcher competence, with a particular focus on doctoral students' use of research software. The model extends on theoretical work done by Young et al. ("Instructional Science 30"(1): 47-63, 2002), modelling the intentional dynamics of technological learning contexts. The development of the…
Descriptors: Electronic Learning, Doctoral Programs, Computer Software, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Granitz, Neil; Koernig, Stephen K. – Journal of Marketing Education, 2011
Although both experiential learning and Web 2.0 tools focus on creativity, sharing, and collaboration, sparse research has been published integrating a Web 2.0 paradigm with experiential learning in marketing. In this article, Web 2.0 concepts are explained. Web 2.0 is then positioned as a philosophy that can advance experiential learning through…
Descriptors: Experiential Learning, Internet, Business Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Garrett, Nathan – Educational Technology & Society, 2011
This project attempts to improve electronic portfolio software through the creation of a design model using ownership, ease of use, and social learning variables to predict user adoption. The pilot software attempts to encourage student learning by enhancing peer interaction. The software was used by two groups of students. The first group used it…
Descriptors: Higher Education, Portfolio Assessment, Computer Software, Usability
Peer reviewed Peer reviewed
Direct linkDirect link
den Ouden, Hanny; van Wijk, Carel – Business Communication Quarterly, 2011
Students write papers in many of their courses to improve their writing skills and to foster an active attitude toward learning. Every year, they hand in hundreds of papers for teachers to assess. This stream may get polluted in two ways: by simple copying from Internet sources and by the exchange of text fragments between students. These…
Descriptors: Foreign Countries, College Students, Plagiarism, Cheating
Peer reviewed Peer reviewed
Direct linkDirect link
Bowers, Janet; Bezuk, Nadine; Aguilar, Karen – International Journal of Mathematical Education in Science and Technology, 2011
Designing didactic objects involves imagining how students can conceive of specific mathematical topics and then imagining what types of classroom discussions could support these mental constructions. This study investigated whether it was possible to design Java applets that might serve as didactic objects to support online learning where…
Descriptors: Electronic Learning, Online Courses, Mathematics, Models
Peer reviewed Peer reviewed
Direct linkDirect link
McLaren, Bruce M.; DeLeeuw, Krista E.; Mayer, Richard E. – Computers & Education, 2011
Should an intelligent software tutor be polite, in an effort to motivate and cajole students to learn, or should it use more direct language? If it should be polite, under what conditions? In a series of studies in different contexts (e.g., lab versus classroom) with a variety of students (e.g., low prior knowledge versus high prior knowledge),…
Descriptors: Feedback (Response), Test Items, Intervention, Intelligent Tutoring Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Gurmukh; Siddiqui, Khalid; Singh, Mankiran; Singh, Satpal – Journal of Educational Technology Systems, 2011
The current research article is based on a simple and practical way of employing the computational power of widely available, versatile software MS Excel 2007 to perform interactive computer simulations for undergraduate/graduate students in biology, biochemistry, biophysics, microbiology, medicine in college and university classroom setting. To…
Descriptors: Heredity, Genetics, Biological Sciences, Medical Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Werner, Laurie A.; Frank, Charles E. – Information Systems Education Journal, 2010
Teaching a computer security course which includes network administration and protection software is especially challenging because textbook tools are out of date by the time the text is published. In an effort to use lab activities that work effectively, we turned to the internet. This paper describes several resources for teaching computer…
Descriptors: Information Security, Information Science Education, Video Technology, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jin, Ng Yu – Advances in Language and Literary Studies, 2010
Students are believed to learn at optimum level with materials with a lot of white space since the existence of vast number of words and limited amount of white space, especially in textbooks may contribute to the increase in anxiety among learners (Tomlinson, 1998). This study evaluates the amount of white space in terms of pixels in the…
Descriptors: Textbooks, Textbook Evaluation, English (Second Language), Second Language Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Skupas, Bronius – Informatics in Education, 2010
Automatic program evaluation is a way to assess source program files. These techniques are used in learning management environments, programming exams and contest systems. However, use of automated program evaluation encounters problems: some evaluations are not clear for the students and the system messages do not show reasons for lost points.…
Descriptors: Foreign Countries, Feedback (Response), Automation, Computer Software
Vee, Annette – ProQuest LLC, 2010
This dissertation looks at computer programming through the lens of literacy studies, building from the concept of code as a written text with expressive and rhetorical power. I focus on the intersecting technological and social factors of computer code writing as a literacy--a practice I call "proceduracy". Like literacy, proceduracy is a human…
Descriptors: Computer Software, Computers, Programming, Foreign Countries
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Pages: 1  |  ...  |  738  |  739  |  740  |  741  |  742  |  743  |  744  |  745  |  746  |  ...  |  1871