Publication Date
| In 2026 | 1 |
| Since 2025 | 734 |
| Since 2022 (last 5 years) | 3584 |
| Since 2017 (last 10 years) | 7450 |
| Since 2007 (last 20 years) | 15034 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 2852 |
| Teachers | 2010 |
| Researchers | 608 |
| Administrators | 473 |
| Media Staff | 268 |
| Students | 245 |
| Policymakers | 202 |
| Parents | 78 |
| Counselors | 33 |
| Support Staff | 22 |
| Community | 21 |
| More ▼ | |
Location
| Australia | 499 |
| United Kingdom | 474 |
| Turkey | 473 |
| Canada | 364 |
| China | 309 |
| Taiwan | 248 |
| United States | 228 |
| Indonesia | 223 |
| Spain | 221 |
| California | 195 |
| Germany | 163 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 11 |
| Meets WWC Standards with or without Reservations | 16 |
| Does not meet standards | 17 |
Peer reviewedChilds, Ruth A.; Chen, Wen-Hung – Applied Psychological Measurement, 1999
Provides procedures for obtaining comparable item parameter estimates from the MULTILOG and PARSCALE programs for two polytomous Item Response Theory models, F. Samejima's graded response model (1969) and E. Muraki's generalized partial credit model (1992). (SLD)
Descriptors: Computer Software, Estimation (Mathematics), Item Response Theory
Peer reviewedLambert, Joyce C.; Lousteau, Carolyn L.; Mochetta, Page T. – T.H.E. Journal, 2001
Discusses the security of computerized test files based on a survey of collegiate educators and offers recommendations to make tests more secure. Highlights include passwords; firewalls; keeping test files offline rather than on a hard drive; encryption; and using software to write over files rather than just deleting them. (LRW)
Descriptors: Computer Security, Computer Software, Higher Education, Surveys
Peer reviewedBarreau, Deborah K. – Library & Information Science Research, 2001
Discusses transaction systems that are designed for rapid data entry and task completion, and describes a study of three organizations that use commercial off-the-shelf software (COTS) products for providing customer service as well as for processing transactions. Concludes that organizations made do with systems designed for one application to…
Descriptors: Computer Software, Keyboarding (Data Entry), Media Adaptation
Micale, Biagio; Pennisi, Mario – International Journal of Mathematical Education in Science and Technology, 2005
In this article quadrilaterals with concurrent maltitudes are characterized. A generalization of the maltitudes is given, and a larger family of quadrilaterals for which an analogous property of concurrency holds is determined and studied.
Descriptors: Mathematics, Geometric Concepts, Computer Software, Plane Geometry
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
Wares, Arsalan – International Journal of Mathematical Education in Science and Technology, 2004
Students' difficulty with reasoning and justification in the context of proofs in geometry has been well documented. Studies reveal that many of the ideas that students are asked to prove are known to be true, and therefore, the process of such proof is likely to remain meaningless and purposeless. The implication of this claim is that students…
Descriptors: Mathematical Logic, Geometry, Computer Software, Teaching Methods
Johnson-Laird, P. N.; Girotto, Vittorio; Legrenzi, Paolo – Psychological Review, 2004
This article presents a theory of how individuals reason from inconsistency to consistency. The theory is based on 3 main principles. First, individuals try to construct a single mental model of a possibility that satisfies a current set of propositions, and if the task is impossible, they infer that the set is inconsistent. Second, when an…
Descriptors: Computer Software, Causal Models, Thinking Skills, Theories
Stvan, Laurel Smith – Computers in the Schools, 2005
Through small-scale sampling of relevant specialized texts to craft hands-on inferential vocabulary tasks, both students and teachers can benefit from corpus linguistic information. By discovering ways to collect and access real data, second-language teachers can create topic-specific corpora and use software to sort and highlight the data to…
Descriptors: Computer Software, Vocabulary Development, English (Second Language)
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Ateyeh, Khaldoun; Lockemann, Peter C. – Educational Technology & Society, 2006
No longer can courseware providers deal with one homogeneous target group, one learning form and possibly one pedagogical approach. Instead they must develop a broad range of courseware, each serving its specific target group, each adjusted to a specific learning and teaching form, each appealing to its own learning and teaching scenario, and each…
Descriptors: Courseware, Programming, Computer Software, Educational Technology
Hongyi Wang – Journal of Chemical Education, 2005
A study uses the ChemDraw nuclear magnetic resonance spectroscopy (NMR) tool to process 15 para-substituted benzoic acids and generate (super 13)C NMR chemical shifts of C1 through C5. The data were plotted against their pK[subscript a] value and a fairly good linear fit was found for pK[subscript a] versus delta[subscript c1].
Descriptors: Physics, Computer Software, Chemistry, Spectroscopy
McConatha, Douglas; Praul, Matt; Lynch, Michael J. – Turkish Online Journal of Educational Technology - TOJET, 2008
Mobile Learning, or M-learning as it is often called, is a relatively new tool in the pedagogical arsenal to assist students and teachers as they navigate the options available in the expanding distance learning world. This article assesses some of the possible methods, challenges and future potential of using this approach in a college classroom…
Descriptors: Electronic Learning, Introductory Courses, Student Evaluation, Distance Education
Shaaf, Mohamad – American Journal of Business Education, 2008
Using Excel, an interactive program is designed to simulate the Solow and endogenous growth models to facilitate the understanding of these models for students of growth theory and macroeconomics.
Descriptors: Economic Change, Models, Computer Simulation, Computer Software
Maloney, John; Peppler, Kylie; Kafai, Yasmin B.; Resnick, Mitchel; Rusk, Natalie – Online Submission, 2008
This paper describes Scratch, a visual, block-based programming language designed to facilitate media manipulation for novice programmers. We report on the Scratch programming experiences of urban youth ages 8-18 at a Computer Clubhouse--an after school center--over an 18-month period. Our analyses of 536 Scratch projects collected during this…
Descriptors: Programming Languages, Programming, Urban Youth, Children
Gonen, Selahattin; Basaran, Bulent – Online Submission, 2008
In this article, two basic purposes are presented. First, taking effective feedbacks in the electronic learning environment about the learning level of students at the problem solving which are told in physics lessons and laboratories. Second, providing a possibility for students to repeat the subjects and solved problems by watching and…
Descriptors: Online Courses, Computer Software, Physics, Science Curriculum

Direct link
