Publication Date
| In 2026 | 0 |
| Since 2025 | 710 |
| Since 2022 (last 5 years) | 3560 |
| Since 2017 (last 10 years) | 7426 |
| Since 2007 (last 20 years) | 15010 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 2852 |
| Teachers | 2010 |
| Researchers | 608 |
| Administrators | 473 |
| Media Staff | 268 |
| Students | 245 |
| Policymakers | 202 |
| Parents | 78 |
| Counselors | 33 |
| Support Staff | 22 |
| Community | 21 |
| More ▼ | |
Location
| Australia | 499 |
| United Kingdom | 474 |
| Turkey | 472 |
| Canada | 364 |
| China | 307 |
| Taiwan | 248 |
| United States | 228 |
| Indonesia | 222 |
| Spain | 221 |
| California | 195 |
| Germany | 163 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 11 |
| Meets WWC Standards with or without Reservations | 16 |
| Does not meet standards | 17 |
Tonidandel, Scott; Overall, John E. – Psychological Methods, 2004
A split-sample replication criterion originally proposed by J. E. Overall and K. N. Magee (1992) as a stopping rule for hierarchical cluster analysis is applied to multiple data sets generated by sampling with replacement from an original simulated primary data set. An investigation of the validity of this bootstrap procedure was undertaken using…
Descriptors: Computer Software, Sampling, Multivariate Analysis, Computation
McAndrew, Patrick; Clow, Doug; Taylor, Josie; Aczel, James – British Journal of Educational Technology, 2004
Knowledge Management (KM) and knowledge sharing are important factors that support lifelong learning, and enable people to continue developing throughout their careers. The concept of a Community of Practice ( Wenger, 2000) is attractive in drawing together people whose work shares similar aspects, and consideration is given here to how technology…
Descriptors: Educational Technology, Computer Software, Lifelong Learning, Systems Development
Peer reviewedRajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet
Sandell, Karin L.; Welch, Lonnie – New Directions for Teaching and Learning, 2004
The two models for group exams described here employ these exams as both a formative strategy for assessing student understanding of key course material and preparing students for further class activities and a summative strategy for evaluating student learning and assigning grades.
Descriptors: Class Activities, Student Evaluation, Group Testing, Groups
Algina, James; Olejnik, Stephen – Multivariate Behavioral Research, 2003
Tables for selecting sample size in correlation studies are presented. Some of the tables allow selection of sample size so that r (or r[squared], depending on the statistic the researcher plans to interpret) will be within a target interval around the population parameter with probability 0.95. The intervals are [plus or minus] 0.05, [plus or…
Descriptors: Probability, Intervals, Sample Size, Multiple Regression Analysis
Peer reviewedHollebrands, Karen Flanagan – Mathematics Teacher, 2004
Directions for using a function called Mail Merge in Microsoft Office are mentioned. Using a spreadsheet and mail merge, allows one to create different assessments, complete with worked solutions, generate them on demand or save them for later use.
Descriptors: Internet, Electronic Mail, Spreadsheets, Educational Technology
Hawkins, Brian L. – EDUCAUSE Review, 2006
In this second part of a two-part interview with Clifford A. Lynch, Executive Director of the Coalition for Networked Information, Lynch talks to Hawkins about the most provocative and exciting projects that are being developed in the field of networked information worldwide. He also talks on how institutional repositories are being currently…
Descriptors: Information Technology, Interviews, Intellectual Property, Higher Education
Williams, John M. – Exceptional Parent, 2006
This article reports the highlights of the recently concluded Annual International Technology and Persons with Disabilities Conference organized by California State University at Northridge. Attendees from more than 30 countries learned about services provided by the Social Security Administration, GeorgiaTech (CATEA), NISH, Computer/Electronic…
Descriptors: Assistive Technology, Disabilities, Conferences, Exhibits
Peer reviewedBower, Jon – Technology & Learning, 2005
The proposed 2006 federal budget has been criticized by many in the education and technology communities for zeroing out the primary federal funding source for education technology: the Enhancing Education Through Technology (EETT) state block-grant program. The author believes schools are better off without it. and gives reasons why. For many…
Descriptors: Computer Software, Educational Technology, State Aid, Block Grants
Peer reviewedRoschelle, Jeremy; Penuel, William R.; Abrahamson, Louis – Educational Leadership, 2004
Classroom network requires every student to think actively, which enhances student participation in mathematics and science. Classroom-specific networks use software designed to enhance communication between teacher and students.
Descriptors: Computer Networks, Mathematics Education, Science Education, Computer Software
Pace, Andrew K. – Computers in Libraries, 2005
This article discusses six maxims by which to run library automation. The following maxims are discussed: (1) Solve only known problems; (2) Avoid changing data to fix display problems; (3) Aut viam inveniam aut faciam; (4) If you cannot make it yourself, buy something; (5) Kill the alligator closest to the boat; and (6) Just because yours is…
Descriptors: Libraries, Library Automation, Computers, Computer Software
Balas, Janet – Computers in Libraries, 2005
The last time this author wrote about open source (OS) software was in last September's 2004 issue of Computers in Libraries, which was devoted to making the most of what you have and do-it-yourself solutions. After the column appeared, she received an e-mail from David Dorman of Index Data, who believed that she had done OS products a disservice…
Descriptors: Internet, Computer Software, Libraries, Computer Interfaces
Hunt, Neville – Teaching Statistics: An International Journal for Teachers, 2005
This article describes how the mail merge facility within Microsoft Word can be used in conjunction with Microsoft Excel to generate personalized assignments for students at all levels.
Descriptors: Computer Software, Computer Literacy, Computer Uses in Education, Electronic Mail
Martin, Gale L. – Psychological Review, 2004
This article proposes that visual encoding learning improves reading fluency by widening the span over which letters are recognized from a fixated text image so that fewer fixations are needed to cover a text line. Encoder is a connectionist model that learns to convert images like the fixated text images human readers encode into the…
Descriptors: Familiarity, Reading Fluency, Cognitive Processes, Eye Movements
Peer reviewedParkinson, John; Hollamby, Peter – School Science Review, 2003
Extols the virtues of PowerPoint as a teaching aid yet cautions against inappropriate use of it which may cause students to learn very little. Explains a number of features of slide preparation and presentation techniques that enable teachers to give effective lessons. Includes examples of PowerPoint presentations. (Author/NB)
Descriptors: Computer Software, Instructional Effectiveness, Science Instruction, Secondary Education

Direct link
