NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 8,731 to 8,745 of 28,037 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Guo, Sijia – Research-publishing.net, 2014
This case study aims to explore the best practice of applying task-based language teaching (TBLT) via the web conferencing tool Blackboard Collaborate in a beginners' online Chinese course by evaluating the technical capacity of the software and the pedagogical values and limitations of the tasks designed. In this paper, Chapelle's (2001) criteria…
Descriptors: Chinese, Teleconferencing, Group Activities, Online Courses
Probst, Alexandre C. – ProQuest LLC, 2014
A significant deficiency in the area of introductory statistics education exists: Student performance on standardized assessments after a full semester statistics course is poor and students report a very low desire to learn statistics. Research on the current generation of students indicates an affinity for technology and for multitasking.…
Descriptors: Statistics, Mathematics Instruction, Technology Uses in Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Stanley A. Taylor; Amy E. Mickel – Journal of Statistics Education, 2014
In this article, we present a data set and case study exercise that can be used by educators to teach a range of statistical concepts including Simpson's paradox. The data set and case study are based on a real-life scenario where there was a claim of discrimination based on ethnicity. The exercise highlights the importance of performing rigorous…
Descriptors: Statistics, Case Studies, Concept Formation, Mathematical Concepts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Waguespack, Leslie J. – Information Systems Education Journal, 2013
This paper presents a learning unit that addresses quality design in relational data models. The focus on modeling allows the learning to span analysis, design, and implementation enriching pedagogy across the systems development life cycle. Thriving Systems Theory presents fifteen choice properties that convey design quality in models integrating…
Descriptors: Units of Study, Design, Data, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Werner, Linda; McDowell, Charlie; Denner, Jill – Journal of Educational Data Mining, 2013
Educational data mining can miss or misidentify key findings about student learning without a transparent process of analyzing the data. This paper describes the first steps in the process of using low-level logging data to understand how middle school students used Alice, an initial programming environment. We describe the steps that were…
Descriptors: Electronic Learning, Learning Processes, Educational Research, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Endacott, Jason L.; Bowles, Freddie A. – Multicultural Education, 2013
Classroom instruction about other cultures all too often resembles the Disney version of "It's a Small World" with Fantasyland-like cultural stereotypes, ceremonial activities, and traditional dress that can lead to serious misunderstandings about the depth and complexity of global societies. Social studies instruction presents the…
Descriptors: Multicultural Education, Cultural Awareness, Global Approach, Elementary School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Berenson, Mark L. – Decision Sciences Journal of Innovative Education, 2013
There is consensus in the statistical literature that severe departures from its assumptions invalidate the use of regression modeling for purposes of inference. The assumptions of regression modeling are usually evaluated subjectively through visual, graphic displays in a residual analysis but such an approach, taken alone, may be insufficient…
Descriptors: Spreadsheets, Computer Software, Regression (Statistics), Models
Peer reviewed Peer reviewed
Direct linkDirect link
Cole, Sydni M.; Reysen, Matthew B.; Kelley, Matthew R. – Journal of Experimental Psychology: Learning, Memory, and Cognition, 2013
Part-set cuing "inhibition" refers to the counterintuitive finding that hints--specifically, part of the set of to-be-remembered information--often impair memory performance in free recall tasks. Although inhibition is the most commonly reported result, part-set cuing "facilitation" has been shown with serial order tasks. The…
Descriptors: Cues, Spatial Ability, Task Analysis, Memory
Peer reviewed Peer reviewed
Direct linkDirect link
Bates, Alan – Physics Teacher, 2013
Simulations of physical systems are widely available online, with no cost, and are ready to be used in our classrooms. Such simulations offer an accessible tool that can be used for a range of interactive learning activities. The Jovian Moons Apple allows the user to track the position of Jupiter's four Galilean moons with a variety of…
Descriptors: Earth Science, Astronomy, Learning Activities, Measurement
Peer reviewed Peer reviewed
Direct linkDirect link
Patton, Ryan M. – Studies in Art Education: A Journal of Issues and Research in Art Education, 2013
This action research study examines the making of video games, using an integrated development environment software program called GameMaker, as art education curriculum for students between the ages of 8-13. Through a method I designed, students created video games using the concepts of move, avoid, release, and contact (MARC) to explore their…
Descriptors: Video Games, Systems Approach, Art Education, Action Research
Peer reviewed Peer reviewed
Direct linkDirect link
Siko, Jason; Barbour, Michael – Journal of Educational Multimedia and Hypermedia, 2013
Research on educational games often focuses on the benefits that playing games has on student achievement. However, there is a growing body of research examining the benefits of having students design games rather than play them. Problems with game design as an instructional tool include the additional instruction on the programming language…
Descriptors: Educational Games, Teaching Methods, Computer Software, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ziegler, Blake E. – Journal of Chemical Education, 2013
Computational chemistry undergraduate laboratory courses are now part of the chemistry curriculum at many universities. However, there remains a lack of computational chemistry exercises available to instructors. This exercise is presented for students to develop skills using computational chemistry software while supplementing their knowledge of…
Descriptors: Science Laboratories, College Science, Chemistry, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Rodriguez, Purificacion; Lago, M. Oliva; Enesco, Ileana; Guerrero, Silvia – Journal of Experimental Child Psychology, 2013
In this study, the development of comprehension of essential and nonessential aspects of counting is examined in children ranging from 5 to 8 years of age. Essential aspects, such as logical rules, and nonessential aspects, including conventional rules, were studied. To address this, we created a computer program in which children watched counting…
Descriptors: Elementary School Students, Computer Software, Computation, Comprehension
Srinivasan, Deepa – ProQuest LLC, 2013
Recent rapid malware growth has exposed the limitations of traditional in-host malware-defense systems and motivated the development of secure virtualization-based solutions. By running vulnerable systems as virtual machines (VMs) and moving security software from inside VMs to the outside, the out-of-VM solutions securely isolate the anti-malware…
Descriptors: Computer Security, Computer Software, Semantics, Computer Simulation
Pages: 1  |  ...  |  579  |  580  |  581  |  582  |  583  |  584  |  585  |  586  |  587  |  ...  |  1870