NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 11,521 to 11,535 of 28,046 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Duff, Andrea; Spangenberg, Brady; Carter, Susanna; Miller, Julia – Journal of Learning Design, 2010
The University of South Australia and Purdue University (Indiana) launched the "Grammar Gang Blog" in June 2008, as a collaborative forum for talking about language. The blog reaches a far-flung community of learners from Australia to the United States, Brisbane to Bangalore and Ghana to Germany. The Grammar Gang--where Owls meet…
Descriptors: Foreign Countries, Grammar, Electronic Publishing, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Hansson, Thomas; Carey, Greg; Kjartansson, Rafn – Journal of Beliefs & Values, 2010
Global flow of information forms a basis for active citizenship at local, regional and national levels of society. Information, exchange and education hold a potential to empower individuals for personal development, working life purposes and public life. In raising people's awareness of the ways of the world, piecemeal, factual and true "data" as…
Descriptors: Citizenship, Computer Uses in Education, Social Sciences, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Dadashzadeh, Mohammad – Journal of Information Systems Education, 2010
Service Oriented Architecture (SOA) shows demonstrable signs of simplifying software integration. It provides the necessary framework for building applications that can be integrated and can reduce the cost of integration significantly. Organizations are beginning to architect new integration solutions following the SOA approach. As such,…
Descriptors: Information Systems, Internet, Client Server Architecture, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Thompsett, Andrew; Ahluwalia, Jatinder – Bioscience Education, 2010
Research on undergraduate bioscience students and the incidence of plagiarism is still in its infancy and a key problem arises in gauging the perception of undergraduate students on plagiarism and collusion in biosciences subjects because of the lack of empirical data. The aim of this study was to provide qualitative data on the perceptions of…
Descriptors: Undergraduate Students, Plagiarism, Pharmacology, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Wu, Chien-Hsing; Kao, Shu-Chen; Shih, Lan-Hsin – Behaviour & Information Technology, 2010
The transfer of tacit knowledge, one of the most important issues in the knowledge sharing context, needs a multi-dimensional perception in its process. Information technology's (IT) supporting role has already been addressed in the process of tacit knowledge transfer. However, IT has its own characteristics, and in turn, may have dissimilar…
Descriptors: Information Systems, Information Technology, Technology Transfer, Knowledge Management
Peer reviewed Peer reviewed
Direct linkDirect link
Plumb, Tawnya K. – Journal of Electronic Resources Librarianship, 2010
As library patrons move online, librarians must move instructional content online to join them. One means of educating library users is to meet them on their computers with electronic tutorials. Electronic tutorials may be used for various instructional tasks such as teaching users about the basic elements of a library catalog, pointing out the…
Descriptors: Computer Software, Educational Technology, Internet, Librarians
Peer reviewed Peer reviewed
Direct linkDirect link
Blyth, Russell D.; Rainbolt, Julianne G. – PRIMUS, 2010
A traditional abstract algebra course typically consists of the professor stating and then proving a sequence of theorems. As an alternative to this classical structure, the students could be expected to discover some of the theorems even before they are motivated by classroom examples. This can be done by using a software system to explore a…
Descriptors: Computer Software, Algebra, Computer Uses in Education, Mathematics Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Adi, Erwin; Aditya, I Gde Made Krisna; Citrawati, Meriyana – Journal of Information Technology Education, 2010
Learning physical activities such as sports and games is expensive and time-consuming. A common advice is "repetition makes perfection," which implies that wrong actions must soon be noticed and avoided. A knowledgeable tutor is often required to provide good feedback for that purpose. However, this facility is available only for those…
Descriptors: Physical Activities, Computer Assisted Instruction, Computer Software, Basic Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Batane, Tshepo – Educational Technology & Society, 2010
This paper reports on a pilot project of the Turnitin plagiarism detection software, which was implemented to determine the impact of the software on the level of plagiarism among University of Botswana (UB) students. Students' assignments were first submitted to the software without their knowledge so as to gauge their level of plagiarism. The…
Descriptors: Plagiarism, Computer Software, Foreign Countries, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Ponikvar, D. – European Journal of Physics, 2010
A rotating magnetic field is the basis for the transformation of electrical energy to mechanical energy. School experiments on the rotating magnetic field are rare since they require the use of specially prepared mechanical setups and/or relatively large, three-phase power supplies to achieve strong magnetic fields. This paper proposes several…
Descriptors: Physics, Energy, Magnets, Science Experiments
Peer reviewed Peer reviewed
Direct linkDirect link
McCurry, Doug – English in Australia, 2010
This article provides an introduction to the kind of computer software that is used to score student writing in some high stakes testing programs, and that is being promoted as a teaching and learning tool to schools. It sketches the state of play with machines for the scoring of writing, and describes how these machines work and what they do.…
Descriptors: Testing Programs, High Stakes Tests, Computer Software, Scoring
Peer reviewed Peer reviewed
Direct linkDirect link
Rader, Martha H.; Bailey, Glenn A. – Delta Pi Epsilon Journal, 2010
Objective: This article introduces the history and development of speech recognition, addresses its role in the business curriculum, outlines related national and state standards, describes instructional strategies, and discusses the assessment of student achievement in speech recognition classes. Methods: Research methods included a synthesis of…
Descriptors: Speech Communication, Computer Software, State Standards, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Hsiao, I.-H.; Sosnovsky, S.; Brusilovsky, P. – Journal of Computer Assisted Learning, 2010
Rapid growth of the volume of interactive questions available to the students of modern E-Learning courses placed the problem of personalized guidance on the agenda of E-Learning researchers. Without proper guidance, students frequently select too simple or too complicated problems and ended either bored or discouraged. This paper explores a…
Descriptors: Electronic Learning, Guidance, Individualized Instruction, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Coffey, John W. – Journal of Educational Technology Systems, 2010
Faculty who offer university-level technical courses through e-Learning environments must surmount several difficult challenges. Traditionally, learning in technical courses takes place through real-time interactions between instructor and students in the course of solving actual problems--a form of activity that is not possible in asynchronous…
Descriptors: Higher Education, Technical Education, Electronic Learning, Distance Education
Peer reviewed Peer reviewed
Direct linkDirect link
Custer, William L. – New Directions for Institutional Research, 2010
Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…
Descriptors: Institutional Research, Databases, School Security, Computer Security
Pages: 1  |  ...  |  765  |  766  |  767  |  768  |  769  |  770  |  771  |  772  |  773  |  ...  |  1870