NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 12,406 to 12,420 of 28,052 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Foster, E. Michael; Kalil, Ariel – Developmental Psychology, 2008
Two forces motivate this special section, "New Methods for New Questions in Developmental Psychology." First are recent developments in social science methodology and the increasing availability of those methods in common software packages. Second, at the same time psychologists' understanding of developmental phenomena has continued to grow. At…
Descriptors: Psychologists, Social Sciences, Developmental Psychology, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Hadar, Irit; Sherman, Sofia; Hazzan, Orit – Journal of Information Systems Education, 2008
Collaboration has become increasingly widespread in the software industry as systems have become larger and more complex, adding human complexity to the technological complexity already involved in developing software systems. To deal with this complexity, human-centric software development methods, such as Extreme Programming and other agile…
Descriptors: Cooperation, Computer Software, Learning Processes, Management Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Cor, Ken; Alves, Cecilia; Gierl, Mark J. – Applied Psychological Measurement, 2008
This review describes and evaluates a software add-in created by Frontline Systems, Inc., that can be used with Microsoft Excel 2007 to solve large, complex test assembly problems. The combination of Microsoft Excel 2007 with the Frontline Systems Premium Solver Platform is significant because Microsoft Excel is the most commonly used spreadsheet…
Descriptors: Computer Software, Computers, Psychometrics, Spreadsheets
Peer reviewed Peer reviewed
Direct linkDirect link
Paine, Thomas A.; Griggs, Tyler J. – EDUCAUSE Quarterly, 2008
Educational institutions today face budgetary restraints and scarce resources, complicating the decision of how to allot bandwidth for campus network users. Additionally, campus concerns over peer-to-peer networking (specifically outbound Internet traffic) have increased because of bandwidth and copyright issues. In this article, the authors…
Descriptors: Management Systems, Schools, Computer Software, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Pratt, Dave; Johnston-Wilder, Peter; Ainley, Janet; Mason, John – Statistics Education Research Journal, 2008
In this reflective paper, we explore students' local and global thinking about informal statistical inference through our observations of 10- to 11-year-olds, challenged to infer the unknown configuration of a virtual die, but able to use the die to generate as much data as they felt necessary. We report how they tended to focus on local changes…
Descriptors: Statistical Inference, Early Adolescents, Interviews, Sample Size
Peer reviewed Peer reviewed
Direct linkDirect link
van Harmelen, M. – Interactive Learning Environments, 2008
Increasingly, there is a shared understanding that the educational approach driving the development of Personal Learning Environments (PLEs) is one of learner empowerment and facilitation of the efforts of self-directed learners. This approach fits well with concepts of social constructivism, constructionism, and the development and execution of…
Descriptors: Constructivism (Learning), Experiments, Educational Environment, Independent Study
Peer reviewed Peer reviewed
Direct linkDirect link
Christie, Derek – Teaching Statistics: An International Journal for Teachers, 2008
This article shows how to use Microsoft Excel to get data from the Internet into a statistically usable form.
Descriptors: Computer Literacy, Internet, Information Technology, Information Skills
Technology & Learning, 2008
In this article, four directors discuss the security challenges that keep them worried and what they do about it. Dwayne Alton describes how his school district, IT School District of Lee County, Fort Meyers, Florida, collaborated with Cisco and installed an intrusion detection system which alerts IT staff when someone creates their own access…
Descriptors: Computer Security, School Districts, Information Technology, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Stock, S. E.; Davies, D. K.; Wehmeyer, M. L.; Palmer, S. B. – Journal of Intellectual Disability Research, 2008
Background: There are over two billion telephones in use worldwide. Yet, for millions of Americans with intellectual disabilities (ID), access to the benefits of cellphone technology is limited because of deficits in literacy, numerical comprehension, the proliferation of features and shrinking size of cellphone hardware and user interfaces.…
Descriptors: Mental Retardation, Computer Software, Educational Technology, Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Zhang, Zhiyong; McArdle, John J.; Wang, Lijuan; Hamagami, Fumiaki – Structural Equation Modeling: A Multidisciplinary Journal, 2008
Bayesian methods are becoming very popular despite some practical difficulties in implementation. To assist in the practical application of Bayesian methods, we show how to implement Bayesian analysis with WinBUGS as part of a standard set of SAS routines. This implementation procedure is first illustrated by fitting a multiple regression model…
Descriptors: Bayesian Statistics, Computer Software, Monte Carlo Methods, Multiple Regression Analysis
De Groff, Amy Begg – Computers in Libraries, 2008
Librarians role as partners in education is to instruct customers on how to find information. Their purpose is to get information to customers. Often, that takes the form of delivering a book. Sometimes, it is accomplished by typing a URL into a web browser, reading text, and copying some of it into a text document for manipulation and…
Descriptors: Computer Software, Public Libraries, Instructional Materials, Access to Information
Foster, Andrea – Chronicle of Higher Education, 2008
At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…
Descriptors: Computer Software, Confidential Records, Student Records, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Fu, Fong-Ling; Su, Rong-Chang; Yu, Sheng-Chin – Computers & Education, 2009
In an effective e-learning game, the learner's enjoyment acts as a catalyst to encourage his/her learning initiative. Therefore, the availability of a scale that effectively measures the enjoyment offered by e-learning games assist the game designer to understanding the strength and flaw of the game efficiently from the learner's points of view.…
Descriptors: Online Courses, Questionnaires, Educational Games, Student Attitudes
Nam, Ta Thanh; Trinh, Lap Q. – Journal on English Language Teaching, 2012
In Vietnamese secondary education, translation and visuals are traditionally used as major techniques in teaching new English lexical items. Responding to the Vietnamese government policy issued in 2008 on using IT for a quality education, the application of PowerPoint has been considered the most prevalent type of technology used in the…
Descriptors: Vocabulary Development, Pretests Posttests, Computer Software, Questionnaires
Bowman, Charles Robert – ProQuest LLC, 2012
Improving student performance is the goal of any chemistry educator. With the proliferation of internet technologies in recent years, educators have been struggling with providing effective learning materials to students online. These materials also have not always had the intended effect of improving student performance. Either students do not…
Descriptors: Study Habits, Student Attitudes, Correlation, Schematic Studies
Pages: 1  |  ...  |  824  |  825  |  826  |  827  |  828  |  829  |  830  |  831  |  832  |  ...  |  1871