Publication Date
| In 2026 | 1 |
| Since 2025 | 725 |
| Since 2022 (last 5 years) | 3575 |
| Since 2017 (last 10 years) | 7441 |
| Since 2007 (last 20 years) | 15025 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 2852 |
| Teachers | 2010 |
| Researchers | 608 |
| Administrators | 473 |
| Media Staff | 268 |
| Students | 245 |
| Policymakers | 202 |
| Parents | 78 |
| Counselors | 33 |
| Support Staff | 22 |
| Community | 21 |
| More ▼ | |
Location
| Australia | 499 |
| United Kingdom | 474 |
| Turkey | 472 |
| Canada | 364 |
| China | 309 |
| Taiwan | 248 |
| United States | 228 |
| Indonesia | 223 |
| Spain | 221 |
| California | 195 |
| Germany | 163 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 11 |
| Meets WWC Standards with or without Reservations | 16 |
| Does not meet standards | 17 |
Peer reviewedThissen, David; Steinberg, Lynne; Kuang, Daniel – Journal of Educational and Behavioral Statistics, 2002
Illustrates that the Benjamini-Hochberg (B-H) procedure to controlling the false positive rate in multiple comparisons is easy to implement using widely available spreadsheet software. Shows that it is feasible to use the B-H procedure to augment or replace the Bonferroni technique. (SLD)
Descriptors: Comparative Analysis, Computer Software
Fickes, Michael – College Planning & Management, 2002
Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)
Descriptors: Computer Software, School Security
Castaldi, John, Comp. – Community, Technical, and Junior College Journal, 1988
A directory of several hundred computer companies, divided into sections on hardware, software, and computer-related services and materials. Entries include company name, address, phone number, principals, contact person, product descriptions, and services. (DMM)
Descriptors: Computer Software, Computers, Microcomputers
Peer reviewedWeinberg, Sharon L. – Measurement and Evaluation in Counseling and Development, 1991
Describes several salient features of multidimensional scaling (MDS) for spatial distance models including proximity measures, interpoint distances, goodness-of-fit, and distinctions between metric and nonmetric scaling. Four commonly used MDS computer programs are described, and a section on applications of MDS selected from the counseling…
Descriptors: Computer Software, Multidimensional Scaling
Peer reviewedBernstein, Philip A.; Bergstraesser, Thomas; Carlson, Jason; Pal, Shankar; Sanders, Paul; Shutt, David – Information Systems, 1999
Describes the programming interface and implementation of the repository engine and the Open Information Model for Microsoft Repository, an object-oriented meta-data management facility that ships in Microsoft Visual Studio and Microsoft SQL Server. Discusses Microsoft's component object model, object manipulation, queries, and information…
Descriptors: Computer Software, Metadata, Models
Peer reviewedGraf, Richard G.; Alf, Edward F., Jr. – Applied Psychological Measurement, 1999
I. Olkin and J. Finn (1995) developed expressions for confidence intervals for functions of simple, partial, and multiple correlations. Describes procedures and computer programs for solving these problems and extending the methods for any number of predictors or for partialing out any number of variables. (Author/SLD)
Descriptors: Computer Software, Correlation, Prediction
Peer reviewedOsborne, Jason W. – Practical Assessment, Research & Evaluation, 2000
Introduces the problem of hierarchical, or nested, data structures and discusses how this problem is dealt with effectively. Provides examples of the pitfalls of not doing appropriate analyses. New software is making hierarchical linear modeling more user-friendly and accessible. (SLD)
Descriptors: Computer Software, Research Methodology
Peer reviewedAntonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex – Internet Research, 2001
Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…
Descriptors: Computer Security, Computer Software
Hadwin, Allyson F.; Winne, Philip H.; Nesbit, John C. – British Journal of Educational Psychology, 2005
While reviews abound on theoretical topics in educational psychology, it is rare that we examine our field's instrumentation development, and what effects this has on educational psychology's evolution. To repair this gap, this paper investigates and reveals the implications of software technologies for researching and theorizing about core issues…
Descriptors: Computer Software, Educational Psychology
Lovely, Gail – Learning & Leading with Technology, 2004
While I wrote this column, there seemed to be a lull in new software announcements for education and educators. Perhaps it is reflective of the tightening of school budgets or the heavy emphasis on standardized tests and strictly measurable results here in the United States, which has lead to fewer really exciting software announcements lately.…
Descriptors: Computer Software, Standardized Tests
McCarthy, Rob – Technology & Learning, 2005
In the last year, a series of viruses and worms that caused damage across the Internet in record time has made very clear how vulnerable computer systems are. The MS Blaster, Slammer, Sasser, and Korgo.W worms have shown that signature-based antivirus software and traditional firewalls are not enough to protect networks. Everyone is worried about…
Descriptors: Computer Software, Computer Security
Christie, Derek – Teaching Statistics: An International Journal for Teachers, 2004
Standard Microsoft Excel functions and the Excel Data Table facility are used in randomization applications using resampling with and without replacement.
Descriptors: Computer Software, Sampling, Statistics
Hunt, Neville – Teaching Statistics: An International Journal for Teachers, 2004
This article describes how Chernoff faces can be drawn in Microsoft Excel.
Descriptors: Computer Software, Multivariate Analysis
Peer reviewedGoldborough, Reid – Teacher Librarian, 2004
If you have worked with computers for any length of time, you have undoubtedly heard the warnings and the recommendations. Data stored on PCs can disappear in a nanosecond. You need to back up any crucial data you cannot risk losing. Ideally, you should store at least one set of crucial back-up data off-site in case of a fire, flood or other…
Descriptors: Computers, Computer Software, Troubleshooting
Weber, Jonathan – Library Journal, 2006
Creating a digital library might seem like a task best left to a large research collection with a vast staff and generous budget. However, tools for successfully creating digital libraries are getting easier to use all the time. The explosion of people creating content for the web has led to the availability of many high-quality applications and…
Descriptors: Electronic Libraries, Computer Software

Direct link
