Publication Date
| In 2026 | 1 |
| Since 2025 | 725 |
| Since 2022 (last 5 years) | 3575 |
| Since 2017 (last 10 years) | 7441 |
| Since 2007 (last 20 years) | 15025 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 2852 |
| Teachers | 2010 |
| Researchers | 608 |
| Administrators | 473 |
| Media Staff | 268 |
| Students | 245 |
| Policymakers | 202 |
| Parents | 78 |
| Counselors | 33 |
| Support Staff | 22 |
| Community | 21 |
| More ▼ | |
Location
| Australia | 499 |
| United Kingdom | 474 |
| Turkey | 472 |
| Canada | 364 |
| China | 309 |
| Taiwan | 248 |
| United States | 228 |
| Indonesia | 223 |
| Spain | 221 |
| California | 195 |
| Germany | 163 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 11 |
| Meets WWC Standards with or without Reservations | 16 |
| Does not meet standards | 17 |
Peer reviewedBarreau, Deborah K. – Library & Information Science Research, 2001
Discusses transaction systems that are designed for rapid data entry and task completion, and describes a study of three organizations that use commercial off-the-shelf software (COTS) products for providing customer service as well as for processing transactions. Concludes that organizations made do with systems designed for one application to…
Descriptors: Computer Software, Keyboarding (Data Entry), Media Adaptation
Micale, Biagio; Pennisi, Mario – International Journal of Mathematical Education in Science and Technology, 2005
In this article quadrilaterals with concurrent maltitudes are characterized. A generalization of the maltitudes is given, and a larger family of quadrilaterals for which an analogous property of concurrency holds is determined and studied.
Descriptors: Mathematics, Geometric Concepts, Computer Software, Plane Geometry
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
Wares, Arsalan – International Journal of Mathematical Education in Science and Technology, 2004
Students' difficulty with reasoning and justification in the context of proofs in geometry has been well documented. Studies reveal that many of the ideas that students are asked to prove are known to be true, and therefore, the process of such proof is likely to remain meaningless and purposeless. The implication of this claim is that students…
Descriptors: Mathematical Logic, Geometry, Computer Software, Teaching Methods
Johnson-Laird, P. N.; Girotto, Vittorio; Legrenzi, Paolo – Psychological Review, 2004
This article presents a theory of how individuals reason from inconsistency to consistency. The theory is based on 3 main principles. First, individuals try to construct a single mental model of a possibility that satisfies a current set of propositions, and if the task is impossible, they infer that the set is inconsistent. Second, when an…
Descriptors: Computer Software, Causal Models, Thinking Skills, Theories
Stvan, Laurel Smith – Computers in the Schools, 2005
Through small-scale sampling of relevant specialized texts to craft hands-on inferential vocabulary tasks, both students and teachers can benefit from corpus linguistic information. By discovering ways to collect and access real data, second-language teachers can create topic-specific corpora and use software to sort and highlight the data to…
Descriptors: Computer Software, Vocabulary Development, English (Second Language)
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Ateyeh, Khaldoun; Lockemann, Peter C. – Educational Technology & Society, 2006
No longer can courseware providers deal with one homogeneous target group, one learning form and possibly one pedagogical approach. Instead they must develop a broad range of courseware, each serving its specific target group, each adjusted to a specific learning and teaching form, each appealing to its own learning and teaching scenario, and each…
Descriptors: Courseware, Programming, Computer Software, Educational Technology
Hongyi Wang – Journal of Chemical Education, 2005
A study uses the ChemDraw nuclear magnetic resonance spectroscopy (NMR) tool to process 15 para-substituted benzoic acids and generate (super 13)C NMR chemical shifts of C1 through C5. The data were plotted against their pK[subscript a] value and a fairly good linear fit was found for pK[subscript a] versus delta[subscript c1].
Descriptors: Physics, Computer Software, Chemistry, Spectroscopy
Meisch, Allison; Hamilton, Jennifer; Chen, Eva; Quintanilla, Priscilla; Fong, Pauline; Gray-Adams, Karen; Petta, Ian; Thornton, Nancy – Westat, 2011
This report summarizes the results of the Newark, New Jersey, Striving Readers program for project Years 1, 2, 3, 4, and 5. This report updates one analysis (3 years); the remainder of the impacts and implementation findings are for Year 4. The Striving Readers Grant addresses the unmet needs of middle school students reading 2 or more years below…
Descriptors: Reading Difficulties, Reading Programs, Program Evaluation, Intervention
Garrote, Ramon; Pettersson, Tomas; Christie, Michael – Australasian Journal of Educational Technology, 2011
In this paper the authors analyse the design and implementation of a course about learning management systems (LMS). The course was first given in Cuba and then in Guatemala and Peru, within the project USo+I: "Universidad, Sociedad e Innovacion, Mejora de la pertinencia de la educacion en las ingenierias de Latinoamerica" financed by…
Descriptors: Foreign Countries, Problem Based Learning, Course Evaluation, Developing Nations
Smith, Judith J.; Dobson, Ellen – Computers in the Schools, 2011
New information and communications technologies (ICT) are redefining teacher education. A university faculty member and an instructional technology consultant incorporated information and communications technologies within a graduate university methods course. The following research questions explored student perceptions of using Web 2.0 tools as…
Descriptors: Preservice Teacher Education, Methods Courses, Literacy, Educational Technology
Eshlaghy, Abbas Toloie; Kaveh, Haydeh – International Education Studies, 2009
The purpose of this study was to determine the most suitable ICT-based education and define the most suitable e-content creation tools for quantitative courses in the IT-management Masters program. ICT-based tools and technologies are divided in to three categories: the creation of e-content, the offering of e-content, and access to e-content. In…
Descriptors: Case Studies, Foreign Countries, Technology Uses in Education, Educational Technology
Juersivich, Nicole Renee – ProQuest LLC, 2009
The purposes of this study were to (1) investigate non-accelerated middle schools students' understanding of pre-algebraic concepts, in particular, addition and subtraction of integers and the notion of equality; (2) describe and analyze how non-accelerated middle school students interact with The Geometer's Sketchpad (GSP) applets depicting…
Descriptors: Feedback (Response), Middle School Students, Equations (Mathematics), Case Studies
Schultz, Leah – ProQuest LLC, 2009
This study investigates the relationships between the use of a zoom tool, the terms they supply to describe the image, and the type of image being viewed. Participants were assigned to two groups, one with access to the tool and one without, and were asked to supply terms to describe forty images, divided into four categories: landscape, portrait,…
Descriptors: Control Groups, Indexing, Information Retrieval, Visual Aids

Direct link
