Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
Author
Awadhiya, Ashish Kumar | 1 |
Baggaley, Jon | 1 |
Bologna, Jack, Comp. | 1 |
Bosley, Sara | 1 |
Brandt, D. Scott, Comp. | 1 |
Broderick, Bill | 1 |
Brooks, Rochelle | 1 |
Buck, Stephanie | 1 |
Caverly, David C. | 1 |
Dyrli, Kurt O. | 1 |
Falk, Howard | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 4 |
Elementary Secondary Education | 2 |
Postsecondary Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Administrators | 3 |
Practitioners | 3 |
Teachers | 2 |
Location
Canada | 2 |
Denmark | 1 |
India | 1 |
Latvia | 1 |
Massachusetts | 1 |
Poland | 1 |
Slovenia | 1 |
South Carolina | 1 |
United Kingdom | 1 |
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Awadhiya, Ashish Kumar; Gowthaman, K. – Turkish Online Journal of Distance Education, 2014
Open Universities across the world are embracing ICT based teaching and learning process to disseminate quality education to their learners spread across the globe. In India availability and access of ICT and learner characteristics are uneven and vary from state to state. Hence it is important to establish the facts about ICT access among…
Descriptors: Foreign Countries, Open Universities, Educational Technology, Technology Uses in Education
Dyrli, Kurt O. – District Administration, 2009
We are at the start of a revolution in the use of computers, one that analysts predict will rival the development of the PC in its significance. Companies such as Google, HP, Amazon, Sun Microsystems, Sony, IBM, and Apple are orienting their entire business models toward this change, and software maker SAS has announced plans for a $70 million…
Descriptors: Elementary Secondary Education, Computers, Educational Technology, School Districts
Bosley, Sara – Adults Learning, 2011
Everyone knows that lack of internet access can reinforce the social and economic disadvantages already facing some older people. Recognising the divisive nature of digital exclusion, the government has invested 2.8 million British Pounds in Get Digital, a project that will enable sheltered housing residents to develop computer and internet…
Descriptors: Focus Groups, Computers, Housing, Educational Technology
Nevin, Roger – Teacher Librarian, 2009
At Adam Scott Collegiate and Vocational Institute (CVI) in Peterborough, Canada, the Learning Commons is the school's central place for introducing new technology to students and teachers. This includes collaborative projects with teachers to develop curriculum that uses new technologies. Over the last few years podcasting as well as other online…
Descriptors: Electronic Learning, Curriculum Development, Computers, Foreign Countries
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Baggaley, Jon – International Review of Research in Open and Distance Learning, 2006
Portable software applications can be carried on a convenient storage medium such as a USB drive, and offer numerous benefits to mobile teachers and learner. The article illustrates the growing field of "portable apps" in reviews of seven contrasting products. These represent the major categories of document editing, email maintenance,…
Descriptors: Internet, Electronic Mail, Computers, Physical Mobility
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Fredriksson, Ulf; Gajek, Elzbieta; Jedeskog, Gunilla – Acta Didactica Napocensia, 2009
The European eLearning Forum for Education 2 (ELFE2) is a project initiated by the ETUCE (European Trade Union Committee on Education) and builds on the conclusion of its predecessor ELFE1. ELFE2 aims, as ELFE1, to contribute to a better understanding of the strengths and weaknesses of using ICT in education. It identifies ways used to optimize…
Descriptors: Educational Technology, Technology Uses in Education, Teaching Methods, Foreign Countries
Olson, Gary A. – Chronicle of Higher Education, 2007
Many professors, staff members, and even administrators see campus computers and e-mail accounts as their own private property--a type of employment benefit provided with no constraints on use. The fact is, universities "assign" computer equipment to personnel as tools to help them perform their jobs more effectively and efficiently, in the same…
Descriptors: Ethics, College Faculty, Computer Security, Electronic Mail

Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Bologna, Jack, Comp. – 1989
This bibliography lists 14 books, 154 journal articles, 34 newspaper articles, and 3 research papers published during 1988-1989 on the subject of computer viruses, software protection and 'cures', virus hackers, and other related issues. Some of the sources listed include Computers and Security, Computer Security Digest, PC Week, Time, the New…
Descriptors: Books, Computer Networks, Computer Software, Computers
Goldman, Robin – Currents, 1990
A computerized fund-raising office relies on two software capabilities: word-processing software (to create, edit, store, and print text) and database software (to store, organize, and sort large numbers of facts). These capabilities handle: mass-producing personalized letters, maintaining records of gifts and acknowledgments, and generating lists…
Descriptors: College Administration, Computer Software, Computer Uses in Education, Computers
Brandt, D. Scott, Comp. – Computers in Libraries, 1998
This annual compilation is designed as a resource for access to products (hardware and software) and services related to library automation and information storage. Sections include products and services by category, vendor, and brand name, as well as addresses (including phone/fax, e-mail, and URL for web pages) of companies and consultants. (AEF)
Descriptors: Computer Peripherals, Computer Software, Computers, Consultants

Caverly, David C.; Broderick, Bill – Journal of Developmental Education, 1993
Explains how to access the Internet, discussing hardware and software considerations, connectivity, and types of access available to users. Describes the uses of electronic mail; TELNET, a method for remotely logging onto another computer; and anonymous File Transfer Protocol (FTP), a method for downloading files from a remote computer. (MAB)
Descriptors: Access to Information, Computer Networks, Computer Peripherals, Computer Software
Previous Page | Next Page ยป
Pages: 1 | 2