Academic literature on the topic 'COMPUTERS / Information Technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COMPUTERS / Information Technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "COMPUTERS / Information Technology"

1

Bagon, Špela, Mateja Gačnik, and Andreja Istenic Starcic. "Information Communication Technology Use among Students in Inclusive Classrooms." International Journal of Emerging Technologies in Learning (iJET) 13, no. 06 (May 29, 2018): 56. http://dx.doi.org/10.3991/ijet.v13i06.8051.

Full text
Abstract:
As inclusion has brought diversity into 21st-century classrooms, it has also brought challenges for teachers who must adapt their teaching to different groups of children with varying learning abilities, needs, and interests. It is believed that information and communication technology (ICT) can be used as a powerful tool to support inclusion and that information on students’ use of ICT can facilitate its integration. Our research compared the leisure and school-related computer use of students in inclusive classrooms. Frequency of computer use, types of ICT-supported activities, and attitudes toward computer use were explored. Consistent with previous studies, our results show that students with special needs (SN) and their peers use computers more frequently for leisure activities than school activities. Compared to their peers, students with SN use computers less frequently and for fewer leisure and school activities. They are also more resistant to computer use. No correlation was found between the presence of SN and a student’s desire to use a computer or opinion regarding whether computer use improves learning success. A comparison of male and female students revealed that males use computers more frequently than females, that they use computers more frequently for leisure activities than females, and that they have a stronger belief that computer use improves learning success. The presented work offers important information that may contribute to the integration of ICT in inclusive classrooms.
APA, Harvard, Vancouver, ISO, and other styles
2

Anderson, H. Vernon. "Information Technology Data Standards in Cardiology What, Why, and How Come." US Cardiology Review 10, no. 1 (2016): 43. http://dx.doi.org/10.15420/usc.2016.10.1.43.

Full text
Abstract:
Computers are the necessary substrate for everything that occurs in cardiology and all of medicine, yet computer technology has been implemented in a piecemeal manner. Multiple single solutions have been introduced to solve individual problems, with no coherent planning for integration and communication across all the multiple computer platforms. Data and data elements are the building blocks of what we call information. In order to maximally utilize the enormous capacities that computers offer in handling information, the data elements must be precisely defined and stored in computers in a uniform manner. This requires data standards. In cardiology, national professional societies led by the American College of Cardiology are developing data standards along with necessary technical specifications that will help achieve the desired goal of a fully interoperable health information network.
APA, Harvard, Vancouver, ISO, and other styles
3

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
APA, Harvard, Vancouver, ISO, and other styles
4

Amran, Ali, Sinta Ainun Zuhria, M. David Ramadhani, Putri Rahayu Susmawati, Siti Nur Diana, Luluk Bahrul Ulum, Rida Nur Aulita, Firman Aditya Firdaus, Dede Latifah, and Astutik Astutik. "Simulation of local area network (LAN) computer network using cisco packet tracer at SMP Negeri 1 Grabagan." Jurnal Mandiri IT 12, no. 3 (January 29, 2024): 175–82. http://dx.doi.org/10.35335/mandiri.v12i3.260.

Full text
Abstract:
Computer network, especially together with information technology, are now considered fundamental in all fields. A company’s information technology infrastructure is a strategic resource that must be handled effectively. Information technology infrastructure provides continuous processing and flow of information throughout the organization. A computer network that links machines is called a local area network over short distances among two or more places. To keep the network infrastructure functioning properly network security is very important. Cisco packet tracer is one of the tools used in simulations to setup network security. To build a computer network, procedures related to the network area required. Local Area Network (LAN) is an abbreviation off Local Area Network. LAN consist of several computers connected in a network. In this network, each computer can accsess data from other computers. Additionally, computers can access data from other computers. Apart from that, computers connected to LAN can also run hardware such as printers from other computers, chat with other computer ownerm or play games together. Network simulations on cisco system Local Area Network (LAN) computers using cisco packet treacer is a program for imulatinng network device, the program is used as a learning and training tool.
APA, Harvard, Vancouver, ISO, and other styles
5

Dasta, Joseph F., and Gregory Reardon. "Survey of ACCP Members Regarding Use of Computers and Information Processing." Pharmacotherapy: The Journal of Human Pharmacology and Drug Therapy 12, no. 6 (November 12, 1992): 468–74. http://dx.doi.org/10.1002/j.1875-9114.1992.tb04491.x.

Full text
Abstract:
A questionnaire was sent to a random sample of 480 members of the American College of Clinical Pharmacy to determine their opinions on various issues relating to computer technology and the future role of computers in information processing in pharmacy. Results from the 335 evaluable responses revealed nearly universal use of computers. Word processing was the most common application and IBM or compatible computers were the dominant machines. Respondents used a wide variety of generalized and specialized programs, especially electronic communication products. Computer technology is expected to have a major impact on routine aspects of pharmacy practice, although, respondents were split on its impact on more cognitively intensive functions.
APA, Harvard, Vancouver, ISO, and other styles
6

Nwafor, Stephen Chinedu, Franklin Nnanna Ibe, and Nneora Mary Muoneke. "Optimizing information and communication technology applications in chemistry learning." Journal of Research in Instructional 2, no. 2 (November 7, 2022): 151–62. http://dx.doi.org/10.30862/jri.v2i2.92.

Full text
Abstract:
Information and communication technology (ICT) is crucial to the educational growth of any country and the academic interactions and collaborations of students. The study determined the extent of ICT application in chemistry instruction in Anambra State, Nigeria, secondary schools. This study uses a descriptive survey. A total of 133 students and 12 chemistry teachers as samples. The t-test was used to test the research hypothesis. The study's findings revealed a low extent of ICT application in teaching and learning chemistry in Anambra State, Nigeria. Moreover, both the chemistry teachers and students agree that ICT is applied to a low extent for teaching and learning chemistry in Anambra State, Nigeria. The study also revealed that the use of outdated computers; lack of technical assistance; lack of time; lack of computer hardware/software; lack of electricity; broken down computers; lack of internet or slow connectivity, and high cost of computers are some of the challenges of ICT application while the provision/maintenance of adequate ICT software and hardware, exposure of chemistry teachers to workshops and conferences and provision of uninterrupted internet services and power supply by the government among others were proffered as possible strategies to eliminate these challenges.
APA, Harvard, Vancouver, ISO, and other styles
7

Board, John E. "Information technology. Can computers think like people?" Electronics and Power 31, no. 4 (1985): 275. http://dx.doi.org/10.1049/ep.1985.0173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lamanauskas, Vincentas. "INFORMATION & COMMUNICATION TECHNOLOGY PENETRATION INTO EDUCATION: SOME THOUGHTS." Problems of Education in the 21st Century 50, no. 1 (December 15, 2012): 5–6. http://dx.doi.org/10.33225/pec/12.50.05.

Full text
Abstract:
Over the last decade the spread of information communication technologies has been growing very rapidly both in quantitative and qualitative meaning. Not only new, innovative technologies, but also various people communication forms based on these technologies have appeared. Here, it is spoken about so-called social networking websites. Their rapid development raises certain anxiousness as well. Education, as one of society life spheres, can’t stay apart. The penetration of technologies in education is very great. The number of computers and computer technologies is expanding not only in educational offices, but also in the environment of every of us: homes, working places and so on. The youth is a very receptive group of society in this respect, seeking to try the newest technologies as quickly as possible. The majority of pupils spend quite a big part of time working on computers and using other computer technologies. It must be accentuated, that very often such kind of activity is not directly related with learning and self-education in a wider sense. It is obvious, that penetration of technologies enables educational community to work differently, to change educational process, to search for new approaches and so on.
APA, Harvard, Vancouver, ISO, and other styles
9

Imanbekova, A. N. "Development of an information system of a medical institution." Mechanics and Technologies, no. 4 (December 30, 2023): 140–48. http://dx.doi.org/10.55956/zcgt6039.

Full text
Abstract:
This article discusses the issues about Information technology (IT) is the research, design, development, implementation, maintenance or management of Computer Information Systems, in particular software applications and computer hardware. Information Technology Association. It deals with the use of electronic computers and computer software tools for the safe Conversion, Storage, Protection, processing, transmission and retrieval of information.
APA, Harvard, Vancouver, ISO, and other styles
10

Velmurugan, N., T. Lalitha, and Dr T. Mukilan. "An Importance of Information Technology and Computer Applications Among Students in Kannanur." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 1236–43. http://dx.doi.org/10.22214/ijraset.2022.48081.

Full text
Abstract:
Abstract: Computers and information technology and computer are critical components of modern society. In the meantime, education in information technology and computer applications has opened up new employment opportunities in Information Technology fields. The educational institution then began offering a variety of degrees through colleges, making a unique contribution to information technology and computer education. Colleges unquestionably have a significant impact on many facets of education and enhance both teaching and learning quality. The educational system, including schools, colleges, and universities, has been improved through the use of numerous computer technologies and applications. To effectively manage their institution's learning, teaching, administration, and accounting processes, educational institutions today use their own computer applications. In order for students to learn effectively, they need to be aware of how computers affect both their subjects and education. Students are able to recognize that integrated technology will enhance classroom learning thanks to information technology and computer applications. The purpose of this study is to determine that students place a high value on information technology and computer applications. The present study finds that college students' advancement in information technology and computer applications. The study reveals the numerous usages of information technology and computer applications importance among students. As a result, the information technology and computer applications were used in college education make it possible for students and teachers to learn and teach effectively.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "COMPUTERS / Information Technology"

1

Hazzard, Catherine. "Women and information technology /." [St. Lucia, Qld.], 2001. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe16195.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fung, Yat-chu, and 馮一柱. "Information technology and empowerment in information society: use of computers amongst senior persons." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B31245298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Sally. "An exploration of professional identity in the information technology sector." Thesis, Edinburgh Napier University, 2016. http://researchrepository.napier.ac.uk/Output/9731.

Full text
Abstract:
At present the Information Technology profession appears to be dogged by high profile project failure, high graduate unemployment rates, employers unable to recruit suitable staff and a professional body under attack. It is not even clear that IT can be considered a profession when compared with other occupational groups in which professional bodies regulate entry and employers demand professional status from their employees. There are some advantages in belonging to a recognised profession, including external recognition and status; and, consequentially, disadvantages in not belonging. To find out more about the nature of professional identity as experienced in the workplace, this study was designed to explore how IT professionals in leadership roles self-identify. Professional identity is defined to be a coherent self-conception based on skills, abilities, experiences and identification with a profession. The underlying identity theories accept a complex picture of multiple identities with identity commitment and salience affecting behaviour in different contexts. This study explored the nature of professional identity construction and adaptation for experienced IT professionals. As a previously unexplored group in a relatively new profession, the life narrative technique was used to identify factors in the construction and adaptation of identity with insights drawn over the course of a working life. The findings revealed that participants constructed organisational, technical skills-based and leadership identities but there was little identification with the IT profession, as would have been in evidence, for example, through membership of the British Computer Society or developmental interactions with prototypical IT professionals. Analysis of the data uncovered mechanisms which could explain the lack of identification with the IT profession, including the rate of technological change and an underpowered professional body. The findings were evaluated and a set of emerging recommendations for stakeholders in a strong and stable IT sector were framed, including encouraging employers to endorse chartered status and careful consideration of the review on computing course accreditation underway.
APA, Harvard, Vancouver, ISO, and other styles
4

Tsang, Currie. "Higher education in information technology & its impacts on a changing urban job market : case study: Hong Kong /." [Hong Kong : University of Hong Kong], 1986. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12324413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou, Xiaosong. "Understanding serendipity and its application in the context of information science and technology." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/52100/.

Full text
Abstract:
Serendipity is widely experienced in current society, especially in the digital world. According to the Oxford Concise English Dictionary, the term “serendipity” is defined as “the occurrence and development of events by chance in a happy or beneficial way”. This PhD research project aims to understand serendipity in the context of information research, and then attempts to design information technologies which can support the encountering of serendipity in cyberspace. The whole PhD project is organised with two parts. The first part investigates the nature of serendipity by conducting three user studies. After a systematic literature review on existing empirical studies of serendipity, the author finds there are research methodological problems in current studies; for example, the most widely used methods are those conventional ones like interview or survey, and it is mainly the subjective data that can be collected from participants. The author then conducted the first user study, which was an expert interview, where nine experts in the research area of serendipity were interviewed with a focus on the research methodological issues. This study successfully helped the author to gain a broader understanding of the advantages and disadvantages of employing different research methods in studying serendipity. Then the second user study, which was a diary-based study, was performed among a group of Chinese scholars with the aim to have a further investigation on the role of “context” played in the process of serendipity. The study lasted two weeks and successfully collected 62 serendipitous cases from 16 participants. The outcome of this study helped us with a better understanding of how these Chinese scholars experience serendipity, and a context-based research model was constructed, where the role of external context, social context and internal context were identified in detail during the process of serendipity. One interesting finding from the second user study is that emotions played a role in these participants’ experiencing serendipity, which was a part largely ignored by current serendipity researchers; therefore, the author conducted the third user study with the main objective to find out the impact of emotions during serendipitous encountering. This study first employed electrodermal activity (EDA) device to test participants’ psychological signals during the process of serendipity, which was implemented through a self-developed algorithm and the algorithm was embedded through a “Wizard of Oz” approach in a sketch game. The results of the study show that participants are more possible to experience serendipity under the influence of positive emotions and/or with skin conductance responses (SCRs). The second part of the PhD project is the application of serendipity through recommendation technology. A recommender system is an important area that practises serendipity in the digital world, as users in today’s society are no longer satisfied with “accurate” recommendations, and they aim to be recommended with the information that is more serendipitous and interesting to them. However, a review of existing studies on serendipitous recommendation, I have found that the inspiring achievements of understanding the nature of serendipity from information science failed to gain attention by researchers in the area of recommender systems. I then developed a new serendipitous recommendation algorithm by adopting the theory of serendipity from information research and implemented the algorithm in a real data set. The algorithm was implemented in Movielens, which involves 138,493 users with about 20,000,263 ratings across 27,278 movies. The evaluation of the algorithm was conducted in a sub-dataset, which consists of 855,598 ratings from 2,113 users on 10,197 movies. The developed algorithm was compared with another two widely used collaborative filtering algorithms (user-based collaborative filtering and item-based collaborative filtering), and the results demonstrated the developed algorithm is more effective in recommending “unexpected” and “serendipitous” movies to users. A post user study on twelve movie scholars showed that these participants were possible to experience serendipity when they were recommended with movies under the developed algorithm; and compared to user-based collaborative filtering, these participants were more willing to follow the recommended use by the serendipitous algorithm.
APA, Harvard, Vancouver, ISO, and other styles
6

Sweeny, Louis J. (Louis Joseph). "Connecting people not computers : information technology and culture change in environmental management." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/37010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bin, Ishaq Alseiari Khalid. "The management of risk awareness in relation to information technology (MERIT)." Thesis, University of Gloucestershire, 2015. http://eprints.glos.ac.uk/2739/.

Full text
Abstract:
Current business environments are characterised by a wide range of factors and issues which combine to create an unprecedented level of uncertainty and exposure to risks in IT management and all areas of strategic and operational activities. However IT risk awareness presents both a problem and an opportunity to achieve effective IT risk management. This context creates an imperative for conceptualising risk awareness to account for the intensity, diversity and complexity of IT risks ensuring a heightened level of awareness. The central focus of this study is founded on the premise that IT risk awareness among individuals in all levels of the organisation is critical and involves consideration of human and social factors. The research aimed to evaluate current practice in IT risk awareness in police forces and explore what police forces in the UAE can learn from the best practices of other UAE public and private enterprises. The study further aimed to develop a new holistic conceptual model of IT risk awareness supporting IT risk management. Quantitative and qualitative data was collected to achieve the research objectives utilising three main techniques of structured survey, a Delphi method and in-depth interviews. The findings underline that IT risk awareness is not being maximised or embedded in UAE organisations and there is a lack of formalisation of risk management processes. Although the ADP particularly demonstrated these weaknesses this was also reflected to a lesser extent in other UAE organisations. The results show that a diverse level of knowledge in relation to risk awareness and management is evidenced and detailed knowledge of risk management was weak in addition to low awareness of policies and guidelines. Moreover IT risk awareness and management was perceived as solely the domain of IT departments and not as a collective responsibility. A further key finding is validation of all five components of Governance, Compliance, Enterprise, IT GRC and Risk management within the MERIT IT systems risk awareness model, affirming that it is appropriate and important to examine risk awareness in relation to these elements. Model components were further found to be iterative and interdependent and findings highlighted the critical role of governance in facilitating risk awareness and other elements in the model. Finally, risk awareness is found to be critically underpinned and influenced by a complex range of different elements involving cognitive, social, cultural, emotional and psychological aspects in addition to the extent to which people understand a range of different types of risk. The MERIT model provides significant opportunity to identify, assess and address these elements.
APA, Harvard, Vancouver, ISO, and other styles
8

Ko, Leonard L. "Personal information system /." Online version of thesis, 1993. http://hdl.handle.net/1850/11976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peacock, Martin. "An investigation into the use of information technology in the hospitality industry." Thesis, Brunel University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.299117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mogotlhwane, T. M. "Barriers to successful application of information technology in Botswana." Thesis, University of Salford, 2008. http://usir.salford.ac.uk/1735/.

Full text
Abstract:
This research looked at barriers to successful applications of information and communication technology (ICT) in Botswana. Botswana has high investments in ICT infrastructure development in the public service. However, there is still concern about service delivery not being satisfactory. Many departmental functions are still performed manually despite the availability of computers and people capable of using them. The research question addressed is why there is lack of exploitation of ICT in the Botswana public sector. Two government departments based in the capital city were selected as case studies and investigated using questionnaires and semi structured interviews to determine the status of employee relations and ICT use. Questionnaires were used to solicit satisfaction perception of the general public about public service using a sample of capital city population. This research revealed a digital divide within Botswana. Within the public sector, computer penetration as well as internet access is very high as there is 1 computer for every 2 employees. For the general public, computer ownership is low as about 28% of the population have computers at home. Despite availability of computers in the public service, members of the public experience delay when they seek service. Motivation and payment are biggest problem regarding employee relations. ICT support is satisfactory though this might be due to low level of ICT use. Fear of change is the main limiting factor to ICT exploitation in Botswana. It was found that maintenance cost of ICT infrastructure is in the order of 8 times the national average salary. A framework is proposed to help policy makers on how best to exploit existing ICT infrastructure. Botswana has remained at the first level of ICT exploitation for over 10 years. Suggestions are made as to how the next level could be reached and future research is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "COMPUTERS / Information Technology"

1

Daggett, Willard R. Computers and information technology. Cincinnati: South-Western Pub. Co., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Procter, Paula M. Nurses, computers, and information technology. London: Chapman & Hall, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1947-, Long Nancy, ed. Computers: Information technology in perspective. Upper Saddle River, New Jersey: Prentice Hall, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1947-, Long Nancy, ed. Computers: Information technology in perspective. Upper Saddle River, N.J: Pearson/Prentice Hall, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Long, Larry. Computers: Information technology in perspective. Upper Saddle River, NJ: Prentice Hall, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Long, Larry. Computers: Information technology in perspective. Upper Saddle River, N.J: Prentice Hall, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lloyd, Ian J. Information technology law. 2nd ed. London: Butterworths, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mooney, Cotter Anne-Marie, Babe Colin, and Law Society of Ireland, eds. Information technology law. London: Cavendish, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A, Dodd. Computing: The technology of information. New York: Oxford University Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hanazawa, Akitoshi, Tsutomu Miki, and Keiichi Horio. Brain-inspired information technology. Berlin: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "COMPUTERS / Information Technology"

1

Harper, Harriet. "Introduction to Computers." In Information Technology, 3–11. London: Macmillan Education UK, 1988. http://dx.doi.org/10.1007/978-1-349-11675-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harper, Harriet. "Introduction to Computers." In Information Technology, 3–11. London: Macmillan Education UK, 1988. http://dx.doi.org/10.1007/978-1-349-10097-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Whiteley, David. "Computers and Information Technology." In An Introduction to Information Systems, 114–32. London: Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-08467-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Anderson, Roy. "Evolution of Information Technology." In Management, Information Systems and Computers, 144–67. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18419-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lancaster, John. "Computers in Everyday Life." In Basic Concepts of Information Technology, 61–73. London: Springer London, 2000. http://dx.doi.org/10.1007/978-1-4471-0781-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nagle, L. M., Judith Shamian, and P. Catford. "Information Technology Developments: Issues for Nursing." In Nursing and Computers, 14–21. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-2182-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mevarech, Zemira R. "The U-Curve Process That Trainee Teachers Experience In Integrating Computers Into The Curriculum." In Information Technology, 46–51. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35081-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kurki-Suonio, Reino, Oddur Benediktsson, Janis Bubenko, Ingemar Dahlstrand, Christian Gram, and John Impagliazzo. "University Education on Computers." In IFIP Advances in Information and Communication Technology, 310–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03757-3_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

King, Wendy. "Information Technology and the Management of Preventive Services." In Nursing and Computers, 214–18. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-2182-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dorner, Jane. "Authors and Information Technology: New Challenges in Publishing." In Computers and Writing, 5–14. Dordrecht: Springer Netherlands, 1992. http://dx.doi.org/10.1007/978-94-011-2674-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "COMPUTERS / Information Technology"

1

TITU, Aurel Mihail, and Alexandru STANCIU. "Merging Operations Technology with Information Technology." In 2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2020. http://dx.doi.org/10.1109/ecai50035.2020.9223235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Carneiro de Paula, Virginia. "Computer Programming is More than to Program Computers." In SIGITE '18: The 19th Annual Conference on Information Technology Education. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3241815.3241824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pesetskaya, Tatiana, and Tatsiana Zhylinskaya. "Information Technology in Multicultural Educational Environment." In ICETC 2019: 2019 11th International Conference on Education Technology and Computers. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3369255.3369292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Zegang, Xinghua Li, and Xuecheng Yu. "Tennis Teaching Based on Information Technology." In 2021 International Conference on Computers, Information Processing and Advanced Education (CIPAE). IEEE, 2021. http://dx.doi.org/10.1109/cipae53742.2021.00011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bai, Fenfang. "Integration Project Based on Computer Information Technology Management System." In 2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2022. http://dx.doi.org/10.1109/ipec54454.2022.9777313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

El Helou, Melhem, Marc Ibrahim, Samer Lahoud, and Kinda Khawam. "Optimizing network information for radio access technology selection." In 2014 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2014. http://dx.doi.org/10.1109/iscc.2014.6912591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Basogain, Xabier, Juan Carlos Olabe, and Miguel Ángel Olabe. "Fostering STEAM education using computers and information technologies." In ICMET '20: 2020 the 2nd International Conference on Modern Educational Technology. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3401861.3401875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fu, Qiang. "Virtual Reality Technology in Information Teaching." In CIPAE 2021: 2021 2nd International Conference on Computers, Information Processing and Advanced Education. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3456887.3457457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peng, Ruiqi. "Analysis of Computer Information Processing Technology Based on Unstructured Data." In 2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2021. http://dx.doi.org/10.1109/ipec51340.2021.9421190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

YIN, YONG, HONG ZENG, and XIAOLEI ZHENG. "THE DEVELOPMENT AND APPLICATION OF INFORMATION TECHNOLOGY IN HIGHER VOCATIONAL EDUCATION." In 2021 INTERNATIONAL CONFERENCE ON ADVANCED EDUCATION AND INFORMATION MANAGEMENT (AEIM 2021). Destech Publications, Inc., 2021. http://dx.doi.org/10.12783/dtssehs/aeim2021/36002.

Full text
Abstract:
Abstract. The development of a series of information trends, such as electronic computers derived from information technology, plays a positive role in modern society. Electronic computer has been widely applied in various fields, and it also plays an important role in polytechnic college education. It is not only applied in education and teaching, but also in the management system of the polytechnic college. This paper discusses and analyzes in detail the impact of informatization on the management system of polytechnic college and the impact of informatization on the informatization management of students' status files of polytechnic college.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "COMPUTERS / Information Technology"

1

Czerwonko, Alejo, Julian P. Cristia, and Pablo Garofalo. Does ICT Increase Years of Education?: Evidence from Peru. Inter-American Development Bank, May 2010. http://dx.doi.org/10.18235/0011176.

Full text
Abstract:
A number of empirical studies have measured the effect of Information and Communication Technology (ICT) on test scores, yet there is a lack of empirical evidence on the effects of this type of intervention on drop-out and repetition rates, variables that have a direct impact on years of education. This working paper analyzes rich longitudinal censal data from Peru as well as information regarding a specific program that deployed computers in 350 schools in the year 2004. Results indicate null impacts of increasing computer access on repetition, drop-out rates and initial enrollment. The large sample sizes allow the authors to detect even very modest effects. These results, together with previous evidence on the lack of effects on tests scores, point to a limited potential of computers in improving education outcomes.
APA, Harvard, Vancouver, ISO, and other styles
2

Crooks, Roderic. Toward People’s Community Control of Technology: Race, Access, and Education. Social Science Research Council, January 2022. http://dx.doi.org/10.35650/jt.3015.d.2022.

Full text
Abstract:
This field review explores how the benefits of access to computing for racialized and minoritized communities has become an accepted fact in policy and research, despite decades of evidence that technical fixes do not solve the kinds of complex social problems that disproportionately affect these communities. I use the digital divide framework—a 1990s policy diagnosis that argues that the growth and success of the internet would bifurcate the public into digital “haves” and “have-nots”—as a lens to look at why access to computing frequently appears as a means to achieve economic, political, and social equality for racialized and minoritized communities. First, I present a brief cultural history of computer-assisted instruction to show that widely-held assumptions about the educational utility of computing emerged from utopian narratives about scientific progress and innovation—narratives that also traded on raced and gendered assumptions about users of computers. Next, I use the advent of the digital divide framework and its eventual transformation into digital inequality research to show how those raced and gendered norms about computing and computer users continue to inform research on information and communication technologies (ICTs) used in educational contexts. This is important because the norms implicated in digital divide research are also present in other sites where technology and civic life intersect, including democratic participation, public health, and immigration, among others. I conclude by arguing that naïve or cynical deployments of computing technology can actually harm or exploit the very same racialized and minoritized communities that access is supposed to benefit. In short, access to computing in education—or in any other domain—can only meaningfully contribute to equality when minoritized and racialized communities are allowed to pursue their own collective goals.
APA, Harvard, Vancouver, ISO, and other styles
3

Kamonjo, Florence W., David Ngatia, Benedicta Tabot, and Paul Onsare. Baseline Study on Technology-Enabled Learning at the University of Kabianga. Commonwealth of Learning (COL), August 2023. http://dx.doi.org/10.56059/11599/5442.

Full text
Abstract:
This report presents the findings of a baseline study conducted at the University of Kabianga (UoK), Kenya. The study’s aim was to establish the status of access to and use of information and communication technologies (ICT) for teaching and learning at UoK. The baseline study established that UoK’s institutional preparedness status can be represented as ‘emerging preparedness.’ UoK provides Internet access to both instructors and learners in some areas of the university. However, learners felt they should have Internet access in more places, including their hostels, to improve the TEL experience. Learners had positive perceptions about using technology in their learning, but they indicated the need for greater bandwidth and for more desktop computers to be available in non-ICT courses. The study also established that lecturers have positive attitudes towards the use of TEL. However, they have concerns about a lack of faculty training on TEL and a lack of time to develop courses for delivery using technology.
APA, Harvard, Vancouver, ISO, and other styles
4

Megersa, Kelbesa, Fabrizio Santoro, Adrienne Lees, Marco Carreras, Theonille Mukamana, Naphtal Hakizimana, and Yves Nsengiyumva. Technology and Tax: Adoption and Impacts of E-services in Rwanda. Institute of Development Studies, May 2023. http://dx.doi.org/10.19088/ictd.2023.029.

Full text
Abstract:
Many low-income countries are increasingly digitising their tax services, which can bring a range of benefits, from reducing compliance costs and improving record-keeping, to limiting opportunities for corruption and increasing fairness in the tax system. However, the success of these benefits depends on adequate levels of awareness and adoption of e-services among taxpayers; where these levels are suboptimal, tax e-services may produce only partial benefits. This paper examines the extent of awareness and uptake of tax e-services in Rwanda from a pre-pandemic situation up to two years into the COVID-19 crisis. The country has increasingly digitalised its tax administration, even more so during the pandemic. Electronic filing and payment of taxes have been mandatory since 2015, and two different e-services are available: E-tax, a free web-based platform designed to be used on computers and smartphones, and M-declaration, a feature phone-based application which enables mobile money payments and a simpler process for filing a return. This allows us to run a comparative analysis of the two solutions. We apply a mixed methods approach, using a nationally representative panel survey of 2,000 corporate (CIT) and personal (PIT) income taxpayers, with baseline information collected pre-COVID-19 and four follow-up rounds carried out after the pandemic hit, and focus group discussions (FGDs) with 24 e-services users. Summary of Working Paper 153.
APA, Harvard, Vancouver, ISO, and other styles
5

Wei, Yuehui, Hui Mao, Ziyun Jiang, Luyao Liu, Yuqiao Quan, and Xun Li. Efficacy and safety of Zuogui Wan combined with conventional Western medicine for postmenopausal osteoporosis: A protocol for a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, April 2022. http://dx.doi.org/10.37766/inplasy2022.4.0099.

Full text
Abstract:
Review question / Objective: The proposed systematic review of randomized controlled trials (RCTs) will address the effectiveness and safety of Zuogui Wan combined with conventional Western medicine (CWM) for osteoporosis in postmenopausal women, and provide reference for clinical practice. Information sources: We will use computers to search PubMed, Cochrane Library, Embase, Web of Science, Chinese National Knowledge Infrastructure database (CNKI), WanFang database, Chinese Biomedical Database (CMB), Chinese Science and Technology Periodical database (VIP), China Master’s Theses Full-text Database (CMFD), China Proceedings of Conference Full-text Database (CPFD), WHO International Clinical Trials Registry Platform (ICTRP), Chinese Clinical Trials Registry (ChiCTR) and ClinicalTrials.gov, and select all eligible RCTs from inception to October, 2021. Clinicians will also be consulted for additional studies.
APA, Harvard, Vancouver, ISO, and other styles
6

McGarrigle, Malachy. Watchpoints for Consideration When Utilising a VDI Network to Teach Archicad BIM Software Within an Educational Programme. Unitec ePress, October 2023. http://dx.doi.org/10.34074/ocds.099.

Full text
Abstract:
This research identifies factors to be considered in the adoption of a virtual desktop infrastructure (VDI) accommodating the software needs of a tertiary institution. The study discusses the potential advantages and disadvantages of VDI, focusing specifically on the performance of the architectural software Archicad when used virtually. The findings will be relevant to similar programmes, such as Revit, and software used in other disciplines, especially where processing power is important. Aims discussed include reducing high-specification computers rarely used to capacity, assessing user experience, and feasibility of VDI remote access. Primarily a case study, this project centres around delivery of papers in the New Zealand Diploma of Architectural Technology programme at Unitec | Te Pūkenga that employ Archicad. Software efficiency and performance was monitored throughout teaching across numerous semesters. Incidents were logged and VDI operation tracked, especially during complex tasks such as image rendering. Load testing was also carried out to assess the implications of large user numbers simultaneously performing such complex tasks. Project findings indicate that Archicad performance depends on the design and specification of the virtual platform. Factors such as processing power, RAM allocation and ratio of users to virtual machines (VM)s proved crucial. Tasks executed by the software and how software itself uses hardware are other considerations. This research is important, as its findings could influence the information technology strategies of both academic institutions and industry in coming years. Virtual computing provides many benefits, and this project could provide the confidence for stakeholders to adopt new strategies using VDI instead of the traditional approach of computers with locally installed software applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Videa, Aldo, and Yiyi Wang. Inference of Transit Passenger Counts and Waiting Time Using Wi-Fi Signals. Western Transportation Institute, August 2021. http://dx.doi.org/10.15788/1715288737.

Full text
Abstract:
Passenger data such as real-time origin-destination (OD) flows and waiting times are central to planning public transportation services and improving visitor experience. This project explored the use of Internet of Things (IoT) Technology to infer transit ridership and waiting time at bus stops. Specifically, this study explored the use of Raspberry Pi computers, which are small and inexpensive sets of hardware, to scan the Wi-Fi networks of passengers’ smartphones. The process was used to infer passenger counts and obtain information on passenger trajectories based on Global Positioning System (GPS) data. The research was conducted as a case study of the Streamline Bus System in Bozeman, Montana. To evaluate the reliability of the data collected with the Raspberry Pi computers, the study conducted technology-based estimation of ridership, OD flows, wait time, and travel time for a comparison with ground truth data (passenger surveys, manual data counts, and bus travel times). This study introduced the use of a wireless Wi-Fi scanning device for transit data collection, called a Smart Station. It combines an innovative set of hardware and software to create a non-intrusive and passive data collection mechanism. Through the field testing and comparison evaluation with ground truth data, the Smart Station produced accurate estimates of ridership, origin-destination characteristics, wait times, and travel times. Ridership data has traditionally been collected through a combination of manual surveys and Automatic Passenger Counter (APC) systems, which can be time-consuming and expensive, with limited capabilities to produce real-time data. The Smart Station shows promise as an accurate and cost-effective alternative. The advantages of using Smart Station over traditional data collection methods include the following: (1) Wireless, automated data collection and retrieval, (2) Real-time observation of passenger behavior, (3) Negligible maintenance after programming and installing the hardware, (4) Low costs of hardware, software, and installation, and (5) Simple and short programming and installation time. If further validated through additional research and development, the device could help transit systems facilitate data collection for route optimization, trip planning tools, and traveler information systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Markova, Oksana M., Serhiy O. Semerikov, Andrii M. Striuk, Hanna M. Shalatska, Pavlo P. Nechypurenko, and Vitaliy V. Tron. Implementation of cloud service models in training of future information technology specialists. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3270.

Full text
Abstract:
Leading research directions are defined on the basis of self-analysis of the study results on the use of cloud technologies in training by employees of joint research laboratory “Сloud technologies in education” of Kryvyi Rih National University and Institute of Information Technology and Learning Aids of the NAES of Ukraine in 2009-2018: cloud learning technologies, cloud technologies of blended learning, cloud-oriented learning environments, cloud-oriented methodological systems of training, the provision of cloud-based educational services. The ways of implementation SaaS, PaaS, IaaS cloud services models which are appropriate to use in the process of studying the academic disciplines of the cycles of mathematical, natural science and professional and practical training of future specialists in information technology are shown, based on the example of software engineering, computer science and computer engineering. The most significant advantages of using cloud technologies in training of future information technology specialists are definite, namely, the possibility of using modern parallel programming tools as the basis of cloud technologies. Conclusions are drawn; the direction of further research is indicated: designing a cloud-oriented learning environment for future specialists in computer engineering, identifying trends in the development of cloud technologies in the professional training and retraining of information technology specialists, developing a methodology for building the research competencies of future software engineering specialists by using cloud technologies.
APA, Harvard, Vancouver, ISO, and other styles
9

Varina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko, and Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4453.

Full text
Abstract:
Technologies based on cloud computing is one of the demanded and actively developing areas of the modern information world. Cloud computing refers to an innovative technology that allows you to combine IT resources of various hardware platforms into a single whole and provide the user with access to them via a local network or the global Internet. Cloud services from various providers offer users access to their resources via the Internet via free or shareware cloud applications, the hardware and software requirements of which do not imply that the user has high-performance and resource-consuming computers. Cloud technologies represent a new way of organizing the educational process and offers an alternative to traditional methods of organizing the educational process, creates an opportunity for personal learning, collective teaching, interactive classes, and the organization of psychological support. The scientific article is devoted to the problem of integrating cloud technologies not only in the process of training highly qualified specialists, but also in the formation of professionally important personality traits. The article describes the experience of introducing cloud technologies into the process of forming the adaptive potential of students in conditions of social constraints caused by the COVID-19 pandemic.
APA, Harvard, Vancouver, ISO, and other styles
10

Ricker, Richard E. DTRS56-04-X-0025 Pipeline Steel Corrosion Data from NBS Studies 1922-1940. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), May 2007. http://dx.doi.org/10.55274/r0011874.

Full text
Abstract:
Between 1911 and 1984, the National Bureau of Standards (NBS) conducted a large number of corrosion studies that included the measurement of corrosion damage to samples exposed to real-world environments. One of these studies was an investigation conducted between 1922 and 1940 into the corrosion of bare steel and wrought iron pipes buried underground at 47 different sites representing different soil types across the United States. At the start of this study, very little was known about the corrosion of ferrous alloys underground. The objectives of this study were to determine (i) if coatings would be required to prevent corrosion, and (ii) if soil properties could be used to predict corrosion and determine when coatings would be required. While this study determined very quickly that coatings would be required for some soils, it found that the results were so divergent that even generalities based on this data must be drawn with care. The investigators concluded that so many diverse factors influence corrosion rates underground that planning of proper tests and interpretation of the results were matters of considerable difficulty and that quantitative interpretations or extrapolations could be done "only in approximate fashion" and attempted only in the "restricted area" of the tests until more complete information is available. Following the passage of the Pipeline Safety Improvement Act in 2002 and at the urging of the pipeline industry, the Office of Pipeline Safety of the U.S. Department of Transportation approached the National Institute of Standards and Technology (NBS became NIST in 1988) and requested that the data from this study be reexamined to determine if the information handling and analysis capabilities of modern computers and software could enable the extraction of more meaningful information from these data.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography