NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
There are hundreds of unique search engines in the United States and thousands of unique search engines around the world. If people get into search engines designed just to search particular web sites, the number is in the hundreds of thousands. This article looks at: (1) clustering search engines, such as KartOO (www.kartoo.com) and Grokker…
Descriptors: Search Engines, Artificial Intelligence, Internet, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
Descriptors: Internet, Computer Mediated Communication, Privacy, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Netbooks, sometimes called "mini-notebooks," are lightweight, small, and low-priced computers. Some writers ridicule them by calling them "one of the hottest tech toys of the year" (Saltzman, 2008). Others enthusiastically embrace them as "my perfect new travel companion" (Grossman, 2009). Netbooks are not toys. They are honest-to-goodness real…
Descriptors: Laptop Computers, Technology Uses in Education, Access to Computers, Computer Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2008
In this article, the author discusses some features of Windows Vista that may be of interest to teachers and/or their students. These are: (1) User Account Control; (2) Windows Firewall; (3) Windows Backup; (4) Parental Controls; (5) Windows Sidebar and Gadgets; (6) Instant Search; and (7) Windows ReadyBoost.
Descriptors: Computer Software, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2008
How can fictitious websites fool so many people for so long? Most students at some time in their career are taught different flags to look for to try to ascertain the accuracy of a site. If one takes a look at most any list that teachers use to help students check on the credibility of a website, they seem to cover the same attributes. Is the…
Descriptors: Internet, Web Sites, Validity, Content Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
In this article, the author discusses text messaging and instant messaging (IM). In a nutshell, text messaging is another name for Short Message Service (SMS). SMS is a service available on most digital mobile phones that permits the sending of short messages (also known as SMSes, text messages, messages, or more colloquially texts or even txts)…
Descriptors: Telecommunications, Electronic Equipment, Word Processing, Age Differences
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
Just as many people log onto a Web mail site (Gmail, Yahoo, MSN, etc.) to read, write and store their email, there are Web sites out there with word processing, database, and a myriad of other software applications that are not downloadable but used on the site through a Web browser. The user does not have to download the applications to a…
Descriptors: Computer Software, Internet, Online Searching, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
According to the National Safety Council, 63 million computers became obsolete in 2005 alone, and it is estimated that the total number in storage in 2007 numbers upwards of 500 million computers (Earth 911, 2007). This article describes the steps that one should take before disposing of an obsolete computer. First and foremost, all personal…
Descriptors: Conservation (Environment), Computers, Computer Security, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
Some remember when they accessed the Internet through the telephone on a 300-baud modem. It was slow and it was not easy, but it gave them a view of the world. Now there is the web, idiot-proof email, and practically unlimited wireless connectivity. Having gone from desktop computers to laptops, now a major push is moving connectivity into the…
Descriptors: Internet, Telecommunications, History, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
What would people do without the Internet? It gives them the world at their fingertips. Almost anything that they want and need can be found in one neat little place. The Internet is a great place for kids also. They can be entertained, chat with friends, and learn about whatever interests them. Unfortunately the Internet also helps people…
Descriptors: Internet, Computer Security, Child Safety, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…
Descriptors: Computers, Computer Security, Crime Prevention, Internet