Asee peer logo
Displaying all 12 results
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
column (the maximum grade is the total number of badgesavailable). In the comment section, the instructor adds the recently earned badge name. Thestudents are encouraged to write (or draw) each badge earned onto their name signs.Below are the specific EM/KEEN course objectives [3] that students will gain with throughoutthe course if you implement this type of system. KEEN Related Course Outcomes/Learning Objectives [3]: • Develop an appreciation of hard work & recognize the benefits of focused and fervent effort • Accept responsibility of their own actions and credit the action of others • Demonstrate an ability to set, evaluate, and achieve personal & professional goals • Be able to teach and learn from peers
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Irini Spyridakis, University of Washington
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
culturaldimensions as they pertain to UI features (e.g., content, organization, navigation, verbal rhetoric,tone, design) in two websites that are produced by the same company for two different countries[11] - [12]. Students seek to assess how effective the sites are in meeting their audiences’ needs.They write a draft report to the hypothetical Marketing Director of the company website thatthey chose (this report is not sent out), conduct a peer review of other students’ draft reports,revise and finalize their own report, and create and present an oral presentation to their peers.This report assignment involves active, collaborative, problem-based learning [13]. The reportassignment counts for 20 percent of the final grade and is holistically graded with
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Emil H Salib, James Madison University
Tagged Divisions
Computing and Information Technology
network of computers that stores transactional data in replica across every com-puter (node) in the network. This data is called a distributed ledger. The following are the coreblockchain architecture components: nodes, transactions, blocks, hashes, chain, miners and con-sensus.3.1.1.1 NodesA node [4] is a user or computer within the blockchain which is also known as peer or participant.Nodes are distributed across a widespread network and carry out a variety of tasks. All nodes on ablockchain are connected to each other and they constantly exchange the latest blockchain data soall nodes stay up to date. They store, spread and preserve the blockchain data. Figure 1 shows howmultiple nodes, designated in the Ethereum implementation as Ethereum
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Alberto Cureg Cruz, California State University, Bakersfield; Antonio-Angel L. Medel, California State University Bakersfield; Anthony Chistoper Bianchi, California State University, Bakersfield; Vincent Wong On, California State University, Bakersfield; Melissa Danforth, California State University, Bakersfield
Tagged Divisions
Computing and Information Technology
learn a newtopic from online videos. Students complete a JiTT quiz before lecture for assessment, and toensure they watch the videos. Questions are reused from CON homework sets, but theassignments are less complex: ten to twenty MC and up to three free response questions. UnlikeCON, the instructor varies the daily topic based on JiTT results. JiTT quizzes are worth 5% of astudent’s overall grade. During lecture, students apply knowledge with peer-instruction. We usepair programming, a software engineering paradigm where one person is the driver and the otheris the navigator. The driver focuses on the problem and writes/codes. The navigator reads ahead,manages time, and validates. The driver and navigator get the same grade. The
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Scott J. Reckinger, University of Illinois at Chicago; Shanon Marie Reckinger, University of Illinois at Chicago
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
examsencouraged them to do more independent work throughout the semester. For research question 3,students reported that oral exams were very stressful prior to taking the first one but did not findsubsequent oral exams stressful.MOTIVATIONIt has been shown that higher perceived teacher support and school belonging is correlated withless school misconduct [1]. The same study also showed that higher peer attachment is alsoassociated with higher rates of school misconduct. The most common reason students cite forchoosing to commit academic misconduct is grade pressure [2]. However, with large andincreasing enrollments in introductory programming courses, standardized assessment will be therequired for the foreseeable future.One strategy that has been
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ben Ralph Bernard, North Dakota State University; Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
information systems, networking, web sitedevelopment, and how to write computer programs with Python. As a general education course,it is available to any student to use to complete the requirements for their degree. As a result,students enrolled in the course have diverse academic backgrounds and a wide range of priorexperience with computer science concepts.Course material is divided into weekly subjects ranging from an introduction to informationtechnology and networking, creating a webpage using raw HTML, to an introduction toalgorithms and programing concepts with Python. Each week, recorded lectures, course slides,and related online materials are provided via the university’s online course management system(Blackboard). Classroom lectures can
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
D. Cenk Erdil, Sacred Heart University; Kevin N. Bowlyn, Sacred Heart University; Joshua Randall, Sacred Heart University
Tagged Divisions
Computing and Information Technology
Paper ID #34473A Hands-on Learning Approach to Introducing Computer Organization andArchitecture to Early-college StudentsDr. D. Cenk Erdil, Sacred Heart University Dr. Erdil has joined Sacred Heart University’s School of Computer Science & Engineering in Fall 2017. Prior to SHU, he has held academic positions at Marist College, Columbia University, and Istanbul Bilgi University. His research interests include using Cloud Computing as Artificial Intelligence Infrastructures, Cyber-Physical Systems and Internet-of-Things, Teaching coding to P-12 students, and Health Informat- ics. He is the author of numerous peer
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Vijay Anand, University of Missouri, St. Louis; Dmytro Kudriashov, EPAM Systems
Tagged Divisions
Computing and Information Technology
, anonymoustransactions and as an efficient money-laundering tool. Cryptography and blockchain technology usedto produce building blocks of cryptocurrencies – a process called mining – to verify and addtransaction records to a write-only database of all previous transactions. As an incentive to add a newblock to the blockchain, the network compensates miners’ efforts with cryptocurrency, and a newlyadded block protected by cryptographic techniques to ensure the integrity of the record. To add ablock to the blockchain, miners have to solve a cryptographic puzzle, and a valid block will contain asolution to such puzzle with a hash of a previous block, hash of the transactions in the current blockand an address for the miner’s wallet on which the reward will be
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Anastasia Kurdia, Tulane University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
computational problem into manageable sub-problems. • Write an algorithm to solve a specific problem, and then translate that algorithm into a program in a specific programming language (Python). • Reason about solution’s performance and measure its efficiency. • Write clear, concise documentation for their code and develop tests to verify proper program operation.The second aim is to explore the breadth of Computer Science as a discipline and how it exists inthe world: • Reason how computational tools, and computational thinking, are used to solve problems in a diverse set of application areas. • Explain the basic theory and organization of a computer system, basic operation of modern software tools (e.g
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Leslie Harvey III, University of Florida; Ashish Aggarwal, University of Florida
Tagged Divisions
Computing and Information Technology
assigned lecturesout of class, it is important to know what kind of impact this has on a student’s learning experience[6, 13]. By students managing their own time, some students will submit the required quiz morethan a day earlier than some of their peers. With the submission time of quizzes varying betweeneach student, it is important to be able to identify if this impacts a student’s overall performancein the course. A starting point for understanding student behaviors is their approach towards self-scheduling the commitments required for a flipped course. Although all students have differentschedules impacting when assignments are completed, alongside other factors, this paper strives tounderstand more about how a student’s approach towards the
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Mudasser Fraz Wyne, National University; Shakil Akhtar, Clayton State University; Muhammad Asadur Rahman, Clayton State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
research activities, have been invited to number of international conferences as Invited Speaker, chaired panel discussions and numerous international conference sessions. He has served on more than 220 international conference program committees. Furthermore, he has published number of articles in peer- reviewed international journals and conferences. He is an active member of ACM, ASEE, ASEE/PSW and CSAB.Dr. Shakil Akhtar, Clayton State University Dr. Shakil Akhtar is currently Professor of IT and Computer Science at Clayton State University. Be- fore this he was the IT Department head from July 2007 to December 2008. He was a Professor in the College of Information Technology at UAE University from 2002 to 2007
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
– Right Questions http://vimeo.com/74338298 More Videos & Other Materials https://venturewell.org/i-corps/team-materials/ Table 3. Business Plan Resources Material URL Inc Magazine Business Plan https://www.inc.com/larry-kim/top-10-business-plan- Templates templates-you-can-download-free.html SCORE Business Plan Templates https://www.score.org/resource/business-plan- template-startup-business Small Business Administration https://www.sba.gov/business-guide/plan-your- Business Plan Templates business/write-your-business-plan5. Course-Long Software