Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 92 in total
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
these processes relate, specifically, to a software venture. This paperpresents the overall instructional plan of the course and discusses each of the course’scomponents. The implementation of the project component is discussed, in particular, in detail.The design and implementation challenges that were encountered are discussed.This course was run in Spring of 2020 and started as an in-classroom course, later transitioningto an online course due to the COVID-19 pandemic. The outcomes of the course are discussed.Possible future enhancements are considered.1. IntroductionSoftware businesses have been responsible for tremendous growth and changes in society. Oncesmall startups, names like Google, Microsoft, PayPal and Facebook now are among the
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
secure information technology (IT) systems, with responsibility for aspects of Software development system and/or network development Systems architecture Technology R&D Systems requirements planning Test and evaluation Systems development Operate and Maintain Provides the support, administration, and Data administration maintenance necessary to ensure effective Knowledge
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Centre/University of Minho (Portugal) working on H2020 Project titled ”Gender Equality Plans for In- formation Sciences and Technology Research Institutions, EQUAL-IST”. He is Member of Intersociety Cooperation Committee, Standing Committee of the IEEE Education Society; Vice President of Brazilian Chapter of Association of Information Systems (BRAIS); Vice President of the Portuguese Chapter of the IEEE Women in Engineering (IEEE WiE); and Associate Editor of Directory of Open Access Journals (DOAJ). He is Editor-in-Chief of Brazilian Journal of Education, Technology and Society (BRAJETS) and Associate Editor of Journal of Information Systems and Technology Management (JISTEM). He is titled ”Engineering Educator
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Bin Cong, California State University at Fullerton; Christopher Ryu, California State University at Fullerton; Raman Menon Unnikrishnan, California State University at Fullerton
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
process to beperformed in the organization for the institutionalization of a process:1. Establish an Organizational Policy 7. Identify and Involve Relevant Stakeholders2. Plan the Process 8. Monitor and Control the Process3. Provide Resources 9. Objectively Evaluate Adherence4. Assign Responsibility 10. Review Status with Higher Level Management5. Train People 11. Establish a Defined Process6. Control Work Products 12. Collect Process Related ExperiencesInstitutionalization of ABET Metrics at California State University, FullertonData plays a key role in any improvement effort since it shows the areas that
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Radana Dvorak, University of Portland; Heather Dillon, University of Portland; Nicole Ralston, University of Portland; Jeffrey Matthew Welch, University of Portland
Tagged Divisions
Computing and Information Technology
security issues in their software engineering careers.Students were asked to rank the learning objectives on a Likert scale of 1 to 5 where 1 was theworst ranking and 5 was the best ranking Generally, the results of the survey demonstratedstudents ranked the objectives well, with the lowest score for the objective about developing anaction plan for ethics indicating ways to improve the module in future course offering. Thehighest values were given to considering multiple viewpoints, indicating the mindset aspects ofthe project may have been successful.Based on the outcome and student feedback recommendations for future implementation of themodule in the curriculum is discussed.IntroductionThis paper describes a classroom module designed to develop
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
spoke to specific actions and behaviors they plan to take after the internship experience, reflecting their heightened maturity and sense of direction. Additionally, the internship illuminated the importance of building interpersonal skills, exhibiting personal growth, and developing attributes of lifelong learning. In contrast to these conclusions, pre- and post-survey analysis for the MSLQ with the same group of students reveals specific areas where student motivation decreased after the internship experience. These findings point to the important formative role internships can play in an undergraduate Computer Science and Engineering program and shed light on the lessons universities can learn about leveraging
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
data for a planned multiple semester longer term project.This paper contains (1) motivation and goals for this work, (2) outcomes and learning objectives,(3) instructions on how to design this kind of assignment, (4) the video assignment write up, (5)the rubric for the video, (6) the rubric for peer feedback, and (7) the rubric for reflection. Thispaper focuses on the structure and instruments used during the course.About the CourseArtificial Intelligence (AI) is being used to tackle more and more of the real-world problemsaround us. EECS 4901 Special Topics: Introduction to Artificial Intelligence will introducestudents to the fundamentals of Artificial Intelligence (AI). During this course students will lookat various problems being solved
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
, implementation and utilization aspects of aneducational big-data system that imitate Mobile Service Providers (MSPs) systems to delve deepinto their data stores. The purpose of the educational system was to introduce students todifferent concepts of big-data systems, mobile networks, systems integration, and mobilenetworks traffic analysis, and data management (Tamer Omar, 2016). The paper introduced thebig-data system architecture together with the analytics framework designed to support themobile network.The proposed project to implement the lab resources was planned over three years with anestimate budget of hundred thousand dollars. During this period the project team leader wasplanning to implement a production mobile testbed from small-cells
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. 1,2017- Oct. 1. 2020) in September 2017. This paper describes the project goals,objectives, and expected outcomes as well as the steps taken to implement some of theproject activities. It should be noted that the project is a work in progress and thus itsimpact on the students and our CS program could not be currently evaluated due toinsufficient data. The effectiveness of the project will be measured annually by Octoberof each project year. We are planning to present the assessment results of this project in afuture article by 2020.Goal StatementThe primary goal of this project is to enhance the retention and graduation rates ofcomputer science students at FVSU through revising curriculum, implementing a peer-to-peer tutoring/mentoring, and
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Abdullah Azzouni, Oregon State University; Jennifer Parham-Mocello, Oregon State University
Tagged Divisions
Computing and Information Technology
Education, 2021 Continuous Improvement in Academic Computing Programs is Rarely ComprehensiveAbstractRapid advancements in computing require academic computing departments to continuallyimprove. According to the literature, many of those departments claim to have institutedcomprehensive Continuous Improvement (CI) plans by building their own or using externallydeveloped tools to handle the process. This paper provides an exhaustive examination of the“comprehensiveness” of those comprehensive CI plans in the current literature and whether allcomponents of CI (360-CI) are addressed. We identify eight unique CI components, but we donot find any documentation of implementing all of them in a single program. The
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
administration and industry mentorship planning used to increase enrollments of woman and minorities with declared majors in the areas of Computer Sci- ence (CS), Engineering (E), Mathematics (M), and Science (S). Currently, Dr. Kappers is an Assistant Professor within the M.S. in Information Security & Assurance (MISA) within Embry-Riddle Aeronau- tical University’s (ERAU) College of Business, Worldwide Campus, and teaches within the College of Engineering for the Daytona Beach Campus of ERAU. Teaching responsibilities include: RSCH 202 – Introduction to Research, CS120 – Introduction to Computing in Aviation, and the entire collection of MISA-related program courses as needed. Both positions allow her to stay focused
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Daqing Hou, Clarkson University; Yu Liu, Clarkson University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
accommodate per year ten high-achieving undergraduate students recruited from across the USA and their faculty mentors on the theme of HPC applications in engineering research. In this experience report, we describe our first offering of the site in summer 2019, including the processes of students recruitment and selection, training and engagement, research mentoring, and professional development for the students. Best practices and lessons learned are identified and summarized based on our own observations and the evaluation conducted by an independent evaluator. In particular, improvements are being planned so as to deliver a more holistic and rigorous research experience for future cohorts
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
security practitioners indicate that their organization doesnot invest enough in security awareness training. Professionals in the field consider it imperative foracademic institutions to increase course development in computer security to make students bothknowledgeable and technologically prepared for future challenges in this field. Knowledge aboutongoing and planned activities will help the institutions to design and develop effective programsindividually and in collaboration with others. Universities are only beginning to catch up.The objective of this paper is to describe our experiences in the design and development of cybersecuritycourses and laboratory exercises for a cybersecurity concentration for our computer science majors
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephen Michael MacNeil, University of California, San Diego; Mohsen M. Dorodchi, University of North Carolina at Charlotte; Erfan Al-Hossami, University of North Carolina at Charlotte; Aileen Benedict, University of North Carolina at Charlotte; Devansh Desai, University of North Carolina at Charlotte; Mohammad Javad Mahzoon, Core Compete Inc.
Tagged Divisions
Computing and Information Technology
heat andflavor, Curri balances students’ actual pathways through the curriculum with the intendedcurricular dependencies. We present a series of case studies and focus groups from our college toillustrate the benefits afforded by a balanced view of the curriculum. For instance, multipleconcentrations can be compared based on how spread they are across the curriculum and howmany inter-concentration dependencies they have. Mismatches between curriculum designers’expectations and students’ pathways through the curriculum can also be identified, such ascurricular violations, where a course is taken very close to or before its own prerequisites. Weconclude with a discussion about the effectiveness of our approach and our plan for
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Matthew A. Verleger (He/His/Him), Embry-Riddle Aeronautical University; Richard S. Stansbury, Embry-Riddle Aeronautical University; Mustafa Ilhan Akbas, Embry-Riddle Aeronautical University; Philip Craiger, Embry-Riddle Aeronautical University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Swarms with Distributed Swarm Control 3. Enhancing Security of Cloud-Connected UAS ServicesStudents were placed onto teams based on their prior course experiences and the projectrequirements. Common resources were provided for all students to train them in conductingresearch. Teams were then tasked with developing a more comprehensive research plan for theirspecific project and carrying out that plan throughout the 2020-2021 academic year.Students completed a pre-survey at the start of the project and a mid-project survey shortly afterthe winter break. The surveys combined project specific skills questions as well as relevantquestions from the Undergraduate Research Student Self-Assessment (URSSA), an NSF-fundedassessment tool to measure
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, IGERT, and I3 grants for the National Science Foun- dation. She is an Extension Services Consultant to the National Center for Women & Information Tech- nology and has helped more than a dozen universities increase recruiting and retention of women in their technology programs with data driven methods and evaluation support. Four of her clients are NCWIT NEXT Award winners for the Extension Services outcomes they achieved. Michelle has an M.A. in Applied Behavioral Sciences with Human Factors specialization. Her research interests include the eval- uation of STEM projects and programs, diversity studies, strategic planning, and data visualization. c American Society for Engineering
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
browsing capabilities via TOR (The Onion Router), LAMP (Linux, Apache, MySQL, PHPor Python or Perl) server, Virtual Private Network (VPN) server, and protected browsing viaproxy service. The main goal of this educational project is to leverage the total holisticintegration of open source hardware and software to provide an affordable and portable solutionthat could be promptly deployed in case of an emergency, as a part of an incident response plan(IRP), or in case it is needed for testing purposes. Implementing this project provides valuablehands-on security experience and best practices in network architecture and configuration.Additional security features, both in hardware and software, were added to the single-boardcomputers to add additional
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiaoyan Gong, Institute of Smart Education, Qingdao Academy of Intelligent Industries. ; Liang Zhao, Faculty of Information Technology, Beijing University of Technology; RenHao Tang, Faculty of Information Technology, Beijing University of Technology; YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology; Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy of Sciences; Jian He, Faculty of Information Technology, Beijing University of Technology; Fei-Yue Wang, National Key Laboratory of Management and Control for Complex Systems, Chinese Academy of Sciences; Ying Tang, Rowan University; Wanruo Shi, Beijing Normal University; Xiaojie Niu, Beijing Normal University; Xinzhu Wang, Beijing Normal University
Tagged Divisions
Computing and Information Technology
suggestedbyState Council in its recently released “NewGeneration Artificial Intelligence Development Plan”[2], we should “gradually carry outnational intelligent education projects, set up AI courses in primary and secondary schools,gradually promote programming education, build AI disciplines and cultivate AI talents”. Therefore, it is necessary and urgent to set up AI courses especially in primary andsecondary schools. To this end, AI education systems and related teaching systems are indis-pensable. However only few AI education equipment are available at market such as ChengXiaoben of Makeblock and Abilix’s Oculus, which are affordable programming educationrobots learning systems, integrating more than 10 electronic modules such as sound sensors
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rendong Bai, Eastern Kentucky University; Wutthigrai Boonsuk, Eastern Illinois University; Peter P. Liu
Tagged Divisions
Computing and Information Technology
the race of building ultimatelyautonomous vehicles. In this paper, we conduct a study on self-driving technology. Autonomouscars offer many benefits. The primary benefit is that they reduce accidents and save lives. Therehas been a long history of developing self-driving cars, from Stanford Cart in 1961 to Tesla andGoogle at present. The differences between Tesla and Google are mainly in two areas, computervision technology and human car control. Self-driving is challenging and requires a wide rangeof technologies, including learning the environment, tracking objects, localization, path planning, 1and control. We illustrate finding lane lines with computer vision and predicting the location
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Bonnie Achee, Southeastern Louisiana University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-week on-campus experience. In the successof the first year, expansion, to include a satellite campus, was planned for year two. This wasnever realized due to COVID-19.The summer 2020 delivery and curriculum was redesigned two short months before delivery.The decision was made to offer a much abbreviated online version of the camp, whilemaintaining the maximum capacity. Through a partnership with cyber.org, curriculum wasselected and a virtual capture-the-flag was offered. The capture-the-flag competition served topromote participation in the recruitment activities. Through the use of pre and post tests, datawas collected as to familiarity with the university, the Department of Computer Science degreeofferings, job opportunities in the field
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Divisions
Computing and Information Technology
responsiblefor conducting selection of scholarship recipients, ensuring that recipients understood theirobligations to the program, assigning mentors, meeting with students regularly, and monitoringtheir progress. LEAP Scholar Selection CriteriaStudents were selected based on the following criteria: 1) U.S. Citizen or Permanent Resident. 2) Must be admitted in a four-year Computer Science program at UVU or a two-year Pre- Engineering program at UVU with the plan to transfer into an Engineering four-year program. 3) Demonstration of financial need in accordance with the U.S. Department of Education rules for Federal financial aid. 4) Full-time student majoring in Computer Science, Computer Engineering, Software
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Zhen Wu, University of Colorado, Boulder; Christopher Lynnly Hovey, University of Colorado, Boulder; Leisa D. Thompson, University of Virginia
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
ofthe economy, from scientific investigation and engineering to finance, health, and nationalsecurity, demands a high quality professional computing workforce that includes the meaningfulparticipation of diverse perspectives and experiences. These perspectives and experiencesinform how personnel approach and solve a wide variety of difficult problems. Computingoccupations and degree programs, however, struggle with generating gender diversity. In 2015,only 18 percent of computing bachelor’s degree recipients were women, despite womencomprising 57 percent of bachelor’s degree recipients across disciplines [1]. Embeddingevidence-based interventions in a strategic plan is an effective approach to increasingenrollments and ultimately attaining
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
more comfortable participating in computing activities beyond the classroom. Thetechnical practice was immediately useful for some students as described below: It has shown me how to use python and wireshark and even do some web dev. I plan to make my own website using some of this knowledge. I also appreciate learning so much material that I never even knew, now CS is not as intimidating Learned python and got experience using libraries that are crazy, and it helped refamiliarize me with git & git bash. I actually contributed to a GitHub repository because I felt somewhat confident. Been a few weeks now and there aren’t any comments bashing it! :D I have joined more CS activities like the Web
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
experience with online courses. We weresomewhat prepared when there was a need to move F2F courses to online courses as thepandemic started in early 2020.In spring 2020, fall 2020 and spring 2021, all undergraduate F2F courses in our department weremoved online to reduce the potential spread of COVID-19 infections. For DE students, thechanges in course delivery were relatively small. For many F2F students, taking all coursesonline was neither expected nor planned when they came to this college. Both F2F and DEstudents were also facing additional challenges and stressors, physically, mentally, andfinancially. It is important to find a way to make the online transition as seamless as possible.3. STRATEGIES OF MOVING COURSES ONLINEIn the classes I
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Deng Cao, Central State University; Cadance Lowell, Central State University; Augustus Morris, Central State University
Tagged Divisions
Computing and Information Technology
itis open source, relatively easy to use, and can be implemented on different platforms. Thedeliverable of the project is a real-time image classifier that can work as a PC program oran android App.2.2. Proposal Phase: Since TensorFlow is mostly written in Python, a brief introductionof Python is presented in the classroom, followed by the introduction to deep learning andCNN. The instructor then demonstrates how to install TensorFlow on Windows. Eachstudent is asked to submit a proposal to identify the classes he or she plans to work on. Thestudent also need to justify why the chosen classes are important and a software applicationshould be created to automatically classify them. The proposal is reviewed by acomprehensive face-to-face
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Uma Kannan; Rajendran Swamidurai, Alabama State University
Tagged Divisions
Computing and Information Technology
to grow 41% inthe U.S., and 89% worldwide to effectively defend organizations’ critical assets. DespiteCOVID-19 and economic pressures, organizations’ plans to increase cybersecurity staffing overthe next 12 months remain consistent with previous years [10]. The (ISC)2 report also indicatesthat 49% of their survey respondents expect their organizations to hire more cybersecurityprofessionals within the next year [10]. Despite a huge demand for cyber security personnel theindustry is facing great challenges to hire sufficient, qualified security personnel and retain them.The global cybersecurity skill gap in 2020 is about 3.1 million [10]. Due to this cybersecuritystaff shortage 69% of the ISACA (Information Systems Audit and Control
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Justin Daniel Josey, Robert Morris University; Sushil Acharya, Robert Morris University
Tagged Divisions
Computing and Information Technology
Software Industry. His teaching involvement and research interest are in the area of Software Engineering education, Software Verification & Validation, Software Security, Data Mining, Neural Networks, and Enterprise Resource Planning. He also has interest in Learning Objectives based Education Material Design and Development. Dr. Acharya is a co-author of ”Discrete Mathematics Applications for Information Systems Professionals” and ”Case Studies in Software Verification & Val- idation”. He is a member of Nepal Engineering Association and is also a member of ASEE and ACM. Dr. Acharya was the Principal Investigator of the 2007 HP grant for Higher Education at RMU through which he incorporated tablet PC based
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mariangely Iglesias Pena, Iowa State University; Stephen B. Gilbert, Iowa State University; Jamie Payton, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
sites based on their research projects, thereis still a need to provide new PIs with guidance on the different aspects of an REU site such asidentifying resources that can assist in recruiting women and underrepresented minorityapplicants, providing training for graduate students acting as mentors, and strategies for keepinga mentoring connection to undergraduate researchers after they return to their home institutions.Currently, REU site preparation and orientation for new PIs is a face-to-face process thatrequires careful planning and significant travel costs. The REU PI Guide, a set of web-basedresources at https://www.vrac.iastate.edu/cise-reu-pi-resources/, was developed to share bestpractices of experienced PIs and build capacity within
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Mohsen M. Dorodchi, University of North Carolina at Charlotte; Alexandria Benedict, University of North Carolina at Charlotte; Audrey Rorrer; David K. Pugalee, University of North Carolina at Charlotte; Lijuan Cao, University of North Carolina Charlotte
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
exposing students to Python. Through theexisting researcher-practitioner partnerships (RPPs), we have been providing CT professionaldevelopment for the teachers based on block programming. Furthermore, we developed andpresented the new materials in two online PDs as a short and a more detailed one in Spring andSummer of 2020 to help the teachers with planning for the 20-21 school year. Moreover, westudied how such PD would impact the teachers.Our prior study of the middle school ecosystem revealed that teachers’ needs should always bethe focal point of PDs, as there are many unmet needs for CS/CT in K-12. Our first challenge wasto provide a holistic view of programming in Python while reassuring the teachers that they areable to learn the language
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
satisfactionproblems are common problems in computer science. Furthermore, puzzles are also commonlyused in CS instructional approaches [11], [29]–[31], [59], [60]. The third problem was a shopping task, where the participants received a hypotheticalgrocery store floor plan and a shopping list. Using the given floor plan, the participants had todescribe their route for acquiring all items in the list including a gallon of milk, a jar of jam, afive-pound bag of flour, five pounds of chicken, and a bottle of fruit juice. No specific constraintwas given to the participants. At the end of this task, the participants were asked to describe theirusual shopping strategy. We believe people develop a general floor plan of their favorite stores, which