The effect of video tutorials on learning spreadsheets
Date
2010Source Title
ITiCSE '10 Proceedings of the fifteenth annual conference on Innovation and technology in computer science education
Publisher
ACM
Pages
323
Language
English
Type
Conference PaperItem Usage Stats
196
views
views
133
downloads
downloads
Abstract
In this study a video tutorial for spreadsheet use (Excel) will be prepared by two undergraduate students by using a recorder and applied on a group of students to understand how effective this kind of a tutorial is to increase student achievement. Copyright 2010 ACM.
Keywords
Computer-assisted instructionIndependent learning
Instructional technology
Spreadsheet (Excel)
Student achievement
Video tutorial
Computer Assisted Instruction
Independent learning
Instructional technology
Student achievement
Undergraduate students
Computer aided instruction
Computer science
Education computing
Engineering education
Engineering research
Innovation
Spreadsheets
Technology
Students
Permalink
http://hdl.handle.net/11693/28565Published Version (Please cite this version)
http://dx.doi.org/10.1145/1822090.1822200Collections
Related items
Showing items related by title, author, creator and subject.
-
Advantage of using Web 2.0 applications in class
Aydinol, Ayşe Begüm; Gültekin, Özgür (ACM, 2010)In this study the advantage of using Web 2.0 applications in terms of increasing student attention and enthusiasm will be emphasized by presenting the example of community service activities which were supported by the ... -
How to teach usage of equipments in a remote laboratory
Alparslan, N. Ceren; Özen, M.; Cağiltay, N. E.; Aydın, E. (IEEE, 2007-09)European Remote Radio Laboratory (ERRL) is an e-learning project for students, teachers and technicians of the universities who will use the very important devices of this laboratory remotely. These devices are very expensive ... -
G-free: Defeating return-oriented programming through gadget-less binaries
Onarlıoğlu, Kaan; Bilge, L.; Lanzi, A.; Balzarotti, D.; Kirda, E. (ACM, 2010-12)Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of ...