In introductory computer programming courses, students experience a range of emotions. Students often experience anxiety and frustration when they encounter difficulties in writing programs. Continued frustration can ...
详细信息
In introductory computer programming courses, students experience a range of emotions. Students often experience anxiety and frustration when they encounter difficulties in writing programs. Continued frustration can discourage students from pursuing engineering and computing careers. Although prior research has shown how emotions affect students' motivation and learning, little is known about students' emotions in programming courses. In this qualitative study of first-year engineering students taking an introductory programming course, we examined the emotions that these students experienced during programming tasks and the reasons for experiencing those emotions. Our study was grounded in the control-value theory of achievement emotions. Each research participant came to two laboratory sessions: a programming session and a retrospective think-aloud interview session. In the programming session, each participant worked individually on programming problems. We collected screen capture, biometrics, and survey responses. In the interview session, each participant watched a video of their actions during the programming session. After every 2 minutes of viewing, the participants reported the emotions that they had experienced during this 2-minute period. We performed a thematic analysis of the interview data. Our results indicate that the participants experienced frustration most frequently. Sometimes they experienced multiple emotions. For example, one participant felt annoyed because she had made a mistake, but she felt joy and pride when she fixed the mistake. To promote student learning, educators should take students' emotions into account in the design of curriculum and pedagogy for introductory programming courses.
This article contains the text of the speech given by the author at the Boston Museum on the occasion of BYTE's 10th Anniversary celebration. The author expresses his opinion that the construction of computer prog...
详细信息
This article contains the text of the speech given by the author at the Boston Museum on the occasion of BYTE's 10th Anniversary celebration. The author expresses his opinion that the construction of computer programs is a mathematical activity like the solution of differential equations, that programs can be derived from their specifications through mathematical insight, calculations, and proof, using algebraic laws as simple and elegant as those of elementary arithmetic. The author claims that such methods of program construction promise benefits in specifications, systems software, safety-critical programs, silicon design, and standards.
We announce the release of kSNP3.0, a program for SNP identification and phylogenetic analysis without genome alignment or the requirement for reference genomes. kSNP3.0 is a significantly improved version of kSNP v2.
We announce the release of kSNP3.0, a program for SNP identification and phylogenetic analysis without genome alignment or the requirement for reference genomes. kSNP3.0 is a significantly improved version of kSNP v2.
The 1409 EPROM Programmer connects to one of the computer's RS-232C ports. It is configured as 'data terminal equipment', which means that a null-modem cable will be required for connection to most microco...
详细信息
The 1409 EPROM Programmer connects to one of the computer's RS-232C ports. It is configured as 'data terminal equipment', which means that a null-modem cable will be required for connection to most microcomputers. The EPROM programmer controls the RTS (ready to send) and DTR (data terminal ready) lines to indicate when an overflow condition is imminent. The host computer can monitor these signal lines to control transmission flow or can watch for the XOFF and XON signals for the same purpose. The host computer can also control the output of the programmer with the CTS (clear to send) line. As long as this signal line is held in a high state, the 1409 will continue to output data.
Methods for estimating reliability parameters from the error detection rates are described. The accuracy of the estimators and its dependence on the number of errors is discussed.
Methods for estimating reliability parameters from the error detection rates are described. The accuracy of the estimators and its dependence on the number of errors is discussed.
In response to a need for some objective measures for software, particularly ″quality″ , complexity measures have been experimented with. Preliminary results have shown that high run detection and correction times c...
详细信息
In response to a need for some objective measures for software, particularly ″quality″ , complexity measures have been experimented with. Preliminary results have shown that high run detection and correction times correspond to programs with ″high″ complexity. Although somewhat limited in scope, these metrics have proven useful in scheduling testing effort and for forecasting reliability and maintainability requirements. Two useful, and easy to compute, metrics have been found very effective in a software test environment. The effect of these measures in generating a test strategy is described.
Mobile computers have the potential to provide a new array of location-based services to drivers as they travel around. The predestination algorithm predicts a driver's destination based on both general trends, su...
详细信息
Mobile computers have the potential to provide a new array of location-based services to drivers as they travel around. The predestination algorithm predicts a driver's destination based on both general trends, such as the likelihood that people will choose various types of destinations, and personalized data such as a list of previously visited locations. We designed the algorithm to run on a vehicle's navigation system and learn a driver's habits based on logged GPS measurements. Predictions about destination can be an important component of ubiquitous computing, and we hope that such predictions might one day enhance the provision of information and services to people as they move through the world
The applications presented here are derived from the matrix multiplication method. As in the previous articles, Lotus 1-2-3, Version 1A is used on the IBM-PC with 544K of RAM, as the basis of our experiments, Section ...
详细信息
The applications presented here are derived from the matrix multiplication method. As in the previous articles, Lotus 1-2-3, Version 1A is used on the IBM-PC with 544K of RAM, as the basis of our experiments, Section II briefly explains, how the spreadsheet copy command can be used to multiply two matrices when only one element of the product matrix is formulated. The same technique is then applied in Section III, in which a power series approximation of the inverse of the Input-Output matrix (I-A), where I is the identity matrix and A is a matrix with elements which are non-negative fractions, is obtained. Similarly, Section IV shows the implementation of the Gauss-Jacobi and Gauss-Seidel iterative methods of finding the inverse of any non-singular matrix. Lastly, the power method for finding the dominant characteristic root and its associated characteristic vector is implemented on the spreadsheet using the same spreadsheet method. The article concludes with some remarks on the built-in commands of matrix multiplication which were made available recently in the new version (2. 0) of Lotus 1-2-3. Refs.
Finite-state techniques are applied to the specification of the control portion of a program. A language, an implementation representation, and an optimization are described.
Finite-state techniques are applied to the specification of the control portion of a program. A language, an implementation representation, and an optimization are described.
暂无评论