A guideline for the planning and system requirement determination of a computer based educational system
Johnson, Harry Wayne
Hayes, John R.
MetadataShow full item record
The objective of this thesis research was to create a guideline that can be followed to plan and determine the system requirements of a computer based educational system. The principle users of this report will be those commands that may not have personnel trained in computer management but desire to investigate the possibility of augmenting or replacing current traditional educational methods. Current advancements in computer technology and production processes have made even the smallest of commands potential users of the computer to ensure more effective and efficient personnel training and education. Computer Based Education (CBE) is at the forefront of this advancing technology of computers and possesses the potential to improve individual learning rates and comprehension, but only if the proper system is developed. Guidance for CBE system development is presented in this thesis.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
DiMiceli, John A. (1986-09);A computer-controlled data acquisition and analysis system was designed, built and tested. All of the required elements of a complete data acquisition system were assembled, including transducers, amplifiers, signal ...
The translation of data structure representations of simple queuing problems into GPSS programs and English text. McGee, Robert Thomas (Monterey, California. Naval Postgraduate School, 1971-06);One of the goals of computer technology is to have the ability to communicate with the computer in a natural language such as English. A research effort underway at the Naval Postgraduate School involves the design and ...
Graham, Scott W.; Mills, Stephen E. (Monterey, California. Naval Postgraduate School, 1999-09-01);Many computer security policies are written relatively vaguely. In many ways this is intentional to allow for easier access to all the functionality of the computer network. However, too much leeway allows users, without ...