Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu
Theses: Doctorates and Masters
Malicious executable code is nothing new. While many consider that the concept of malicious code began in the 1980s when the first PC viruses began to emerge, the concept does in fact date back even earlier. Throughout the history of malicious code, methods of hostile code delivery have mirrored prevailing patterns of code distribution. In the 1980s, file infecting and boot sector viruses were common, mirroring the fact that during this time, executable code was commonly transferred via floppy disks. Since the 1990s email has been a major vector for malicious code attacks. Again, this mirrors the fact that during …
Development, Implementation And Evaluation Of An Interactive Multimedia Instructional Model : A Teaching And Learning Programming Approach, Kacha Chansilp
Development, Implementation And Evaluation Of An Interactive Multimedia Instructional Model : A Teaching And Learning Programming Approach, Kacha Chansilp
Theses: Doctorates and Masters
This study sought to explore the outcomes from the use of a dynamic interactive visualisation tool among novice programmers in an introductory computer programming course. The proposed model, Dynamic Interactive Visualisation Tool in Teaching C (DIVTIC), was designed to use multimedia and visual imagery to provide learners with a step-by-step representation of program execution in the C language as a means of enhancing their understanding of programming structures and concepts. DIVTIC was designed to support constructivist learning principles and combined collaborative and visualisation learning strategies with use of the Internet and the World Wide Web to support the learning of …