- Page 3 and 4:
Aalto University publication series
- Page 5:
Abstract Aalto University, P.O. Box
- Page 9 and 10:
Acknowledgements Lauri Malmi first
- Page 11 and 12:
4.5.3 Some effects of cognitive loa
- Page 13 and 14:
13.1.2 It is simple to watch an ani
- Page 15 and 16:
18.2.3 We saw a few pedagogically i
- Page 17 and 18:
11.16 PlanAni .....................
- Page 19 and 20:
Chapter 1 Here is How to Make Sense
- Page 21 and 22:
On research traditions Each researc
- Page 23:
The thesis should ideally be read f
- Page 26 and 27:
Introduction to Part I Introductory
- Page 28 and 29:
Figure 2.1: Bloom’s taxonomy of l
- Page 30 and 31:
2.2 The SOLO taxonomy sorts learnin
- Page 32 and 33:
2.2.3 The expected outcomes of prog
- Page 34 and 35:
Multi-institutional studies In the
- Page 36 and 37:
3.3 But many students do not learn
- Page 38 and 39:
long-term, action research study of
- Page 40 and 41:
Introduction to Part II What is inv
- Page 42 and 43:
Figure 4.1: A commonly used basic a
- Page 44 and 45:
play a decisive role in how and whe
- Page 46 and 47:
cognitive psychology also sought to
- Page 48 and 49:
terms for the two meanings. Followi
- Page 50 and 51:
It suggests that the growth of expe
- Page 52 and 53:
work (because of lack of motivation
- Page 54 and 55:
The effect of prior knowledge: the
- Page 56 and 57:
“writing a computer program is le
- Page 58 and 59:
model of program comprehension to o
- Page 60 and 61:
Chapter 5 Psychologists Also Say: W
- Page 62 and 63:
• are commonly deficient in a num
- Page 64 and 65:
expert stage. De Kleer and Brown ch
- Page 66 and 67:
5.3 Teachers employ conceptual mode
- Page 68 and 69:
Not only are there different notion
- Page 70 and 71:
the computer can carry out deductio
- Page 72 and 73:
Therefore: teach early and teach lo
- Page 74 and 75:
epresentation of a complex program
- Page 76 and 77:
A reasonable description of this fo
- Page 78 and 79:
are “somewhat contrary to the cla
- Page 80 and 81:
memory storage (see, e.g., Greeno,
- Page 82 and 83:
Chapter 6 Constructivists Say: Know
- Page 84 and 85:
Figure 6.1: A classification of con
- Page 86 and 87:
Social constructivist reasoning tak
- Page 88 and 89:
Figure 6.2: A radical destructivist
- Page 90 and 91:
certainly fall under the broad usag
- Page 92 and 93:
in the eyes of the members of the c
- Page 94 and 95:
of proper design, coding style, req
- Page 96 and 97:
In any particular course you will b
- Page 98 and 99:
precedes construction. Therefore, c
- Page 100 and 101:
Skirmish 7: minimal guidance pedago
- Page 102 and 103:
Chapter 7 Phenomenographers Say: Le
- Page 104 and 105:
the phenomenon. An individual’s e
- Page 106 and 107:
(Bowden and Marton, 2004). A way of
- Page 108 and 109:
The answer is none in particular, w
- Page 110 and 111:
Table 7.3: Different ways of experi
- Page 112 and 113:
7.6 Phenomenography has not escaped
- Page 114 and 115:
outcome spaces describe both the st
- Page 116 and 117:
Figure 8.1: Views from three tradit
- Page 118 and 119:
There is substantial agreement betw
- Page 120 and 121:
• it may mark boundaries in ‘co
- Page 122 and 123:
Telling TCs apart from other conten
- Page 124 and 125:
et al., 2007). The latter was later
- Page 127 and 128:
Part III Teaching Introductory Prog
- Page 129 and 130:
Chapter 10 CS1 is Taught in Many Wa
- Page 131 and 132:
it and right from the beginning. So
- Page 133 and 134:
10.1.3 Guidance mediates complexity
- Page 135 and 136:
10.2 Some approaches foster schema
- Page 137 and 138:
Many CS1 teachers have come up with
- Page 139 and 140:
Vagianou (2006) observes that a wea
- Page 141 and 142:
Figure 10.6: A view of Anchor Garde
- Page 143 and 144:
impressions of computing matter and
- Page 145 and 146:
The paradigm shift There is anecdot
- Page 147 and 148:
notional machines. Sajaniemi and Ku
- Page 149 and 150:
Program visualization vs. algorithm
- Page 151 and 152:
Figure 11.2: A part of Kelleher and
- Page 153 and 154:
aspects can play a decisive part in
- Page 155 and 156:
Table 11.1: The original engagement
- Page 157 and 158:
The 2DET The engagement taxonomy of
- Page 159 and 160:
Given content means that the learne
- Page 161 and 162:
Table 11.5: A summary of selected p
- Page 163 and 164:
Figure 11.4: The PyDev debugger for
- Page 165 and 166:
Figure 11.6: DynaLab executing a To
- Page 167 and 168:
Figure 11.10: The user has just com
- Page 169 and 170:
Figure 11.11: Korsh and Sangwan’s
- Page 171 and 172:
Figure 11.14: JIVE displays various
- Page 173 and 174:
Figure 11.16: PlanAni executing a P
- Page 175 and 176:
Figure 11.18: A snapshot of a Java
- Page 177 and 178:
Figure 11.19: Jeliot 3 executing a
- Page 179 and 180:
Figure 11.21: The Teaching Machine
- Page 181 and 182:
students used VIP in the way intend
- Page 183 and 184:
Python in the browser: Jype and the
- Page 185 and 186:
11.3.3 A few systems make the stude
- Page 187 and 188:
Figure 11.31: Students interact wit
- Page 189 and 190:
Online Tutoring System Kollmansberg
- Page 191 and 192:
Figure 11.36: A “Clouds & Boxes
- Page 193:
Table 11.7: Experimental evaluation
- Page 196 and 197:
Introduction to Part IV We have now
- Page 198 and 199:
An example Here is a short Python c
- Page 200 and 201:
Chapter 13 The UUhistle System Faci
- Page 202 and 203:
194 Figure 13.1: An animation of a
- Page 204 and 205:
Figure 13.2: The between-step stage
- Page 206 and 207:
Figure 13.4: UUhistle highlights a
- Page 208 and 209:
Figure 13.7: UUhistle’s interacti
- Page 210 and 211:
13.4 Teachers can turn examples int
- Page 212 and 213:
Add another +, then the literal 1.
- Page 214 and 215:
Figure 13.11: The user has created
- Page 216 and 217:
Figure 13.14: A VPS assignment in t
- Page 218 and 219:
Figure 13.16: A visual algorithm si
- Page 220 and 221:
Chapter 14 Visual Program Simulatio
- Page 222 and 223:
the individual instructions of the
- Page 224 and 225:
Visual program simulation seeks to
- Page 226 and 227:
14.2.2 VPS exercises can have eleme
- Page 228 and 229:
features prominently in many progra
- Page 230 and 231:
too, later decided to develop a sof
- Page 232 and 233:
The easiest examples for a programm
- Page 234 and 235:
may be necessary; at the very least
- Page 236 and 237:
Figure 14.1 continued M. H. van Emd
- Page 238 and 239:
integration of new material with pr
- Page 240 and 241:
The system designer vs. excessive d
- Page 242 and 243:
Level 3 By allowing what’s wrong.
- Page 244 and 245:
about this mistake to the user in a
- Page 246 and 247:
Table 15.1: Cognitive dimensions of
- Page 248 and 249:
parts that deal with different stag
- Page 250 and 251:
Error-proneness A VPS exercise in U
- Page 252 and 253:
something that resides ‘within th
- Page 254 and 255:
evidence. Like the documentation of
- Page 256 and 257:
Introduction to Part V Reflecting o
- Page 258 and 259:
launched for sharing (e.g., Fincher
- Page 260 and 261:
elatively independent of the resear
- Page 262 and 263:
There are values that are internal
- Page 264 and 265:
• Authenticity is an abstraction
- Page 266 and 267:
• Triangulation: triangulation of
- Page 268 and 269:
Each assignment was worth a number
- Page 270 and 271:
Figure 16.1: The earlier version of
- Page 272 and 273:
Chapter 17 Students Perceive Visual
- Page 274 and 275:
Figure 17.1: The phenomenographic r
- Page 276 and 277:
Figure 17.4: The structure of human
- Page 278 and 279:
Figure 17.5: The structure of aware
- Page 280 and 281:
further note the importance of esta
- Page 282 and 283:
Whichever variant of the analysis p
- Page 284 and 285:
Different phenomenographers define
- Page 286 and 287:
choose what to do?”, “What does
- Page 288 and 289:
We sought to form an outcome space
- Page 290 and 291:
17.4.1 A: VPS is perceived as learn
- Page 292 and 293:
17.4.2 B: VPS is perceived as learn
- Page 294 and 295:
Interviewer 2 : Can you describe ho
- Page 296 and 297:
17.4.5 E: VPS is perceived as learn
- Page 298 and 299:
through VPS is perceived as learnin
- Page 300 and 301:
Table 17.2: Qualitatively different
- Page 302 and 303:
what the phenomenon is in reality,
- Page 304 and 305: the students develop a sophisticate
- Page 306 and 307: involve VPS). 17 • The teacher us
- Page 308 and 309: thought about the dynamics of VPS.
- Page 310 and 311: solve the assignments using the ani
- Page 312 and 313: Table 18.1: Types of information us
- Page 314 and 315: As they start to work on the first
- Page 316 and 317: print third second = third As they
- Page 318 and 319: Elizabeth: And. . . So the function
- Page 320 and 321: Otto: “True”. . . And then we g
- Page 322 and 323: The pair fail to accommodate refere
- Page 324 and 325: Parameter passing was the only topi
- Page 326 and 327: 18.3 We have some quantitative resu
- Page 328 and 329: and the student searches for meanin
- Page 330 and 331: in Section 18.2.4 is a step in this
- Page 332 and 333: Chapter 19 UUhistle Helps Students
- Page 334 and 335: • The supervising research assist
- Page 336 and 337: Table 19.1: Improvement from ‘non
- Page 338 and 339: - attempts to make variables get th
- Page 340 and 341: to predict program behaviors better
- Page 342 and 343: • The use of programs with a doma
- Page 344 and 345: in the course more generally, not o
- Page 346 and 347: Good both as an idea and in functio
- Page 348 and 349: In many cases the UUhistle assignme
- Page 350 and 351: Boredom and excessive detail A fair
- Page 352 and 353: A handful of students suggested tha
- Page 356 and 357: Introduction to Part VI In Parts I,
- Page 358 and 359: as an important component of introd
- Page 360 and 361: 21.5 The contribution of the thesis
- Page 362 and 363: the picture is hardly complete. Fut
- Page 365 and 366: Part VII Appendices 357
- Page 367 and 368: On Table A.1 In Table A.1, topics o
- Page 369 and 370: Table A.1 continued No. Topic Descr
- Page 371 and 372: Table A.1 continued No. Topic Descr
- Page 373 and 374: Table A.1 continued No. Topic Descr
- Page 375 and 376: Table A.1 continued No. Topic Descr
- Page 377 and 378: Appendix B Example Programs from Co
- Page 379 and 380: Assignment 4.1 (animation) def gree
- Page 381 and 382: def refuel(self, liters): actually_
- Page 383 and 384: Appendix C Example Programs from Ex
- Page 385 and 386: Q4 (pretest and post-test) def tral
- Page 387 and 388: Already now, and especially in the
- Page 389 and 390: Appendix E Statement of the Author
- Page 391 and 392: Anderson, J. R., Conrad, F. G., and
- Page 393 and 394: Bennedsen, J. and Schulte, C. (2006
- Page 395 and 396: Bower, M. (2008). A Taxonomy of Tas
- Page 397 and 398: Clancy, M. (2004). Misconceptions a
- Page 399 and 400: Dönmez, O. and İnceoğlu, M. M. (
- Page 401 and 402: Fleury, A. E. (1991). Parameter Pas
- Page 403 and 404: Green, T. R. G. and Petre, M. (1996
- Page 405 and 406:
Hundhausen, C. D. (2002). Integrati
- Page 407 and 408:
Karavirta, V. (n.d.). XAAL: eXtensi
- Page 409 and 410:
Kumar, A. N. (2005). Results from t
- Page 411 and 412:
Lister, R. and Leaney, J. (2003). I
- Page 413 and 414:
Mayer, R. E. and Alexander, P. A. (
- Page 415 and 416:
Myller, N. and Bednarik, R. (2006).
- Page 417 and 418:
Pashler, H., McDaniel, M., Rohrer,
- Page 419 and 420:
Proulx, V. K. and Cashorali, T. (20
- Page 421 and 422:
Rossy de Brito, S., Silva, A. S., d
- Page 423 and 424:
Schumacher, R. M. (1987). Acquisiti
- Page 425 and 426:
Smith, P. A. and Webb, G. I. (2000)
- Page 427 and 428:
Thompson, E. (2008). How Do They Un
- Page 429 and 430:
von Glasersfeld, E. (1998). Why Con
- Page 432:
9HSTFMG*aegcfj+