Developing a Concept Inventory for Computer Science 2: What should it focus on and what makes it challenging?

Lea Wittie, Anastasia Kurdia, Judy Peng, James Kelly, Meriel Huggard

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

This Work-In-Progress Research Paper reports on an international study that is being undertaken in order to develop a validated concept inventory for the second introductory computer science course (CS2).A concept inventory is a research-based multiple-choice test that measures a student's knowledge of a set of concepts while also capturing conceptions and misconceptions they may have about the topic under consideration. Development of a concept inventory for a course requires identifying course topics that are both difficult and important. This paper details how the Delphi method is being used to develop a concept inventory for CS2; in particular, it focuses on the initial process of identifying the set of topics that should be covered by a concept inventory for CS2.

Original languageEnglish (US)
Title of host publication2020 IEEE Frontiers in Education Conference, FIE 2020 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728189611
DOIs
StatePublished - Oct 21 2020
Event2020 IEEE Frontiers in Education Conference, FIE 2020 - Uppsala, Sweden
Duration: Oct 21 2020Oct 24 2020

Publication series

NameProceedings - Frontiers in Education Conference, FIE
Volume2020-October
ISSN (Print)1539-4565

Conference

Conference2020 IEEE Frontiers in Education Conference, FIE 2020
Country/TerritorySweden
CityUppsala
Period10/21/2010/24/20

Keywords

  • Assessment
  • CS2
  • Computer Science 2
  • Concept inventory
  • Delphi method

ASJC Scopus subject areas

  • Software
  • Education
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Developing a Concept Inventory for Computer Science 2: What should it focus on and what makes it challenging?'. Together they form a unique fingerprint.

Cite this