Updating search results...

Search Resources

1527 Results

View
Selected filters:
  • Computer Science
  • College / Upper Division
  • Community College / Lower Division
Computer Graphics and Computer Animation: A Retrospective Overview
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This book was developed in an attempt to maintain in one location the information and references that point to the many important historical developments of the short life of the computer graphics world as we know it.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Ohio State University
Provider Set:
Pressbooks
Date Added:
01/14/2019
Computer Language Engineering
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course analyzes issues associated with the implementation of higher-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, the interaction of theory and practice, and using tools in building software. The course includes a multi-person project on compiler design and implementation.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Amarasinghe, Saman
Rinard, Martin
Date Added:
02/01/2010
Computer Language Engineering (SMA 5502)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.035 is a course within the department's "Computer Systems and Architecture" concentration. This course analyzes issues associated with the implementation of high-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, basic program optimization techniques, the interaction of theory and practice, and using tools in building software. The course features a multi-person project on design and implementation of a compiler that is written in Java® and generates MIPS executable machine code. This course is worth 8 Engineering Design Points.
This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5502 (Computer Language Engineering).

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Amarasinghe, Saman
Rinard, Martin
Date Added:
09/01/2005
Computer Network Security
Unrestricted Use
CC BY
Rating
0.0 stars

This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), apply these concepts to computer networks, and amplify the theory with hands-on aspects of configuring and using secure networks. Topics include: review of networking concepts, general security concepts, user authentication and authorization, encryption, network attacks (including hacking, viruses, worms and denial of service) and network protection. Defense tools including firewalls, Virtual Private Networks (VPNs), and filters will be discussed in depth, as they relate to effective and safe e-commerce and other applications in the real world. Case studies along with projects will be assigned and performed.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
Middlesex Community College
Author:
Ryan Fried
Date Added:
05/13/2019
Computer Networking: Principles, Protocols and Practice
Unrestricted Use
CC BY
Rating
0.0 stars

This open textbook aims to fill the gap between the open-source implementations and the open-source network specifications by providing a detailed but pedagogical description of the key principles that guide the operation of the Internet.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
The Saylor Foundation
Provider Set:
Saylor Textbooks
Author:
Olivier Bonaventure
Date Added:
03/06/2012
Computer Networks: A Systems Approach
Unrestricted Use
CC BY
Rating
0.0 stars

Suppose you want to build a computer network, one that has the potential to grow to global proportions and to support applications as diverse as teleconferencing, video on demand, electronic commerce, distributed computing, and digital libraries. What available technologies would serve as the underlying building blocks, and what kind of software architecture would you design to integrate these building blocks into an effective communication service? Answering this question is the overriding goal of this book—to describe the available building materials and then to show how they can be used to construct a network from the ground up.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Bruce Davie
Larry Peterson
Date Added:
09/12/2019
Computer Organization and Design Fundamentals Series
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

For all intents and purposes, this show is the fourth edition of the textbook Computer Organization and Design Fundamentals by David Tarnoff. Since the first edition came out in 2005, the PDFs have been made free for download to anyone interested in computer organization. With the trend toward audio and video instructional material, it was time for an update.

The presentation of the material in this series will be similar to that of the original textbook. In the first third, we will discuss the mathematical foundation and design tools that address the digital nature of computers. This will include an introduction to the differences between the physical world and the digital world, how those differences affect the way the computer represents and manipulates data, and the use and design of digital logic and logic gates. In the second third, the fundamentals of the digital logic and design will be used to design common circuits such as binary adders, describe checksums and cyclic redundancy checks, network addressing, storage devices, and state machines. The final third will examine the top-level view of the computer. This will include a discussion of the memory hierarchy and its components, the components of a CPU, and maybe even a discussion of assembly language along with some examples.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
East Tennessee State University
Author:
David Tarnoff
Date Added:
05/14/2021
Computer Science 210
Unrestricted Use
CC BY
Rating
0.0 stars

While this version of CS210-text has references that may be specific to University of Oregon, we invite instructors at other Oregon colleges and universities to fork and customize it to their needs.

Subject:
Applied Science
Computer Science
Material Type:
Lecture Notes
Teaching/Learning Strategy
Provider:
University of Oregon
Author:
Michal Young
Date Added:
11/04/2022
Computer Science 221: Database Design and Management Syllabus
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

In this syllabus from Fall 2022, Dr. J. David Fleig provides a list of chapters from two OER textbooks. Course topics include: Introduction to Databases; Remote Lab/SQL Server; Database Design/ER Model; Relational Models; Single table queries; Sorting and Aggregation; Subqueries; Multi-table queries; Joins, unions, and more; Primary and Foreign Keys; Create, Alter, & Drop tables; Insert, Update, Delete rows; Table Constraints; Normalization; Views and Temp Tables; From Problem to Design; From Design to Tables; Cursors and Indexes; No-SQL Databases

Subject:
Applied Science
Computer Science
Material Type:
Syllabus
Provider:
University of Wisconsin Green Bay
Author:
J. David Fleig
Date Added:
03/27/2024
Computer Science I - Version 1.3.7
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This textbook covers the traditional introductory Computer Science I topics but takes a unique approach. Topics are covered in a language-agnostic manner in the first part with supplemental parts that cover the same concepts in a specific language. The current version covers C, Java, and PHP. This textbook as been used in several Computer Science I sections over multiple years at the University of Nebraska-Lincoln.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Chris Bourke
Date Added:
11/18/2021
Computer Science Midterm Paper
Unrestricted Use
CC BY
Rating
0.0 stars

The midterm represents the final week of working in Word. You will be asked to complete documents that demonstrate that you understand basic rules and best practices to ensure your online research is reliable as well as demonstrate skill in the proper use of Word features covered during the first 5 weeks of the course.

Skills & Knowledge Attained:
*Time management – You were asked to think about your midterm topic in week 1 and declare it in a post in week 2 and given several weeks to prepare and do the necessary research. Research document should demonstrate the time provided was used to spread out the work so that it was not done in a rush and/or at the last minute.
*Best practices on how to check a website for accuracy and truth as well as appropriateness as research source.
*Proper application of MLA requirements using Microsoft Word Reference features, such as adding footnotes, citations, and generating a bibliography from correctly added citations as well as placement and content of appropriate header and footer.
*The paper should be an original piece of writing based on properly cited online research, that demonstrates understanding of the topic researched and should explain in your own words, using proper spelling and grammar, what you have learned about your chosen topic.

Subject:
Applied Science
Computer Science
Material Type:
Homework/Assignment
Module
Author:
Maria Julia Sorrentino
Date Added:
03/28/2022
Computer System Engineering
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This class covers topics on the engineering of computer software and hardware systems. Topics include techniques for controlling complexity; strong modularity using client-server design, operating systems; performance, networks; naming; security and privacy; fault-tolerant systems, atomicity and coordination of concurrent activities, and recovery; impact of computer systems on society.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
LaCurts, Katrina
Date Added:
02/01/2018
Computer Systems Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security (cybersecurity). With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Activity/Lab
Homework/Assignment
Syllabus
Textbook
Author:
Ryan Tolboom
Date Added:
03/01/2023
Computer Usage and Applications
Unrestricted Use
CC BY
Rating
0.0 stars

Word Count: 42351

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Maricopa Millions Grant
Author:
Abigail Rusu
Aleta Butler
Jessica Parsons
Date Added:
02/10/2022
Computers and Criminal Justice
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Word Count: 17425

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Social Science
Material Type:
Textbook
Provider:
College of DuPage
Author:
Eric Ramirez-Thompson
Date Added:
08/25/2021
Computing System Fundamentals
Unrestricted Use
CC BY
Rating
0.0 stars

This course is designed to familiarize students with basic computer architecture and operating systems and the relationships between hardware and operating systems will be explored. A student who successfully completes this course will also be able to gain strong foundation in the core fundamentals of digital technology. Basic concepts are reinforced by exercises, and hand-on applications. Students will also program and run simple macros in Linux shell. Employability skills, such as Problem solving, Teamwork, Communications and Critical Thinking are integrated into the course work.
4 hours’ lecture.
All course content created by Syeda Ferdous Arar Begum. Content added to OER Commons by Joanna Gray.

Subject:
Applied Science
Computer Science
Material Type:
Reading
Syllabus
Provider:
Middlesex Community College
Date Added:
05/07/2019
Computing and Data Analysis for Environmental Applications
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This subject is a computer-oriented introduction to probability and data analysis. It is designed to give students the knowledge and practical experience they need to interpret lab and field data. Basic probability concepts are introduced at the outset because they provide a systematic way to describe uncertainty. They form the basis for the analysis of quantitative data in science and engineering. The MATLAB® programming language is used to perform virtual experiments and to analyze real-world data sets, many downloaded from the web. Programming applications include display and assessment of data sets, investigation of hypotheses, and identification of possible casual relationships between variables. This is the first semester that two courses, Computing and Data Analysis for Environmental Applications (1.017) and Uncertainty in Engineering (1.010), are being jointly offered and taught as a single course.

Subject:
Applied Science
Computer Science
Engineering
Environmental Science
Mathematics
Statistics and Probability
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
McLaughlin, Dennis
Date Added:
09/01/2003
Computing the ecological footprints - OO design and programming
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This assignment on object-oriented programming has been crafted within the framework of Computing for Social Good in Education and Responsible Computing. It aims to integrate socially relevant elements into the core activities typically encountered in traditional Computer Science (CS) curricula. Extensive research suggests that integrating these topics throughout the traditional CS curriculum is more effective than segregating them into separate activities. The assignment has undergone refinement across multiple iterations over the years to address challenges such as accommodating students with varying abilities and motivations, catering to different learning styles, and mitigating frustration when tasks may seem overly challenging.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Assessment
Lesson Plan
Teaching/Learning Strategy
Author:
Renato Cortinovis
Date Added:
03/01/2024
Compétences informationnelles: Principes fondamentaux
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Manuel d'accompagnement

Short Description:
Ce manuel sur les principes fondamentaux de la recherche documentaire vise à combler des lacunes dans les compétences académiques des étudiants du premier cycle par l'amélioration de leurs connaissances en matière de maîtrise de l'information. Le contenu est conçu pour encourager les étudiants à réfléchir de manière critique à leurs besoins en information et à leurs habitudes de recherche, et pour les aider à développer des approches efficaces pour repérer et utiliser les sources d'information dans leurs parcours universitaires.

Word Count: 19265

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Date Added:
05/16/2022
Contents Home   Bookshelves   Computer Science   Operating Systems   Linux - The Penguin Marches On (McClanahan) Linux - The Penguin Marches On
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This course and its materials follow the CompTIA Linux+ curriculum and prepares students for that certification.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
LibreTexts
Author:
Patrick McClanahan
Date Added:
12/05/2022
Conversations with History: Culture and Technology, with Jaron Lanier
Read the Fine Print
Rating
0.0 stars

Host Harry Kreisler welcomes computer scientist Jaron Lanier. Lanier talks about his work in computer science and his work as a composer and student of music. He reflects on the implications of technology for culture and offers his assessment of how far the revolution in communications will go. (53 min)

Subject:
Applied Science
Arts and Humanities
Computer Science
Material Type:
Lecture
Provider:
UCTV Teacher's Pet
Date Added:
03/14/2010
Converting decimal numbers to binary
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Learn a technique for converting decimal numbers into binary numbers using just pen, paper, and calculations. Works best for small numbers, since bigger numbers require increasingly more calculations. Created by Pamela Fox.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Pamela Fox
Date Added:
07/14/2021
Course Materials and Syllabus for CS 162: Introduction to Computer Science II
Unrestricted Use
CC BY
Rating
0.0 stars

Collection of OER materials created for use in a computer science introductory class, including a syllabus and 10-week schedule with projects, resources, and discussion topics. Also includes guidelines for a final project.

Subject:
Applied Science
Computer Science
Material Type:
Syllabus
Provider:
Open Oregon
Author:
Joseph I. Jess
Date Added:
03/29/2024
Create an Interactive Story Game (Using Google Slides)
Unrestricted Use
CC BY
Rating
0.0 stars

This document details a simple way for anyone to create an interactive digital adventure game with zero programming. This activity can be done as an individual or with a team. Use a cloud-based PowerPoint program to get started (Google slides recommended).  

Subject:
Computer Science
Graphic Arts
Literature
Material Type:
Activity/Lab
Game
Lesson
Author:
John Whitfield
Date Added:
07/31/2020
Create a screencast
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students create a Power Point presentation on a topic of their choice. Then they make this presentation into a screencast using the free program, called Jing. The students do this by narrating their Power Point using a rubric that I've provided.

Subject:
Applied Science
Computer Science
Education
Material Type:
Activity/Lab
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Author:
Amy Hochberg
Date Added:
01/20/2023
Creating Video Games
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

CMS.611J / 6.073 Creating Video Games is a class that introduces students to the complexities of working in small, multidisciplinary teams to develop video games. Students will learn creative design and production methods, working together in small teams to design, develop, and thoroughly test their own original digital games. Design iteration across all aspects of video game development (game design, audio design, visual aesthetics, fiction and programming) will be stressed. Students will also be required to focus test their games, and will need to support and challenge their game design decisions with appropriate focus testing and data analysis.

Subject:
Applied Science
Arts and Humanities
Business and Communication
Career and Technical Education
Computer Science
Engineering
Graphic Arts
Graphic Design
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Eberhardt, Richard
Grant, Andrew
Tan, Philip
Verrilli, Sara
Date Added:
09/01/2014
C++ reference
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

A complete online reference for the C and C++ languages and standard libraries, i.e. a more convenient version of the C and C++ standards.

Subject:
Applied Science
Computer Science
Material Type:
Reading
Author:
Various
Date Added:
12/13/2022
Critical Data Literacy
Unrestricted Use
CC BY
Rating
0.0 stars

Strategies to Effectively Interpret and Evaluate Data Visualizations

Short Description:
A short course for students to increase their proficiency in analyzing and interpreting data visualizations. By completing this short course students will be able to explain the importance of data literacy, identify data visualization issues in order to improve their own skills in data story-telling. The intended outcome of this course is to help students become more discerning and critical users of data, graphs, charts and infographics.

Word Count: 9819

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Toronto Metropolitan University
Date Added:
02/28/2022
Cryptography Module" by Hunter R. Johnson
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.

The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this archive.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
John Jay College of Criminal Justice
Author:
Johnson Hunter R
Date Added:
06/04/2019
Current & Emerging Computing Technology
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
This book is written for the typical computer user: someone who uses computers for day-to-day activities (browsing the web, sending/receiving email, etc.) and is interested in delving a bit deeper into some of the current technology concepts and terminology.

Long Description:
This book is written for the typical computer user: someone who uses computers for day-to-day activities (browsing the web, sending/receiving email, etc.) and is interested in delving a bit deeper into some of the current technology concepts and terminology.

Word Count: 24004

ISBN: 978-1-77420-191-6

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Business and Communication
Communication
Computer Science
Material Type:
Textbook
Provider:
BCcampus
Date Added:
10/05/2022
CurvedLand: An Applet to Simulate Curved Space
Unrestricted Use
CC BY
Rating
0.0 stars

CurvedLand is an applet for showing what the world would look like with different geometry. It is named CurvedLand in tribute to the science fiction novel, Flatland, by Edwin Abbott, which describes the adventures of a two-dimensional being who is visited by a stranger from the third dimension.

One of the central ideas of Einstein's theory of relativity is that space and time curve in response to the matter and energy within them. A curved space is one that doesn't obey the usual laws of Euclidean geometry: the angles of a triangle don't generally add up to 180 degrees, the circumference of a circle isn't pi times the diameter, parallel lines can either converge towards each other or move apart, and so on.

Since the geometry we observe is very close to Euclidean, however, it is hard for most of us to picture what this difference would mean physically. If you draw a circle and a diameter, how could the ratio be anything other than pi? To answer this question, imagine that as you move around in space the shapes of objects appear to distort. This is what happens in curved space. If you draw a circle around yourself and then start walking around it to pace out the circumference, it will look to you like you are walking along a constantly changing ellipse.

CurvedLand illustrates this distortion as it would appear in a two-dimensional curved space. The structure is similar to a mapping program. You can place objects of different shapes in different places in the world and then move around the space to see what they look like from different perspectives.

Subject:
Applied Science
Computer Science
Geometry
Mathematics
Physical Science
Physics
Material Type:
Activity/Lab
Provider:
Smith College
Author:
Gary Felder
Stephanie Erickson
Date Added:
07/29/2020
Curve digitization package
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

You may have already had to digitize a curve from an original document in the form of an image, which is quite tedious to do by hand.

To facilitate the digitization of curves, we have created a small utility that allows you to display on the screen the previously scanned image of a graph, then to very easily record the points of the curves you are interested in (up to 2000).

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Diagram/Illustration
Homework/Assignment
Interactive
Author:
Renaud Gicquel
Date Added:
11/02/2023
Cyber Security Economics
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.

Systems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
TU Delft OpenCourseWare
Author:
Dr. Ir. Carlos Hernandez Gañán
Dr. Rainer Böhme
Dr. Tyler Moore
Prof.dr. Michel van Eeten
Prof.dr. Ross Anderson
Date Added:
08/16/2019
Cybercrime and Cyber security Techniques
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Cybersecurity Presentation Series: Part 3 Protection against Ransomware
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems.
Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks?
Attendees will learn about the following topics:
• Background on ransomware.
• Current state-of-the-art Information Technology against ransomware.
• A risk-based protection strategy.
• Practical tools & tips against ransomware.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Author:
Henry S. Teng
Date Added:
04/09/2024
Cybersecurity Presentation Series: Part 4 PCI Credit Card Data Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:

- What is PCI/credit card data security?
- Why do small businesses need to plan for PCI security compliance?
- Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider
and website hosting service provider.
- IT audit requirements and stages for PCI compliance.
 
Presentation Time: 50 minutes plus 10 minutes Q&A.
Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson
Author:
Henry S. Teng
Date Added:
04/12/2024
Cybersecurity Presentation Series: Part 5 HIPAA Healthcare Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).

Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:
- What are the business requirements for HIPAA security?
- What stages of IT audit do small businesses need to plan for HIPAA security compliance?
- What technology and tools can be used to protect HIPAA-related data and to assure compliance?
 
Presentation Time: 50 minutes plus 10 minutes Q&A.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson Plan
Author:
Henry S. Teng
Date Added:
04/13/2024
Cyber security Techniques- What Is The Internet?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cybersecurity and crime
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/14/2021
DASHlink
Unrestricted Use
Public Domain
Rating
0.0 stars

DASHlink is a virtual laboratory for scientists and engineers to disseminate results and collaborate on research problems in health management technologies for aeronautics systems. Managed by the Integrated Vehicle Health Management project within NASA's Aviation Safety program, the Web site is designed to be a resource for anyone interested in data mining, IVHM, aeronautics and NASA.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Lecture
Primary Source
Reading
Simulation
Provider:
NASA
Date Added:
07/11/2003
Dangerous Pleasures of Cancel Culture
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
Innocent trends may foreshadow a grimmer future. You may wonder why the title refers to pleasures. If you have read Huxley's Brave New World, you may understand how pleasures can be motors of control and manipulation, which makes them dangerous.

Long Description:
Canceling” and calling out appear as the struggle against the opposite world views. I invite you to look at this cultural phenomenon from an economic perspective that outlines the social stakes of its practice. This book will encourage you to consider the unintended consequences of cancel culture and question its reliability as a tool of activism.

Word Count: 24104

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Anthropology
Applied Science
Computer Science
Political Science
Social Science
Social Work
Material Type:
Textbook
Provider:
Third Culture House
Date Added:
06/10/2021
Data Analytics
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
Data analytics is a rapidly evolving field. In today's labour market, knowing how to acquire, process, and interpret large amounts of data to make optimal decisions is crucial for many professionals, especially those in business and engineering. This open textbook, "a new online course" if you will, focuses on three key concept areas: data acquisition, data processing, and decision-making models. In this course, students will be able to develop advanced knowledge and skills to acquire related data for operations of business or projects; apply quantitative literacy skills such as statistics and machine learning; and use predictive or prescriptive modeling to make timely, actionable, and meaningful decisions.

Long Description:
Data analytics is a rapidly evolving field. In today’s labour market, knowing how to acquire, process, and interpret large amounts of data to make optimal decisions is crucial for many professionals, especially those in business and engineering. This open textbook, “a new online course” if you will, focuses on three key concept areas: data acquisition, data processing, and decision-making models. In this course, students will be able to develop advanced knowledge and skills to acquire related data for operations of business or projects; apply quantitative literacy skills such as statistics and machine learning; and use predictive or prescriptive modeling to make timely, actionable, and meaningful decisions.

Word Count: 2054

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Business and Communication
Computer Science
Engineering
Information Science
Management
Mathematics
Statistics and Probability
Material Type:
Textbook
Provider:
University of Windsor
Date Added:
02/28/2022
Data Analytics and Decision Making
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
Data analytics is a rapidly evolving field. In today's labour market, knowing how to acquire, process, and interpret large amounts of data to make optimal decisions is crucial for many professionals, especially those in business and engineering. This open textbook, "a new online course" if you will, focuses on three key concept areas: data acquisition, data processing, and decision-making models. In this course, students will be able to develop advanced knowledge and skills to acquire related data for operations of business or projects; apply quantitative literacy skills such as statistics and machine learning; and use predictive or prescriptive modeling to make timely, actionable, and meaningful decisions.

Long Description:
Data analytics is a rapidly evolving field. In today’s labour market, knowing how to acquire, process, and interpret large amounts of data to make optimal decisions is crucial for many professionals, especially those in business and engineering. This open textbook, “a new online course” if you will, focuses on three key concept areas: data acquisition, data processing, and decision-making models. In this course, students will be able to develop advanced knowledge and skills to acquire related data for operations of business or projects; apply quantitative literacy skills such as statistics and machine learning; and use predictive or prescriptive modeling to make timely, actionable, and meaningful decisions.

Word Count: 2038

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Business and Communication
Computer Science
Engineering
Information Science
Management
Mathematics
Statistics and Probability
Material Type:
Textbook
Provider:
University of Windsor
Date Added:
02/28/2022
Data Analytics for Public Policy and Management
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Beta Version

Word Count: 92165

ISBN: 979-8-88895-422-5

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Business and Communication
Computer Science
Information Science
Material Type:
Textbook
Date Added:
12/27/2022
DataDive
Unrestricted Use
CC BY
Rating
0.0 stars

The A2DataDive assembled representatives from nonprofit organizations, U-M statistics and data sciences departments, and members of the community to collectively address the data analysis and visualization needs for area nonprofits and local organizations. Open.Michigan was one of the organizers of the A2DataDive, and worked with two School of Information graduate students to scope and implement the event. After identifying two organizations who had data needs:ŰÖFocus HopeŰÖand theŰÖAfrican Health OER Network, this joint community/university datadive took place over a weekend in February 2012 in North Quads space 2435, an adaptable space especially suited to collaborative, participatory work. The A2DataDive was a successful proof-of-concept for a joint collaboration between an academic institution and local organizations and businesses, and demonstrated that sharing skills and expertise to address a need is also a great way to help others.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
University of Michigan
Provider Set:
Open.Michigan
Author:
Open.Michigan
Date Added:
04/11/2012
DataExplore
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is a desktop application for visualization of data with convenient plotting functions. It is intended for educational/scientific use and teaching data analysis skills such as aggregation, merging data and getting statistics.
Though the program has a spreadsheet like interface, the focus is on data manipulation with very configurable 2D/3D plotting rather than data entry. Though basic cell editing and row/column changes are supported. The program is open source., licensed under the GPL.
This program is suitable for use by secondary school and third level students wishing to learn about data manipulation and advanced plotting.

Subject:
Applied Science
Computer Science
Material Type:
Interactive
Author:
Damien Farrell
Date Added:
02/28/2014
Data Management and Governance Glossary
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

A Claremont Graduate University EDUC 448 Fall 2021 Course Publication

Short Description:
This glossary is intended to support professionals who are seeking to understand Data Management and Governance in the context of K-12 and higher education. The definitions included in this ebook provide a fundamental understanding of common Data Management and Governance terms. This glossary was co-created by education professionals and graduate students enrolled in Claremont Graduate University’s EDUC 448: Data Management & Governance course taught by Dr. Gwen Garrison, PhD during the Fall 2021 semester.

Word Count: 2578

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Textbook
Provider:
Claremont Colleges
Date Added:
01/11/2021
Data, Math, Visualization, and Interpretation of Networks: An Introduction
Read the Fine Print
Rating
0.0 stars

Network analysis is one of the four pillars of computational humanities, along with geographic, text, and image analysis. Participants in this course will receive a broad overview of networks as they’re applied to humanities problems.

Subject:
Applied Science
Arts and Humanities
Computer Science
Material Type:
Reading
Provider:
Scott B. Weingart
Author:
Scott B. Weingart
Date Added:
07/14/2015
Data Visualization Labs
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Word Count: 6664

Included H5P activities: 11

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Date Added:
01/26/2024
Data Wrangling with R
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Cleaning, reshaping, and transforming data for analysis and visualization, with R and the Tidyverse

Word Count: 3515

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Information Science
Mathematics
Social Science
Sociology
Statistics and Probability
Material Type:
Textbook
Provider:
College of DuPage Press, 2022
Author:
Christine Monnier
Date Added:
07/13/2022
Database Design - 2nd Edition
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.

Long Description:
This second edition of Database Design book covers the concepts used in database systems and the database design process. Topics include: The history of databases Characteristics and benefits of databases Data models Data modelling Classification of database management systems Integrity rules and constraints Functional dependencies Normalization Database development process

Word Count: 30650

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Textbook
Provider:
BCcampus
Date Added:
10/24/2014
Database Design-2nd Edition
Unrestricted Use
CC BY
Rating
0.0 stars

Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
BCcampus
Provider Set:
BCcampus Open Textbooks
Author:
Adrienne Watt
Nelson Eng
Date Added:
11/26/2014
Database Security -Exercise and Case study Solution
Unrestricted Use
CC BY
Rating
0.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Case Study
Full Course
Interactive
Textbook
Unit of Study
Date Added:
04/11/2017
Database Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course relies on primary readings from the database community to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, query optimization, and transactions. It is designed for students who have taken 6.033 (or equivalent); no prior database experience is assumed, though students who have taken an undergraduate course in databases are encouraged to attend.

Subject:
Applied Science
Business and Communication
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Curino, Carlo
Madden, Samuel
Morris, Robert
Stonebraker, Michael
Date Added:
09/01/2010
Database Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course relies on primary readings from the database community to introduce graduate/undergraduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, query optimization, transactions, and other more advanced topics. No prior database experience is assumed, though students who have taken an undergraduate course in databases are encouraged to attend.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Kraska, Tim
Madden, Samuel
Date Added:
09/01/2023
The Dating Equation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Python IF-ELSE activity - "The Dating Equation" - for CS0 students. Part of the CUNY CS04All project.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
College of Staten Island
Author:
City University Of New York - Graduate Center
Domanski Robert J
Robert J Domanski
Date Added:
06/04/2019
Decimal system refresher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Review how the decimal number system works before diving into the binary number system. The decimal number system and binary number system work the same way; the only difference is what each digit represents (0-9 versus 0/1). Created by Pamela Fox.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Pamela Fox
Date Added:
07/14/2021
Decision Intelligence You Tube Page
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

***This resource is published by Cassie Kozyrhov.Cassie is Head of Decision Intelligence at Google and this is her video channel. It provides short video clips on stats, AI, data, and decision science. May serve as a supplemental resource.

Subject:
Computer Science
Educational Technology
Material Type:
Activity/Lab
Author:
Cyber Citizenship Initiative
Date Added:
08/08/2021
Decisions, Games, and Rational Choice
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Foundations and philosophical applications of Bayesian decision theory, game theory and theory of collective choice. Why should degrees of belief be probabilities? Is it always rational to maximize expected utility? If so, why and what is its utility? What is a solution to a game? What does a game-theoretic solution concept such as Nash equilibrium say about how rational players will, or should, act in a game? How are the values and the actions of groups, institutions and societies related to the values and actions of the individuals that constitute them?

Subject:
Applied Science
Arts and Humanities
Computer Science
Information Science
Mathematics
Philosophy
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Stalnaker, Robert
Date Added:
02/01/2008
The Deep Physiological Connections That Form Among Choir Singers
Unrestricted Use
CC BY
Rating
0.0 stars

This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:

"A new study from the Max Planck Institute for Human Development unveils the deep bodily connections that can form among choir singers Researchers tracked different physiological variables as a choir sung and used algorithms to uncover connections between them Aside from a blending of voices, they found that choir singers’ heart rates and breathing patterns sync up when performing as a group This merging was coupled to the vocalization patterns of the singers The conductor’s hand movements also caused a shared physiological response among the singers In essence, the work suggests that a choir can be considered a type of coherent physiological entity… or, as the researchers suggest, a superorganism Viktor Müller, Julia A.M. Delius, Ulman Lindenberger. Complex networks emerging during choir singing..."

The rest of the transcript, along with a link to the research itself, is available on the resource itself.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Reading
Provider:
Research Square
Provider Set:
Video Bytes
Date Added:
09/20/2019
Deep into Pharo
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Pharo is a clean, innovative, open-source, live-programming environment.

Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.

You will explore the language with chapters on exceptions, blocks, small integers, and floats.

You will discover tools such as profilers, Metacello and Gofer.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alexandre Bergel
Damien Cassou
Jannik Laval
Stéphane Ducasse
Date Added:
11/08/2018
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Digital Suppression and Cryptographic Defense of Social Movements

Short Description:
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s. This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next. También disponible en Español Data dashboard

Word Count: 67802

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Political Science
Social Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Glencora Borradaile
Date Added:
03/29/2021
Deleting Dystopia: Re-Asserting Human Priorities in the Age of Surveillance Capitalism
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Short Description:
Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Long Description:
The IT revolution has brought many surprises. Among them is the fact that intensive surveillance and the related abuse of personal data have fallen into the hands of powerful digital oligarchies. Accounts of the increasingly repressive uses of advanced technologies and the subsequent ‘dumbing down’ of entire populations cast dark shadows over future prospects that are beginning to look increasingly dystopian.

Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Word Count: 53352

ISBN: 978-0-6487698-7-3

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Education
Material Type:
Textbook
Provider:
University of Southern Queensland
Author:
Richard A. Slaughter
Date Added:
09/01/2021
Delftse Foundations of Computation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Delft University of Technology
Author:
Neil Yorke-Smith
Stefan Hugtenburg
Date Added:
11/01/2018
Delftse Foundations of Computation 2nd Edition
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Delft University of Technology
Author:
Neil Yorke-Smith
Stefan Hugtenburg
Date Added:
08/25/2022
Democratizing Machine Learning: Creating Open Educational Materials for the Public
Unrestricted Use
Public Domain
Rating
0.0 stars

The resource described is a guide for individual research scholars in machine learning who want to create open educational materials for the public. It provides tips and recommendations on how to develop effective educational materials for machine learning, including starting with the basics, providing examples, using interactive tools, focusing on practical applications, emphasizing ethics and social responsibility, and providing additional resources. The goal of this resource is to help research scholars in machine learning to share their knowledge with a broader audience and contribute to the democratization of knowledge in the field.

Subject:
Computer Science
Material Type:
Homework/Assignment
Author:
Aswin premnath
Date Added:
04/01/2023
Design and Analysis of Algorithms
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is an intermediate algorithms course with an emphasis on teaching techniques for the design and analysis of efficient algorithms, emphasizing methods of application. Topics include divide-and-conquer, randomization, dynamic programming, greedy algorithms, incremental improvement, complexity, and cryptography.

Subject:
Applied Science
Computer Science
Engineering
Mathematics
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Demaine, Erik
Devadas, Srini
Lynch, Nancy
Date Added:
02/01/2015
Design and Analysis of Algorithms
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Techniques for the design and analysis of efficient algorithms, emphasizing methods useful in practice. Topics include sorting; search trees, heaps, and hashing; divide-and-conquer; dynamic programming; greedy algorithms; amortized analysis; graph algorithms; and shortest paths. Advanced topics may include network flow, computational geometry, number-theoretic algorithms, polynomial and matrix calculations, caching, and parallel computing.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Moshkovitz, Dana
Tidor, Bruce
Date Added:
02/01/2012
Designing Computational Biology Workflows with Perl
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material introduces Linux File System structures and demonstrates how to use commands to communicate with the operating system through a Terminal program. Basic program structures and system() function of Perl are discussed. A brief introduction to gene-sequencing terminology and file formats are given.

Subject:
Applied Science
Computer Science
Material Type:
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Yildirim Esma
Date Added:
05/01/2019
Designing Computational Biology Workflows with Perl
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided, connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to enter the data folder, which includes gene-sequencing input files and print the first five line of each file remotely. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Date Added:
06/04/2019
Designing Computational Biology Workflows with Perl
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This manual guides the instructor to combine the partial files of the virtual machine image and construct sequencer.ova file. It is accompanied by the partial files of the virtual machine image.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Date Added:
06/04/2019
"Designing Computational Biology Workflows with Perl Part 2
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material briefly reintroduces the DNA double Helix structure, explains SNP and INDEL mutations in genes and describes FASTA, FASTQ, BAM and VCF file formats. It also explains the index creation, alignment, sorting, marking duplicates and variant calling steps of a simple preprocessing workflow and how to write a Perl script to automate the execution of these steps on a Virtual Machine Image.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Date Added:
06/04/2019
Designing Computational Biology Workflows with Perl Part 2b
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided and connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to automate the tasks to create VCF files from two different sample genomes belonging to E.coli microorganisms by using the FASTA and FASTQ files in the input folder of the virtual machine. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Date Added:
06/04/2019
Designing the Digital World
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
This book touches on design thinking, virtual reality, and 3D printing, and their applications in our world.

Long Description:
This book offers a blend of theory and practice in guiding readers to apply design thinking principles to solving some of our world’s biggest problems. At the same time, readers are encouraged to become aware of new and emerging technologies that make prototyping and applying solutions a reality.

Word Count: 38787

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Arts and Humanities
Career and Technical Education
Computer Science
Graphic Arts
Graphic Design
Visual Arts
Material Type:
Textbook
Date Added:
04/12/2021
Designing the Digital World
Unrestricted Use
CC BY
Rating
0.0 stars

The book offers a blend of theory and practice in guiding readers to apply design thinking principles to solving some of our world’s biggest problems. At the same time, readers are encouraged to become aware of new and emerging technologies that make prototyping and applying solutions a reality.

Subject:
Applied Science
Arts and Humanities
Computer Science
Information Science
Visual Arts
Material Type:
Textbook
Provider:
Open Press at NUI Galway
Author:
Eileen Kennedy
Date Added:
05/31/2021
Design of Ocean Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course covers the complete cycle of designing an ocean system using computational design tools for the conceptual and preliminary design stages. Students complete the projects in teams with each student responsible for a specific subsystem. Lectures cover such topics as hydrodynamics; structures; power and thermal aspects of ocean vehicles; environment, materials, and construction for ocean use; and generation and evaluation of design alternatives. The course focuses on innovative design concepts chosen from high-speed ships, submersibles, autonomous vehicles, and floating and submerged deep-water offshore platforms. Lectures on ethics in engineering practice are included, and instruction and practice in oral and written communication is provided.

Subject:
Applied Science
Computer Science
Engineering
Oceanography
Physical Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Chryssostomidis, Chryssostomos
Liu, Yuming
Date Added:
02/01/2011
Dialogues on AI and Ethics: Case Study PDFs
Unrestricted Use
CC BY
Rating
0.0 stars

These are a set of fictional case studies that are designed to prompt reflection and discussion about issues at the intersection of AI and Ethics. These case studies were developed out of an interdisciplinary workshop series at Princeton University that began in 2017-18. They are the product of a research collaboration between the University Center for Human Values (UCHV) and the Center for Information Technology Policy (CITP) at Princeton. Click the title of each case study to download the full document.

Subject:
Applied Science
Arts and Humanities
Business and Communication
Career and Technical Education
Computer Science
Criminal Justice
Education
Health, Medicine and Nursing
Mathematics
Philosophy
Statistics and Probability
Material Type:
Case Study
Author:
Princeton Center for Information Technology Policy
Princeton University Center for Human Values
Date Added:
04/03/2024
Didacticiel de recherche en bibliothèque pour les sciences humaines et sociales
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Une introduction à la recherche informationnelle à l'Université de l'Alberta

Short Description:
Le but de ce manuel est de vous donner les connaissances de base nécessaires pour commencer à rechercher des informations en utilisant le catalogue et les bases de données de la bibliothèque de l’Université d’Alberta. Le manuel contient des instructions étape par étape, des vidéos et des exemples en sciences humaines et sociales. Pour atteindre les objectifs prévus, il vous faudra passer au moins une heure et demie à lire les instructions du didacticiel, répondre aux questions des exercices et revoir les exemples chaque fois que cela sera nécessaire.

Long Description:
This tutorial allows the learner to formulate a research question based on a humanities and social sciences topic, locate the full text of journal or book titles in the University of Alberta library, and ” identify references to inform your research question (s) using databases such as ERIC, Érudit and PsycInfo. A chapter is devoted to information evaluation and citation in APA format.

Word Count: 4828

ISBN: 978-1-55195-453-0

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Education
Higher Education
Material Type:
Textbook
Provider:
University of Alberta
Author:
Denis Lacroix et Sarah Shaughnessy
Date Added:
08/20/2020
Didacticiel du style de citation APA
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

7e édition

Short Description:
Le didacticiel du style de citation APA est créé par le personnel de la bibliothèque de l'Université de l'Alberta pour venir en aide aux étudiants et aux professeurs. Le didacticiel explique pourquoi il est important de se servir de citations, des éléments relatifs à diverses sources courantes et comment créer des références et des citations dans le texte d’après les directives de la 7e édition du guide de l’APA. Une lecture assidue d'au moins une heure et demie est nécessaire pour atteindre les objectifs d'apprentissage. Ce didacticiel peut également servir de ressource de référence.

Long Description:
A l’origine le APA Citation Style Tutorial , sur lequel ce didacticiel est basé, a été créé par le personnel de la bibliothèque de l’Université de l’Alberta pour soutenir les étudiants et les professeurs dans les cours EDU 100/300 de la faculté d’éducation de l’Université de l’Alberta. Le didacticiel explique pourquoi il est important d’utiliser des citations, des éléments de types de source courants et comment créer des références et des citations dans le texte sur la base des directives APA de la 7e édition. Les sources et les activités tout au long du didacticiel se concentrent sur le contenu éducatif. Ce didacticiel peut également être utilisé comme ressource de référence. Le tutoriel de citation de style APA est une adaptation des didacticiels d’introduction à la APA de la NorQuest College Library. Ils ont fourni des ressources et un appui pour la création de ce didacticiel.

Word Count: 4261

ISBN: 978-1-55195-452-3

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Education
Material Type:
Textbook
Provider:
University of Alberta
Author:
Debbie Feisst
Denis Lacroix
Sarah Adams
Date Added:
04/01/2020