This book was developed in an attempt to maintain in one location …
This book was developed in an attempt to maintain in one location the information and references that point to the many important historical developments of the short life of the computer graphics world as we know it.
This course analyzes issues associated with the implementation of higher-level programming languages. …
This course analyzes issues associated with the implementation of higher-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, the interaction of theory and practice, and using tools in building software. The course includes a multi-person project on compiler design and implementation.
6.035 is a course within the department's "Computer Systems and Architecture" concentration. …
6.035 is a course within the department's "Computer Systems and Architecture" concentration. This course analyzes issues associated with the implementation of high-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, basic program optimization techniques, the interaction of theory and practice, and using tools in building software. The course features a multi-person project on design and implementation of a compiler that is written in Java® and generates MIPS executable machine code. This course is worth 8 Engineering Design Points. This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5502 (Computer Language Engineering).
This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), …
This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), apply these concepts to computer networks, and amplify the theory with hands-on aspects of configuring and using secure networks. Topics include: review of networking concepts, general security concepts, user authentication and authorization, encryption, network attacks (including hacking, viruses, worms and denial of service) and network protection. Defense tools including firewalls, Virtual Private Networks (VPNs), and filters will be discussed in depth, as they relate to effective and safe e-commerce and other applications in the real world. Case studies along with projects will be assigned and performed.
This open textbook aims to fill the gap between the open-source implementations …
This open textbook aims to fill the gap between the open-source implementations and the open-source network specifications by providing a detailed but pedagogical description of the key principles that guide the operation of the Internet.
Suppose you want to build a computer network, one that has the …
Suppose you want to build a computer network, one that has the potential to grow to global proportions and to support applications as diverse as teleconferencing, video on demand, electronic commerce, distributed computing, and digital libraries. What available technologies would serve as the underlying building blocks, and what kind of software architecture would you design to integrate these building blocks into an effective communication service? Answering this question is the overriding goal of this book—to describe the available building materials and then to show how they can be used to construct a network from the ground up.
For all intents and purposes, this show is the fourth edition of …
For all intents and purposes, this show is the fourth edition of the textbook Computer Organization and Design Fundamentals by David Tarnoff. Since the first edition came out in 2005, the PDFs have been made free for download to anyone interested in computer organization. With the trend toward audio and video instructional material, it was time for an update.
The presentation of the material in this series will be similar to that of the original textbook. In the first third, we will discuss the mathematical foundation and design tools that address the digital nature of computers. This will include an introduction to the differences between the physical world and the digital world, how those differences affect the way the computer represents and manipulates data, and the use and design of digital logic and logic gates. In the second third, the fundamentals of the digital logic and design will be used to design common circuits such as binary adders, describe checksums and cyclic redundancy checks, network addressing, storage devices, and state machines. The final third will examine the top-level view of the computer. This will include a discussion of the memory hierarchy and its components, the components of a CPU, and maybe even a discussion of assembly language along with some examples.
While this version of CS210-text has references that may be specific to …
While this version of CS210-text has references that may be specific to University of Oregon, we invite instructors at other Oregon colleges and universities to fork and customize it to their needs.
In this syllabus from Fall 2022, Dr. J. David Fleig provides a …
In this syllabus from Fall 2022, Dr. J. David Fleig provides a list of chapters from two OER textbooks. Course topics include: Introduction to Databases; Remote Lab/SQL Server; Database Design/ER Model; Relational Models; Single table queries; Sorting and Aggregation; Subqueries; Multi-table queries; Joins, unions, and more; Primary and Foreign Keys; Create, Alter, & Drop tables; Insert, Update, Delete rows; Table Constraints; Normalization; Views and Temp Tables; From Problem to Design; From Design to Tables; Cursors and Indexes; No-SQL Databases
This textbook covers the traditional introductory Computer Science I topics but takes …
This textbook covers the traditional introductory Computer Science I topics but takes a unique approach. Topics are covered in a language-agnostic manner in the first part with supplemental parts that cover the same concepts in a specific language. The current version covers C, Java, and PHP. This textbook as been used in several Computer Science I sections over multiple years at the University of Nebraska-Lincoln.
The midterm represents the final week of working in Word. You will …
The midterm represents the final week of working in Word. You will be asked to complete documents that demonstrate that you understand basic rules and best practices to ensure your online research is reliable as well as demonstrate skill in the proper use of Word features covered during the first 5 weeks of the course.
Skills & Knowledge Attained: *Time management – You were asked to think about your midterm topic in week 1 and declare it in a post in week 2 and given several weeks to prepare and do the necessary research. Research document should demonstrate the time provided was used to spread out the work so that it was not done in a rush and/or at the last minute. *Best practices on how to check a website for accuracy and truth as well as appropriateness as research source. *Proper application of MLA requirements using Microsoft Word Reference features, such as adding footnotes, citations, and generating a bibliography from correctly added citations as well as placement and content of appropriate header and footer. *The paper should be an original piece of writing based on properly cited online research, that demonstrates understanding of the topic researched and should explain in your own words, using proper spelling and grammar, what you have learned about your chosen topic.
This class covers topics on the engineering of computer software and hardware …
This class covers topics on the engineering of computer software and hardware systems. Topics include techniques for controlling complexity; strong modularity using client-server design, operating systems; performance, networks; naming; security and privacy; fault-tolerant systems, atomicity and coordination of concurrent activities, and recovery; impact of computer systems on society.
The text, labs, and review questions in this book are designed as …
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security (cybersecurity). With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
Word Count: 42351 (Note: This resource's metadata has been created automatically by …
Word Count: 42351
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Word Count: 17425 (Note: This resource's metadata has been created automatically by …
Word Count: 17425
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This course is designed to familiarize students with basic computer architecture and …
This course is designed to familiarize students with basic computer architecture and operating systems and the relationships between hardware and operating systems will be explored. A student who successfully completes this course will also be able to gain strong foundation in the core fundamentals of digital technology. Basic concepts are reinforced by exercises, and hand-on applications. Students will also program and run simple macros in Linux shell. Employability skills, such as Problem solving, Teamwork, Communications and Critical Thinking are integrated into the course work. 4 hours’ lecture. All course content created by Syeda Ferdous Arar Begum. Content added to OER Commons by Joanna Gray.
This subject is a computer-oriented introduction to probability and data analysis. It …
This subject is a computer-oriented introduction to probability and data analysis. It is designed to give students the knowledge and practical experience they need to interpret lab and field data. Basic probability concepts are introduced at the outset because they provide a systematic way to describe uncertainty. They form the basis for the analysis of quantitative data in science and engineering. The MATLAB® programming language is used to perform virtual experiments and to analyze real-world data sets, many downloaded from the web. Programming applications include display and assessment of data sets, investigation of hypotheses, and identification of possible casual relationships between variables. This is the first semester that two courses, Computing and Data Analysis for Environmental Applications (1.017) and Uncertainty in Engineering (1.010), are being jointly offered and taught as a single course.
This assignment on object-oriented programming has been crafted within the framework of …
This assignment on object-oriented programming has been crafted within the framework of Computing for Social Good in Education and Responsible Computing. It aims to integrate socially relevant elements into the core activities typically encountered in traditional Computer Science (CS) curricula. Extensive research suggests that integrating these topics throughout the traditional CS curriculum is more effective than segregating them into separate activities. The assignment has undergone refinement across multiple iterations over the years to address challenges such as accommodating students with varying abilities and motivations, catering to different learning styles, and mitigating frustration when tasks may seem overly challenging.
Manuel d'accompagnement Short Description: Ce manuel sur les principes fondamentaux de la …
Manuel d'accompagnement
Short Description: Ce manuel sur les principes fondamentaux de la recherche documentaire vise à combler des lacunes dans les compétences académiques des étudiants du premier cycle par l'amélioration de leurs connaissances en matière de maîtrise de l'information. Le contenu est conçu pour encourager les étudiants à réfléchir de manière critique à leurs besoins en information et à leurs habitudes de recherche, et pour les aider à développer des approches efficaces pour repérer et utiliser les sources d'information dans leurs parcours universitaires.
Word Count: 19265
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Host Harry Kreisler welcomes computer scientist Jaron Lanier. Lanier talks about his …
Host Harry Kreisler welcomes computer scientist Jaron Lanier. Lanier talks about his work in computer science and his work as a composer and student of music. He reflects on the implications of technology for culture and offers his assessment of how far the revolution in communications will go. (53 min)
Learn a technique for converting decimal numbers into binary numbers using just …
Learn a technique for converting decimal numbers into binary numbers using just pen, paper, and calculations. Works best for small numbers, since bigger numbers require increasingly more calculations. Created by Pamela Fox.
Collection of OER materials created for use in a computer science introductory …
Collection of OER materials created for use in a computer science introductory class, including a syllabus and 10-week schedule with projects, resources, and discussion topics. Also includes guidelines for a final project.
This document details a simple way for anyone to create an interactive …
This document details a simple way for anyone to create an interactive digital adventure game with zero programming. This activity can be done as an individual or with a team. Use a cloud-based PowerPoint program to get started (Google slides recommended).
Students create a Power Point presentation on a topic of their choice. …
Students create a Power Point presentation on a topic of their choice. Then they make this presentation into a screencast using the free program, called Jing. The students do this by narrating their Power Point using a rubric that I've provided.
CMS.611J / 6.073 Creating Video Games is a class that introduces students …
CMS.611J / 6.073 Creating Video Games is a class that introduces students to the complexities of working in small, multidisciplinary teams to develop video games. Students will learn creative design and production methods, working together in small teams to design, develop, and thoroughly test their own original digital games. Design iteration across all aspects of video game development (game design, audio design, visual aesthetics, fiction and programming) will be stressed. Students will also be required to focus test their games, and will need to support and challenge their game design decisions with appropriate focus testing and data analysis.
Strategies to Effectively Interpret and Evaluate Data Visualizations Short Description: A short …
Strategies to Effectively Interpret and Evaluate Data Visualizations
Short Description: A short course for students to increase their proficiency in analyzing and interpreting data visualizations. By completing this short course students will be able to explain the importance of data literacy, identify data visualization issues in order to improve their own skills in data story-telling. The intended outcome of this course is to help students become more discerning and critical users of data, graphs, charts and infographics.
Word Count: 9819
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This archive contains a series of lessons on cryptography suitable for use …
This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.
The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this archive.
Short Description: This book is written for the typical computer user: someone …
Short Description: This book is written for the typical computer user: someone who uses computers for day-to-day activities (browsing the web, sending/receiving email, etc.) and is interested in delving a bit deeper into some of the current technology concepts and terminology.
Long Description: This book is written for the typical computer user: someone who uses computers for day-to-day activities (browsing the web, sending/receiving email, etc.) and is interested in delving a bit deeper into some of the current technology concepts and terminology.
Word Count: 24004
ISBN: 978-1-77420-191-6
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
CurvedLand is an applet for showing what the world would look like …
CurvedLand is an applet for showing what the world would look like with different geometry. It is named CurvedLand in tribute to the science fiction novel, Flatland, by Edwin Abbott, which describes the adventures of a two-dimensional being who is visited by a stranger from the third dimension.
One of the central ideas of Einstein's theory of relativity is that space and time curve in response to the matter and energy within them. A curved space is one that doesn't obey the usual laws of Euclidean geometry: the angles of a triangle don't generally add up to 180 degrees, the circumference of a circle isn't pi times the diameter, parallel lines can either converge towards each other or move apart, and so on.
Since the geometry we observe is very close to Euclidean, however, it is hard for most of us to picture what this difference would mean physically. If you draw a circle and a diameter, how could the ratio be anything other than pi? To answer this question, imagine that as you move around in space the shapes of objects appear to distort. This is what happens in curved space. If you draw a circle around yourself and then start walking around it to pace out the circumference, it will look to you like you are walking along a constantly changing ellipse.
CurvedLand illustrates this distortion as it would appear in a two-dimensional curved space. The structure is similar to a mapping program. You can place objects of different shapes in different places in the world and then move around the space to see what they look like from different perspectives.
You may have already had to digitize a curve from an original …
You may have already had to digitize a curve from an original document in the form of an image, which is quite tedious to do by hand.
To facilitate the digitization of curves, we have created a small utility that allows you to display on the screen the previously scanned image of a graph, then to very easily record the points of the curves you are interested in (up to 2000).
This economics course provides an introduction to the field of cybersecurity through …
This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.
Systems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.
This lecture presents information about cybercrime, which has become the most ubiquitous …
This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.
This book on Cybersecurity is written for beginners. No college degree is …
This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.
It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.
Have you ever felt uneasy or even dreadful after losing a USB …
Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?
This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.
Attendees will learn about the following topics: - A brief introduction to data encryption. - A few encryption tools for a novice user. - Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB flash drive. - Pros and cons of encryption/decryption technology.
Today many small businesses benefit from QuickBooks (Desktop and Online) as a …
Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.
What can small business owners do in QuickBooks to manage these security risks?
Attendees to this webinar will learn about the following topics: - Introduce a security architectural approach to QuickBooks data protection. - Learn about the default data integrity protections built into QuickBooks. - Practice stronger authentication into QuickBooks. - Practice role-based access on QuickBooks accounting. - Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.
Presentation Time: 50 minutes plus 10 minutes on Q&A.
Back in May 2021 a cyber-attack known as ransomware shut down the …
Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems. Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks? Attendees will learn about the following topics: • Background on ransomware. • Current state-of-the-art Information Technology against ransomware. • A risk-based protection strategy. • Practical tools & tips against ransomware.
The Payment Card Industry (PCI) has created an industry-wide digital security standard. …
The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
Topics to be covered include:
- What is PCI/credit card data security? - Why do small businesses need to plan for PCI security compliance? - Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider and website hosting service provider. - IT audit requirements and stages for PCI compliance.
Presentation Time: 50 minutes plus 10 minutes Q&A. Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a …
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).
Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
Topics to be covered include: - What are the business requirements for HIPAA security? - What stages of IT audit do small businesses need to plan for HIPAA security compliance? - What technology and tools can be used to protect HIPAA-related data and to assure compliance?
Presentation Time: 50 minutes plus 10 minutes Q&A.
The lecture presents information about how the Internet works so students studying …
The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.
Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the …
Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams.
DASHlink is a virtual laboratory for scientists and engineers to disseminate results …
DASHlink is a virtual laboratory for scientists and engineers to disseminate results and collaborate on research problems in health management technologies for aeronautics systems. Managed by the Integrated Vehicle Health Management project within NASA's Aviation Safety program, the Web site is designed to be a resource for anyone interested in data mining, IVHM, aeronautics and NASA.
A Document Type Definition (DTD) defines the structure and the legal elements …
A Document Type Definition (DTD) defines the structure and the legal elements and attributes of an XML document. A DTD can be declared inside an XML document or in an external file.
Short Description: Innocent trends may foreshadow a grimmer future. You may wonder …
Short Description: Innocent trends may foreshadow a grimmer future. You may wonder why the title refers to pleasures. If you have read Huxley's Brave New World, you may understand how pleasures can be motors of control and manipulation, which makes them dangerous.
Long Description: Canceling” and calling out appear as the struggle against the opposite world views. I invite you to look at this cultural phenomenon from an economic perspective that outlines the social stakes of its practice. This book will encourage you to consider the unintended consequences of cancel culture and question its reliability as a tool of activism.
Word Count: 24104
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: Data analytics is a rapidly evolving field. In today's labour …
Short Description: Data analytics is a rapidly evolving field. In today's labour market, knowing how to acquire, process, and interpret large amounts of data to make optimal decisions is crucial for many professionals, especially those in business and engineering. This open textbook, "a new online course" if you will, focuses on three key concept areas: data acquisition, data processing, and decision-making models. In this course, students will be able to develop advanced knowledge and skills to acquire related data for operations of business or projects; apply quantitative literacy skills such as statistics and machine learning; and use predictive or prescriptive modeling to make timely, actionable, and meaningful decisions.
Long Description: Data analytics is a rapidly evolving field. In today’s labour market, knowing how to acquire, process, and interpret large amounts of data to make optimal decisions is crucial for many professionals, especially those in business and engineering. This open textbook, “a new online course” if you will, focuses on three key concept areas: data acquisition, data processing, and decision-making models. In this course, students will be able to develop advanced knowledge and skills to acquire related data for operations of business or projects; apply quantitative literacy skills such as statistics and machine learning; and use predictive or prescriptive modeling to make timely, actionable, and meaningful decisions.
Word Count: 2054
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: Data analytics is a rapidly evolving field. In today's labour …
Short Description: Data analytics is a rapidly evolving field. In today's labour market, knowing how to acquire, process, and interpret large amounts of data to make optimal decisions is crucial for many professionals, especially those in business and engineering. This open textbook, "a new online course" if you will, focuses on three key concept areas: data acquisition, data processing, and decision-making models. In this course, students will be able to develop advanced knowledge and skills to acquire related data for operations of business or projects; apply quantitative literacy skills such as statistics and machine learning; and use predictive or prescriptive modeling to make timely, actionable, and meaningful decisions.
Long Description: Data analytics is a rapidly evolving field. In today’s labour market, knowing how to acquire, process, and interpret large amounts of data to make optimal decisions is crucial for many professionals, especially those in business and engineering. This open textbook, “a new online course” if you will, focuses on three key concept areas: data acquisition, data processing, and decision-making models. In this course, students will be able to develop advanced knowledge and skills to acquire related data for operations of business or projects; apply quantitative literacy skills such as statistics and machine learning; and use predictive or prescriptive modeling to make timely, actionable, and meaningful decisions.
Word Count: 2038
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Beta Version Word Count: 92165 ISBN: 979-8-88895-422-5 (Note: This resource's metadata has …
Beta Version
Word Count: 92165
ISBN: 979-8-88895-422-5
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
The A2DataDive assembled representatives from nonprofit organizations, U-M statistics and data sciences …
The A2DataDive assembled representatives from nonprofit organizations, U-M statistics and data sciences departments, and members of the community to collectively address the data analysis and visualization needs for area nonprofits and local organizations. Open.Michigan was one of the organizers of the A2DataDive, and worked with two School of Information graduate students to scope and implement the event. After identifying two organizations who had data needs:ŰÖFocus HopeŰÖand theŰÖAfrican Health OER Network, this joint community/university datadive took place over a weekend in February 2012 in North Quads space 2435, an adaptable space especially suited to collaborative, participatory work. The A2DataDive was a successful proof-of-concept for a joint collaboration between an academic institution and local organizations and businesses, and demonstrated that sharing skills and expertise to address a need is also a great way to help others.
This is a desktop application for visualization of data with convenient plotting …
This is a desktop application for visualization of data with convenient plotting functions. It is intended for educational/scientific use and teaching data analysis skills such as aggregation, merging data and getting statistics. Though the program has a spreadsheet like interface, the focus is on data manipulation with very configurable 2D/3D plotting rather than data entry. Though basic cell editing and row/column changes are supported. The program is open source., licensed under the GPL. This program is suitable for use by secondary school and third level students wishing to learn about data manipulation and advanced plotting.
A Claremont Graduate University EDUC 448 Fall 2021 Course Publication Short Description: …
A Claremont Graduate University EDUC 448 Fall 2021 Course Publication
Short Description: This glossary is intended to support professionals who are seeking to understand Data Management and Governance in the context of K-12 and higher education. The definitions included in this ebook provide a fundamental understanding of common Data Management and Governance terms. This glossary was co-created by education professionals and graduate students enrolled in Claremont Graduate University’s EDUC 448: Data Management & Governance course taught by Dr. Gwen Garrison, PhD during the Fall 2021 semester.
Word Count: 2578
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Network analysis is one of the four pillars of computational humanities, along …
Network analysis is one of the four pillars of computational humanities, along with geographic, text, and image analysis. Participants in this course will receive a broad overview of networks as they’re applied to humanities problems.
Word Count: 6664 Included H5P activities: 11 (Note: This resource's metadata has …
Word Count: 6664
Included H5P activities: 11
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Cleaning, reshaping, and transforming data for analysis and visualization, with R and …
Cleaning, reshaping, and transforming data for analysis and visualization, with R and the Tidyverse
Word Count: 3515
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: Database Design - 2nd Edition covers database systems and database …
Short Description: Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
Long Description: This second edition of Database Design book covers the concepts used in database systems and the database design process. Topics include: The history of databases Characteristics and benefits of databases Data models Data modelling Classification of database management systems Integrity rules and constraints Functional dependencies Normalization Database development process
Word Count: 30650
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Database Design - 2nd Edition covers database systems and database design concepts. …
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
Database Security is the utmost key part for any type of database, …
Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.
This course relies on primary readings from the database community to introduce …
This course relies on primary readings from the database community to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, query optimization, and transactions. It is designed for students who have taken 6.033 (or equivalent); no prior database experience is assumed, though students who have taken an undergraduate course in databases are encouraged to attend.
This course relies on primary readings from the database community to introduce …
This course relies on primary readings from the database community to introduce graduate/undergraduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, query optimization, transactions, and other more advanced topics. No prior database experience is assumed, though students who have taken an undergraduate course in databases are encouraged to attend.
This Lecturer notes explain data warehousing architecture design and how it is …
This Lecturer notes explain data warehousing architecture design and how it is implemented using oracle. The main objective of lecture notes is student can print and use in easier way.
Review how the decimal number system works before diving into the binary …
Review how the decimal number system works before diving into the binary number system. The decimal number system and binary number system work the same way; the only difference is what each digit represents (0-9 versus 0/1). Created by Pamela Fox.
***This resource is published by Cassie Kozyrhov.Cassie is Head of Decision Intelligence at …
***This resource is published by Cassie Kozyrhov.Cassie is Head of Decision Intelligence at Google and this is her video channel. It provides short video clips on stats, AI, data, and decision science. May serve as a supplemental resource.
Foundations and philosophical applications of Bayesian decision theory, game theory and theory …
Foundations and philosophical applications of Bayesian decision theory, game theory and theory of collective choice. Why should degrees of belief be probabilities? Is it always rational to maximize expected utility? If so, why and what is its utility? What is a solution to a game? What does a game-theoretic solution concept such as Nash equilibrium say about how rational players will, or should, act in a game? How are the values and the actions of groups, institutions and societies related to the values and actions of the individuals that constitute them?
This resource is a video abstract of a research paper created by …
This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:
"A new study from the Max Planck Institute for Human Development unveils the deep bodily connections that can form among choir singers Researchers tracked different physiological variables as a choir sung and used algorithms to uncover connections between them Aside from a blending of voices, they found that choir singers’ heart rates and breathing patterns sync up when performing as a group This merging was coupled to the vocalization patterns of the singers The conductor’s hand movements also caused a shared physiological response among the singers In essence, the work suggests that a choir can be considered a type of coherent physiological entity… or, as the researchers suggest, a superorganism Viktor Müller, Julia A.M. Delius, Ulman Lindenberger. Complex networks emerging during choir singing..."
The rest of the transcript, along with a link to the research itself, is available on the resource itself.
Pharo is a clean, innovative, open-source, live-programming environment. Deep into Pharois the …
Pharo is a clean, innovative, open-source, live-programming environment.
Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.
You will explore the language with chapters on exceptions, blocks, small integers, and floats.
You will discover tools such as profilers, Metacello and Gofer.
Digital Suppression and Cryptographic Defense of Social Movements Short Description: Defend Dissent …
Digital Suppression and Cryptographic Defense of Social Movements
Short Description: Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s. This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next. También disponible en Español Data dashboard
Word Count: 67802
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: Deleting Dystopia confirms that the existential threats posed by the …
Short Description: Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.
Long Description: The IT revolution has brought many surprises. Among them is the fact that intensive surveillance and the related abuse of personal data have fallen into the hands of powerful digital oligarchies. Accounts of the increasingly repressive uses of advanced technologies and the subsequent ‘dumbing down’ of entire populations cast dark shadows over future prospects that are beginning to look increasingly dystopian.
Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.
Word Count: 53352
ISBN: 978-0-6487698-7-3
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Delftse Foundations of Computation is a textbook for a one quarter introductory …
Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.
Delftse Foundations of Computation is a textbook for a one quarter introductory …
Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.
The resource described is a guide for individual research scholars in machine …
The resource described is a guide for individual research scholars in machine learning who want to create open educational materials for the public. It provides tips and recommendations on how to develop effective educational materials for machine learning, including starting with the basics, providing examples, using interactive tools, focusing on practical applications, emphasizing ethics and social responsibility, and providing additional resources. The goal of this resource is to help research scholars in machine learning to share their knowledge with a broader audience and contribute to the democratization of knowledge in the field.
This is an intermediate algorithms course with an emphasis on teaching techniques …
This is an intermediate algorithms course with an emphasis on teaching techniques for the design and analysis of efficient algorithms, emphasizing methods of application. Topics include divide-and-conquer, randomization, dynamic programming, greedy algorithms, incremental improvement, complexity, and cryptography.
Techniques for the design and analysis of efficient algorithms, emphasizing methods useful …
Techniques for the design and analysis of efficient algorithms, emphasizing methods useful in practice. Topics include sorting; search trees, heaps, and hashing; divide-and-conquer; dynamic programming; greedy algorithms; amortized analysis; graph algorithms; and shortest paths. Advanced topics may include network flow, computational geometry, number-theoretic algorithms, polynomial and matrix calculations, caching, and parallel computing.
This material introduces Linux File System structures and demonstrates how to use …
This material introduces Linux File System structures and demonstrates how to use commands to communicate with the operating system through a Terminal program. Basic program structures and system() function of Perl are discussed. A brief introduction to gene-sequencing terminology and file formats are given.
This material introduces the AWS console interface, describes how to create an …
This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided, connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to enter the data folder, which includes gene-sequencing input files and print the first five line of each file remotely. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.
This manual guides the instructor to combine the partial files of the …
This manual guides the instructor to combine the partial files of the virtual machine image and construct sequencer.ova file. It is accompanied by the partial files of the virtual machine image.
This material briefly reintroduces the DNA double Helix structure, explains SNP and …
This material briefly reintroduces the DNA double Helix structure, explains SNP and INDEL mutations in genes and describes FASTA, FASTQ, BAM and VCF file formats. It also explains the index creation, alignment, sorting, marking duplicates and variant calling steps of a simple preprocessing workflow and how to write a Perl script to automate the execution of these steps on a Virtual Machine Image.
This material introduces the AWS console interface, describes how to create an …
This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided and connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to automate the tasks to create VCF files from two different sample genomes belonging to E.coli microorganisms by using the FASTA and FASTQ files in the input folder of the virtual machine. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.
Short Description: This book touches on design thinking, virtual reality, and 3D …
Short Description: This book touches on design thinking, virtual reality, and 3D printing, and their applications in our world.
Long Description: This book offers a blend of theory and practice in guiding readers to apply design thinking principles to solving some of our world’s biggest problems. At the same time, readers are encouraged to become aware of new and emerging technologies that make prototyping and applying solutions a reality.
Word Count: 38787
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
The book offers a blend of theory and practice in guiding readers …
The book offers a blend of theory and practice in guiding readers to apply design thinking principles to solving some of our world’s biggest problems. At the same time, readers are encouraged to become aware of new and emerging technologies that make prototyping and applying solutions a reality.
This course covers the complete cycle of designing an ocean system using …
This course covers the complete cycle of designing an ocean system using computational design tools for the conceptual and preliminary design stages. Students complete the projects in teams with each student responsible for a specific subsystem. Lectures cover such topics as hydrodynamics; structures; power and thermal aspects of ocean vehicles; environment, materials, and construction for ocean use; and generation and evaluation of design alternatives. The course focuses on innovative design concepts chosen from high-speed ships, submersibles, autonomous vehicles, and floating and submerged deep-water offshore platforms. Lectures on ethics in engineering practice are included, and instruction and practice in oral and written communication is provided.
These are a set of fictional case studies that are designed to …
These are a set of fictional case studies that are designed to prompt reflection and discussion about issues at the intersection of AI and Ethics. These case studies were developed out of an interdisciplinary workshop series at Princeton University that began in 2017-18. They are the product of a research collaboration between the University Center for Human Values (UCHV) and the Center for Information Technology Policy (CITP) at Princeton. Click the title of each case study to download the full document.
Une introduction à la recherche informationnelle à l'Université de l'Alberta Short Description: …
Une introduction à la recherche informationnelle à l'Université de l'Alberta
Short Description: Le but de ce manuel est de vous donner les connaissances de base nécessaires pour commencer à rechercher des informations en utilisant le catalogue et les bases de données de la bibliothèque de l’Université d’Alberta. Le manuel contient des instructions étape par étape, des vidéos et des exemples en sciences humaines et sociales. Pour atteindre les objectifs prévus, il vous faudra passer au moins une heure et demie à lire les instructions du didacticiel, répondre aux questions des exercices et revoir les exemples chaque fois que cela sera nécessaire.
Long Description: This tutorial allows the learner to formulate a research question based on a humanities and social sciences topic, locate the full text of journal or book titles in the University of Alberta library, and ” identify references to inform your research question (s) using databases such as ERIC, Érudit and PsycInfo. A chapter is devoted to information evaluation and citation in APA format.
Word Count: 4828
ISBN: 978-1-55195-453-0
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
7e édition Short Description: Le didacticiel du style de citation APA est …
7e édition
Short Description: Le didacticiel du style de citation APA est créé par le personnel de la bibliothèque de l'Université de l'Alberta pour venir en aide aux étudiants et aux professeurs. Le didacticiel explique pourquoi il est important de se servir de citations, des éléments relatifs à diverses sources courantes et comment créer des références et des citations dans le texte d’après les directives de la 7e édition du guide de l’APA. Une lecture assidue d'au moins une heure et demie est nécessaire pour atteindre les objectifs d'apprentissage. Ce didacticiel peut également servir de ressource de référence.
Long Description: A l’origine le APA Citation Style Tutorial , sur lequel ce didacticiel est basé, a été créé par le personnel de la bibliothèque de l’Université de l’Alberta pour soutenir les étudiants et les professeurs dans les cours EDU 100/300 de la faculté d’éducation de l’Université de l’Alberta. Le didacticiel explique pourquoi il est important d’utiliser des citations, des éléments de types de source courants et comment créer des références et des citations dans le texte sur la base des directives APA de la 7e édition. Les sources et les activités tout au long du didacticiel se concentrent sur le contenu éducatif. Ce didacticiel peut également être utilisé comme ressource de référence. Le tutoriel de citation de style APA est une adaptation des didacticiels d’introduction à la APA de la NorQuest College Library. Ils ont fourni des ressources et un appui pour la création de ce didacticiel.
Word Count: 4261
ISBN: 978-1-55195-452-3
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.