Updating search results...

Search Resources

323 Results

View
Selected filters:
Communication Skills: Listening Skills (PDF)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A chapter on listening skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.

Subject:
Arts and Humanities
Material Type:
Textbook
Provider:
OER Africa
Author:
Chisoni, E
Gulule, M
Maulidi, F
Mkandawire, M
Salanje, G
Samu, S
Sitima, J
Date Added:
02/27/2012
Communication Skills: Writing (PDF)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A chapter on writing skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.

Subject:
Arts and Humanities
English Language Arts
Language, Grammar and Vocabulary
Material Type:
Textbook
Provider:
OER Africa
Author:
Chisoni, E
Gulule, M
Maulidi, F
Mkandawire, M
Salanje, G
Samu, S
Sitima, J
Date Added:
02/27/2012
Communication Skills: Writing Skills (Word)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A chapter on writing skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.

Subject:
Arts and Humanities
English Language Arts
Language, Grammar and Vocabulary
Material Type:
Textbook
Provider:
OER Africa
Author:
Chisoni, E
Gulule, M
Maulidi, F
Mkandawire, M
Salanje, G
Samu, S
Sitima, J
Date Added:
02/27/2012
Comparison of the Effects of Increased CO2 in the Air to Seawater and Distilled Water
Unrestricted Use
CC BY
Rating
0.0 stars

This well-designed experiment compares CO2 impacts on salt water and fresh water. In a short demonstration, students examine how distilled water (i.e., pure water without any dissolved ions or compounds) and seawater are affected differently by increasing carbon dioxide in the air.

Subject:
Applied Science
Career and Technical Education
Environmental Science
Environmental Studies
Oceanography
Physical Science
Material Type:
Activity/Lab
Simulation
Provider:
CLEAN: Climate Literacy and Energy Awareness Network
Provider Set:
CLEAN: Climate Literacy and Energy Awareness Network
Author:
Annika Sabrowski
CarboSchools.org
Patrick Silva
S. Soria-Dengg
Date Added:
06/19/2012
Concept Development Studies in Chemistry
Unrestricted Use
CC BY
Rating
0.0 stars

"Concept Development Studies in Chemistry" is an on-line textbook for an Introductory General Chemistry course. Each module develops a central concept in Chemistry from experimental observations and inductive reasoning. This approach complements an interactive or active learning teaching approach.

Subject:
Chemistry
Physical Science
Material Type:
Textbook
Provider:
BCcampus
Provider Set:
BCcampus Faculty Reviewed Open Textbooks
Author:
John S. Hutchison
Date Added:
01/05/2015
Confidence Intervals
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The applets in this section of Statistical Java allow you to see how levels of confidence are achieved through repeated sampling. The confidence intervals are related to the probability of successes in a Binomial experiment.

Subject:
Mathematics
Statistics and Probability
Material Type:
Activity/Lab
Provider:
Consortium for the Advancement of Undergraduate Statistics Education
Provider Set:
Causeweb.org
Author:
Anderson-Cook, C.
C.Anderson-Cook
Dorai-Raj, S.
Robinson, T.
S.Dorai-Raj
T.Robinson
Date Added:
02/16/2011
Conservation techniques
Unrestricted Use
CC BY
Rating
0.0 stars

This book fosters the recognition of options for making progress toward increased environmental conservation through an understanding of the underlying science and practice of a variety of conservation techniques. Today, there are expected benefits from integrated science and practice, and many people are promoting this as the way forward to improve our environment. Over time, trends emerge regarding the best way to conserve the environment, but so far an outstanding solution has not emerged. Each conservation technique has its foundational concepts, limitations, and implementation issues. Reviewing a collection of techniques provides a basis for considering which approach will be best for any specific environmental challenge. This book should advance the recognition of the challenges managing the environment, techniques that can be used to address the challenges, and the ways they might help foster the integration of science and the practice of ecological conservation.

Subject:
Applied Science
Environmental Science
Material Type:
Textbook
Provider:
Rutgers University
Author:
Marcia S Meixler
Mark B Bain
Date Added:
06/15/2022
Control Charts
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The applets in this section allow you to see how the common Xbar control chart is constructed with known variance. The Xbar chart is constructed by collecting a sample of size n at different times t.

Subject:
Mathematics
Statistics and Probability
Material Type:
Activity/Lab
Provider:
Consortium for the Advancement of Undergraduate Statistics Education
Provider Set:
Causeweb.org
Author:
Anderson-Cook, C.
C. Anderson-Cook
Doria-Raj, S.
Robinson, T.
S. Dorai-Raj
T. Robinson
Date Added:
02/16/2011
Control Using Sound
Read the Fine Print
Educational Use
Rating
0.0 stars

Students gain a deeper understanding of how sound sensors work through a hands-on design challenge involving LEGO MINDSTORMS(TM) NXT taskbots and sound sensors. Student groups each program a robot computer to use to the sound of hand claps to control the robot's movement. They learn programming skills and logic design in parallel. They experience how robots can take sensor input and use it to make decisions to move and turn, similar to the human sense of hearing. A PowerPoint® presentation and pre/post quizzes are provided.

Subject:
Applied Science
Career and Technical Education
Electronic Technology
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Pranit Samarth
Satish S. Nair
Srijith Nair
Date Added:
09/18/2014
Correlation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The applets in this section allow you to see how different bivariate data look under different correlation structures. The Movie applet either creates data for a particular correlation or animates a multitude data sets ranging correlations from -1 to 1.

Subject:
Mathematics
Statistics and Probability
Material Type:
Activity/Lab
Provider:
Consortium for the Advancement of Undergraduate Statistics Education
Provider Set:
Causeweb.org
Author:
Anderson-Cook, C.
C. Anderson-Cook
Dorai-Raj, S.
Robinson, T.
S. Dorai-Raj
T. Robinson
Date Added:
02/16/2011
Cost Comparisons
Read the Fine Print
Educational Use
Rating
0.0 stars

Students learn about the many types of expenses associated with building a bridge. Working like engineers, they estimate the cost for materials for a bridge member of varying sizes. After making calculations, they graph their results to compare how costs change depending on the use of different materials (steel vs. concrete). They conclude by creating a proposal for a city bridge design based on their findings.

Subject:
Applied Science
Architecture and Design
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Denali Lander
Denise W. Carlson
Joe Friedrichsen
Jonathan S. Goode
Malinda Schaefer Zarske
Natalie Mach
Date Added:
10/14/2015
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Cybersecurity Presentation Series: Part 3 Protection against Ransomware
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems.
Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks?
Attendees will learn about the following topics:
• Background on ransomware.
• Current state-of-the-art Information Technology against ransomware.
• A risk-based protection strategy.
• Practical tools & tips against ransomware.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Author:
Henry S. Teng
Date Added:
04/09/2024
Cybersecurity Presentation Series: Part 4 PCI Credit Card Data Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:

- What is PCI/credit card data security?
- Why do small businesses need to plan for PCI security compliance?
- Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider
and website hosting service provider.
- IT audit requirements and stages for PCI compliance.
 
Presentation Time: 50 minutes plus 10 minutes Q&A.
Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson
Author:
Henry S. Teng
Date Added:
04/12/2024
Cybersecurity Presentation Series: Part 5 HIPAA Healthcare Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).

Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:
- What are the business requirements for HIPAA security?
- What stages of IT audit do small businesses need to plan for HIPAA security compliance?
- What technology and tools can be used to protect HIPAA-related data and to assure compliance?
 
Presentation Time: 50 minutes plus 10 minutes Q&A.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson Plan
Author:
Henry S. Teng
Date Added:
04/13/2024
Data Analysis
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The applet in this section allows for simple data analysis of univariate data. Users can either generate normal or uniform data for k samples or copy and paste data from another source to a text box. A univariate analysis is performed for all k samples.

Subject:
Mathematics
Statistics and Probability
Material Type:
Activity/Lab
Provider:
Consortium for the Advancement of Undergraduate Statistics Education
Provider Set:
Causeweb.org
Author:
C. Anderson-Cook, S. Dorai-Raj, T. Robinson, Virginia Tech Department of Statistics
Date Added:
02/16/2011
Data Analysis and Visualization in R for Ecologists
Unrestricted Use
CC BY
Rating
0.0 stars

Data Carpentry lesson from Ecology curriculum to learn how to analyse and visualise ecological data in R. Data Carpentry’s aim is to teach researchers basic concepts, skills, and tools for working with data so that they can get more done in less time, and with less pain. The lessons below were designed for those interested in working with ecology data in R. This is an introduction to R designed for participants with no programming experience. These lessons can be taught in a day (~ 6 hours). They start with some basic information about R syntax, the RStudio interface, and move through how to import CSV files, the structure of data frames, how to deal with factors, how to add/remove rows and columns, how to calculate summary statistics from a data frame, and a brief introduction to plotting. The last lesson demonstrates how to work with databases directly from R.

Subject:
Applied Science
Computer Science
Ecology
Information Science
Life Science
Mathematics
Measurement and Data
Material Type:
Module
Provider:
The Carpentries
Author:
Ankenbrand, Markus
Arindam Basu
Ashander, Jaime
Bahlai, Christie
Bailey, Alistair
Becker, Erin Alison
Bledsoe, Ellen
Boehm, Fred
Bolker, Ben
Bouquin, Daina
Burge, Olivia Rata
Burle, Marie-Helene
Carchedi, Nick
Chatzidimitriou, Kyriakos
Chiapello, Marco
Conrado, Ana Costa
Cortijo, Sandra
Cranston, Karen
Cuesta, Sergio Martínez
Culshaw-Maurer, Michael
Czapanskiy, Max
Daijiang Li
Dashnow, Harriet
Daskalova, Gergana
Deer, Lachlan
Direk, Kenan
Dunic, Jillian
Elahi, Robin
Fishman, Dmytro
Fouilloux, Anne
Fournier, Auriel
Gan, Emilia
Goswami, Shubhang
Guillou, Stéphane
Hancock, Stacey
Hardenberg, Achaz Von
Harrison, Paul
Hart, Ted
Herr, Joshua R.
Hertweck, Kate
Hodges, Toby
Hulshof, Catherine
Humburg, Peter
Jean, Martin
Johnson, Carolina
Johnson, Kayla
Johnston, Myfanwy
Jordan, Kari L
K. A. S. Mislan
Kaupp, Jake
Keane, Jonathan
Kerchner, Dan
Klinges, David
Koontz, Michael
Leinweber, Katrin
Lepore, Mauro Luciano
Li, Ye
Lijnzaad, Philip
Lotterhos, Katie
Mannheimer, Sara
Marwick, Ben
Michonneau, François
Millar, Justin
Moreno, Melissa
Najko Jahn
Obeng, Adam
Odom, Gabriel J.
Pauloo, Richard
Pawlik, Aleksandra Natalia
Pearse, Will
Peck, Kayla
Pederson, Steve
Peek, Ryan
Pletzer, Alex
Quinn, Danielle
Rajeg, Gede Primahadi Wijaya
Reiter, Taylor
Rodriguez-Sanchez, Francisco
Sandmann, Thomas
Seok, Brian
Sfn_brt
Shiklomanov, Alexey
Shivshankar Umashankar
Stachelek, Joseph
Strauss, Eli
Sumedh
Switzer, Callin
Tarkowski, Leszek
Tavares, Hugo
Teal, Tracy
Theobold, Allison
Tirok, Katrin
Tylén, Kristian
Vanichkina, Darya
Voter, Carolyn
Webster, Tara
Weisner, Michael
White, Ethan P
Wilson, Earle
Woo, Kara
Wright, April
Yanco, Scott
Ye, Hao
Date Added:
03/20/2017