Updating search results...

Search Resources

142 Results

View
Selected filters:
  • Computing and Information
CREATIVE COMMONS A SOJOURN FOR OPEN LICENSES IN DIGITAL JOURNEY
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Creative Commons is an open license that actually works with Copyright with a slant to copyleft.

Subject:
Anthropology
Arts and Humanities
Computing and Information
Film and Music Production
Information Science
Journalism
Literature
Social Work
World Cultures
Material Type:
Diagram/Illustration
Lecture
Student Guide
Author:
Dr. Avik Roy
Date Added:
12/17/2023
CYBER THREAT INTELLIGENCE FUNDEMENTALS  COURSE
Unrestricted Use
CC BY
Rating
0.0 stars

This Module forms part of the Henry Ford Corporate College Series on Cyber Intelligence and is accompanied by a Teaching Guide. The full range of materials includes teaching modules on cyber threat intelligence, threat hunting,MITRE and Diamond Frameworks, CARET, ATT&CK, collecting and processing data, assessments, slides, and other teaching tools that lecturers can adapt to their contexts, and integrate into existing college courses. The Module provides an outline for a 8 week class, but can be used for shorter or longer sessions.All teaching modules engage with existing academic research and debates, and may contain information, opinions and statements from a variety of sources, including press reports and independent experts. Links to external resources were tested at the time of publication. However, as third-party websites may change, please contact us if you come across a broken link or are redirected to inappropriate content. Please also inform us if you notice that a publication is linked to an unofficial version or website.

Subject:
Computing and Information
Material Type:
Full Course
Author:
MARRCI CONNER
Marcia Mangold
Date Added:
06/29/2023
The Chandra X-Ray Observatory
Read the Fine Print
Educational Use
Rating
0.0 stars

Learn about the Chandra X-Ray Observatory's telescope system, science instruments, and spacecraft system in this interactive activity adapted from NASA.

Subject:
Applied Science
Computer Science
Computing and Information
Engineering
Geoscience
Physical Science
Space Science
Technology
Material Type:
Interactive
Provider:
PBS LearningMedia
Provider Set:
PBS Learning Media Common Core Collection
Author:
NASA
WGBH Educational Foundation
WNET
Date Added:
12/02/2011
Citations in Microsoft Word
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

How to create citations in either APA or MLA format using Microsoft Word (365). 

Subject:
Arts and Humanities
Communication
Composition and Rhetoric
Computing and Information
Higher Education
Literature
Technology
Material Type:
Diagram/Illustration
Student Guide
Teaching/Learning Strategy
Author:
MARCUS LACHER
Date Added:
02/09/2024
Colliding Neutron Stars Create Black Hole and Gamma-ray Burst
Read the Fine Print
Educational Use
Rating
0.0 stars

This video from NASA describes the detailed computer modeling used to predict that colliding neutron stars can produce gamma-ray bursts similar to those associated with black holes.

Subject:
Applied Science
Chemistry
Computer Science
Computing and Information
Engineering
Physical Science
Physics
Technology
Material Type:
Lesson
Provider:
PBS LearningMedia
Provider Set:
PBS Learning Media Common Core Collection
Author:
NASA
WGBH Educational Foundation
WNET
Date Added:
10/28/2011
Complex Networks and Graphs
Read the Fine Print
Educational Use
Rating
0.0 stars

Students learn about complex networks and how to represent them using graphs. They also learn that graph theory is a useful mathematical tool for studying complex networks in diverse applications of science and engineering, such as neural networks in the brain, biochemical reaction networks in cells, communication networks, such as the internet, and social networks. Topics covered include set theory, defining a graph, as well as defining the degree of a node and the degree distribution of a graph.

Subject:
Applied Science
Computing and Information
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Debbie Jenkinson
Garrett Jenkinson
John Goutsias
Susan Frennesson
Date Added:
09/18/2014
Computer Science: Knowledge for Educators
Unrestricted Use
CC BY
Rating
0.0 stars

In the digital tapestry of the 21st century, education, particularly in the realms of Computer Applications Technology (CAT) and Information Technology (IT), stands at the forefront of innovation and transformation. It is with immense pride and enthusiasm that we present this pioneering Open Educational Resource (OER) Textbook, a testament to the collaborative spirit and intellectual rigor of a group of distinguished postgraduate students from North-West University, South Africa: L. Van der Walt, B. Molokwane and N. Mbele. Under the editorship of Dr. C. Bosch, this textbook emerges as a beacon of knowledge, co-creation, and dissemination, meticulously crafted to serve the vibrant community of computer science educators.Embarking on a journey through the rich landscapes of learning theories in CAT and IT education, this textbook unveils the multifaceted dimensions of teaching and learning strategies that resonate with the demands of contemporary education. It meticulously navigates through the intricacies of effective pedagogical approaches, ensuring that educators are well-equipped to foster environments where learning is not just absorbed but experienced and enacted.  

Subject:
Computing and Information
Material Type:
Textbook
Author:
Chantelle Bosch
Date Added:
02/22/2024
Curiosity Killed the App
Read the Fine Print
Educational Use
Rating
0.0 stars

Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)

Subject:
Applied Science
Computer Science
Computing and Information
Education
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Brian Sandall
Rich Powers
Date Added:
09/18/2014
Cyberinfrastructure
Read the Fine Print
Rating
0.0 stars

Cyberinfrastructure is a tightly integrated, planet-wide grid of computing, information, networking and sensor resources which will enable individual researchers to have the power of the world's highest-performance digital resources at their disposal. NSF has funded or is exploring cyberinfrastructure-related projects designed to lead the scientific and engineering community in the coordinated development and expansive use of cyberinfrastructure.

Subject:
Applied Science
Computer Science
Computing and Information
Material Type:
Lecture
Provider:
NSDL Staff
Provider Set:
National Science Foundation (NSF) Special Reports and Videos
Date Added:
11/06/2014
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Dam Pass or Fail
Read the Fine Print
Educational Use
Rating
0.0 stars

Students conduct Internet research to investigate the purpose and current functioning status of some of the largest dams throughout the world. They investigate the success or failure of eight dams and complete a worksheet. While researching the dams, they also gain an understanding of the scale of these structures by recording and comparing their reservoir capacities. Students come to understand that dams, like all engineered structures, have a finite lifespan and require ongoing maintenance and evaluation for their usefulness.

Subject:
Applied Science
Computing and Information
Engineering
Mathematics
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Denali Lander
Denise W. Carlson
Jeff Lyng
Kristin Field
Megan Podlogar
Date Added:
09/18/2014
The Data Renaissance: Analyzing the Disciplinary Effects of Big Data, Artificial Intelligence, and Beyond
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The Data Renaissance delves into the complexities of data's role in various industries and its broader impact on society. It highlights the challenges in investigating data practices, citing examples like TikTok, where algorithms and data handling are closely guarded secrets. The content, contributed by students under the guidance of an expert, covers a wide range of topics, including the ethical aspects of generative AI in education and the workplace, and case studies reflecting real-world experiences. This evolving text, intended to be updated with each class, serves as a dynamic resource for educators and students alike, offering insights and discussion guides for an in-depth understanding of the ever-changing landscape of data in our digital age.

Subject:
Applied Science
Computing and Information
Material Type:
Activity/Lab
Textbook
Provider:
Remixing Open Textbooks through an Equity Lens (ROTEL) Project
Author:
J.J. Sylvia Iv
Date Added:
03/07/2024
Deliberately Safeguarding Privacy and Confidentiality in the Age of Generative AI
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This presentation covers the implications of generative AI for the general user. It also discusses various strategies for protecting one's privacy and confidentiality proactively.

Subject:
Computing and Information
Material Type:
Lecture
Author:
Reed Hepler
Date Added:
03/06/2024
Digital Citizenship
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson over digital citizenship is a brief overview of the elements of being a good digital citizen, ways our students can better protect themselves online, the lasting effects of a digital footprint, and finally some things that they can do to be a better digital citizen. The information was pulled from a variety of academic resources. 

Subject:
Computer Science
Computing and Information
Electronic Technology
Material Type:
Homework/Assignment
Lesson Plan
Author:
Brittney Patterson
Date Added:
06/15/2023
Digital Images: The Universe Exposed!
Read the Fine Print
Rating
0.0 stars

For most of human history, recording a star meant describing it with words or drawing a picture. The 19th-century invention of photography changed that—only to be revolutionized by digital imaging. This Moveable Museum article, available as a six-page printable PDF file, takes a look at the technology of digital imaging. It discusses how digital images are pictures stored as numbers and explains how computer manipulation can enhance images and reduce distortion. Some suggested resources are provided for further research.

Subject:
Applied Science
Astronomy
Computer Science
Computing and Information
Physical Science
Space Science
Technology
Material Type:
Data Set
Provider:
American Museum of Natural History
Provider Set:
American Museum of Natural History
Date Added:
10/15/2014