This activity guides students through the evaluation of a website that they ...
This activity guides students through the evaluation of a website that they have created to see if it is accessible for users with disabilities. Students will simulate a number of different disabilities (e.g. visual impairments, color blindness, auditory impairments, motor impairments) to see if their website is accessible; they will also use automated W3 and WAVE tools to evaluate their sites. Students will consider the needs of users with disabilities by creating a persona and scenario of a user with disabilities interacting with their site. Finally, students will write up recommendations to change their site and implement the changes.
Comments Although this activity can be used in isolation, it is intended to be part of a series guiding students towards the creation of a front-end of a website. The series (all published as OER) consist of:
a) Needfinding b) Personas, Scenarios and Storyboards c) Front-end Website Design and Development d) Accessibility Evaluation
This presentation introduces Computer Science students to the notion of accessibility: developing ...
This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.
Comments These slides use Poll Everywhere polls; to use them, create your own Poll Everywhere account and duplicate the polls.
African American History and Culture contains 10 modules starting with African Origins ...
African American History and Culture contains 10 modules starting with African Origins - History and Captivity and continuing through Reconstruction. Openly-licensed course materials developed for the Open Educational Resources (OER) Degree Initiative, led by Achieving the Dream https://courses.lumenlearning.com/catalog/achievingthedream.
The Advanced Certificate and the Advanced Diploma in Applications of ICT in ...
The Advanced Certificate and the Advanced Diploma in Applications of ICT in Libraries permit library staff to obtain accreditation for their skills in the use of ICT. Anyone can make use of the materials and assessment is available in variety of modes, including distance learning.
This two week assignment asks students to interpret and analyze the 1974 ...
This two week assignment asks students to interpret and analyze the 1974 Arecibo Message sent by Drake and Sagan. Week 1 introduces the concepts behind the construction of the message and engages with a critical analysis of the architecture and the contents of the message. Week 2 asks students to develop software in a Jupyter Notebook (available for free from the Anaconda Python Distribution) to interpret messages that were similar to those produced by Drake and Sagan.
Blender 3D: Noob to Pro is a product of shared effort by ...
Blender 3D: Noob to Pro is a product of shared effort by numerous team members and anonymous editors. Its purpose is to teach people how to create three-dimensional computer graphics using Blender, a free software application. This book is intended to be used in conjunction with other on-line resources that complement it.
C is the most commonly used programming language for writing operating systems. ...
C is the most commonly used programming language for writing operating systems. The first operating system written in C is Unix. Later operating systems like GNU/Linux were all written in C. Not only is C the language of operating systems, it is the precursor and inspiration for almost all of the most popular high-level languages available today. In fact, Perl, PHP, Python and Ruby are all written in C. By way of analogy, let's say that you were going to be learning Spanish, Italian, French, or Portuguese. Do you think knowing Latin would be helpful? Just as Latin was the basis of all of those languages, knowing C will enable you to understand and appreciate an entire family of programming languages built upon the traditions of C. Knowledge of C enables freedom.
Although C# is derived from the C programming language, it introduces some ...
Although C# is derived from the C programming language, it introduces some unique and powerful features, such as delegates (which can be viewed as type-safe function pointers) and lambda expressions which introduce elements of functional programming languages, as well as a simpler single class inheritance model (than C++) and, for those of you with experience in "C-like" languages, a very familiar syntax that may help beginners become proficient faster than its predecessors. Similar to Java, it is object-oriented, comes with an extensive class library, and supports exception handling, multiple types of polymorphism, and separation of interfaces from implementations. Those features, combined with its powerful development tools, multi-platform support, and generics, make C# a good choice for many types of software development projects: rapid application development projects, projects implemented by individuals or large or small teams, Internet applications, and projects with strict reliability requirements. Testing frameworks such as NUnit make C# amenable to test-driven development and thus a good language for use with Extreme Programming (XP). Its strong typing helps to prevent many programming errors that are common in weakly typed languages.
Students are presented with information relating to stand alone Python programs, stdin, ...
Students are presented with information relating to stand alone Python programs, stdin, stdout, and command line arguments. This is a lab exercise. After completion students should be able to create executable Python programs which can accept input from stdin or command line arguments.
This book is a guide to Cascading Style Sheets (CSS), a technique ...
This book is a guide to Cascading Style Sheets (CSS), a technique widely used in web pages including Wikipedia to describe their visual style and appearance. CSS can take HTML to new places creatively and functionally. Once you learn how to style mark-up, you can additionally learn JavaScript functions that make dynamic web pages.
These slides are used to guide a discussion with students introducing them ...
These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.
Comments Note that these slides use Poll Everywhere polls; to use them, you will need to create your own Poll Everywhere account.
This activity helps student design and develop a front-end of a website, ...
This activity helps student design and develop a front-end of a website, from wireframes through HTML/CSS/Javascript. It includes design questions for students, including the invocation of Ben Schneiderman's eight golden rules for interface design.
Note: this activity assumes prior knowledge of web development. Since this activity is designed for an HCI course, with a focus on interface design, students are not expected to create a back-end for it. This activity can obviously be modified for a full-stack experience.
Comments Although this activity can be used in isolation, it is intended to be part of a series guiding students towards the creation of a front-end of a website. The series (all published as OER) consist of:
a) Needfinding b) Personas, Scenarios and Storyboards c) Front-end Website Design and Development d) Accessibility Evaluation
This archive contains a series of lessons on cryptography suitable for use ...
This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.
The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this archive.
This lecture presents information about cybercrime, which has become the most ubiquitous ...
This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.
The lecture presents information about how the Internet works so students studying ...
The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.
Database Design - 2nd Edition covers database systems and database design concepts. ...
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
This material introduces Linux File System structures and demonstrates how to use ...
This material introduces Linux File System structures and demonstrates how to use commands to communicate with the operating system through a Terminal program. Basic program structures and system() function of Perl are discussed. A brief introduction to gene-sequencing terminology and file formats are given.
This manual guides the instructor to combine the partial files of the ...
This manual guides the instructor to combine the partial files of the virtual machine image and construct sequencer.ova file. It is accompanied by the partial files of the virtual machine image.
This material introduces the AWS console interface, describes how to create an ...
This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided, connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to enter the data folder, which includes gene-sequencing input files and print the first five line of each file remotely. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.
This material briefly reintroduces the DNA double Helix structure, explains SNP and ...
This material briefly reintroduces the DNA double Helix structure, explains SNP and INDEL mutations in genes and describes FASTA, FASTQ, BAM and VCF file formats. It also explains the index creation, alignment, sorting, marking duplicates and variant calling steps of a simple preprocessing workflow and how to write a Perl script to automate the execution of these steps on a Virtual Machine Image.
This material introduces the AWS console interface, describes how to create an ...
This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided and connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to automate the tasks to create VCF files from two different sample genomes belonging to E.coli microorganisms by using the FASTA and FASTQ files in the input folder of the virtual machine. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.
TCP/IP Level Attacks Port Scanning DDoS Footprinting and Social Engineering Enumeration Programming for Security Professionals Operating System Vulnerabilities Embedded System Security Hacking Web Servers Hacking Wireless Networks Cryptography Protecting Networks with Security Devices
Midterm Exam Review for the course "CSC 59970 – Intro to Data ...
Midterm Exam Review for the course "CSC 59970 – Intro to Data Science" delivered at the City College of New York in Spring 2019 by Grant Long as part of the Tech-in-Residence Corps program.
Midterm Exam and Answer Key for the course "CSC 59970 – Intro ...
Midterm Exam and Answer Key for the course "CSC 59970 – Intro to Data Science" delivered at the City College of New York in Spring 2019 by Grant Long as part of the Tech-in-Residence Corps program.
Midterm Exam Review for the course "CS 217 – Probability and Statistics ...
Midterm Exam Review for the course "CS 217 – Probability and Statistics for Computer Science" delivered at the City College of New York in Spring 2019 by Evan Agovino as part of the Tech-in-Residence Corps program.
Practice Final Exam for the course "CS 217 – Probability and Statistics ...
Practice Final Exam for the course "CS 217 – Probability and Statistics for Computer Science" delivered at the City College of New York in Spring 2019 by Evan Agovino as part of the Tech-in-Residence Corps program.
Final Project Assignment for the course: CSCI 49378: Intro to Distributed Systems ...
Final Project Assignment for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing. Delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
This is a collection of all materials used in Health Information Technology ...
This is a collection of all materials used in Health Information Technology by Dr. Chi Zhang at Kennesaw State University, including lecture slides, assignments, and assessments, including a question bank.
Topics covered include:
Clinical Financial Records Evidence-Based Medicine e-Prescribing Patient Bedside Systems Telemedicine Health Information Networks Cryptography Accreditation HIPAA Privacy and Security
Case Study Assignment for the course: CIS 356 - Fundamentals of Cybersecurity ...
Case Study Assignment for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture #1 for the course: CIS 356 - Fundamentals of Cybersecurity and ...
Lecture #1 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture #4 for the course: CIS 356 - Fundamentals of Cybersecurity and ...
Lecture #4 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Lecture #3 for the course: CIS 356 - Fundamentals of Cybersecurity and ...
Lecture #3 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.