Updating search results...

Information & Computer Science

159 affiliated resources

Search Resources

View
Selected filters:
Accessibility Evaluation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity guides students through the evaluation of a website that they have created to see if it is accessible for users with disabilities. Students will simulate a number of different disabilities (e.g. visual impairments, color blindness, auditory impairments, motor impairments) to see if their website is accessible; they will also use automated W3 and WAVE tools to evaluate their sites. Students will consider the needs of users with disabilities by creating a persona and scenario of a user with disabilities interacting with their site. Finally, students will write up recommendations to change their site and implement the changes.

Comments
Although this activity can be used in isolation, it is intended to be part of a series guiding students towards the creation of a front-end of a website. The series (all published as OER) consist of:

a) Needfinding
b) Personas, Scenarios and Storyboards
c) Front-end Website Design and Development
d) Accessibility Evaluation

Subject:
Computer Science
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Brooklyn College
Author:
Devorah Kletenik
Date Added:
09/03/2020
Accessibility: the Whys and the Hows
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.

Comments
These slides use Poll Everywhere polls; to use them, create your own Poll Everywhere account and duplicate the polls.

Subject:
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Brooklyn College
Author:
Devorah Kletenik
Date Added:
09/03/2020
African American History and Culture
Unrestricted Use
CC BY
Rating
0.0 stars

African American History and Culture contains 10 modules starting with African Origins - History and Captivity and continuing through Reconstruction. Openly-licensed course materials developed for the Open Educational Resources (OER) Degree Initiative, led by Achieving the Dream https://courses.lumenlearning.com/catalog/achievingthedream.

Subject:
Computer Science
U.S. History
Material Type:
Textbook
Provider:
Lumen Learning
Author:
Florida State College At Jacksonville
Date Added:
01/07/2020
Applications of ICT in Libraries
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

The Advanced Certificate and the Advanced Diploma in Applications of ICT in Libraries permit library staff to obtain accreditation for their skills in the use of ICT. Anyone can make use of the materials and assessment is available in variety of modes, including distance learning.

Subject:
Information Science
Material Type:
Textbook
Provider:
Wikibooks
Date Added:
05/13/2016
Arecibo Message
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This two week assignment asks students to interpret and analyze the 1974 Arecibo Message sent by Drake and Sagan. Week 1 introduces the concepts behind the construction of the message and engages with a critical analysis of the architecture and the contents of the message. Week 2 asks students to develop software in a Jupyter Notebook (available for free from the Anaconda Python Distribution) to interpret messages that were similar to those produced by Drake and Sagan.

Subject:
Computer Science
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
LaGuardia Community College
Author:
Joshua P Tan
Date Added:
06/04/2019
Blender 3D: Noob to Pro
Conditional Remix & Share Permitted
CC BY-SA
Rating
1.0 stars

Blender 3D: Noob to Pro is a product of shared effort by numerous team members and anonymous editors. Its purpose is to teach people how to create three-dimensional computer graphics using Blender, a free software application. This book is intended to be used in conjunction with other on-line resources that complement it.

Subject:
Computer Science
Graphic Design
Material Type:
Textbook
Provider:
Wikibooks
Date Added:
07/28/2016
C Programming
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

C is the most commonly used programming language for writing operating systems. The first operating system written in C is Unix. Later operating systems like GNU/Linux were all written in C. Not only is C the language of operating systems, it is the precursor and inspiration for almost all of the most popular high-level languages available today. In fact, Perl, PHP, Python and Ruby are all written in C. By way of analogy, let's say that you were going to be learning Spanish, Italian, French, or Portuguese. Do you think knowing Latin would be helpful? Just as Latin was the basis of all of those languages, knowing C will enable you to understand and appreciate an entire family of programming languages built upon the traditions of C. Knowledge of C enables freedom.

Subject:
Computer Science
Material Type:
Textbook
Provider:
Wikibooks
Date Added:
07/28/2016
C# Programming
Conditional Remix & Share Permitted
CC BY-SA
Rating
5.0 stars

Although C# is derived from the C programming language, it introduces some unique and powerful features, such as delegates (which can be viewed as type-safe function pointers) and lambda expressions which introduce elements of functional programming languages, as well as a simpler single class inheritance model (than C++) and, for those of you with experience in "C-like" languages, a very familiar syntax that may help beginners become proficient faster than its predecessors. Similar to Java, it is object-oriented, comes with an extensive class library, and supports exception handling, multiple types of polymorphism, and separation of interfaces from implementations. Those features, combined with its powerful development tools, multi-platform support, and generics, make C# a good choice for many types of software development projects: rapid application development projects, projects implemented by individuals or large or small teams, Internet applications, and projects with strict reliability requirements. Testing frameworks such as NUnit make C# amenable to test-driven development and thus a good language for use with Extreme Programming (XP). Its strong typing helps to prevent many programming errors that are common in weakly typed languages.

Subject:
Computer Science
Material Type:
Textbook
Provider:
Wikibooks
Date Added:
07/28/2016
CS04ALL: Command Line Python
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students are presented with information relating to stand alone Python programs, stdin, stdout, and command line arguments. This is a lab exercise. After completion students should be able to create executable Python programs which can accept input from stdin or command line arguments.

Subject:
Computer Science
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
John Jay College of Criminal Justice
Author:
Hunter. R Johnson
Date Added:
02/02/2019
Cascading Style Sheets
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This book is a guide to Cascading Style Sheets (CSS), a technique widely used in web pages including Wikipedia to describe their visual style and appearance. CSS can take HTML to new places creatively and functionally. Once you learn how to style mark-up, you can additionally learn JavaScript functions that make dynamic web pages.

Subject:
Computer Science
Material Type:
Textbook
Provider:
Wikibooks
Date Added:
05/12/2016
Coding for the Public Good
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.

Comments
Note that these slides use Poll Everywhere polls; to use them, you will need to create your own Poll Everywhere account.

Subject:
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Brooklyn College
Author:
Devorah Kletenik
Date Added:
09/03/2020
Coding for the Public Good: Front-end Website Design and Development
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity helps student design and develop a front-end of a website, from wireframes through HTML/CSS/Javascript. It includes design questions for students, including the invocation of Ben Schneiderman's eight golden rules for interface design.

Note: this activity assumes prior knowledge of web development. Since this activity is designed for an HCI course, with a focus on interface design, students are not expected to create a back-end for it. This activity can obviously be modified for a full-stack experience.

Comments
Although this activity can be used in isolation, it is intended to be part of a series guiding students towards the creation of a front-end of a website. The series (all published as OER) consist of:

a) Needfinding
b) Personas, Scenarios and Storyboards
c) Front-end Website Design and Development
d) Accessibility Evaluation

Subject:
Computer Science
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Brooklyn College
Author:
Cuny Brooklyn College
Devorah Kletenik
Date Added:
09/03/2020
Cryptography Module" by Hunter R. Johnson
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.

The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this archive.

Subject:
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
John Jay College of Criminal Justice
Author:
Johnson Hunter R
Date Added:
06/04/2019
Cybercrime and Cyber security Techniques
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.

Subject:
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cyber security Techniques- What Is The Internet?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.

Subject:
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Database Design-2nd Edition
Unrestricted Use
CC BY
Rating
0.0 stars

Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.

Subject:
Computer Science
Material Type:
Textbook
Provider:
BCcampus
Provider Set:
BCcampus Open Textbooks
Author:
Adrienne Watt
Nelson Eng
Date Added:
11/26/2014
The Dating Equation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Python IF-ELSE activity - "The Dating Equation" - for CS0 students. Part of the CUNY CS04All project.

Subject:
Computer Science
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
College of Staten Island
Author:
City University Of New York - Graduate Center
Domanski Robert J
Robert J Domanski
Date Added:
06/04/2019
Designing Computational Biology Workflows with Perl
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material introduces Linux File System structures and demonstrates how to use commands to communicate with the operating system through a Terminal program. Basic program structures and system() function of Perl are discussed. A brief introduction to gene-sequencing terminology and file formats are given.

Subject:
Computer Science
Material Type:
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Yildirim Esma
Date Added:
05/01/2019
Designing Computational Biology Workflows with Perl
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This manual guides the instructor to combine the partial files of the virtual machine image and construct sequencer.ova file. It is accompanied by the partial files of the virtual machine image.

Subject:
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Date Added:
06/04/2019
Designing Computational Biology Workflows with Perl
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided, connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to enter the data folder, which includes gene-sequencing input files and print the first five line of each file remotely. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.

Subject:
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Date Added:
06/04/2019
"Designing Computational Biology Workflows with Perl Part 2
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material briefly reintroduces the DNA double Helix structure, explains SNP and INDEL mutations in genes and describes FASTA, FASTQ, BAM and VCF file formats. It also explains the index creation, alignment, sorting, marking duplicates and variant calling steps of a simple preprocessing workflow and how to write a Perl script to automate the execution of these steps on a Virtual Machine Image.

Subject:
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Date Added:
06/04/2019
Designing Computational Biology Workflows with Perl Part 2b
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material introduces the AWS console interface, describes how to create an instance on AWS with the VMI provided and connect to that machine instance using the SSH protocol. Once connected, it requires the students to write a script to automate the tasks to create VCF files from two different sample genomes belonging to E.coli microorganisms by using the FASTA and FASTQ files in the input folder of the virtual machine. The same exercise can be applied if the VMI is installed on a local machine using virtualization software (e.g. Oracle VirtualBox). In this case, the Terminal program of the VMI can be used to do the exercise.

Subject:
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Date Added:
06/04/2019
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Unrestricted Use
CC BY
Rating
0.0 stars

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Subject:
Computer Science
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018
Exam: Intro to Data Science - "Midterm Exam Review"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Midterm Exam Review for the course "CSC 59970 – Intro to Data Science" delivered at the City College of New York in Spring 2019 by Grant Long as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Material Type:
Assessment
Provider:
CUNY Academic Works
Provider Set:
City College of New York
Author:
Grant Long
Nyc Tech-in-residence Corps
Date Added:
05/06/2020
Exam: Intro to Data Science - "Midterm Exam and Answer Key"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Midterm Exam and Answer Key for the course "CSC 59970 – Intro to Data Science" delivered at the City College of New York in Spring 2019 by Grant Long as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Material Type:
Assessment
Provider:
CUNY Academic Works
Provider Set:
City College of New York
Author:
Grant Long
Nyc Tech-in-residence Corps
Date Added:
05/06/2020
Exam: Probability and Statistics for Computer Science - "Midterm Exam Review"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Midterm Exam Review for the course "CS 217 – Probability and Statistics for Computer Science" delivered at the City College of New York in Spring 2019 by Evan Agovino as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Material Type:
Assessment
Provider:
CUNY Academic Works
Provider Set:
City College of New York
Author:
Evan Agovino
Nyc Tech-in-residence Corps
Date Added:
05/06/2020
Exam: Probability and Statistics for Computer Science - "Practice Final Exam"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Practice Final Exam for the course "CS 217 – Probability and Statistics for Computer Science" delivered at the City College of New York in Spring 2019 by Evan Agovino as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Material Type:
Assessment
Provider:
CUNY Academic Works
Provider Set:
City College of New York
Author:
Evan Agovino
Nyc Tech-in-residence Corps
Date Added:
05/06/2020
Final Project Assignment: Distributed Systems and Cloud Computing
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Final Project Assignment for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing. Delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Material Type:
Activity/Lab
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Hunter College
Author:
Bonan Liu
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Foundations of Health Information Technology (Undergraduate) Course Materials
Unrestricted Use
CC BY
Rating
0.0 stars

This is a collection of all materials used in Health Information Technology by Dr. Chi Zhang at Kennesaw State University, including lecture slides, assignments, and assessments, including a question bank.

Topics covered include:

Clinical Financial Records
Evidence-Based Medicine
e-Prescribing
Patient Bedside Systems
Telemedicine
Health Information Networks
Cryptography
Accreditation
HIPAA Privacy and Security

Subject:
Information Science
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Chi Zhang
Date Added:
03/20/2018
Fundamentals of Cybersecurity and Intelligence Gathering - Case Study Assignment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Case Study Assignment for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Information Science
Material Type:
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #1 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption & Hashing"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #4 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #3 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020