Updating search results...

Search Resources

1525 Results

View
Selected filters:
  • Computer, Networking and Telecommunications Systems
Contrails or Chemtrails?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Using multi-media and basic atmospheric physics, students investigate contrails and chemtrails. Students apply previous learning about pseudoscience, and couple that with an understanding of the atmosphere to reach a decision about chemtrails. Students write an analysis paper on the issue of chemtrails, followed by a decision paper about whether society should be concerned about chemtrails.

Subject:
Atmospheric Science
Computer, Networking and Telecommunications Systems
Earth and Space Science
Information Science
Material Type:
Activity/Lab
Homework/Assignment
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Date Added:
04/12/2023
Control a Servo with Your Phone Using Bluetooth!
Read the Fine Print
Educational Use
Rating
0.0 stars

Bluetooth is everywhere—from smartphones to computers to cars. Even though students are exposed to this technology, many are not aware of how they can use it themselves to wirelessly control their own creative projects! For this challenge, students build on what they learned during a previous Arduino maker challenge, Make and Control a Servo Arm with Your Computer, and learn how to control a servo with an Android phone (iPhones do not work with the components used in this challenge). By the end of the exercise, expect students to be wirelessly controlling a servo with a simple phone application!

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Engineering
Physical Science
Physics
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
MakerChallenges
Date Added:
05/23/2018
Converting decimal numbers to binary
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Learn a technique for converting decimal numbers into binary numbers using just pen, paper, and calculations. Works best for small numbers, since bigger numbers require increasingly more calculations. Created by Pamela Fox.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Date Added:
04/11/2023
Cosmic Evolution: From Big Bang to Humankind
Read the Fine Print
Educational Use
Rating
0.0 stars

The arrow of time, from origin of the universe to the present and beyond spans several major epochs throughout all of history. Cosmic evolution is the study of the many varied changes in the assembly and composition of energy, matter and life in the thinning and cooling of the universe.

Subject:
Anthropology
Applied Science
Archaeology
Astronomy
Biology
Chemistry
Computer, Networking and Telecommunications Systems
Cultural Geography
Earth and Space Science
Engineering
Environmental Science
Geoscience
Information Science
Life Science
Mathematics
Measurement and Data
Physical Geography
Physical Science
Physics
Social Science
Material Type:
Diagram/Illustration
Provider:
Harvard-Smithsonian
Provider Set:
Center for Astrophysics
Date Added:
02/06/2023
Create a Cloud-Connected LED Cloud Light Fixture
Read the Fine Print
Educational Use
Rating
0.0 stars

Students put their STEAM knowledge and skills to the test by creating indoor light fixture “clouds” that mimic current weather conditions or provide other colorful lighting schemes they program and control with smartphones. Groups fabricate the clouds from paper lanterns and pillow stuffing, adding LEDs to enable the simulation of different lighting conditions. They code the controls and connect the clouds to smart devices and the Internet cloud to bring their floating clouds to life as they change color based on the weather outside.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
Activities
Date Added:
05/25/2018
Create and Control a Popsicle Stick Finger Robot
Read the Fine Print
Educational Use
Rating
0.0 stars

Students are introduced to servos and the flex sensor as they create simple, one-jointed, finger robots controlled by Arduino. Servos are motors with feedback and are extensively used in industrial and consumer applications—from large industrial car-manufacturing robots that use servos to hold heavy metal and precisely weld components together, to prosthetic hands that rely on servos to provide fine motor control. Students use Arduino microcontrollers and flex sensors to read finger flexes, which they process to send angle information to the servos. Students create working circuits; use the constrain, map and smoothing commands; learn what is meant by library and abstraction in a coding context; and may even combine team finger designs to create a complete prosthetic hand of bendable fingers.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Engineering
Physical Science
Physics
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
MakerChallenges
Date Added:
10/20/2017
Create a screencast
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students create a Power Point presentation on a topic of their choice. Then they make this presentation into a screencast using the free program, called Jing. The students do this by narrating their Power Point using a rubric that I've provided.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Education
Material Type:
Activity/Lab
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Date Added:
04/12/2023
Create water surface using particles
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

How do we draw a surface of water using only particles? In this video we'll introduce a powerful analogy using heat to help us out.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Graphic Arts
Visual Arts and Design
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Pixar
Date Added:
04/11/2023
Creative Commons License Use Survey Instrument
Unrestricted Use
CC BY
Rating
0.0 stars

This survey instrument is designed to understand how creators use (or decide not to use) Creative Commons licenses. The target survey participants are people who create materials for documentation, maintenance, instruction, learning, and/or revitalization of Indigenous, minority, endangered, and/or low-resourced languages. Part 1 of this survey is designed to learn about the digital creation formats and sharing practices in this specific community of practice. Parts 2 through 4 of this survey contain general questions intended to elicit information about research participants’ knowledge and awareness of Creative Commons (CC) licenses; understanding of how to apply CC licenses to their digital creations; interest in and experience with applying CC licenses to their digital creations; motivations for and barriers to applying CC licenses to their digital creations; and understanding of how to adapt or reuse digital creations licensed with CC licenses.

This survey can be easily adapted for use in other communities of practice by editing some of the questions and multiple-choice responses.

If you wish to read this survey and background information about it, please start with the file ReadMe-CCLuseSurvey.pdf.

The file Creative_Commons_License_Use_Survey.qsf is a Qualtrics Survey File that can be used to recreate this survey in your own instance of the Qualtrics software.

The file Creative_Commons_License_Use_Survey.pdf is a PDF of the survey. This version includes Creative Commons graphics that are used in the survey questions. The file ReadMe-CCLuseSurvey.pdf does not include the graphics.

Subject:
Anthropology
Arts and Humanities
Computer, Networking and Telecommunications Systems
Information Science
Languages
Social Science
World Cultures
World Languages
Material Type:
Activity/Lab
Primary Source
Date Added:
03/29/2023
Cryptography Module" by Hunter R. Johnson
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.

The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this archive.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
John Jay College of Criminal Justice
Date Added:
04/11/2023
Culturally Responsive-Sustaining Computer Science Education: A Framework
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The framework was developed by the Kapor Center to bring a focus to equity in Computer Science Education, specifically around teacher preparation, professional development, curriculum development, and policy-making.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Primary Source
Date Added:
04/11/2023
Curiosity Killed the App
Read the Fine Print
Educational Use
Rating
0.0 stars

Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Education
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Date Added:
09/18/2014
Curso de Programação Orientada a Objetos
Unrestricted Use
CC BY
Rating
0.0 stars

Curso de Programação Orientada a Objetos criado na ferramenta Moodle, aplicado em alunos de 2 universidades brasileiras, como parte do experimentos realizados na dissertação de mestrado, entitulada "O Uso de Recursos Educacionais Abertos para ensinar Orientação a Objetos na transição do Paradigma Procedimental".

Objective-oriented Programming Course created in the master's dissertation entitled "The Use of Open Educational Resources for Mentoring in Achieving a Goal on the Paradigm of the Procedure".

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Full Course
Date Added:
04/11/2023
CurvedLand: An Applet to Simulate Curved Space
Unrestricted Use
CC BY
Rating
0.0 stars

CurvedLand is an applet for showing what the world would look like with different geometry. It is named CurvedLand in tribute to the science fiction novel, Flatland, by Edwin Abbott, which describes the adventures of a two-dimensional being who is visited by a stranger from the third dimension.

One of the central ideas of Einstein's theory of relativity is that space and time curve in response to the matter and energy within them. A curved space is one that doesn't obey the usual laws of Euclidean geometry: the angles of a triangle don't generally add up to 180 degrees, the circumference of a circle isn't pi times the diameter, parallel lines can either converge towards each other or move apart, and so on.

Since the geometry we observe is very close to Euclidean, however, it is hard for most of us to picture what this difference would mean physically. If you draw a circle and a diameter, how could the ratio be anything other than pi? To answer this question, imagine that as you move around in space the shapes of objects appear to distort. This is what happens in curved space. If you draw a circle around yourself and then start walking around it to pace out the circumference, it will look to you like you are walking along a constantly changing ellipse.

CurvedLand illustrates this distortion as it would appear in a two-dimensional curved space. The structure is similar to a mapping program. You can place objects of different shapes in different places in the world and then move around the space to see what they look like from different perspectives.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Geometry
Mathematics
Physical Science
Physics
Material Type:
Activity/Lab
Provider:
Smith College
Date Added:
04/11/2023
Cyber Security Economics
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.

Systems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
Delft University OpenCourseWare
Date Added:
04/11/2023
Cyberbullying And Impacts of Cyberbullying
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

CYBER BULLYING

Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyber bullying crosses the line into unlawful or criminal behavior.

The most common places where cyber bullying occurs are:

Social Media, such as Facebook, Instagram, Snapchat, and Twitter
SMS (Short Message Service) also known as Text Message sent through devices
Instant Message (via devices, email provider services, apps, and social media messaging features)
Email.

WHERE IS CYBERBULLYING OCCURING ?

Manuals to educate the public, teachers and parents summarize, "Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet." Research, legislation and education in the field are ongoing. Research has identified basic definitions and guidelines to help recognize and cope with what is regarded as abuse of electronic communications.

Cyberbullying involves repeated behavior with intent to harm.
Cyberbullying is perpetrated through harassment, cyberstalking, denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), impersonation, and exclusion (intentionally and cruelly excluding someone from an online group)
Cyberbullying can be as simple as continuing to send emails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, sexual remarks, pejorative labels (i.e., hate speech) or defamatory false accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person. Cyberbullying could be limited to posting rumors about a person on the internet with the intention of bringing about hatred in others' minds or convincing others to dislike or participate in online denigration of a target. It may go to the extent of personally identifying victims of crime and publishing materials severely defaming or humiliating them.

Cyberbullies may disclose victims' personal data (e.g. real name, home address, or workplace/schools) at websites or forums or may use impersonation, creating fake accounts, comments or sites posing as their target for the purpose of publishing material in their name that defames, discredits or ridicules them. This can leave the cyberbully anonymous which can make it difficult for the offender to be caught or punished for their behavior, although not all cyberbullies maintain their anonymity. Text or instant messages and emails between friends can also constitute cyber bullying if what is said or displayed is hurtful to the participants.
The recent use of mobile applications and rise of smartphones have yielded to a more accessible form of . It is expected that cyber bullying via these platforms will be associated with bullying via mobile phones to a greater extent than exclusively through other more stationary internet platforms. In addition, the combination of cameras and Internet access and the instant availability of these modern smartphone technologies yield themselves to specific types of cyber bullying not found in other platforms. It is likely that those cyber bullied via mobile devices will experience a wider range of cyber bullying types than those exclusively bullied elsewhere.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Homework/Assignment
Author:
Mounika
Date Added:
04/11/2023