Updating search results...

Search Resources

1525 Results

View
Selected filters:
  • Computer, Networking and Telecommunications Systems
Database (08:02): Database Management Systems
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Database Management Systems is the software that allows us to create and use a database. This video looks at the DBMS, their functions, some examples of popular software solutions and a quick look at Structured Query Language (SQL)

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Database (08:03): Database Models
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The database management software is the program used to create and mange the database. The database model is the architecture the DBMS used to store objects within that database.

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Database (08:04): Some Final Bits
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our final database video. This one looks at some odds and ends. We examine: Data Warehouse, Data Mining, Big Data. I also talk about the ethics of data mining from the NSA and CDC, and how they are different.

We also give out top picks for the lesson.

Links from Video:
•http://www.w3schools.com/sql/
•What is Database & SQL by Guru99 http://youtu.be/FR4QIeZaPeM
•What is a database http://youtu.be/t8jgX1f8kc4
•MySQL Database For Beginners https://www.udemy.com/mysql-database-for-beginners2/

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Database Design-2nd Edition
Unrestricted Use
CC BY
Rating
0.0 stars

Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
BCcampus
Provider Set:
BCcampus Open Textbooks
Date Added:
11/26/2014
Databases and SQL
Unrestricted Use
CC BY
Rating
0.0 stars

Software Carpentry lesson that teaches how to use databases and SQL In the late 1920s and early 1930s, William Dyer, Frank Pabodie, and Valentina Roerich led expeditions to the Pole of Inaccessibility in the South Pacific, and then onward to Antarctica. Two years ago, their expeditions were found in a storage locker at Miskatonic University. We have scanned and OCR the data they contain, and we now want to store that information in a way that will make search and analysis easy. Three common options for storage are text files, spreadsheets, and databases. Text files are easiest to create, and work well with version control, but then we would have to build search and analysis tools ourselves. Spreadsheets are good for doing simple analyses, but they don’t handle large or complex data sets well. Databases, however, include powerful tools for search and analysis, and can handle large, complex data sets. These lessons will show how to use a database to explore the expeditions’ data.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Information Science
Mathematics
Measurement and Data
Material Type:
Module
Provider:
The Carpentries
Date Added:
04/11/2023
Data sharing in PLOS ONE: An analysis of Data Availability Statements
Unrestricted Use
CC BY
Rating
0.0 stars

A number of publishers and funders, including PLOS, have recently adopted policies requiring researchers to share the data underlying their results and publications. Such policies help increase the reproducibility of the published literature, as well as make a larger body of data available for reuse and re-analysis. In this study, we evaluate the extent to which authors have complied with this policy by analyzing Data Availability Statements from 47,593 papers published in PLOS ONE between March 2014 (when the policy went into effect) and May 2016. Our analysis shows that compliance with the policy has increased, with a significant decline over time in papers that did not include a Data Availability Statement. However, only about 20% of statements indicate that data are deposited in a repository, which the PLOS policy states is the preferred method. More commonly, authors state that their data are in the paper itself or in the supplemental information, though it is unclear whether these data meet the level of sharing required in the PLOS policy. These findings suggest that additional review of Data Availability Statements or more stringent policies may be needed to increase data sharing.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Health, Medicine and Nursing
Information Science
Social Science
Material Type:
Reading
Provider:
PLOS ONE
Date Added:
04/11/2023
Dating Students: Relative vs. Numerical Time
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lab, students are introduced to the difference between relative and absolute dating, using the students themselves as the material to be ordered. Initially, the students are asked to develop physical clues to put themselves in order from youngest to oldest (exposing the inferences we make unconsciously about people's ages), and this will be refined/modified using a list of current events from an appropriate historical period that more and more of the students will remember, depending on their age (among other variables). Absolute age is introduced by having the students order themselves by birth decade, year, month, and day, and comparing the absolute age order to the order worked out in the relative-dating exercise, with a discussion of dating precision and accuracy.

(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)

Subject:
Applied Science
Biology
Computer, Networking and Telecommunications Systems
Earth and Space Science
Environmental Science
Geology
Information Science
Life Science
Mathematics
Measurement and Data
Material Type:
Activity/Lab
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Date Added:
08/10/2019
Decimal system refresher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Review how the decimal number system works before diving into the binary number system. The decimal number system and binary number system work the same way; the only difference is what each digit represents (0-9 versus 0/1). Created by Pamela Fox.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Date Added:
04/11/2023
Decoding the Arecibo message
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This video explains the design of the Arecibo Message transmitted in the 1970s by SETI pioneers. It explains why humans sent the message and who they hope might receive it. It shows the telescope in Brasil. It plays the audio signal from the message that was sent and shows how that signal can be converted to binary to show an image. It also gives a brief overview of how the binary number system works.

Subject:
Applied Science
Astronomy
Career and Technical Education
Computer Science
Computer, Networking and Telecommunications Systems
Earth and Space Science
Electronic Technology
Engineering, Technology and Media Arts
History
Information Science
Networking and Telecommunications
Programming and Software Engineering
STEAM
Space Science
World History
Material Type:
Lecture
Video
Provider:
CSU Extension Office
Author:
Hardegree-Ullman
Date Added:
03/09/2023
Deep into Pharo
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Pharo is a clean, innovative, open-source, live-programming environment.

Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.

You will explore the language with chapters on exceptions, blocks, small integers, and floats.

You will discover tools such as profilers, Metacello and Gofer.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Date Added:
04/11/2023
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s.

This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Oregon State University
Date Added:
04/11/2023
Delay Insentitive Circuits -- Structures, Semantics, and Strategies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The design of concurrent distributed hardware systems is a major challenge for engineers today and is bound to escalate in the future, but engineering education continues to emphasize traditional tools of logic design that are just not up to the job. For engineers tackling realistic projects, improvised attempts at synchronization across multiple clock domains have long been a fact of life. Prone to hazards and metastability, these ad hoc interfaces could well be the least trustworthy aspects of a system, and typically also the least able to benefit from any readily familiar textbook techniques of analysis or verification.

Progress in the long run depends on a change of tactics. Instead of the customary but inevitably losing battle to describe complex systems in terms of their stepwise time evolution, taking their causal relationships and handshaking protocols as a starting point cuts to the chase by putting the emphasis where it belongs. This way of thinking may call for setting aside a hard earned legacy of practice and experience, but it leads ultimately to a more robust and scalable methodology.

Delay insensitive circuits rely on local coordination and control from the ground up. The most remarkable consequence of adhering to this course is that circuits can get useful things done without any clock distribution network whatsoever. Because a handshake acknowledgment concludes each interaction among primitive components and higher level subsystems alike, a clock pulse to mark them would be superfluous. This effect can bring a welcome relief to projects whose timing infrastructure would otherwise tend to create more problems than it solves.

The theory of delay insensitive circuits is not new but has not yet attracted much attention outside of its research community. At best ignored and at worst discouraged in standard curricula, this topic until now has been accessible only by navigating a sea of conference papers and journal articles, some of them paywalled. Popular misconceptions and differing conventions about terminology and notation have posed further barriers to entry. To address this need, this book presents a unified account of delay insensitive circuits from first principles to cutting edge concepts, subject only to an undergraduate-level understanding of discrete math. In an approachable tutorial format with numerous illustrations, exercises, and over three hundred references, it guides an engineering professional or advanced student towards proficiency in this extensive field.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computer, Networking and Telecommunications Systems
Electronic Technology
Engineering
Material Type:
Textbook
Author:
Dennis Furey
Date Added:
04/11/2023
Delftse Foundations of Computation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Delft University of Technology
Date Added:
04/11/2023
Delftse Foundations of Computation 2nd Edition
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Delft University of Technology
Date Added:
04/11/2023
Depth of field
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this video we'll explore why regions in our scenes can go "out of focus." The region of our scene which is in focus call depth of field..

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Graphic Arts
Visual Arts and Design
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Pixar
Date Added:
04/11/2023