Updating search results...

Search Resources

1525 Results

View
Selected filters:
  • Computer, Networking and Telecommunications Systems
Educational App Development Toolkit for Teachers and Learners
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

The Educational App Development Toolkit for Teachers and Learners is designed to introduce the basic and some intermediate concepts of Android app development on the App Inventor (AI2) platform. It provides hands-on activities and tutorials to use the Designer and Blocks Editor components of App Inventor to create apps that can be readily downloaded and used on any Android smartphone or tablet. Furthermore, the hands-on sessions will guide you on how to use features such as text-to-speech, accelerometer, speech recognition, drawing, video, games and music playback. The Toolkit also provides guidelines on how to package and distribute your app. For teachers a training plan is also provided that can be used to provide training to students in an instructor-led environment.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Activity/Lab
Provider:
Commonwealth of Learning
Date Added:
11/01/2015
Educational Software
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

MAIN AIMS OF THE MODULE: To achieve an understanding and practical experience of key principles, methods and theories in the area of educational software.
LEARNING OUTCOMES FOR THE MODULE: The module provides opportunities for students to develop and demonstrate knowledge and understanding, qualities, skills and other attributes in the following areas:
1) Obtain understand of major learning principles, theories, and approaches
2. Identify key factors of successful educational software design and deployment.
3) Apply theories, principles, and approached into an appropriate design of educational software system.
4) Establish an appreciation of state-of-art developments in the area of educational software design.
MAIN TOPICS OF STUDY: The main topics of study considered in light of the above learning outcomes are: ‰ Educational Principles Design of educational software such as electronic instruction manuals, serious gaming, VR training, drills, and tutor agents and tutorials ‰Educational software for specific learners such as children, elderly, mentally or physically challenged individuals ‰CEvaluation of education software.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Assessment
Homework/Assignment
Lecture
Lecture Notes
Lesson Plan
Reading
Provider:
Delft University of Technology
Provider Set:
Delft University OpenCourseWare
Date Added:
04/11/2023
El Control de Versiones con Git
Unrestricted Use
CC BY
Rating
0.0 stars

Software Carpentry lección para control de versiones con Git Para ilustrar el poder de Git y GitHub, usaremos la siguiente historia como un ejemplo motivador a través de esta lección. El Hombre Lobo y Drácula han sido contratados por Universal Missions para investigar si es posible enviar su próximo explorador planetario a Marte. Ellos quieren poder trabajar al mismo tiempo en los planes, pero ya han experimentado ciertos problemas anteriormente al hacer algo similar. Si se rotan por turnos entonces cada uno gastará mucho tiempo esperando a que el otro termine, pero si trabajan en sus propias copias e intercambian los cambios por email, las cosas se perderán, se sobreescribirán o se duplicarán. Un colega sugiere utilizar control de versiones para lidiar con el trabajo. El control de versiones es mejor que el intercambio de ficheros por email: Nada se pierde una vez que se incluye bajo control de versiones, a no ser que se haga un esfuerzo sustancial. Como se van guardando todas las versiones precedentes de los ficheros, siempre es posible volver atrás en el tiempo y ver exactamente quién escribió qué en un día en particular, o qué versión de un programa fue utilizada para generar un conjunto de resultados en particular. Como se tienen estos registros de quién hizo qué y en qué momento, es posible saber a quién preguntar si se tiene una pregunta en un momento posterior y, si es necesario, revertir el contenido a una versión anterior, de forma similar a como funciona el comando “deshacer” de los editores de texto. Cuando varias personas colaboran en el mismo proyecto, es posible pasar por alto o sobreescribir de manera accidental los cambios hechos por otra persona. El sistema de control de versiones notifica automáticamente a los usuarios cada vez que hay un conflicto entre el trabajo de una persona y la otra. Los equipos no son los únicos que se benefician del control de versiones: los investigadores independientes se pueden beneficiar en gran medida. Mantener un registro de qué ha cambiado, cuándo y por qué es extremadamente útil para todos los investigadores si alguna vez necesitan retomar el proyecto en un momento posterior (e.g. un año después, cuando se ha desvanecido el recuerdo de los detalles).

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Information Science
Mathematics
Measurement and Data
Material Type:
Module
Provider:
The Carpentries
Date Added:
04/11/2023
Electronic Commerce (09:01): Introduction
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The last lesson in our Introduction to Computer series. This video looks at the basics of eCommerce. We define some basic terms and give examples.

Links from Video:
•Uncommon Adornments http://www.uncommonadornments.com/
•http://www.teacherspayteachers.com/Store/Mrfordsclass
•http://www.cafepress.com/

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Electronic Commerce (09:02): E-Commerce Technologies
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This is the software and IT systems that support transactions over networks. We look at: E-Commerce Hosts, Digital Money and Online Advertising.

This is out last video in the Introduction to Computers, BCIS, BIM series. We thank you for watching and look forward to seeing you in our next course.

Links from Video:
•What is Bitcoin? http://youtu.be/Gc2en3nHxA4
•Please Subscribe http://www.pleasesubscribefilm.com/
•http://www.storenvy.com/
•http://www.cafepress.com/

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Electrostatic telegraphs (case study)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Long before the internet people thought about sending information along wires using static electricity. Created by Brit Cruise.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Date Added:
04/11/2023
Elementary Data Structures
Unrestricted Use
CC BY
Rating
0.0 stars

In this course, the student will learn the theoretical and practical aspects of algorithms and Data Structures. The student will also learn to implement Data Structures and algorithms in C/C++, analyze those algorithms, and consider both their worst-case complexity and practical efficiency. Upon successful completion of this course, students will be able to: Identify elementary Data Structures using C/C++ programming languages; Analyze the importance and use of Abstract Data Types (ADTs); Design and implement elementary Data Structures such as arrays, trees, Stacks, Queues, and Hash Tables; Explain best, average, and worst-cases of an algorithm using Big-O notation; Describe the differences between the use of sequential and binary search algorithms. (Computer Science 201)

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
04/11/2023
Eloquent JavaScript: A Modern Introduction to Programming
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book contains roughly three parts. The first 11 chapters discussthe JavaScript language itself. The next eight chapters are about webbrowsers and the way JavaScript is used to program them. Finally,two chapters are devoted to Node.js, another environment to programJavaScript in.Throughout the book, there are five project chapters, which describelarger example programs to give you a taste of real programming. Inorder of appearance, we will work through building an artificial life simulation,a programming language, a platform game, a paint program,and a dynamic website.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Date Added:
04/11/2023
Encryption and public keys
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Date Added:
04/11/2023
EndNote/PRISMA: EndNote for Systematic Reviews
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Based on James Cook University Library's Endnote and PRISMA video (CC BY-SA licence), this learning object is a brief video, a document with the codes and formulas, and a downloadable EndNote library with the PRISMA groups set-up

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Health, Medicine and Nursing
Information Science
Material Type:
Interactive
Date Added:
04/11/2023
Engaging Question
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

I use an "engaging question" on the first day of class in all of my courses. This activity is designed to be both engaging and central to all of the course content. That is, the activity is designed around questions that we can keep coming back to, over and over, after each learning unit. This approach not only provides a unifying focus for the course, but it also provides an opportunity to model critical thinking as we revisit the question each time with a different perspective. For the Dynamic Earth and Global Change (the Physical Geology course at Macalester) I chose a question about climate change. The activity starts with two graphs (plots of surface temperature and atmosphere CO2 composition for the past 1,000 years). Students are asked to describe the graphs, interpret the graphs, make some predictions, and explain the graphs using basic earth science processes.

(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)

Subject:
Applied Science
Biology
Computer, Networking and Telecommunications Systems
Education
Environmental Science
Information Science
Life Science
Mathematics
Measurement and Data
Statistics and Probability
Material Type:
Activity/Lab
Lesson Plan
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Date Added:
08/18/2019
Enterprise Pharo a Web Perspective
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Pharo is a clean, innovative, open-source, live-programming environment.

Enterprise Pharo is the third volume of a series of book covering Pharo and its community. Whereas the first volume Pharo by Example is intended for newcomers and the second volume Deep into Pharo covers deep topics of Pharo, this third volume covers libraries and frameworks for enterprises, and in particular those doing web development.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Date Added:
10/06/2016
Environmental Applications of GIS
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Increasingly volatile climate and weather; vulnerable drinking water supplies; shrinking wildlife habitats; widespread deforestation due to energy and food production. These are examples of environmental challenges that are of critical importance in our world, both in far away places and close to home, and are particularly well suited to inquiry using geographic information systems. In GEOG 487 you will explore topics like these and learn about data and spatial analysis techniques commonly employed in environmental applications. After taking this course you will be equipped with relevant analytical approaches and tools that you can readily apply to your own environmental contexts.

Subject:
Applied Science
Computer, Networking and Telecommunications Systems
Earth and Space Science
Environmental Science
Information Science
Physical Geography
Material Type:
Full Course
Provider:
Penn State's College of Earth and Mineral Sciences
Author:
Rachel Kornak
Date Added:
05/03/2023
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Unrestricted Use
CC BY
Rating
0.0 stars

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018