Updating search results...

Search Resources

1366 Results

View
Selected filters:
  • Computer Science
How Do You Make a Program Wait?
Read the Fine Print
Educational Use
Rating
0.0 stars

Building on the programming basics learned so far in the unit, students next learn how to program using sensors rather than by specifying exact durations. They start with an examination of algorithms and move to an understanding of conditional commands (until, then), which require the use of wait blocks. Working with the LEGO MINDSTORMS(TM) NXT robots and software, they learn about wait blocks and how to use them in conjunction with move blocks set with unlimited duration. To help with comprehension and prepare them for the associated activity programming challenges, volunteer students act out a maze demo and student groups conclude by programming LEGO robots to navigate a simple maze using wait block programming. A PowerPoint® presentation, a worksheet and pre/post quizzes are provided.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Date Added:
09/18/2014
How Is a Radio Wave Emitted?
Read the Fine Print
Educational Use
Rating
0.0 stars

This illustrated essay from A Science Odyssey Web site explains the science behind radio waves, including the role of electrons and electromagnetic fields.

Subject:
Applied Science
Chemistry
Computer Science
Computer, Networking and Telecommunications Systems
Engineering
Physical Science
Physics
Material Type:
Activity/Lab
Interactive
Provider:
PBS LearningMedia
Provider Set:
PBS Learning Media: Multimedia Resources for the Classroom and Professional Development
Date Added:
01/29/2004
How do we respond to generative AI in education? Open educational practices give us a framework for an ongoing process
Unrestricted Use
CC BY
Rating
0.0 stars

With the release of ChatGPT in November 2022, the field of higher education rapidly became aware that generative AI can complete or assist in many of the kinds of tasks traditionally used for assessment. This has come as a shock, on the heels of the shock of the pandemic. How should assessment practices change? Should we teach about generative AI or use it pedagogically? If so, how? Here, we propose that a set of open educational practices, inspired by both the Open Educational Resources (OER) movement and digital collaboration practices popularized in the pandemic, can help educators cope and perhaps thrive in an era of rapidly evolving AI. These practices include turning toward online communities that cross institutional and disciplinary boundaries. Social media, listservs, groups, and public annotation can be spaces for educators to share early, rough ideas and practices and reflect on these as we explore emergent responses to AI. These communities can facilitate crowdsourced curation of articles and learning materials. Licensing such resources for reuse and adaptation allows us to build on what others have done and update resources. Collaborating with students allows emergent, student-centered, and student-guided approaches as we learn together about AI and contribute to societal discussions about its future. We suggest approaching all these modes of response to AI as provisional and subject to reflection and revision with respect to core values and educational philosophies. In this way, we can be quicker and more agile even as the technology continues to change.

We give examples of these practices from the Spring of 2023 and call for recognition of their value and for material support for them going forward. These open practices can help us collaborate across institutions, countries, and established power dynamics to enable a richer, more justly distributed emerging response to AI.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Education
Higher Education
Information Science
Material Type:
Reading
Author:
Anna Mills
Lance Eaton
Maha Bali
Date Added:
04/05/2024
How to Think Like a Computer Scientist: C++ Version
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The single most important skill for a computer scientist is problem solving. The goal of this book is to teach you to think like a computer scientist.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Green Tea Press
Date Added:
11/01/2012
How to Think Like a Computer Scientist: C Version
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The goal of this book is to teach you to think like a computer scientist. I like the way computer scientists think because they combine some of the best features of Mathematics, Engineering, and Natural Science. Like mathematicians, computer scientists use formal languages to denote ideas (specifically computations). Like engineers, they design things, assembling components into systems and evaluating trade offs among alternatives. Like scientists, they observe the behavior of complex systems, form hypotheses, and test predictions.The single most important skill for a computer scientist is problem-solving. By that I mean the ability to formulate problems, think creatively about solutions, and express a solution clearly and accurately. As it turns out, the process of learning to program is an excellent opportunity to practice problem-solving skills. That’s why this chapter is called “The way of the program.”

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Green Tea Press
Date Added:
04/11/2023
How to Think Like a Computer Scientist: Learning with Python
Unrestricted Use
CC BY
Rating
0.0 stars

Python is a fun and extremely easy-to-use programming language that has steadily gained in popularity over the last few years. Developed over ten years ago by Guido van Rossum, Python's simple syntax and overall feel is largely derived from ABC, a teaching language that was developed in the 1980's. However, Python was also created to solve real problems and it borrows a wide variety of features from programming languages such as C++, Java, Modula-3, and Scheme. Because of this, one of Python's most remarkable features is its broad appeal to professional software developers, scientists, researchers, artists, and educators. 278 page pdf file.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Green Tea Press
Date Added:
01/01/2008
How to Use OSF as an Electronic Lab Notebook
Unrestricted Use
CC BY
Rating
0.0 stars

This webinar outlines how to use the free Open Science Framework (OSF) as an Electronic Lab Notebook for personal work or private collaborations. Fundamental features we cover include how to record daily activity, how to store images or arbitrary data files, how to invite collaborators, how to view old versions of files, and how to connect all this usage to more complex structures that support the full work of a lab across multiple projects and experiments.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Center for Open Science
Date Added:
04/11/2023
HyperText Markup Language
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This is a guide to HTML, a standard markup language for web pages. A text editor and a web browser is all you need to create web pages, view your handiwork, and share information with others all over the world.

This book covers simple HTML syntax. For dynamic behavior in websites, see the JavaScript wikibook. Another separate book covers Cascading Style Sheets (CSS) which handle overall look and styling, but the present book addresses CSS briefly. Additionally, XHTML has its own textbook.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Wikibooks
Date Added:
04/05/2023
I Bacini Culturali e la progettazione sociale orientata all’Heritage-Making, tra Politiche giovanili, Innovazione sociale, Diversità culturale
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Il volume rappresenta la tappa finale della prima stagione di implementazione del Progetto ABACUS (giugno 2019 - settembre 2020), sostenuta dal finanziamento pubblico garantito dalla Regione Siciliana e dalla Presidenza del Consiglio dei Ministri. In tal senso, la pubblicazione raccoglie sia una sezione di materiali di discussione critica sul percorso progettuale e sui primi esiti maturati, sia una ricca parte di contributi tematici offerti da referenti istituzionali, studiosi ed esperti, docenti accademici e ricercatori, professionisti e rappresentanti di organismi del Terzo settore Sono state così affrontate ed esaminate differenti tematiche e problematiche socio-culturali e socio-economiche, e prospettive e approcci metodologico-operativi tra loro affini e convergenti, che si sviluppano a cavallo delle politiche sociali, giovanili e culturali, della progettazione sociale e culturale, dell'innovazione sociale e della diversità culturale, in differenti contesti socio-territoriali siciliani e italiani, con una particolare attenzione per quelle iniziative che rappresentano casi paradigmatici in cui le istanze istituzionali, della ricerca, dell'educazione e della formazione si incontrano con le aspettative dei pubblici differenziati e, specialmente, delle giovani generazioni, anche sull'orizzonte della innovazione dell'occupazione giovanile.

Subject:
Agriculture and Natural Resources
Anthropology
Applied Science
Archaeology
Architecture and Design
Art History
Arts and Humanities
Business and Communication
Career and Technical Education
Communication
Computer Science
Computer, Networking and Telecommunications Systems
Culinary Arts
Cultural Geography
Earth and Space Science
Ecology
Education
Educational Technology
English Language Arts
Environmental Studies
Ethnic Studies
Graphic Arts
Higher Education
History
Hospitality, Tourism and Social Service Careers
Hydrology
Information Science
Languages
Law
Life Science
Management
Marketing
Mathematics
Measurement and Data
Performing Arts
Philosophy
Political Science
Psychology
Public Relations
Social Science
Social Work
Sociology
Special Education
Visual Arts
Visual Arts and Design
World Cultures
World Languages
Material Type:
Activity/Lab
Assessment
Case Study
Diagram/Illustration
Primary Source
Teaching/Learning Strategy
Textbook
Date Added:
04/05/2023
IP addresses and DNS
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The co-founder of the Internet Vint Cerf and software engineer Paola Mejia take us through the ins and outs of how networks talk to each other.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Date Added:
04/11/2023
IS 278 Syllabus: Networks
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Texts:

Bonaventure, O., Computer Networking: Principles, Protocols and Practice, Release 0.25, Saylor Foundation, 2011. http://www.saylor.org/site/wp-content/uploads/2012/02/Computer-Networking-Principles-Bonaventure-1-30-31-OTC1.pdf

Dordal, P., An Introduction to Computer Networks, Release 1.9.16, 2019. http://intronetworks.cs.luc.edu/current/ComputerNetworks.pdf

Course description: A comprehensive examination of how computers can be linked together to share resources and information. Emphasis will be given to understanding packet switched networks and how they enable contemporary enterprises. Topics include network hardware, software and protocols. Prerequisites: CS13X or CS161 (or concurrent).

Learning Outcomes:
After completing this course:
Students will have practical experience using protocols to enable communication between computing devices connected to each other,
Students will have configured an IT infrastructure solution for a small organization, including a network based on standard technology components, servers, security devices, and several different types of computing clients,
Students will apply core concepts underlying IP networks to solve simple network design problems, including IP subnetting.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Syllabus
Date Added:
04/11/2023
Image Processing with Python
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson shows how to use Python and skimage to do basic image processing. With support from an NSF iUSE grant, Dr. Tessa Durham Brooks and Dr. Mark Meysenburg at Doane College, Nebraska, USA have developed a curriculum for teaching image processing in Python. This lesson is currently being piloted at different institutions. This pilot phase will be followed by a clean-up phase to incorporate suggestions and feedback from the pilots into the lessons and to make the lessons teachable by the broader community. Development for these lessons has been supported by a grant from the Sloan Foundation.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Information Science
Mathematics
Measurement and Data
Material Type:
Module
Provider:
The Carpentries
Date Added:
04/11/2023
An Implementation of Steganography
Read the Fine Print
Educational Use
Rating
0.0 stars

Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.

Subject:
Applied Science
Computer Science
Computer, Networking and Telecommunications Systems
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Date Added:
09/18/2014
Implementing a One Address CPU in Logisim
Unrestricted Use
CC BY
Rating
0.0 stars

Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users as believing computers follow the laws of magic, where some magic incantation is entered, and the computer responds with an expected, but magical, behavior.

This magic computer does not actually exist. In reality computer are machines, and every action a computer performs reduces to a set of mechanical operations. In fact the first complete definition of a working computer was a mechanical machine designed by Charles Babbage in 1834, and would have run on steam power.

Probably the biggest success of Computer Science (CS) in the 20th century was the development of abstractions that hide the mechanical nature of computers. The fact that average people use computers without ever considering that they are mechanistic is a triumph of CS designers.

This purpose of this monograph is to break the abstract understanding of a computer, and to explain a computer’s behavior in completely in mechanistic terms. It will deal specifically with the Central Processing Unit (CPU) of the computer, as this is where the magic happens. All other parts of a computer can be seen as just providing information for the CPU to operate on.

This monograph will deal with a specific type of CPU, a one-address CPU, and will explain this CPU using only standard gates, specifically AND, OR, NOT, NAND and XOR gates, and 4 basic Integrated Circuits (ICs), the Decoder, Multiplexer, Adder, and Flip Flop. All of these gates and components can be described as mechanical transformations of input data to output data, and the overall CPU can then be seen as a mechanical device.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Gettysburg College
Date Added:
07/22/2016
Inclusivity Bugs in Online Courseware: A Field Study
Read the Fine Print
Educational Use
Rating
0.0 stars

Research paper about gender-inclusivity issues found in online CS courses---an an automated tool (AID/Courseware) for detecting those issues.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Education
Social Science
Women's Studies
Material Type:
Primary Source
Date Added:
04/11/2023
Information Security
Unrestricted Use
CC BY
Rating
0.0 stars

This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Upon successful completion of this course, the student will be able to: explain the challenges and scope of information security; explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security; explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry; identify and explain symmetric algorithms for encryption-based security of information; identify and explain public key-based asymmetric algorithms for encryption-based security of information; describe the access control mechanism used for user authentication and authorization; describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce; describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec); explain the importance of physical security and discuss ways to improve physical security of an enterprise; explain the use of such security tools as firewalls and intrusion prevention systems; explain malicious software issues, such as those brought forth by software-based viruses and worms; explain common software security issues, such as buffer overflow; describe the basic process of risk assessment in the context of overall IT security management. (Computer Science 406)

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
04/11/2023