Updating search results...

Computer & Digital Technology

149 affiliated resources

Search Resources

View
Selected filters:
Computer Hardware (02:02): Processors
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Before keyboards, printers, even monitors there was processing. Processing is the reason computers are computers. Processing is the ability of the computer to take in raw data and basically make sense of it.

In this video we look at: Microprocessor (CPUs), Moore's Law, and Motherboard.

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Computer Hardware (02:03): Storage
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

We examine storage devices in computers. This storage lecture has been broken up into to two section, this one focuses on hard drives and RAM, the next video covered removable storage devices.

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Computer Hardware (02:06): Output Devices
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in our Computer Hardware lesson, part of the Introduction to Computers course.

This video looks at the most common output devices found on a computer we also list out top 5 resources, be sure to check them out.

http://arstechnica.com/
http://www.cnet.com/
http://www.newegg.com/
http://www.tigerdirect.com/
http://www.tomshardware.com/

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Computer Networks: A Systems Approach
Unrestricted Use
CC BY
Rating
0.0 stars

Suppose you want to build a computer network, one that has the potential to grow to global proportions and to support applications as diverse as teleconferencing, video on demand, electronic commerce, distributed computing, and digital libraries. What available technologies would serve as the underlying building blocks, and what kind of software architecture would you design to integrate these building blocks into an effective communication service? Answering this question is the overriding goal of this book—to describe the available building materials and then to show how they can be used to construct a network from the ground up.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Author:
Bruce Davie
Larry Peterson
Date Added:
04/11/2023
Computer Software (03:01): Software Basics
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The first video in the Computer Software series, part of our Introduction to Computers course. This video looks at the general types of software, software development, the software development life cycle, as well as explains what computer programers do.

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Computer Software (03:02): Boot Process
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Welcome to one of the most geeky videos in the entire series. This video will introduce you to the computer boot process, the way a computer starts from the moment you turn the computer on, till the operating system kicks in.

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Computer Software (03:04): Types of Operating System
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

In the previous video we looked at the basics of operating systems. In this video we take a look at the current operating systems available to consumer. In addition to looking at Windows, we also cover the current Mac OS X, Linux and Mobile Operating systems.

Links from video:
http://www.ubuntu.com/
http://knopper.net/knoppix/index-en.html

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Computer Software (03:05): Application Software
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Computer Software lesson, part of our Introduction to Computers curriculum.

In this video we look at the types of application users can find. We talk about business software and personal software. We also give our 3-5 to picks for viewers to check out.

Links from video:
http://www.lynda.com/
http://teamtreehouse.com/
https://www.udemy.com/courses/
https://evernote.com/
http://www.openoffice.org/
http://www.mozilla.org/en-US/thunderbird/
http://bricklin.com/history/vcexecutable.htm
http://www.cultofmac.com/90060/how-to-completely-uninstall-software-under-mac-os-x-macrx/
https://reporting.bsa.org/r/report/add.aspx?src=us&ln=en-us

Subject:
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Computer Usage and Applications
Unrestricted Use
CC BY
Rating
0.0 stars

This core Computer Usage and Applications text provides a survey of computer skills necessary to succeed in professional and academic careers. This includes a survey of Operating Systems, Microsoft Office applications such as Word, Excel, Access and PowerPoint, as well as Google Apps. There is a focus on analyzing and solving business problems in the most efficient way possible. Students are given clear, easy-to-follow instructions for each skill presented and are also provided with opportunities to learn additional skills related to the personal and professional objectives presented. Students will learn the objectives with detailed instruction in the ‘Learn It’ and ‘Practice’ assignments; and expand their knowledge with ‘Master’ and ‘Challenge It’ activities. Students are challenged to use critical thinking to solve real world scenarios. For example, ‘fix-it’ case studies are included so students gain an appreciation for the real world application of these technologies. Computer Usage and Applications is an independent publication and is not affiliated with, nor has it been authorized, sponsored, or otherwise approved by Microsoft Corporation. Our adapted work uses all Microsoft screenshots under fair use. If you plan to redistribute our book, please consider whether your use is also fair use.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Textbook
Provider:
Maricopa Open Digital Press
Author:
Abigail Rusu
Aleta Butler
Jessica Parsons
Date Added:
05/18/2021
Concord Consortium: Electric Current
Read the Fine Print
Educational Use
Rating
0.0 stars

This 90-minute activity features six interactive molecular models to explore the relationships among voltage, current, and resistance. Students start at the atomic level to explore how voltage and resistance affect the flow of electrons. Next, they use a model to investigate how temperature can affect conductivity and resistivity. Finally, they explore how electricity can be converted to other forms of energy. The activity was developed for introductory physics courses, but the first half could be appropriate for physical science and Physics First. The formula for Ohm's Law is introduced, but calculations are not required. This item is part of the Concord Consortium, a nonprofit research and development organization dedicated to transforming education through technology. The Concord Consortium develops deeply digital learning innovations for science, mathematics, and engineering.

Subject:
Applied Science
Chemistry
Education
Engineering
Physical Science
Physics
Material Type:
Activity/Lab
Data Set
Diagram/Illustration
Interactive
Lecture Notes
Provider:
Concord Consortium
Provider Set:
Concord Consortium Collection
Date Added:
03/10/2013
Concord Consortium: Solar Oven
Read the Fine Print
Educational Use
Rating
0.0 stars

Elementary grade students investigate heat transfer in this activity to design and build a solar oven, then test its effectiveness using a temperature sensor. It blends the hands-on activity with digital graphing tools that allow kids to easily plot and share their data. Included in the package are illustrated procedures and extension activities. Note Requirements: This lesson requires a "VernierGo" temperature sensing device, available for ~ $40. This item is part of the Concord Consortium, a nonprofit research and development organization dedicated to transforming education through technology. The Consortium develops digital learning innovations for science, mathematics, and engineering.

Subject:
Physical Science
Physics
Material Type:
Activity/Lab
Diagram/Illustration
Lecture Notes
Provider:
Concord Consortium
Provider Set:
Concord Consortium Collection
Date Added:
04/02/2013
Creating Comics | Media Arts Toolkit
Read the Fine Print
Educational Use
Rating
0.0 stars

Reading and creating comic strips and comic books are engaging ways to promote literacy at any grade level and across content areas. The students in this video are members of a high school comic book club and have access to drawing tablets and Adobe Photoshop, so they can achieve sophisticated results. Even without such software, however, teachers can still integrate digital comics into a wide range of teaching situations.

There are a number of comic books, especially contemporary ones, that are not “school appropriate,” so you might want to guide students’ web research on comic books.

Subject:
Earth and Space Science
Geoscience
Mathematics
Trigonometry
Material Type:
Activity/Lab
Provider:
PBS LearningMedia
Date Added:
05/12/2023
Cyberbullying And Impacts of Cyberbullying
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

CYBER BULLYING

Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyber bullying crosses the line into unlawful or criminal behavior.

The most common places where cyber bullying occurs are:

Social Media, such as Facebook, Instagram, Snapchat, and Twitter
SMS (Short Message Service) also known as Text Message sent through devices
Instant Message (via devices, email provider services, apps, and social media messaging features)
Email.

WHERE IS CYBERBULLYING OCCURING ?

Manuals to educate the public, teachers and parents summarize, "Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet." Research, legislation and education in the field are ongoing. Research has identified basic definitions and guidelines to help recognize and cope with what is regarded as abuse of electronic communications.

Cyberbullying involves repeated behavior with intent to harm.
Cyberbullying is perpetrated through harassment, cyberstalking, denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), impersonation, and exclusion (intentionally and cruelly excluding someone from an online group)
Cyberbullying can be as simple as continuing to send emails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, sexual remarks, pejorative labels (i.e., hate speech) or defamatory false accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person. Cyberbullying could be limited to posting rumors about a person on the internet with the intention of bringing about hatred in others' minds or convincing others to dislike or participate in online denigration of a target. It may go to the extent of personally identifying victims of crime and publishing materials severely defaming or humiliating them.

Cyberbullies may disclose victims' personal data (e.g. real name, home address, or workplace/schools) at websites or forums or may use impersonation, creating fake accounts, comments or sites posing as their target for the purpose of publishing material in their name that defames, discredits or ridicules them. This can leave the cyberbully anonymous which can make it difficult for the offender to be caught or punished for their behavior, although not all cyberbullies maintain their anonymity. Text or instant messages and emails between friends can also constitute cyber bullying if what is said or displayed is hurtful to the participants.
The recent use of mobile applications and rise of smartphones have yielded to a more accessible form of . It is expected that cyber bullying via these platforms will be associated with bullying via mobile phones to a greater extent than exclusively through other more stationary internet platforms. In addition, the combination of cameras and Internet access and the instant availability of these modern smartphone technologies yield themselves to specific types of cyber bullying not found in other platforms. It is likely that those cyber bullied via mobile devices will experience a wider range of cyber bullying types than those exclusively bullied elsewhere.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Material Type:
Homework/Assignment
Author:
Mounika
Date Added:
04/11/2023
Database (08:01): Database Fundamentals
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The first video in our database lesson, part of the Introduction to Computer series.
This video looks at the basics of databases. We define database, as well as key terms to know.

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Database (08:02): Database Management Systems
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Database Management Systems is the software that allows us to create and use a database. This video looks at the DBMS, their functions, some examples of popular software solutions and a quick look at Structured Query Language (SQL)

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Database (08:03): Database Models
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The database management software is the program used to create and mange the database. The database model is the architecture the DBMS used to store objects within that database.

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Database (08:04): Some Final Bits
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our final database video. This one looks at some odds and ends. We examine: Data Warehouse, Data Mining, Big Data. I also talk about the ethics of data mining from the NSA and CDC, and how they are different.

We also give out top picks for the lesson.

Links from Video:
•http://www.w3schools.com/sql/
•What is Database & SQL by Guru99 http://youtu.be/FR4QIeZaPeM
•What is a database http://youtu.be/t8jgX1f8kc4
•MySQL Database For Beginners https://www.udemy.com/mysql-database-for-beginners2/

Subject:
Business and Communication
Computer, Networking and Telecommunications Systems
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
05/02/2023
Designing the Digital World
Unrestricted Use
CC BY
Rating
0.0 stars

The book offers a blend of theory and practice in guiding readers to apply design thinking principles to solving some of our world’s biggest problems. At the same time, readers are encouraged to become aware of new and emerging technologies that make prototyping and applying solutions a reality.

Subject:
Computer Science
Computer, Networking and Telecommunications Systems
Information Science
Visual Arts
Visual Arts and Design
Material Type:
Textbook
Provider:
Open Press at NUI Galway
Author:
Eileen Kennedy
Date Added:
05/31/2021
Dew Point
Read the Fine Print
Educational Use
Rating
0.0 stars

Determine the dew point temperature for your classroom through a hands-on experiment. Use humidity and temperature probes to investigate the temperature at which it would rain in your classroom! Learn about water density and the conditions necessary to produce fog or rain.

Subject:
Atmospheric Science
Earth and Space Science
Mathematics
Physical Science
Physics
Material Type:
Activity/Lab
Diagram/Illustration
Lecture Notes
Provider:
Concord Consortium
Provider Set:
Concord Consortium Collection
Date Added:
12/13/2011