Updating search results...

Search Resources

342 Results

View
Selected filters:
  • Computer Science
Computer Science I - Version 1.3.7
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This textbook covers the traditional introductory Computer Science I topics but takes a unique approach. Topics are covered in a language-agnostic manner in the first part with supplemental parts that cover the same concepts in a specific language. The current version covers C, Java, and PHP. This textbook as been used in several Computer Science I sections over multiple years at the University of Nebraska-Lincoln

Table of Contents
I. The C Programming Language

II. The Java Programming Language

III. The PHP Programming Language

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Chris Bourke
Date Added:
05/05/2021
Computer Science I - Version 1.3.7
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This textbook covers the traditional introductory Computer Science I topics but takes a unique approach. Topics are covered in a language-agnostic manner in the first part with supplemental parts that cover the same concepts in a specific language. The current version covers C, Java, and PHP. This textbook as been used in several Computer Science I sections over multiple years at the University of Nebraska-Lincoln.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Chris Bourke
Date Added:
10/26/2023
Computer Skills and Literacy
Unrestricted Use
CC BY
Rating
0.0 stars

This course explores a variety of topics in computing, such as the following: the components of a computer, common computer terminology, an introduction to the Internet, computer security and privacy, computer troubleshooting techniques, and steps to maintain the life of your computer.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Activity/Lab
Full Course
Homework/Assignment
Reading
Syllabus
Provider:
The Saylor Foundation
Date Added:
04/29/2019
Computer Skills for Success: A Step by Step guide
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This introductory class of computer skills is comprised of units that focus on basic computer hardware and the following applications: Word 2010, Excel 2010, PowerPoint 2010, Photo Gallery, and Audacity. Most units begin with YouTube overviews or 'how to' presentations followed by step by step guides to using aspects of the application and then have assessment exercises and conclude with a final project for evaluation.

Subject:
Applied Science
Computer Science
Material Type:
Assessment
Full Course
Lecture
Date Added:
09/30/2013
Computing Project Management
Unrestricted Use
CC BY
Rating
0.0 stars

There is an increasing demand in the industry for graduates with problem solving skills; those with the capability of applying the theories, methods and techniques learnt during their degree programme in solving real life problems. The goal behind applied computer science programme is to produce such graduates who can easily integrate into the industry immediately after college and become indispensable problem solvers. Another goal of the applied computer science programme is to produce entrepreneurs who can create opportunities and bring about innovative solutions. Knowing fully well the demand of the industry, Project 2 has been designed to help students consolidate the knowledge and skills acquired during the course of the degree programme by developing systems (hardware or software) that are applicable to the market. Such systems as a matter of fact should contribute by addressing gaps in the market and should mainly target areas that need solutions unique to the African region. This is not in any way to limit students’ horizon; they should think globally but be able also to customize their solutions to the region.

Subject:
Applied Science
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Victor Odumuyiwa
Date Added:
04/06/2018
Computing and Society
Unrestricted Use
CC BY
Rating
0.0 stars

The primary goal of the course is to develop computer professionals able to explore the implications of what computing professionals create as part of their work and how this impacts society at large. It will help the learner to understand the development, application and consequences of computing technology in relation to society.

In this course, you will learn about the history of computing; principles, concepts and terminology of computing, software uses, application and development; role of computing professionals; current computing technologies and their use in everyday life, examination of variety of computing perspectives such as access to information, privacy, computer security, virtual society, transformation of work and workplace; social, ethical and legal issues and their implications to computing in our daily lives as a society; professional aspects of computing.

Subject:
Applied Science
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
William Korir
Date Added:
12/27/2018
Conversational Computer Systems, Fall 2008
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

" This class explores interaction with mobile computing systems and telephones by voice, including speech synthesis, recognition, digital recording, and browsing recorded speech. Emphasis on human interface design issues and interaction techniques appropriate for cognitive requirements of speech. Topics include human speech production and perception, speech recognition and text-to-speech algorithms, telephone networks, and spatial and time-compressed listening. Extensive reading from current research literature."

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Schmandt, Christopher
Date Added:
01/01/2008
Creation of MS Word Document
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Learners will format and save a basic MS Word document to be used for a number of different purposes.

Learning Objectives
Learners will list the benefits of using a MS Word document for various purposes

Learners will enter and format a text document using basic MS tools

Learners will cut, copy and paste document content using menu options

Learners will save a file both on the computer and to a flash drive

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Date Added:
09/18/2018
Cryptography
Unrestricted Use
CC BY
Rating
0.0 stars

This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that you complete an abstract algebra course (such as the Saylor FoundationĺÎĺ_ĺĚĺ_s MA231) before taking this course. Upon successful completion of this course, students will be able to: explain how symmetric and asymmetric key ciphers work; list and define cryptographyĺÎĺ_ĺĚĺ_s goals; list and define the most common classical ciphers; explain the workings of mechanical ciphers Enigma and Lorenz; describe the principles of substitution-permutation networks; describe the algorithms for data encryption and the advanced encryption standard; describe and use the MD5 and SHA-1 hash functions; explain the idea behind public key cryptography; use the RSA cryptography system by applying it to practical problems; test whether the large integer is prime with the mathematical tools presented in this course; define the elliptic curve and use it in cryptography; explain the Diffie-Hellman key exchange; describe the most common signature and autokey identity schemes; describe the conceptual workings of public key infrastructure. This free course may be completed online at any time. (Computer Science 409)

Subject:
Applied Science
Computer Science
Material Type:
Assessment
Full Course
Homework/Assignment
Lecture
Reading
Syllabus
Textbook
Provider:
The Saylor Foundation
Date Added:
04/29/2019
The Crystal Ball Instruction Manual Volume One: Introduction to Data Science
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

A perfect introduction to the exploding field of Data Science for the curious, first-time student. The author brings his trademark conversational tone to the important pillars of the discipline: exploratory data analysis, choices for structuring data, causality, machine learning principles, and introductory Python programming using open-source Jupyter Notebooks. This engaging read will allow any dedicated learner to build the skills necessary to contribute to the Data Science revolution, regardless of background.

Table of Contents
1 Introduction
2 A trip to Jupyter
3 Three kinds of atomic data
4 Memory pictures
5 Calculations
6 Scales of measure
7 Three kinds of aggregate data
8 Arrays in Python (1 of 2)
9 Arrays in Python (2 of 2)
10 Interpreting Data
11 Assoc. arrays in Python (1 of 3)
12 Assoc. arrays in Python (2 of 3)
13 Assoc. arrays in Python (3 of 3)
14 Loops
15 EDA: univariate
16 Tables in Python (1 of 3)
17 Tables in Python (2 of 3)
18 Tables in Python (3 of 3)
19 EDA: bivariate (1 of 2)
20 EDA: bivariate (2 of 2)
21 Branching
22 Functions (1 of 2)
23 Functions (2 of 2)
24 Recoding and transforming
25 Machine Learning: concepts
26 Classification: concepts
27 Decision trees (1 of 2)
28 Decision trees (2 of 2)
29 Evaluating a classifier

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
University of Mary Washington
Stephen Davies
Date Added:
10/08/2020
Cultures of Computing, Fall 2011
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course examines computers anthropologically, as artifacts revealing the social orders and cultural practices that create them. Students read classic texts in computer science along with cultural analyses of computing history and contemporary configurations. It explores the history of automata, automation and capitalist manufacturing; cybernetics and WWII operations research; artificial intelligence and gendered subjectivity; robots, cyborgs, and artificial life; creation and commoditization of the personal computer; the growth of the Internet as a military, academic, and commercial project; hackers and gamers; technobodies and virtual sociality. Emphasis is placed on how ideas about gender and other social differences shape labor practices, models of cognition, hacking culture, and social media.

Subject:
Anthropology
Applied Science
Computer Science
Social Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Stefan Helmreich
Date Added:
01/01/2011
Data Communication and Computer Networks
Unrestricted Use
CC BY
Rating
0.0 stars

Progressively more, people and organizations depend on the availability of computer networks to carry out various activities such as professional, academic or leisure. Computer networks have become a critical piece of any information system.

Imagine a single computer without being connected to any other computer: this machine will only have access to your information (found on your Hard Disk) or information that may come from floppies, flashes, CD’s and DVD’s.

When a computer is connected to a computer network, you can have access to information that comes to you and to present information on other computers connected to the same network, allowing a much larger number of possible information to access through that computer. However, it must recognize that computer networks today have little to do with networks used for several years, taking advantage of technological advances in transmission capacity of the physical, logical means, processing capacity of the equipment and functionality of the protocols and applications.

Throughout the module will use the term “computer network” when we want to mention a collection of autonomous computers connected by a single technology. Two computers are interconnected when they can exchange information. The connection do not need to be made by a copper wire; they can also use optical fibers, microwaves, infrared waves, and communication satellites. There are networks in many sizes, shapes and forms, as we shall focus on.

Subject:
Applied Science
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Janvier Gasuhuke
Date Added:
12/27/2018
Data Structure and Algorithms
Unrestricted Use
CC BY
Rating
0.0 stars

“Every program depends on algorithms and data structures, but few programs depend on the invention of brand new ones.”! “I will, in fact, claim that the difference between a bad programmer and a good one is whether he considers his code or his data structures more important. Bad programmers worry about the code. Good programmers worry about data structures and their relationships.”!

This course introduces students to data structures and algorithms, and how data structures can be created and used. The application of data structures will be presented on the basis of various algorithms. This course teaches learners the way information is organized in the computer and which have an impact on the performance of the computer. The purpose of this course is to provide the students with solid foundations in the basic concepts of programming: data structures and algorithms. The main objective of the course is to teach the students how to select and design data structures and algorithms that are appropriate for problems that they might encounter. This course is also about showing the correctness of algorithms and studying their computational complexities. This course offers the students a mixture of theoretical knowledge and practical experience. The study of data structures and algorithms is carried out within an object-oriented framework. When implementations are considered, the Java programming language is used.

Subject:
Applied Science
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Harrison Njoroge
Date Added:
02/22/2018
Data Warehousing and Mining
Unrestricted Use
CC BY
Rating
0.0 stars

This course focuses on basic and advanced techniques on data warehousing and data mining, the study of the processing, modelling, querying, organizing, classifying documents, identifying association rules and categorization.

Subject:
Applied Science
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Fekade Getahun
Date Added:
12/27/2018
Database Design-2nd Edition
Unrestricted Use
CC BY
Rating
0.0 stars

Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
BCcampus
Provider Set:
BCcampus Open Textbooks
Author:
Adrienne Watt
Nelson Eng
Date Added:
11/26/2014
Database, Internet, and Systems Integration Technologies, Fall 2013
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to components and middleware. Introduction to design and implementation of multi-tier architectures, benchmarks, and performance. Data networking protocols and technologies. Students complete project that covers requirements/design, data model, database implementation, web site, and system architecture. This course is an intensive review of information technology. It covers topics in software development methods, data modeling and databases, application development, Web standards and development, system integration, security, and data communications. Most of the homework sets lead the class through a project in which a database and Web application are designed and constructed, using good software process and addressing security, network and other issues. The project, which is done in two-person teams, provides hands-on experience to complement the lectures and readings. Recitations discuss readings and provide more detailed information on the software tools used. The course goal is to cover the key concepts in the major areas of information technology, to enable students to successfully understand, work with and manage IT efforts as part of supply chain, transportation or civil engineering projects.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Kocur, George
Date Added:
01/01/2013
Deep into Pharo
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Pharo is a clean, innovative, open-source, live-programming environment.

Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.

You will explore the language with chapters on exceptions, blocks, small integers, and floats.

You will discover tools such as profilers, Metacello and Gofer.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alexandre Bergel
Damien Cassou
Jannik Laval
Stéphane Ducasse
Date Added:
04/24/2019
Deep into Pharo
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Pharo is a clean, innovative, open-source, live-programming environment.

Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.

You will explore the language with chapters on exceptions, blocks, small integers, and floats.

You will discover tools such as profilers, Metacello and Gofer.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alexandre Bergel
Damien Cassou
Jannik Laval
Stéphane Ducasse
Date Added:
10/26/2023
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s.

This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next.

Table of Contents
Introduction: Why Digital Security?
Part 1: An Introduction to Cryptography
Part 2: Digital Suppression of Social Movements (in the US)
Part 3: Defending Social Movements (in the US)
Conclusion: Selecting Digital Security Tools

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Textbook
Author:
Glencora Borradaile
Date Added:
05/05/2021
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s.

This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Glencora Borradaile
Date Added:
10/26/2023