Updating search results...

Search Resources

2887 Results

View
Selected filters:
  • Computer Science
Academic Integrity at Mount Saint Vincent University
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Short Description:
An interactive approach to conveying the values of academic integrity, clarifying the meaning of plagiarism, and introducing the basics of citations.

Long Description:
After working through the Academic Integrity pressbook, students will be able to explain the six fundamental values of academic integrity, identify unethical academic behaviours, and will be familiar with the university’s policy and procedures for academic integrity violations. They will have developed an understanding of plagiarism as a form of misrepresentation, will be able to describe how citations work and will be aware of quoting and paraphrasing properly. Students will be able to explain the university services available to them if they need assistance with their work.

Original version attribution to:

Academic Integrity by Ulrike Kestler. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Word Count: 6658

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Mount Saint Vincent University
Date Added:
09/01/2022
Academic Library Instruction
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

A Fall 2019 Primer for the Fledgling Information Professional

Word Count: 18954

Included H5P activities: 6

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
rebwn
Date Added:
12/12/2019
Accessibility Evaluation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity guides students through the evaluation of a website that they have created to see if it is accessible for users with disabilities. Students will simulate a number of different disabilities (e.g. visual impairments, color blindness, auditory impairments, motor impairments) to see if their website is accessible; they will also use automated W3 and WAVE tools to evaluate their sites. Students will consider the needs of users with disabilities by creating a persona and scenario of a user with disabilities interacting with their site. Finally, students will write up recommendations to change their site and implement the changes.

Comments
Although this activity can be used in isolation, it is intended to be part of a series guiding students towards the creation of a front-end of a website. The series (all published as OER) consist of:

a) Needfinding
b) Personas, Scenarios and Storyboards
c) Front-end Website Design and Development
d) Accessibility Evaluation

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Brooklyn College
Author:
Devorah Kletenik
Date Added:
09/03/2020
Accessibility: the Whys and the Hows
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.

Comments
These slides use Poll Everywhere polls; to use them, create your own Poll Everywhere account and duplicate the polls.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Brooklyn College
Author:
Devorah Kletenik
Date Added:
09/03/2020
Activity: Cognitive Styles End-of-Term Reflection
Unrestricted Use
CC BY
Rating
0.0 stars

What are your facet values when using software? What's one situation when your facet values might change? How did identifying your facet values affect your understanding of how you use software?

Subject:
Computer Science
Engineering
Information Science
Material Type:
Activity/Lab
Homework/Assignment
Author:
Lara Letaw
GenderMag Project
Date Added:
11/16/2021
Activity: Cognitive Styles Reflection
Unrestricted Use
CC BY
Rating
0.0 stars

What are your facet values when using software? What's one situation when your facet values might change? How did identifying your facet values affect your understanding of how you use software?

Subject:
Computer Science
Engineering
Information Science
Material Type:
Activity/Lab
Homework/Assignment
Author:
Lara Letaw
GenderMag Project
Date Added:
11/15/2021
Activity: Cognitive Styles Reflection (Team/Project)
Unrestricted Use
CC BY
Rating
0.0 stars

What cognitive styles do you use to interact with technology? PRE-REQ: https://www.oercommons.org/courseware/lesson/87536 LAST UPDATE: Changed title

Subject:
Computer Science
Engineering
Information Science
Psychology
Material Type:
Activity/Lab
Homework/Assignment
Author:
Lara Letaw
GenderMag Project
Date Added:
11/06/2021
Activity: Cognitive Styles Reflection with GenderMag Personas
Unrestricted Use
CC BY
Rating
0.0 stars

Reflection assignment about cognitive styles used to interact with technology. Includes reflection questions about relating to the GenderMag personas.

Subject:
Computer Science
Engineering
Information Science
Material Type:
Activity/Lab
Homework/Assignment
Author:
Lara Letaw
GenderMag Project
Date Added:
11/15/2021
Activity Tracker Improvement
Unrestricted Use
CC BY
Rating
0.0 stars

In this project, students will start by discussing the strengths and weaknesses of existing activity trackers and determining the variables that affect the accuracy of these trackers. Students will then conduct interviews with people who wear activity trackers or wear a tracker themselves for a week to determine the pros, cons, and accuracies of the trackers. Then, codes and algorithms will be used to determine what should count as the threshold for a step to achieve maximum tracker accuracy by using Sparkfun Inventor's Kit, Raspberry Pi, and Linux.

Subject:
Computer Science
Material Type:
Lesson Plan
Author:
Marie Caniglia
Date Added:
03/25/2019