Updating search results...

Search Resources

330 Results

View
Selected filters:
Communication Skills: Listening Skills (PDF)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A chapter on listening skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.

Subject:
Arts and Humanities
Material Type:
Textbook
Provider:
OER Africa
Author:
Chisoni, E
Gulule, M
Maulidi, F
Mkandawire, M
Salanje, G
Samu, S
Sitima, J
Date Added:
02/27/2012
Communication Skills: Writing (PDF)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A chapter on writing skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.

Subject:
Arts and Humanities
English Language Arts
Language, Grammar and Vocabulary
Material Type:
Textbook
Provider:
OER Africa
Author:
Chisoni, E
Gulule, M
Maulidi, F
Mkandawire, M
Salanje, G
Samu, S
Sitima, J
Date Added:
02/27/2012
Communication Skills: Writing Skills (Word)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A chapter on writing skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.

Subject:
Arts and Humanities
English Language Arts
Language, Grammar and Vocabulary
Material Type:
Textbook
Provider:
OER Africa
Author:
Chisoni, E
Gulule, M
Maulidi, F
Mkandawire, M
Salanje, G
Samu, S
Sitima, J
Date Added:
02/27/2012
Comparison of the Effects of Increased CO2 in the Air to Seawater and Distilled Water
Unrestricted Use
CC BY
Rating
0.0 stars

This well-designed experiment compares CO2 impacts on salt water and fresh water. In a short demonstration, students examine how distilled water (i.e., pure water without any dissolved ions or compounds) and seawater are affected differently by increasing carbon dioxide in the air.

Subject:
Applied Science
Career and Technical Education
Environmental Science
Environmental Studies
Oceanography
Physical Science
Material Type:
Activity/Lab
Simulation
Provider:
CLEAN: Climate Literacy and Energy Awareness Network
Provider Set:
CLEAN: Climate Literacy and Energy Awareness Network
Author:
Annika Sabrowski
CarboSchools.org
Patrick Silva
S. Soria-Dengg
Date Added:
06/19/2012
Concept Development Studies in Chemistry
Unrestricted Use
CC BY
Rating
0.0 stars

"Concept Development Studies in Chemistry" is an on-line textbook for an Introductory General Chemistry course. Each module develops a central concept in Chemistry from experimental observations and inductive reasoning. This approach complements an interactive or active learning teaching approach.

Subject:
Chemistry
Physical Science
Material Type:
Textbook
Provider:
BCcampus
Provider Set:
BCcampus Faculty Reviewed Open Textbooks
Author:
John S. Hutchison
Date Added:
01/05/2015
Confidence Intervals
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The applets in this section of Statistical Java allow you to see how levels of confidence are achieved through repeated sampling. The confidence intervals are related to the probability of successes in a Binomial experiment.

Subject:
Mathematics
Statistics and Probability
Material Type:
Activity/Lab
Provider:
Consortium for the Advancement of Undergraduate Statistics Education
Provider Set:
Causeweb.org
Author:
Anderson-Cook, C.
C.Anderson-Cook
Dorai-Raj, S.
Robinson, T.
S.Dorai-Raj
T.Robinson
Date Added:
02/16/2011
Conservation techniques
Unrestricted Use
CC BY
Rating
0.0 stars

This book fosters the recognition of options for making progress toward increased environmental conservation through an understanding of the underlying science and practice of a variety of conservation techniques. Today, there are expected benefits from integrated science and practice, and many people are promoting this as the way forward to improve our environment. Over time, trends emerge regarding the best way to conserve the environment, but so far an outstanding solution has not emerged. Each conservation technique has its foundational concepts, limitations, and implementation issues. Reviewing a collection of techniques provides a basis for considering which approach will be best for any specific environmental challenge. This book should advance the recognition of the challenges managing the environment, techniques that can be used to address the challenges, and the ways they might help foster the integration of science and the practice of ecological conservation.

Subject:
Applied Science
Environmental Science
Material Type:
Textbook
Provider:
Rutgers University
Author:
Marcia S Meixler
Mark B Bain
Date Added:
06/15/2022
Control Charts
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The applets in this section allow you to see how the common Xbar control chart is constructed with known variance. The Xbar chart is constructed by collecting a sample of size n at different times t.

Subject:
Mathematics
Statistics and Probability
Material Type:
Activity/Lab
Provider:
Consortium for the Advancement of Undergraduate Statistics Education
Provider Set:
Causeweb.org
Author:
Anderson-Cook, C.
C. Anderson-Cook
Doria-Raj, S.
Robinson, T.
S. Dorai-Raj
T. Robinson
Date Added:
02/16/2011
Control Using Sound
Read the Fine Print
Educational Use
Rating
0.0 stars

Students gain a deeper understanding of how sound sensors work through a hands-on design challenge involving LEGO MINDSTORMS(TM) NXT taskbots and sound sensors. Student groups each program a robot computer to use to the sound of hand claps to control the robot's movement. They learn programming skills and logic design in parallel. They experience how robots can take sensor input and use it to make decisions to move and turn, similar to the human sense of hearing. A PowerPoint® presentation and pre/post quizzes are provided.

Subject:
Applied Science
Career and Technical Education
Electronic Technology
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Pranit Samarth
Satish S. Nair
Srijith Nair
Date Added:
09/18/2014
Correlation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The applets in this section allow you to see how different bivariate data look under different correlation structures. The Movie applet either creates data for a particular correlation or animates a multitude data sets ranging correlations from -1 to 1.

Subject:
Mathematics
Statistics and Probability
Material Type:
Activity/Lab
Provider:
Consortium for the Advancement of Undergraduate Statistics Education
Provider Set:
Causeweb.org
Author:
Anderson-Cook, C.
C. Anderson-Cook
Dorai-Raj, S.
Robinson, T.
S. Dorai-Raj
T. Robinson
Date Added:
02/16/2011
Cost Comparisons
Read the Fine Print
Educational Use
Rating
0.0 stars

Students learn about the many types of expenses associated with building a bridge. Working like engineers, they estimate the cost for materials for a bridge member of varying sizes. After making calculations, they graph their results to compare how costs change depending on the use of different materials (steel vs. concrete). They conclude by creating a proposal for a city bridge design based on their findings.

Subject:
Applied Science
Architecture and Design
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Denali Lander
Denise W. Carlson
Joe Friedrichsen
Jonathan S. Goode
Malinda Schaefer Zarske
Natalie Mach
Date Added:
10/14/2015
Current and Emerging Trends in the Management of International Disasters
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The book Current and Emerging Trends in the Management of International Disaster explores contemporary practices and strategies in managing global disasters. It offers an overview of current trends, challenges, and innovations in the field, emphasizing the importance of international cooperation and effective management strategies.

Subject:
Social Science
Material Type:
Textbook
Provider:
Mavs Open Press
Author:
Annette Chretien
Brenda Murphy
Bryce Gunson
Christine Raj
Christopher J Ainsworth
Christopher Sheach
Cihan Aydiner
Danielle J. Mayberry
David A. McEntire
Dulce Suarez
Hsin-Hsuan “Shel” Lin
Iuliia Hoban
Jack L. Rozdilsky
Jeffrey Glick
Jennifer Russell
Josh Ayers
Joshua D. McDuffie
Kazi Amdadul Hoque
Kelbie R. Kennedy
Kent Cawley
Kesley J. Richardson
Laura J. Brown
Laura M. Phipps
Logan Gerber-Chavez
Lorraine Schneider
Marc Anthonisen
Marcelo M. Ferreira
Michael Prasad
Mikey Latner
Muhammad Awfa Islam
Oenone Chadburn
Ozzie Baron
Patrick S. Roberts
Ray Hsienho Chang
Rebecca Morgenstern Brenner
Rita V. Burke
Romeo B. Lavarias
Shirley Feldmann-Jensen
Tanya Buhler Corbin
Terrence O’Sullivan
Terry D. Cooper
Yi-En “Mike” Tso
Yungnane Yang
Zawad Ibn Farid
Date Added:
08/29/2024
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Cybersecurity Presentation Series: Part 3 Protection against Ransomware
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems.
Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks?
Attendees will learn about the following topics:
• Background on ransomware.
• Current state-of-the-art Information Technology against ransomware.
• A risk-based protection strategy.
• Practical tools & tips against ransomware.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Author:
Henry S. Teng
Date Added:
04/09/2024
Cybersecurity Presentation Series: Part 4 PCI Credit Card Data Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:

- What is PCI/credit card data security?
- Why do small businesses need to plan for PCI security compliance?
- Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider
and website hosting service provider.
- IT audit requirements and stages for PCI compliance.
 
Presentation Time: 50 minutes plus 10 minutes Q&A.
Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson
Author:
Henry S. Teng
Date Added:
04/12/2024
Cybersecurity Presentation Series: Part 5 HIPAA Healthcare Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).

Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:
- What are the business requirements for HIPAA security?
- What stages of IT audit do small businesses need to plan for HIPAA security compliance?
- What technology and tools can be used to protect HIPAA-related data and to assure compliance?
 
Presentation Time: 50 minutes plus 10 minutes Q&A.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson Plan
Author:
Henry S. Teng
Date Added:
04/13/2024
The DEI Metadata Handbook: A Guide to Diverse, Equitable, and Inclusive Description
Unrestricted Use
CC BY
Rating
0.0 stars

Written primarily for professionals in library and information science but with applicability to archives and other information management industries, this handbook provides an overview of metadata work that focuses on diversity, equity, and inclusion (DEI). DEI metadata work has several goals: enhancing diverse representation in descriptive metadata; improving discovery of diverse resources; and mitigating negative effects of inaccurate, outdated, or offensive terminology. Readers will gain a broad awareness of DEI-related issues in metadata creation and management; learn techniques for retroactively reviewing and updating existing metadata to address these issues; and develop strategies to create metadata that better meets DEI needs.

Subject:
Applied Science
Information Science
Material Type:
Textbook
Provider:
Iowa State University
Author:
Christopher S. Dieckman
H. E. Wintermute
Heather M. Campbell
Hema Thulsidhos
Nausicaa L. Rose
Date Added:
07/29/2024