Updating search results...

Search Resources

4616 Results

View
Selected filters:
Introduction to Computer Science and Programming
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.00 Intro to CS and Programming has been retired from OCW. You can access the archived course on DSpace – MIT’s digital repository. Please see the list of introductory programming courses and other programming courses from recent years.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Grimson, Eric
Guttag, John
Date Added:
09/01/2008
Culturally Responsive Computing: An Introduction into Computer Science, Security, and Technology
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

“Culturally Responsive Computing” is a groundbreaking textbook that addresses the critical intersection of technology and cultural diversity in our increasingly interconnected world. This comprehensive guide delves into how cultural contexts influence every aspect of computing, from the fundamentals of programming languages to the intricacies of human-computer interaction.

The book begins by exploring the cultural dimensions of core computing concepts, including data types, algorithms, and information security. It then expands into more complex topics such as artificial intelligence, user experience design, and the ethical considerations of technology deployment across different cultural landcapes.

Key features of the book include:
o In-depth analysis of how cultural factors impact technology’s design, implementation, and adoption worldwide.
o Exploration of computational thinking techniques that promote inclusive and culturally aware problem-solving.
o Practical strategies for developing culturally sensitive user interfaces and accessible design practices.
o Case studies from diverse global contexts illustrating real-world applications and challenges in cross-cultural computing.
o Ethical considerations in technology design and deployment focus on respecting cultural differences and promoting digital equity.
o Interdisciplinary connections, linking computing concepts with insights from anthropology, psychology, and other relevant fields.

This textbook is an invaluable resource for computer science students, software developers, UX/UI designers, and technology professionals seeking to create more inclusive and globally relevant digital solutions. It challenges readers to think beyond technical specifications and consider the broader cultural implications of their work.

By bridging the gap between technological innovation and cultural understanding, “Computing Across Cultures” prepares the next generation of tech leaders to build a more equitable and culturally responsive digital future. It is an essential read for anyone looking to thrive in the global tech industry and make a positive impact through culturally inclusive computing practices.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Remixing Open Textbooks through an Equity Lens (ROTEL) Project
Author:
Devan J. Walton
Date Added:
08/16/2024
Computers all around
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson gets students thinking about the many ways computers affect our daily lives. They identify types of computers we use, both familiar and unexpected.
Students encounter people who are computer scientists and hear them talk about their adding computer technology to fashion and other everyday needs and uses.
Students imagine how an everyday object could be used differently if it were “computerized.”

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Author:
NYC Computer Science for All
Date Added:
04/01/2021
Introduction to Computer Science II
Unrestricted Use
CC BY
Rating
0.0 stars

This course is a continuation of the first-semester course titled Introduction to Computer Science I. It will introduce the student to a number of more advanced Computer Science topics, laying a strong foundation for future academic study in the discipline. The student will begin with a comparison between Java--the programming language utilized last semester--and C++, another popular, industry-standard programming language. The student will then discuss the fundamental building blocks of Object-Oriented Programming, reviewing what they have learned learned last semester and familiarizing themselves with some more advanced programming concepts. The remaining course units will be devoted to various advanced topics, including the Standard Template Library, Exceptions, Recursion, Searching and Sorting, and Template Classes. By the end of the class, the student will have a solid understanding of Java and C++ programming, as well as a familiarity with the major issues that programmers routinely address in a professional setting. Upon successful completion of this course, the student will be able to: Demonstrate an understanding of the concepts of Java and C++ and how they are used in Object-Oriented Programming; Demonstrate an understanding of the history and development of Object-Oriented Programming; Explain the importance of the C++ Standard Template Library and how basic components are used; Demonstrate a basic understanding of the importance of run-time analysis in programming; Demonstrate an understanding of important sorting and search routines in programming; Demonstrate an understanding of the generic usage of templates in programming for C++ and Java; Compare and contrast the features of Java and C++. (Computer Science 102; See also: Mathematics 303)

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
11/16/2011
Introduction to Computer Science and Programming
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.00SC Intro to CS and Programming has been retired from OCW. You can access the archived course on DSpace – MIT’s digital repository. Please see the list of introductory programming courses and other programming courses from recent years.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Guttag, John
Date Added:
02/01/2011
The Internet: Crash Course Computer Science #29
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Today, we're going to talk about how the Internet works. Specifically, how that stream of characters you punch into your browser's address bar, like "youtube.com", return this very website. Just to clarify we're talking in a broader sense about that massive network of networks connecting millions of computers together, not just the World Wide Web, which is a portion of the Internet, and our topic for next week. Today, we're going to focus on how data is passed back and forth - how a domain name is registered by the Domain Name System, and of course how the data requested or sent gets to the right person in little packets following standard Internet Protocol, or IP. We'll also discuss two different approaches to transferring this data: Transmission Control Protocol, or TCP, when we need to be certain no information is lost, and User Datagram Protocol, or UDP, for those time sensitive applications - because nobody wants an email with missing text, but they also don't want to get lag-fragged in their favorite first person shooter.

Want to run traceroute on your computer? See directions below. Remember you can replace "dftba.com" with whatever website you want!

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
09/20/2017
Computer Science Midterm Paper
Unrestricted Use
CC BY
Rating
0.0 stars

The midterm represents the final week of working in Word. You will be asked to complete documents that demonstrate that you understand basic rules and best practices to ensure your online research is reliable as well as demonstrate skill in the proper use of Word features covered during the first 5 weeks of the course.

Skills & Knowledge Attained:
*Time management – You were asked to think about your midterm topic in week 1 and declare it in a post in week 2 and given several weeks to prepare and do the necessary research. Research document should demonstrate the time provided was used to spread out the work so that it was not done in a rush and/or at the last minute.
*Best practices on how to check a website for accuracy and truth as well as appropriateness as research source.
*Proper application of MLA requirements using Microsoft Word Reference features, such as adding footnotes, citations, and generating a bibliography from correctly added citations as well as placement and content of appropriate header and footer.
*The paper should be an original piece of writing based on properly cited online research, that demonstrates understanding of the topic researched and should explain in your own words, using proper spelling and grammar, what you have learned about your chosen topic.

Subject:
Applied Science
Computer Science
Material Type:
Homework/Assignment
Module
Author:
Maria Julia Sorrentino
Date Added:
03/28/2022
Lecture 1: Probability and Statistics for Computer Science
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture for the course "CS 217 – Probability and Statistics for Computer Science" delivered at the City College of New York in Spring 2019 by Evan Agovino as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Lecture Notes
Lesson Plan
Provider:
CUNY Academic Works
Provider Set:
City College of New York
Author:
Evan Agovino
Nyc Tech-in-residence Corps
Date Added:
05/06/2020
Educational Technology: Crash Course Computer Science #39
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Today we’re going to go a little meta and talk about how computer science can support learning with educational technology. We here at Crash Course are big fans of interactive in-class learning and hands-on experiences, but we also believe in the additive power of educational technology inside and outside the classroom from the Internet itself and Massive Open Online Courses, or MOOCs to AI driven intelligent tutoring systems and virtual reality.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
12/13/2017
Cybersecurity: Crash Course Computer Science #31
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
10/11/2017
Cryptography: Crash Course Computer Science #33
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.

Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
10/25/2017
Registers and RAM: Crash Course Computer Science #6
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Today we’re going to create memory! Using the basic logic gates we discussed in episode 3 we can build a circuit that stores a single bit of information, and then through some clever scaling (and of course many new levels of abstraction) we’ll show you how we can construct the modern random-access memory, or RAM, found in our computers today. RAM is the working memory of a computer. It holds the information that is being executed by the computer and as such is a crucial component for a computer to operate. Next week we’ll use this RAM, and the ALU we made last episode, to help us construct our CPU - the heart of a computer.

*CORRECTION*

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
03/29/2017
Introduction to Computers
Unrestricted Use
CC BY
Rating
0.0 stars

This course is an introduction for non-computer science students. Instead, this course is a gentler, lighter survey course without delving too much into technical details. It will also examine computers from the perspective on how they influence society.

Subject:
Computer Science
Material Type:
Lecture Notes
Author:
V.N. Battu
Date Added:
02/15/2024
Alan Turing: Crash Course Computer Science #15
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Today we’re going to take a step back from programming and discuss the person who formulated many of the theoretical concepts that underlie modern computation - the father of computer science himself: Alan Turing. Now normally we try to avoid “Great Man" history in Crash Course because truthfully all milestones in humanity are much more complex than just an individual or through a single lens - but for Turing we are going to make an exception. From his theoretical Turing Machine and work on the Bombe to break Nazi Enigma codes during World War II, to his contributions in the field of Artificial Intelligence (before it was even called that), Alan Turing helped inspire the first generation of computer scientists - despite a life tragically cut short.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
06/07/2017
Introduction to Computational Thinking and Data Science
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.0002 is the continuation of 6.0001 Introduction to Computer Science and Programming in Python and is intended for students with little or no programming experience. It aims to provide students with an understanding of the role computation can play in solving problems and to help students, regardless of their major, feel justifiably confident of their ability to write small programs that allow them to accomplish useful goals. The class uses the Python 3.5 programming language.

Subject:
Applied Science
Computer Science
Engineering
Mathematics
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Bell, Ana
Grimson, Eric
Guttag, John
Date Added:
09/01/2016
Introduction to Computer Science and Programming in Python
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.0001 Introduction to Computer Science and Programming in Python is intended for students with little or no programming experience. It aims to provide students with an understanding of the role computation can play in solving problems and to help students, regardless of their major, feel justifiably confident of their ability to write small programs that allow them to accomplish useful goals. The class uses the Python 3.5 programming language.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Bell, Ana
Grimson, Eric
Guttag, John
Date Added:
09/01/2016
Introduction to Computer Science and Programming in Python
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.0001 Introduction to Computer Science and Programming in Python is intended for students with little or no programming experience. It aims to provide students with an understanding of the role computation can play in solving problems and to help students, regardless of their major, feel justifiably confident of their ability to write small programs that allow them to accomplish useful goals. The class uses the Python 3.5 programming language.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Bell, Ana
Grimson, Eric
Guttag, John
Date Added:
09/01/2016
Introduction to Computer Science I
Unrestricted Use
CC BY
Rating
0.0 stars

This syllabus contains information, websites, and resources that are freely available to students as an alternative to a single textbook that is purchased. The semester course focuses on two major sections: 1) Learning Microsoft Office 2019 and 2) Computer Concepts. Students should develop a comfortable understanding of working in Microsoft Office 2019 as well as gain knowledge of computer concepts after taking this course.

Subject:
Computer Science
Educational Technology
Information Science
Material Type:
Homework/Assignment
Syllabus
Textbook
Author:
June Claiborne
Date Added:
05/14/2021
Hands-On AI Projects for the Classroom: A Guide for Computer Science Teachers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The projects in this guide use a student-driven approach to learning. Instead of simply learning about AI through videos or lectures, the students completing these projects are active participants in their AI exploration. In the process, students work directly with innovative AI technologies, participate in “unplugged” activities that further their understanding of how AI technologies work, and create various authentic products—from machine learning models to video games—to demonstrate their learning.

Project 1: Programming with Machine Learning
Project 2: AI-Powered Players in Video Games
Project 3: Using AI for Robotic Motion Planning
Project 4: Machine Learning as a Service

Visit the ISTE website with all the free practical guides for engaging students in AI creation: https://www.iste.org/areas-of-focus/AI-in-education

Subject:
Applied Science
Computer Science
Education
Educational Technology
Material Type:
Lesson
Lesson Plan
Module
Unit of Study
Author:
General Motors
International Society for Technology in Education (ISTE)
Date Added:
07/24/2023
Compression: Crash Course Computer Science #21
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

So last episode we talked about some basic file formats, but what we didn’t talk about is compression. Often files are way too large to be easily stored on hard drives or transferred over the Internet - the solution, unsurprisingly, is to make them smaller. Today, we’re going to talk about lossless compression, which will give you the exact same thing when reassembled, as well as lossy compression, which uses the limitations of human perception to remove less important data. From listening to music and sharing photos, to talking on the phone and even streaming this video right now the ways we use the Internet and our computing devices just wouldn’t be possible without the help of compression.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
07/26/2017