Word Count: 43386 (Note: This resource's metadata has been created automatically by …
Word Count: 43386
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: This book provides an introduction to the genetic concepts of …
Short Description: This book provides an introduction to the genetic concepts of reproductive systems, recombination, mutation, segregation and linkage analysis, inbreeding, quantitative inheritance, fertility regulation, population genetics and polyploidy.
Long Description: This book provides an introduction to the genetic concepts of reproductive systems, recombination, mutation, segregation and linkage analysis, inbreeding, quantitative inheritance, fertility regulation, population genetics and polyploidy.
Word Count: 61452
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This collection uses primary sources to explore Arthur Miller's The Crucible. Digital …
This collection uses primary sources to explore Arthur Miller's The Crucible. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
This archive contains a series of lessons on cryptography suitable for use …
This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.
The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this archive.
A perfect introduction to the exploding field of Data Science for the …
A perfect introduction to the exploding field of Data Science for the curious, first-time student. The author brings his trademark conversational tone to the important pillars of the discipline: exploratory data analysis, choices for structuring data, causality, machine learning principles, and introductory Python programming using open-source Jupyter Notebooks. This engaging read will allow any dedicated learner to build the skills necessary to contribute to the Data Science revolution, regardless of background.
At the end of a six-year armed conflict called the Cuban Revolution, …
At the end of a six-year armed conflict called the Cuban Revolution, Fidel Castro’s 26th of July Movement ousted Cuban President Fulgencio Batista on January 1, 1959, and ushered in a new government. Within months, as Castro began to implement policies and align with the communist Soviet Union, hundreds of thousands fled Cuba for the United States. Most were educated members of the upper and middle classes. Many of these immigrants, termed “exiles” and “refugees,” believed their stay in the United States was temporary because Castro’s government would be short-lived. As Castro’s regime persisted, they realized their flight could be permanent. Pushed out by the consequences of the Revolution, the influx of refugees swelled the Cuban population of the United States from 79,000 in 1960 to 439,000 by 1970. Cubans settled across the country, with the most significant community in Miami, Florida, followed by Union City, New Jersey.
This textbook aims to provide an introduction to the field of cultural …
This textbook aims to provide an introduction to the field of cultural anthropology. The initial chapters introduce the concept of culture and review the historical, theoretical, and methodological influences on the field. Chapters four through twelve discuss the major domains of the study of culture; symbolism, communication, ritual, production, healing, rights, reproduction, kinship, conflict, and globalization. These chapters provide ethnographic examples (both etic and emic perspectives) and case studies to support the central concepts in each chapter. Additional case studies are available via the Anthrobase website and others can be developed in wikibook format and integrated through links in this book.
GEOG 571 explores the relationships between culture and civil security and the …
GEOG 571 explores the relationships between culture and civil security and the process of geographically analyzing social, political, economic, and demographic information to understand human history, institutions, and behaviors. It is an elective course in the Geospatial Intelligence Certificate, the Intercollege Master of Professional Studies (iMPS-HLS), and the Master of Geographic Information Systems degree program that is offered exclusively through Penn State's World Campus. It is also one of the optional capstone courses that leads to Penn State's Postbaccalaureate Certificate in GIS. The course consists of projects, associated readings, and exams.
This Module examines the ways in which culture influences the daily interactions …
This Module examines the ways in which culture influences the daily interactions that occur across all classrooms and provides practice for enhancing culturally responsive teaching (est. completion time: 1 hour).
Short Description: Este libro de texto busca fomentar el visionado crítico de …
Short Description: Este libro de texto busca fomentar el visionado crítico de productos audiovisuales contemporáneos y el reflexionar sobre la representación de las culturas hispanas en webseries y vídeos musicales. This textbook aims to promote critical viewing of contemporary audiovisual products and thinking about the representation of Hispanic cultures in web series and music videos.
Long Description: Culturas hispanas a través de la pantalla busca fomentar el visionado crítico de productos audiovisuales contemporáneos y el reflexionar sobre la representación de las culturas hispanas en webseries y vídeos musicales. La difusión y la popularidad de estos dos géneros justifican que se les dedique espacio en el currículo junto a otros géneros audiovisuales más consagrados, caso de los cortos y los largometrajes. El libro se ofrece en inglés y en español para que pueda ser utilizado en una amplia variedad de disciplinas académicas. Asimismo, el libro está organizado en unidades didácticas independientes, las cuales presentan diferentes estructuras y temáticas de forma que el profesor/a pueda seleccionar aquellas que mejor se ajusten a los objetivos concretos de su curso. Hispanic Cultures Through the Screen aims to promote critical viewing of contemporary audiovisual products and thinking about the representation of Hispanic cultures in web series and music videos. Increasing popularity of these two genres justify dedicating part of the curriculum to them along with other more established audiovisual genres, such as short and feature films. The book is presented in English and Spanish so that it can be used in a wide variety of courses. Finally, it is organized into separate units (each based on a different audiovisual product) with different themes, structures and length, so that teachers can select those units that interest them the most for a specific course.
Word Count: 52525
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This workbook provides a 'how to' guide to developing effective curriculum session …
This workbook provides a 'how to' guide to developing effective curriculum session design. It offers activities and planning tools to enable the end user to review, design and complete their own teaching plans.
This is a unit of study whose competency is selecting ICT resources …
This is a unit of study whose competency is selecting ICT resources to support curriculum outcomes. The objective for teachers is to make the best use of ICT in order to enhance teaching and learning.
This economics course provides an introduction to the field of cybersecurity through …
This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.
Systems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.
This lecture presents information about cybercrime, which has become the most ubiquitous …
This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.
This presentation covers the legal environment of cybercrime to date. It addresses: …
This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. state jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.
The goals of this activity are to facilitate team work, critical thinking, …
The goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.
This is an activity the goals of which are to facilitate team …
This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.