Students will recognize that computer science is so important because it can …
Students will recognize that computer science is so important because it can be found in almost every career. Don't wait, start learning how to code today.
This resource contains several ready made curricula for lower primary students. The …
This resource contains several ready made curricula for lower primary students. The resources are easy to use and contain all of the information a teacher would need to teach the lessons/units.
6.823 is a course in the department’s “Computer Systems and Architecture” concentration. …
6.823 is a course in the department’s “Computer Systems and Architecture” concentration. 6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers.
This class covers topics on the engineering of computer software and hardware …
This class covers topics on the engineering of computer software and hardware systems. Topics include techniques for controlling complexity; strong modularity using client-server design, operating systems; performance, networks; naming; security and privacy; fault-tolerant systems, atomicity and coordination of concurrent activities, and recovery; impact of computer systems on society.
6.858 Computer Systems Security is a class about the design and implementation …
6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
The text, labs, and review questions in this book are designed as …
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security (cybersecurity). With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
Word Count: 42351 (Note: This resource's metadata has been created automatically by …
Word Count: 42351
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This lesson centers around the How AI Works: Computer Vision video from …
This lesson centers around the How AI Works: Computer Vision video from the How AI Works video series. Watch this video first before exploring the lesson plan.
Students learn how computer vision works. They first look at optical illusions to identify the features of the drawing that their eyes noticed. Students watch a video explaining computer vision and how a computer "sees". They design an algorithm that uses a network to decide what number the seven segment display is displaying. Finally, students test their algorithm.
This lesson can be taught on its own, or as part of a 7-lesson sequence on How AI Works. Duration: 45 minutes
This lesson gets students thinking about the many ways computers affect our …
This lesson gets students thinking about the many ways computers affect our daily lives. They identify types of computers we use, both familiar and unexpected. Students encounter people who are computer scientists and hear them talk about their adding computer technology to fashion and other everyday needs and uses. Students imagine how an everyday object could be used differently if it were “computerized.”
Word Count: 17425 (Note: This resource's metadata has been created automatically by …
Word Count: 17425
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This course is designed to familiarize students with basic computer architecture and …
This course is designed to familiarize students with basic computer architecture and operating systems and the relationships between hardware and operating systems will be explored. A student who successfully completes this course will also be able to gain strong foundation in the core fundamentals of digital technology. Basic concepts are reinforced by exercises, and hand-on applications. Students will also program and run simple macros in Linux shell. Employability skills, such as Problem solving, Teamwork, Communications and Critical Thinking are integrated into the course work. 4 hours’ lecture. All course content created by Syeda Ferdous Arar Begum. Content added to OER Commons by Joanna Gray.
This subject is a computer-oriented introduction to probability and data analysis. It …
This subject is a computer-oriented introduction to probability and data analysis. It is designed to give students the knowledge and practical experience they need to interpret lab and field data. Basic probability concepts are introduced at the outset because they provide a systematic way to describe uncertainty. They form the basis for the analysis of quantitative data in science and engineering. The MATLAB® programming language is used to perform virtual experiments and to analyze real-world data sets, many downloaded from the web. Programming applications include display and assessment of data sets, investigation of hypotheses, and identification of possible casual relationships between variables. This is the first semester that two courses, Computing and Data Analysis for Environmental Applications (1.017) and Uncertainty in Engineering (1.010), are being jointly offered and taught as a single course.
This course introduces abstraction as an important mechanism for problem decomposition and …
This course introduces abstraction as an important mechanism for problem decomposition and solution formulation in the biomedical domain, and examines computer representation, storage, retrieval, and manipulation of biomedical data. As part of the course, we will briefly examine the effect of programming paradigm choice on problem-solving approaches, and introduce data structures and algorithms. We will also examine knowledge representation schemes for capturing biomedical domain complexity and principles of data modeling for efficient storage and retrieval. The final project involves building a medical information system that encompasses the different concepts taught in the course. Computer science basics covered in the first part of the course are integral to understanding topics covered in the latter part, and for completing the assigned homework.
This assignment on object-oriented programming has been crafted within the framework of …
This assignment on object-oriented programming has been crafted within the framework of Computing for Social Good in Education and Responsible Computing. It aims to integrate socially relevant elements into the core activities typically encountered in traditional Computer Science (CS) curricula. Extensive research suggests that integrating these topics throughout the traditional CS curriculum is more effective than segregating them into separate activities. The assignment has undergone refinement across multiple iterations over the years to address challenges such as accommodating students with varying abilities and motivations, catering to different learning styles, and mitigating frustration when tasks may seem overly challenging.
Manuel d'accompagnement Short Description: Ce manuel sur les principes fondamentaux de la …
Manuel d'accompagnement
Short Description: Ce manuel sur les principes fondamentaux de la recherche documentaire vise à combler des lacunes dans les compétences académiques des étudiants du premier cycle par l'amélioration de leurs connaissances en matière de maîtrise de l'information. Le contenu est conçu pour encourager les étudiants à réfléchir de manière critique à leurs besoins en information et à leurs habitudes de recherche, et pour les aider à développer des approches efficaces pour repérer et utiliser les sources d'information dans leurs parcours universitaires.
Word Count: 19265
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This is an amazing lesson for third graders! It has an interaction …
This is an amazing lesson for third graders! It has an interaction portion where the students get to work hands on learning what an algorithm is, how to code, and so much more1
This unplugged activity helps students understand the concept of conditionals through a …
This unplugged activity helps students understand the concept of conditionals through a card game. Conditionals can be used to adjust a program based on specific information.
In this lesson, students will learn how a conditional statement can determine …
In this lesson, students will learn how a conditional statement can determine whether specific lines of code will run. Students will continue their Spooky Forest project, adding the ability for the Cat sprite to move when arrow keys are pressed and detect if a sprite touches the edge of the stage (at which point the backdrop will switch).
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.