Emphasizes the relationship among technology, hardware organization, and programming systems in the …
Emphasizes the relationship among technology, hardware organization, and programming systems in the evolution of computer architecture. Pipelined, out-of-order, and speculative execution. Superscaler, VLIW, vector, and multithreaded processors. Addressing structures and virtual memory, and exception handling. I/O and memory systems. Parallel computers; message passing and shared memory systems. Memory models, synchronization, and cache coherence protocols. Vector supercomputers. Assumes an undergraduate knowledge of computer systems.
This free ESL lesson plan on computers has been designed for adults …
This free ESL lesson plan on computers has been designed for adults and young adults at an intermediate (B1/B2) to advanced (C1/C2) level and should last around 45 to 60 minutes for one student.
Introduces abstraction as an important mechanism for problem decomposition and solution formulation …
Introduces abstraction as an important mechanism for problem decomposition and solution formulation in the biomedical domain, and examines computer representation, storage, retrieval, and manipulation of biomedical data. Examines effect of programming paradigm choice on problem-solving approaches, introduces data structures and algorithms. Presents knowledge representation schemes for capturing biomedical domain complexity. Teaches principles of data modeling for efficient storage and retrieval. The final project involves building a medical information system that encompasses the different concepts taught in the subject.
" This class explores interaction with mobile computing systems and telephones by …
" This class explores interaction with mobile computing systems and telephones by voice, including speech synthesis, recognition, digital recording, and browsing recorded speech. Emphasis on human interface design issues and interaction techniques appropriate for cognitive requirements of speech. Topics include human speech production and perception, speech recognition and text-to-speech algorithms, telephone networks, and spatial and time-compressed listening. Extensive reading from current research literature."
This resource includes a link to Creative Commons video, "Get Creative," and …
This resource includes a link to Creative Commons video, "Get Creative," and video viewing worksheet. The mini-lesson can be used to enhance a lesson segment on Copyright and Fair Use.
Learn to create a simple Andriod App with little or no programming …
Learn to create a simple Andriod App with little or no programming experience. The Twist-A-Plot App guides students through creating User Interfaces, Adding New Screens and incorporating multimedia into a simple event-driven Andriod Application.
From the Scratch Wiki: "Scratch contains the resources available for creating a …
From the Scratch Wiki: "Scratch contains the resources available for creating a question/answer system. This system can be used for one to be 'quizzed', or to repetitively answer automated questions. This tutorial shows various methods on how to create a question system. For each method, the ask () and wait block is used to ask questions and input answers."
Use these blocks to teach students to create a quiz for many different concepts and disciplines.
This course introduces cryptography by addressing topics such as ciphers that were …
This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that you complete an abstract algebra course (such as the Saylor FoundationĺÎĺ_ĺĚĺ_s MA231) before taking this course. Upon successful completion of this course, students will be able to: explain how symmetric and asymmetric key ciphers work; list and define cryptographyĺÎĺ_ĺĚĺ_s goals; list and define the most common classical ciphers; explain the workings of mechanical ciphers Enigma and Lorenz; describe the principles of substitution-permutation networks; describe the algorithms for data encryption and the advanced encryption standard; describe and use the MD5 and SHA-1 hash functions; explain the idea behind public key cryptography; use the RSA cryptography system by applying it to practical problems; test whether the large integer is prime with the mathematical tools presented in this course; define the elliptic curve and use it in cryptography; explain the Diffie-Hellman key exchange; describe the most common signature and autokey identity schemes; describe the conceptual workings of public key infrastructure. This free course may be completed online at any time. (Computer Science 409)
This course features a rigorous introduction to modern cryptography, with an emphasis …
This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.
This course examines computers anthropologically, as artifacts revealing the social orders and …
This course examines computers anthropologically, as artifacts revealing the social orders and cultural practices that create them. Students read classic texts in computer science along with cultural analyses of computing history and contemporary configurations. It explores the history of automata, automation and capitalist manufacturing; cybernetics and WWII operations research; artificial intelligence and gendered subjectivity; robots, cyborgs, and artificial life; creation and commoditization of the personal computer; the growth of the Internet as a military, academic, and commercial project; hackers and gamers; technobodies and virtual sociality. Emphasis is placed on how ideas about gender and other social differences shape labor practices, models of cognition, hacking culture, and social media.
Students gain experience with the software/system design process, closely related to the …
Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)
This Business English lesson plan on cybersecurity has been designed for business …
This Business English lesson plan on cybersecurity has been designed for business professionals or other adults and young adults at an intermediate (B1/B2) to advanced (C1/C2) level and should last around 45 to 60 minutes for one student.
Join Danny Rubin, founder of Rubin, as he interviews Mike Frieder, a …
Join Danny Rubin, founder of Rubin, as he interviews Mike Frieder, a cybersecurity expert, on what it's like to work in the challenging field. Students and teachers should also make use of the webinar worksheet at https://rubineducation.com/wp-content/uploads/2021/01/Rubin-Webinar-Worksheet-Q-and-A-about-Cybersecurity.docx
Join Danny Rubin, founder of Rubin, and Tyler Frankenberg and Chad Solomon, …
Join Danny Rubin, founder of Rubin, and Tyler Frankenberg and Chad Solomon, two experienced data analysts, to learn about the exciting and fast-moving field.
This conversation covers the day-to-day life of a data analyst, how to determine insights with data that move businesses in new directions, the power of communication skills and more.
Students and teachers should also make use of the webinar worksheet at https://rubineducation.com/wp-content/uploads/2022/10/Rubin-Dream-Job-Webinar-Worksheet-Data-Analyst-November-2022.docx
Modeling of the control processes in conventional and high-speed data communication networks. …
Modeling of the control processes in conventional and high-speed data communication networks. Develops and utilizes elementary concepts from queueing theory, algorithms, linear and nonlinear programming to study the problems of line and network protocols, distributed algorithms, quasi-static and dynamic routing, congestion control, deadlock prevention. Treats local and wide-area networks, and high-speed electronic and optical networks. Focuses on the fundamentals of data communication networks. One goal is to give some insight into the rationale of why networks are structured the way they are today and to understand the issues facing the designers of next-generation data networks. Much of the course focuses on network algorithms and their performance. Students are expected to have a strong mathematical background and an understanding of probability theory. Topics discussed include: layered network architecture, Link Layer protocols, high-speed packet switching, queueing theory, Local Area Networks, and Wide Area Networking issues, including routing and flow control.
Meet the Data Decoders—a team of scientists at the Solís-Lemus Lab who …
Meet the Data Decoders—a team of scientists at the Solís-Lemus Lab who use math and computers to interpret huge amounts of data from biological experiments.
Resources available for learning about this lab include: • Interactive cards designed to introduce students to scientists in a more personal way • A video with a personal story that explains why the lab's research matters in real life • Questions to consider that will spark connection, reflection, and conversation • An interactive video experience where you can ask questions of scientists in the lab and learn about their research • An inquiry-based activity that focuses on doing science, using some of the same science practices that the lab uses • An educator guide with information about standards alignment, curriculum connections, and tips for using the media resources
These resources are part of Meet the Lab, a collection of educational resources for middle school science classrooms.
Data Science is a slide deck for the intended use of building …
Data Science is a slide deck for the intended use of building educator awareness of and capacity in Data Science. The slide deck contains hyperlinks to videos, webpages, and pdfs; as well as engagement strategies to facilitate group learning.
The following videos will give you a look into the variety of …
The following videos will give you a look into the variety of tech jobs and careers available to you and how you can prepare for them. Watch one - or all - and hear from experts who are doing these jobs today. As you watch the videos, download our workbook at https://bit.ly/MKEWorksheet to help you reflect on each career path and if that might be the right one for you some day!
Database Design - 2nd Edition covers database systems and database design concepts. …
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.