Updating search results...

Search Resources

854 Results

View
Selected filters:
  • Lecture
Hydromechanica 1
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In dit college wordt een introductie gegeven van een groot aantal facetten van de scheepshydromechanica en hun onderlinge samenhang zoals die later in de studie meer als geisoleerde onderwerpen aan bod komen. Behandeld worden: de hydrostatica, de geometrie beschrijving van het schip, inleiding lijnenplan, het begrip stabiliteit, de stabiliteit van drijvende lichamen, eenvoudige stabiliteit berekening bij kleine helling hoeken, de weerstand van lichamen onder water en aan het oppervlak, eenvoudige weerstand benaderings methoden voor schepen, de model wetten in de hydromechanica, de extrapolatie methode van Froude, de lift van een vleugel, de vleugel karakteristieken, de toepassing hiervan bij voortstuwing en bij scheepsschroeven, de schroef karakteristieken en een eenvoudige schroef berekening, en tenslotte de fysica van het zeilen en zeilvoortstuwing. Leerdoelen De student kan: 1. de basis van systeem analyse beschrijven (buitenwereld, interfaces, beperkingen, objecten, relaties enz.) 2. maritieme systemen zoals schip/motor/schroef beschrijven en modelleren met behulp van beperkte systeem analyse methodologie; eenvoudige maritieme systemen modelleren door onderverdeling in subsystemen en componenten 3. evenwicht condities van maritieme systemen bepalen en kwalitatief analyseren 4. de definities en belangrijkste karakteristieken van weerstand, voortstuwing en manoeuvreren (snelheid, weerstand, vermogen, RPM, draaicapaciteit) begrijpen en toepassen 5. de relaties tussen algemeen vloeistof dynamica en scheepshydromechanica (bijv. lift/aerodynamica/zeilen; visceuze stroming/Reynolds getal/volgstroomvelden/voortstuwingsrendement; laminair & visceuze stroming/weerstand; niet visceuze stroming/golf patronen/weerstand) beschrijven 6. de achtergrond van de belangrijkste schaal regels (Newton, Froude, Reynolds) d.m.v dimensie analyse uitleggen 7. schaalregels voor schaalmodel experimenten in een sleeptank toepassen en potentiĚÇle complicaties identificeren

Subject:
Earth and Space Science
Hydrology
Material Type:
Full Course
Lecture
Lecture Notes
Reading
Provider:
Delft University of Technology
Provider Set:
Delft University OpenCourseWare
Author:
P. de Jong
Date Added:
02/24/2016
ISKME's OER Commons Teacher Training Initiative
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

ISKME's OER Commons Teacher Training Initiative offers teachers a collaborative professional development model centered on engagement with Open Educational Resources (OER). The OER Commons Teacher Training Initiative is rooted in the idea that equitable access to high-quality education is a global imperative. Open Educational Resources, or OER, offer opportunities for systemic change in teaching and learning through accessible content, and importantly, through embedding participatory processes and effective technologies to engage with learning for all.

Subject:
Fine Arts
Material Type:
Lecture
Provider:
ISKME
Provider Set:
ISKME
Author:
ISKME
Date Added:
10/10/2017
Increased Immigration
Read the Fine Print
Educational Use
Rating
0.0 stars

Meet two sisters who have migrated from Poland to Ireland, one of three countries in the EU that welcomes immigrant workers from Eastern Europe, in this Wide Angle video.

Subject:
Education
Material Type:
Lecture
Provider:
PBS LearningMedia
Provider Set:
Teachers' Domain
Date Added:
08/22/2008
Information Security (06:01): Introduction
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of:
•Machine-Level Security
•Network Security
•Internet Security
•Social Engineering

Subject:
Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:02): Physical Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
10/10/2017
Information Security (06:05): Network Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.

Links from Video:
-The System Administrator Song http://youtu.be/OpGN3oT1thA

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:06): Internet Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.

Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:07): Malware
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.

Links from Video:
-AVG by Grisoft: http://free.avg.com/us-en/homepage
-AVAST: http://www.avast.com
-ClamWin: http://www.clamwin.com/
-Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:08): Social Engineering
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.

I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.

Links from Video:
•Internet Storm Center: https://isc.sans.edu/
•SNORT: https://www.snort.org/
•Security Now: http://twit.tv/sn
•Internet Crime Complaint Center: http://www.ic3.gov/default.aspx
•Hak5: http://hak5.org/
•Facecrooks (facebook.com/Facecrooks)

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Insects Galore
Rating
0.0 stars

Students will explore the features of an insect and was as the various roles different insects play within the environment. Students will also learn about the stages of metamorphosis.

Subject:
Life Science
Material Type:
Lecture
Lesson
Date Added:
03/19/2024
Instructional Design Tips for Computer-Based E-Learning
Unrestricted Use
CC BY
Rating
0.0 stars

Single lecture presentation containing tips for using technology to enhance teaching. Uses proven multimedia design principles to enhance learning.

Subject:
Career and Technical Education
Health Science
Material Type:
Lecture
Provider:
OER Africa
Provider Set:
open.Michigan African Health OER Network
Author:
Cary Engleberg
Date Added:
12/08/2010