Updating search results...

Search Resources

184 Results

View
Selected filters:
  • computer-science
Computer Programming: Stepping Through Insertion Sort Function
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson clarifies what \break\ does and stepping through the insertion sort implementation. [Computer Programming playlist: 22 of 23]

Subject:
Computer Science
Material Type:
Lecture
Provider:
Khan Academy
Provider Set:
Khan Academy
Author:
Khan, Salman
Date Added:
10/10/2017
Computer Programming: Stepping Through Iterative Fibonacci Function
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson you will understand how the iterative Fibonacci function works for a particular example. [Computer Programming playlist: 16 of 23]

Subject:
Computer Science
Material Type:
Lecture
Provider:
Khan Academy
Provider Set:
Khan Academy
Author:
Khan, Salman
Date Added:
10/10/2017
Computer Science Needs Assessment Survey
Unrestricted Use
CC BY
Rating
0.0 stars

A PDF version of a needs assessment survey for regional K - 12 computer science programming. All questions can be customized as needed. Contact CESA 8 for the Google Form version of the survey. 

Subject:
Computer Science
Material Type:
Assessment
Author:
Tammy Moynihan
Jenny Ambrosius
Date Added:
01/18/2024
Computer Science Soft Skills Practice
Unrestricted Use
CC BY
Rating
0.0 stars

This is an activity designed to have students develop soft skills, specifically communication in a computer science setting using python and the repl IDE.  It can be given as a full document, broken up into a jigsaw activity and altered to accomodate different computer languages and IDEs. 

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Steven Seidl
Date Added:
05/10/2023
Computer Science Soft Skills Practice
Unrestricted Use
CC BY
Rating
0.0 stars

This is an activity designed to have students develop soft skills, specifically communication in a computer science setting using python and the repl IDE.  It can be given as a full document, broken up into a jigsaw activity and altered to accomodate different computer languages and IDEs.  The goal is that students develop needed skills for a career that we don't generally practice in class but are still highly valued by future jobs, even outside of IT.  This was created for english readers but can be altered for any language.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Steven Seidl
Date Added:
05/16/2023
Computer Science Student Workshop
Unrestricted Use
CC BY
Rating
0.0 stars

The slides give a broad overview of discussion points and activities for a day-long, computer science workshop for middle and high school students. The agenda breaks down the day into small group and whole group sessions. Snacks, lunch, and prizes were built into the day. 

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Tammy Moynihan
Jenny Ambrosius
Date Added:
01/18/2024
Computer System Architecture, Fall 2005
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Emphasizes the relationship among technology, hardware organization, and programming systems in the evolution of computer architecture. Pipelined, out-of-order, and speculative execution. Superscaler, VLIW, vector, and multithreaded processors. Addressing structures and virtual memory, and exception handling. I/O and memory systems. Parallel computers; message passing and shared memory systems. Memory models, synchronization, and cache coherence protocols. Vector supercomputers. Assumes an undergraduate knowledge of computer systems.

Subject:
Computer Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Arvind, V.
Date Added:
01/01/2005
Computers ESL Lesson Plan
Unrestricted Use
CC BY
Rating
0.0 stars

This free ESL lesson plan on computers has been designed for adults and young adults at an intermediate (B1/B2) to advanced (C1/C2) level and should last around 45 to 60 minutes for one student.

Subject:
Computer Science
Education
Language Education (ESL)
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Learning Task
Lesson
Lesson Plan
Reading
Student Guide
Teaching/Learning Strategy
Author:
Your English Pal
Date Added:
03/17/2023
Computing for Biomedical Scientists, Fall 2002
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Introduces abstraction as an important mechanism for problem decomposition and solution formulation in the biomedical domain, and examines computer representation, storage, retrieval, and manipulation of biomedical data. Examines effect of programming paradigm choice on problem-solving approaches, introduces data structures and algorithms. Presents knowledge representation schemes for capturing biomedical domain complexity. Teaches principles of data modeling for efficient storage and retrieval. The final project involves building a medical information system that encompasses the different concepts taught in the subject.

Subject:
Computer Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Boxwala, Aziz A.
Ogunyemi, Omolola
Date Added:
01/01/2002
Creating a Quiz with Scratch
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

From the Scratch Wiki:
"Scratch contains the resources available for creating a question/answer system. This system can be used for one to be 'quizzed', or to repetitively answer automated questions. This tutorial shows various methods on how to create a question system. For each method, the ask () and wait block is used to ask questions and input answers."

Use these blocks to teach students to create a quiz for many different concepts and disciplines.

Subject:
Art and Design
Career and Technical Education
Computer Science
Fine Arts
Information and Technology Literacy
Material Type:
Activity/Lab
Author:
Scratch Wiki
Date Added:
04/12/2018
Cryptography
Unrestricted Use
CC BY
Rating
0.0 stars

This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that you complete an abstract algebra course (such as the Saylor FoundationĺÎĺ_ĺĚĺ_s MA231) before taking this course. Upon successful completion of this course, students will be able to: explain how symmetric and asymmetric key ciphers work; list and define cryptographyĺÎĺ_ĺĚĺ_s goals; list and define the most common classical ciphers; explain the workings of mechanical ciphers Enigma and Lorenz; describe the principles of substitution-permutation networks; describe the algorithms for data encryption and the advanced encryption standard; describe and use the MD5 and SHA-1 hash functions; explain the idea behind public key cryptography; use the RSA cryptography system by applying it to practical problems; test whether the large integer is prime with the mathematical tools presented in this course; define the elliptic curve and use it in cryptography; explain the Diffie-Hellman key exchange; describe the most common signature and autokey identity schemes; describe the conceptual workings of public key infrastructure. This free course may be completed online at any time. (Computer Science 409)

Subject:
Computer Science
Material Type:
Assessment
Full Course
Homework/Assignment
Lecture
Reading
Syllabus
Textbook
Provider:
The Saylor Foundation
Date Added:
10/10/2017
Cryptography and Cryptanalysis, Spring 2005
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.

Subject:
Computer Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Micali, Silvio
Date Added:
01/01/2005
Curiosity Killed the App
Read the Fine Print
Educational Use
Rating
0.0 stars

Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)

Subject:
Career and Technical Education
Computer Science
Education
Technology and Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
IMPART RET Program, College of Information Science & Technology,
Rich Powers, Brian Sandall
TeachEngineering.org
Date Added:
09/18/2014