Updating search results...

Search Resources

501 Results

View
Selected filters:
  • CUNY
Coding for the Public Good
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.

Comments
Note that these slides use Poll Everywhere polls; to use them, you will need to create your own Poll Everywhere account.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Brooklyn College
Author:
Devorah Kletenik
Date Added:
09/03/2020
Coding for the Public Good: Front-end Website Design and Development
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity helps student design and develop a front-end of a website, from wireframes through HTML/CSS/Javascript. It includes design questions for students, including the invocation of Ben Schneiderman's eight golden rules for interface design.

Note: this activity assumes prior knowledge of web development. Since this activity is designed for an HCI course, with a focus on interface design, students are not expected to create a back-end for it. This activity can obviously be modified for a full-stack experience.

Comments
Although this activity can be used in isolation, it is intended to be part of a series guiding students towards the creation of a front-end of a website. The series (all published as OER) consist of:

a) Needfinding
b) Personas, Scenarios and Storyboards
c) Front-end Website Design and Development
d) Accessibility Evaluation

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Brooklyn College
Author:
Cuny Brooklyn College
Devorah Kletenik
Date Added:
09/03/2020
Concept Map Example
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Associated "Topic Development with Concept Mapping Lesson" plan and handouts are also available for download and adaptation in the Guttman Community College OER collection in CUNY Academic Works.

Subject:
Education
Material Type:
Reading
Provider:
CUNY Academic Works
Provider Set:
Guttman Community College
Author:
Alexandra Hamlett
Meagan Lacy
Date Added:
01/25/2017
Corporate Finance and Financial Management
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture discusses the importance of financial information in both individuals personal and business lives. It includes description of the important features of the four main types of firms. Then, discusses the three main types of decisions a financial manager makes. Finally, it discusses the tax implications for the different corporate entities.

Subject:
Business and Communication
Finance
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Nœ–ez-Torres, Alexander
Date Added:
10/01/2019
Creating Keywords Handout
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Related lesson plans are also available for download and adaptation in the Guttman Community College OER collection in the CUNY Academic Works institutional repository.

Subject:
Education
Material Type:
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Guttman Community College
Author:
Alexandra Hamlett
Meagan Lacy
Date Added:
01/25/2017
Creating Keywords from a Research Question Lesson
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This lesson helps students recognize that they need to use different types of searching language in order to retrieve relevant results and to emphasize that research is an iterative process. Use when students have already formulated a research question and are about to begin searching for information on their topic.

Subject:
Education
Material Type:
Lesson Plan
Provider:
CUNY Academic Works
Provider Set:
Guttman Community College
Author:
Alexandra Hamlett
Meagan Lacy
Date Added:
01/05/2017
Crispr Cas9
Unrestricted Use
CC BY
Rating
0.0 stars

Precise modification of faulty genes for repair has been one of the most important goals in medicine. It is now finally within the realm of possibility thanks to the gene editing tool CRISPR. This microbial adaptive immune system can copy and cut specific DNA sequences. This animation provides a visual introduction of this revolutionary genetic tool.

Subject:
Applied Science
Genetics
Health, Medicine and Nursing
Life Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
City College
Author:
Chen, Ching-jung
Cheng, Katie
Chowdhury, Abanti Deb
Eng, Timmy
Estevez, Irving
Malik, Rafay
Ndjiharine, Vitjitua
Oviedo, Hysell V.
Date Added:
06/16/2022
Crispr-Cas 9 · Science Animation
Unrestricted Use
CC BY
Rating
0.0 stars

Precise modification of faulty genes for repair has been one of the most important goals in medicine. It is now finally within the realm of possibility thanks to the gene editing tool CRISPR. This microbial adaptive immune system can copy and cut specific DNA sequences. This animation provides a visual introduction of this revolutionary genetic tool.

Subject:
Biology
Genetics
Life Science
Material Type:
Diagram/Illustration
Simulation
Provider:
CUNY
Provider Set:
City College
Author:
Abanti Deb Chowdhury
Ching-Jung Chen
Hysell Ovideo
Irving Estevez
Katie Cheng
Rafay Malik
Timmy Eng
Vitjitua Ndjiharine
Date Added:
06/16/2022
Cryptography Module" by Hunter R. Johnson
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.

The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this archive.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
John Jay College of Criminal Justice
Author:
Johnson Hunter R
Date Added:
06/04/2019
Cybercrime and Cyber security Techniques
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cybersecurity-Cybercrime-The Legal Environment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. state jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.

Subject:
Career and Technical Education
Criminal Justice
Law
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity-Fake News
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.

Subject:
Arts and Humanities
Career and Technical Education
Criminal Justice
Law
Philosophy
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity-Online Identity Theft
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.

Subject:
Career and Technical Education
Criminal Justice
Law
Material Type:
Activity/Lab
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cyber security Techniques- What Is The Internet?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cybersecurity-The Internet of Things
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.

Subject:
Arts and Humanities
Career and Technical Education
Criminal Justice
Law
Philosophy
Material Type:
Activity/Lab
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity-The Silk Road Market
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.

Subject:
Education
Higher Education
Law
Material Type:
Lesson
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
DFN 220 Ethnic and Therapeutic Meal Patterns
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

An in-depth exploration of foods and foodways of diverse populations and cultures. Examination of the effect of ethnic, geographic, ecological and historical factors on foods, foodways, health and diet related diseases.
The full course site is available at https://culturalfoods.commons.gc.cuny.edu/.

Subject:
Life Science
Nutrition
Social Science
Material Type:
Syllabus
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Burt, Katherine
Date Added:
06/16/2022