A chapter on listening skills from the textbook, Communication Skills, developed by …
A chapter on listening skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.
A chapter on writing skills from the textbook, Communication Skills, developed by …
A chapter on writing skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.
A chapter on writing skills from the textbook, Communication Skills, developed by …
A chapter on writing skills from the textbook, Communication Skills, developed by the Language Communication for Development Department at the Bunda College of Agriculture, University of Malawi.
This well-designed experiment compares CO2 impacts on salt water and fresh water. …
This well-designed experiment compares CO2 impacts on salt water and fresh water. In a short demonstration, students examine how distilled water (i.e., pure water without any dissolved ions or compounds) and seawater are affected differently by increasing carbon dioxide in the air.
"Concept Development Studies in Chemistry" is an on-line textbook for an Introductory …
"Concept Development Studies in Chemistry" is an on-line textbook for an Introductory General Chemistry course. Each module develops a central concept in Chemistry from experimental observations and inductive reasoning. This approach complements an interactive or active learning teaching approach.
The applets in this section of Statistical Java allow you to see …
The applets in this section of Statistical Java allow you to see how levels of confidence are achieved through repeated sampling. The confidence intervals are related to the probability of successes in a Binomial experiment.
This book fosters the recognition of options for making progress toward increased …
This book fosters the recognition of options for making progress toward increased environmental conservation through an understanding of the underlying science and practice of a variety of conservation techniques. Today, there are expected benefits from integrated science and practice, and many people are promoting this as the way forward to improve our environment. Over time, trends emerge regarding the best way to conserve the environment, but so far an outstanding solution has not emerged. Each conservation technique has its foundational concepts, limitations, and implementation issues. Reviewing a collection of techniques provides a basis for considering which approach will be best for any specific environmental challenge. This book should advance the recognition of the challenges managing the environment, techniques that can be used to address the challenges, and the ways they might help foster the integration of science and the practice of ecological conservation.
The applets in this section allow you to see how the common …
The applets in this section allow you to see how the common Xbar control chart is constructed with known variance. The Xbar chart is constructed by collecting a sample of size n at different times t.
Students gain a deeper understanding of how sound sensors work through a …
Students gain a deeper understanding of how sound sensors work through a hands-on design challenge involving LEGO MINDSTORMS(TM) NXT taskbots and sound sensors. Student groups each program a robot computer to use to the sound of hand claps to control the robot's movement. They learn programming skills and logic design in parallel. They experience how robots can take sensor input and use it to make decisions to move and turn, similar to the human sense of hearing. A PowerPoint® presentation and pre/post quizzes are provided.
The applets in this section allow you to see how different bivariate …
The applets in this section allow you to see how different bivariate data look under different correlation structures. The Movie applet either creates data for a particular correlation or animates a multitude data sets ranging correlations from -1 to 1.
Students learn about the many types of expenses associated with building a …
Students learn about the many types of expenses associated with building a bridge. Working like engineers, they estimate the cost for materials for a bridge member of varying sizes. After making calculations, they graph their results to compare how costs change depending on the use of different materials (steel vs. concrete). They conclude by creating a proposal for a city bridge design based on their findings.
The book Current and Emerging Trends in the Management of International Disaster …
The book Current and Emerging Trends in the Management of International Disaster explores contemporary practices and strategies in managing global disasters. It offers an overview of current trends, challenges, and innovations in the field, emphasizing the importance of international cooperation and effective management strategies.
This book on Cybersecurity is written for beginners. No college degree is …
This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.
It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.
Have you ever felt uneasy or even dreadful after losing a USB …
Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?
This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.
Attendees will learn about the following topics: - A brief introduction to data encryption. - A few encryption tools for a novice user. - Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB flash drive. - Pros and cons of encryption/decryption technology.
Today many small businesses benefit from QuickBooks (Desktop and Online) as a …
Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.
What can small business owners do in QuickBooks to manage these security risks?
Attendees to this webinar will learn about the following topics: - Introduce a security architectural approach to QuickBooks data protection. - Learn about the default data integrity protections built into QuickBooks. - Practice stronger authentication into QuickBooks. - Practice role-based access on QuickBooks accounting. - Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.
Presentation Time: 50 minutes plus 10 minutes on Q&A.
Back in May 2021 a cyber-attack known as ransomware shut down the …
Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems. Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks? Attendees will learn about the following topics: • Background on ransomware. • Current state-of-the-art Information Technology against ransomware. • A risk-based protection strategy. • Practical tools & tips against ransomware.
The Payment Card Industry (PCI) has created an industry-wide digital security standard. …
The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
Topics to be covered include:
- What is PCI/credit card data security? - Why do small businesses need to plan for PCI security compliance? - Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider and website hosting service provider. - IT audit requirements and stages for PCI compliance.
Presentation Time: 50 minutes plus 10 minutes Q&A. Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a …
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).
Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
Topics to be covered include: - What are the business requirements for HIPAA security? - What stages of IT audit do small businesses need to plan for HIPAA security compliance? - What technology and tools can be used to protect HIPAA-related data and to assure compliance?
Presentation Time: 50 minutes plus 10 minutes Q&A.
Written primarily for professionals in library and information science but with applicability …
Written primarily for professionals in library and information science but with applicability to archives and other information management industries, this handbook provides an overview of metadata work that focuses on diversity, equity, and inclusion (DEI). DEI metadata work has several goals: enhancing diverse representation in descriptive metadata; improving discovery of diverse resources; and mitigating negative effects of inaccurate, outdated, or offensive terminology. Readers will gain a broad awareness of DEI-related issues in metadata creation and management; learn techniques for retroactively reviewing and updating existing metadata to address these issues; and develop strategies to create metadata that better meets DEI needs.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.