Updating search results...

Search Resources

3932 Results

View
Selected filters:
  • Career and Technical Education
Culturas hispanas a través de la pantalla / Hispanic Cultures Through the Screen
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Short Description:
Este libro de texto busca fomentar el visionado crítico de productos audiovisuales contemporáneos y el reflexionar sobre la representación de las culturas hispanas en webseries y vídeos musicales. This textbook aims to promote critical viewing of contemporary audiovisual products and thinking about the representation of Hispanic cultures in web series and music videos.

Long Description:
Culturas hispanas a través de la pantalla busca fomentar el visionado crítico de productos audiovisuales contemporáneos y el reflexionar sobre la representación de las culturas hispanas en webseries y vídeos musicales. La difusión y la popularidad de estos dos géneros justifican que se les dedique espacio en el currículo junto a otros géneros audiovisuales más consagrados, caso de los cortos y los largometrajes. El libro se ofrece en inglés y en español para que pueda ser utilizado en una amplia variedad de disciplinas académicas. Asimismo, el libro está organizado en unidades didácticas independientes, las cuales presentan diferentes estructuras y temáticas de forma que el profesor/a pueda seleccionar aquellas que mejor se ajusten a los objetivos concretos de su curso. Hispanic Cultures Through the Screen aims to promote critical viewing of contemporary audiovisual products and thinking about the representation of Hispanic cultures in web series and music videos. Increasing popularity of these two genres justify dedicating part of the curriculum to them along with other more established audiovisual genres, such as short and feature films. The book is presented in English and Spanish so that it can be used in a wide variety of courses. Finally, it is organized into separate units (each based on a different audiovisual product) with different themes, structures and length, so that teachers can select those units that interest them the most for a specific course.

Word Count: 52525

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Career and Technical Education
English Language Arts
Ethnic Studies
Film and Music Production
Social Science
Sociology
Material Type:
Textbook
Provider:
Bemidji State University
Author:
Ana M. López-Aguilera
Date Added:
10/25/2021
Curriculum Instruction and Assessment for CTE Syllabus
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Curriculum Instruction and Assessment for CTE Syllabus

ED 429

Course Description
Build knowledge and skills in curriculum design, instructional strategies, and assessment for successful teaching in a Career and Technical Education and other specialty areas: (a) Agriculture Food and Natural Resource Systems, (b) Arts, Information and Communications, (c) Business Management, (d) Health Sciences (e) Human Resources, (F) Industrial and Engineering Systems, (g) Family and Consumer Sciences, (h) Career Trades.

Subject:
Career and Technical Education
Education
Material Type:
Syllabus
Author:
Carol McKiel
Date Added:
03/05/2021
Customer Insights
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Autumn 2022 Edition

Short Description:
This textbook is based on materials sourced from different practitioners from the world of research design, data collection, analysis, and interpretation. The author and her collaborators have also added materials to supplement the available literature. This activity is aligned with SDG4 – Quality Education and SDG10 - Reduced Inequalities.  NewParaThis first edition is running concurrently with Customer Insights. Second Edition.

Long Description:
Increasingly, the concept of marketing research is being replaced with the term ‘customer or consumer insights’. As decision-makers are bombarded with data, it is important to have an Insights Team or Department which can sift through it all and identify those nuggets of information that can meaningfully explain human behaviour. Such insights must translate into an informed business strategy for success. This book has been curated to ensure that the practice of data collection, analysis, and interpretation is presented from an industry perspective. This first edition is running concurrently with Customer Insights. Second Edition https://oercollective.caul.edu.au/customer-insights/

Word Count: 41271

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Business and Communication
Career and Technical Education
Environmental Studies
Information Science
Management
Material Type:
Textbook
Provider:
Western Sydney University
Date Added:
02/01/2022
Cutting Through Soil
Read the Fine Print
Educational Use
Rating
0.0 stars

Students pretend they are agricultural engineers during the colonial period and design a miniature plow that cuts through a "field" of soil. They are introduced to the engineering design process and learn of several famous historical figures who contributed to plow design.

Subject:
Agriculture
Applied Science
Career and Technical Education
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Jacob Crosby
Janet Yowell
Malinda Schaefer Zarske
Date Added:
10/14/2015
Cyberbullying Lesson Plan
Rating
0.0 stars

The goal of this lesson plan is for students to be able to learn to identify, respond to, and limit the negative impact of cyberbullying and other unethical or harmful online behaviors through providing various resources and an interactive board game that we have created.

Subject:
Applied Science
Career and Technical Education
Computer Science
Education
Electronic Technology
Elementary Education
Material Type:
Activity/Lab
Assessment
Author:
anna ketsen
colin johnson
stephanie m
karly berger
Date Added:
03/18/2018
Cybercrime and Cyber security Techniques
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cybersecurity-Cybercrime-The Legal Environment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. state jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.

Subject:
Career and Technical Education
Criminal Justice
Law
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity-Fake News
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.

Subject:
Arts and Humanities
Career and Technical Education
Criminal Justice
Law
Philosophy
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity-Online Identity Theft
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.

Subject:
Career and Technical Education
Criminal Justice
Law
Material Type:
Activity/Lab
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Cyber security Techniques- What Is The Internet?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cybersecurity-The Internet of Things
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.

Subject:
Arts and Humanities
Career and Technical Education
Criminal Justice
Law
Philosophy
Material Type:
Activity/Lab
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020