Updating search results...

Business and Information Technology

2450 affiliated resources

Search Resources

View
Selected filters:
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Date Added:
09/26/2014
Information Security (06:05): Network Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.

Links from Video:
-The System Administrator Song http://youtu.be/OpGN3oT1thA

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:06): Internet Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.

Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:07): Malware
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.

Links from Video:
-AVG by Grisoft: http://free.avg.com/us-en/homepage
-AVAST: http://www.avast.com
-ClamWin: http://www.clamwin.com/
-Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:08): Social Engineering
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.

I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.

Links from Video:
•Internet Storm Center: https://isc.sans.edu/
•SNORT: https://www.snort.org/
•Security Now: http://twit.tv/sn
•Internet Crime Complaint Center: http://www.ic3.gov/default.aspx
•Hak5: http://hak5.org/
•Facecrooks (facebook.com/Facecrooks)

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Technology Fundamentals - Creating Tabs and Changing the Page Color
Unrestricted Use
CC BY
Rating
0.0 stars

View the attached files to see a project for a Information Technology Fundamentals class. You will find: Lesson PlanChecklist for StudentsExample of Finished Project Feel free to change and custimize the lesson plan to better fit your classroom and students. 

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Hunter Vanness
Date Added:
08/03/2020
Information Technology Fundamentals - Creating Tabs and Changing the Page Color
Unrestricted Use
CC BY
Rating
0.0 stars

View the attached files to see a project for a Information Technology Fundamentals class. You will find: Lesson PlanChecklist for StudentsExample of Finished Project Feel free to change and custimize the lesson plan to better fit your classroom and students. 

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Hunter Vanness
Date Added:
08/03/2020
Information literacy rubric
Unrestricted Use
CC BY
Rating
0.0 stars

Deb Baker created this after consulting with faculty, librarians, and colleagues from around the country. The idea was to create a practical tool for assessing information literacy that anyone could use, was easy to norm, and focused on what students could do and where research instruction could be improved to increase students' information literacy. This rubric can help improve student success and information literacy learning outcomes in research assignments for any course. Used early in the semester it can serve as a diagnostic tool for supporting student researchers in developing the skills and habits of mind needed to successfully find and use information to answer a question, support a thesis, or solve a problem. Students could even use it to self-assess.

Cover photo by Glenn Carstens-Peters on Unsplash

Subject:
Applied Science
Composition and Rhetoric
Education
English Language Arts
Higher Education
Information Science
Material Type:
Assessment
Teaching/Learning Strategy
Author:
Deb Baker
Date Added:
11/18/2020
Initiation en algorithmique
Unrestricted Use
CC BY
Rating
0.0 stars

Savoir transcrire les différentes étapes de résolution d'un problème sous forme d'algorithme, de façon structurée et indépendante de toute contrainte matérielle ou logicielle

Subject:
Computer Science
Material Type:
Lesson
Author:
Aicha ER-RAFYG
Date Added:
12/14/2021
Input Devices: Crash Course Games #24
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Today we’re going to talk about controllers. Controllers are incredibly important in the gaming experience because they are how we communicate actions within a game and often play a significant role in why we like or dislike certain games. And over the years they have seen some huge improvements mostly brought on by the creation of more complex and immersive video games. Controller design is so important in fact that some of the largest game console manufacturers spend hundreds of millions of dollars each cycle trying to update and refine their designs. But interestingly, the same can’t quite be said for one of the biggest gaming platforms right now - so we’ll talk about that too.

Subject:
Applied Science
Computer Science
Education
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Games
Date Added:
11/11/2016
Input and Output
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be introduced to the 4 basic functions that computers perform and begin to think about the advantages that computers have over humans in taking in input, processing data, and providing output. Students will be asked to identify how humans interface with computers using input and output devices and then invent a new input/output prototype of their choosing.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Author:
NYC Computer Science for All
Date Added:
03/30/2021
Input and output
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students encounter people who are computer scientists, and they learn definitions of computer science.
Students learn the difference between input and output devices, and they creatively invent a new device that combines input and output.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Author:
NYC Computer Science for All
Date Added:
04/02/2021
Insertar Objetos de Estado (Adobe Indesign)
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

¿Cómo podemos hacer más atractivos nuestros documentos digitales? Bueno, mediante las herramientas de interactividad que nos brinda Adobe Indesgin, podemos transformar nuestros documentos. Esta lección, invita a realizar un breve recorrido para lograr documentos más amenos y con interacción.

Subject:
Computer Science
Graphic Design
Material Type:
Activity/Lab
Author:
Wider Santos
Date Added:
07/20/2024
Instructions & Programs: Crash Course Computer Science #8
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Today we’re going to take our first baby steps from hardware into software! Using that CPU we built last episode we’re going to run some instructions and walk you through how a program operates on the machine level. We'll show you how different programs can be used to perform different tasks, and how software can unlock new capabilities that aren't built into the hardware. This episode, like the last is pretty complicated, but don’t worry - as we move forward into programming the idea of opcodes, addresses, and registers at this machine level will be abstracted away like many of the concepts in this series.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
04/12/2017
Insurance: Managing Risk and Balancing Responsibility with Affordability
Read the Fine Print
Educational Use
Rating
0.0 stars

When tragedy strikes, how do people avoid bearing all of the costs of their loss? Learn more in the February 2017 issue of Page One Economics: Focus on Finance.

Subject:
Business and Communication
Economics
Finance
Social Science
Material Type:
Lesson
Reading
Provider:
Federal Reserve Bank of St. Louis
Provider Set:
Page One Economics
Author:
Kris Bertelsen
Date Added:
09/11/2019
Integrated Circuits & Moore's Law: Crash Course Computer Science #17
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

So you may have heard of Moore's Law and while it isn't truly a law it has pretty closely estimated a trend we've seen in the advancement of computing technologies. Moore's Law states that we'll see approximately a 2x increase in transistors in the same space every two years, and while this may not be true for much longer, it has dictated the advancements we've seen since the introduction of transistors in the mid 1950s. So today we're going to talk about those improvements in hardware that made this possible - starting with the third generation of computing and integrated circuits (or ICs) and printed circuit boards (or PCBs). But as these technologies advanced a newer manufacturing process would bring us to the nanoscale manufacturing we have today - photolithography.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
06/21/2017