Updating search results...

Business and Information Technology

2450 affiliated resources

Search Resources

View
Selected filters:
Credit Reports and Credit Bureaus
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This lesson will provide high school students with information about what information is collected by the three main credit bureaus and included on a credit report, and how credit bureaus share the information. Free resources for viewing personal credit scores also discussed.

Subject:
Business and Communication
Education
Finance
Material Type:
Activity/Lab
Lesson
Lesson Plan
Date Added:
07/10/2019
Credit in Agriculture
Unrestricted Use
CC BY
Rating
0.0 stars

This unit covers different types of loans that agricultural producers commonly use in the business of farming and ranching. It explains some key terms that are important to understand, and provides the equations and framework for setting up loans for short-term (operating loans and lines of credit) as well as amortized loans (equal principal payment loans and equal total payment loans).

Subject:
Agriculture
Finance
Material Type:
Activity/Lab
Homework/Assignment
Reading
Author:
Tyler Schau
Date Added:
05/12/2020
Crowding Out
Read the Fine Print
Educational Use
Rating
0.0 stars

Students learn that the loanable funds market is a virtual clearing house matching borrowers and savers. They participate in an activity to demonstrate crowding out in the loanable funds market. They use demand and supply analysis to graphically represent the results of crowding out.

Subject:
Business and Communication
Economics
Finance
Social Science
Material Type:
Lesson
Provider:
Federal Reserve Bank of St. Louis
Provider Set:
Economic Lowdown Lessons
Author:
Barbara Flowers
Date Added:
02/23/2022
Cryptography: Crash Course Computer Science #33
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.

Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
10/25/2017
Curiosity Killed the App
Read the Fine Print
Educational Use
Rating
0.0 stars

Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)

Subject:
Applied Science
Computer Science
Computing and Information
Education
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Brian Sandall
Rich Powers
Date Added:
09/18/2014
Curve digitization package
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

You may have already had to digitize a curve from an original document in the form of an image, which is quite tedious to do by hand.

To facilitate the digitization of curves, we have created a small utility that allows you to display on the screen the previously scanned image of a graph, then to very easily record the points of the curves you are interested in (up to 2000).

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Diagram/Illustration
Homework/Assignment
Interactive
Author:
Renaud Gicquel
Date Added:
11/02/2023
Customer Centric Strategy, 2nd Edition
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Customer centricity is about organizational transformation making the customer the focus for business decisions, processes, product development, services, and procedures. Some companies purport to be customer centric but they fall short in connecting this concept throughout all functional areas of the business. While it is important to offer superb customer service, being customer centric is far more than that. It's about mapping the customer journey to discover customer needs and wants, what's working and what is not, then taking action to improve the customer experience. Customer loyalty is built through providing exceptional customer experiences. This in turn increases revenues through positive company image, referrals, and increased customer lifetime value. Most organizations today realize that they must focus on the customer to remain competitive.

Subject:
Business and Communication
Management
Marketing
Material Type:
Textbook
Provider:
eCampusOntario
Author:
Kerri Shields
Date Added:
01/07/2024
Cyber Society
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This resource is published by cyber.org.Cyber Society is a resource that explores how cyber affects our everyday lives and how to become more educated members of our cyber society. The content lives on an LMS that is maintained by CYBER.ORG. This link will take you to an informational page where you can request access to the rest of the content.

Subject:
Arts and Humanities
Computer Science
Information Science
Political Science
Material Type:
Unit of Study
Author:
Cyber Citizenship Initiative
Date Added:
08/08/2021
Cyberbullying: A comic story
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This is a comic book about cyberbullying. Use it with grades 3rd-6th to discuss what cyberbullying is and how you can stand against it.

Subject:
Computer Science
Material Type:
Lesson Plan
Author:
Wendy Torres
Date Added:
03/18/2018
Cyberbullying Lesson Plan
Rating
0.0 stars

The goal of this lesson plan is for students to be able to learn to identify, respond to, and limit the negative impact of cyberbullying and other unethical or harmful online behaviors through providing various resources and an interactive board game that we have created.

Subject:
Applied Science
Career and Technical Education
Computer Science
Education
Electronic Technology
Elementary Education
Material Type:
Activity/Lab
Assessment
Author:
anna ketsen
colin johnson
stephanie m
karly berger
Date Added:
03/18/2018
Cybercrime and Cyber security Techniques
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cyberinfrastructure
Read the Fine Print
Rating
0.0 stars

Cyberinfrastructure is a tightly integrated, planet-wide grid of computing, information, networking and sensor resources which will enable individual researchers to have the power of the world's highest-performance digital resources at their disposal. NSF has funded or is exploring cyberinfrastructure-related projects designed to lead the scientific and engineering community in the coordinated development and expansive use of cyberinfrastructure.

Subject:
Applied Science
Computer Science
Computing and Information
Material Type:
Lecture
Provider:
NSDL Staff
Provider Set:
National Science Foundation (NSF) Special Reports and Videos
Date Added:
11/06/2014
Cybersecurity: Crash Course Computer Science #31
Read the Fine Print
Some Rights Reserved
Rating
0.0 stars

Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Complexly
Provider Set:
Crash Course Computer Science
Date Added:
10/11/2017
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 3 Protection against Ransomware
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems.
Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks?
Attendees will learn about the following topics:
• Background on ransomware.
• Current state-of-the-art Information Technology against ransomware.
• A risk-based protection strategy.
• Practical tools & tips against ransomware.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Author:
Henry S. Teng
Date Added:
04/09/2024
Cybersecurity Presentation Series: Part 4 PCI Credit Card Data Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:

- What is PCI/credit card data security?
- Why do small businesses need to plan for PCI security compliance?
- Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider
and website hosting service provider.
- IT audit requirements and stages for PCI compliance.
 
Presentation Time: 50 minutes plus 10 minutes Q&A.
Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson
Author:
Henry S. Teng
Date Added:
04/12/2024
Cyber security Techniques- What Is The Internet?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020