This course will focus on advanced techniques and concepts in database management. …
This course will focus on advanced techniques and concepts in database management. Emphasis will be on Structured Query Language (SQL) and current industry best practices for utilizing data and databases. This course will be using hands-on exercises and real-world case studies for topics such as database optimization, database scalability, performance tuning, and concurrency control. Learning Objectives
Choose appropriate data models for projects. Implement data design in a relational database. Use query language (SQL) to create, access, update, and delete. Articulate how to collect and handle data Visualize and present data in ways that are easy to communicate with others Write efficient SQL statements Practice and implement database modeling and design Utilize and implement industry best practices for security and data standards Program a complex project using industry standard techniques. Describe the issues related to database performance. Show the advantages and disadvantages of various database types.
Course Overview: Building an Endless Runner Game in Unreal EngineThis course is …
Course Overview: Building an Endless Runner Game in Unreal EngineThis course is designed for aspiring game developers and educators looking to learn Unreal Engine through a hands-on project: building an endless runner game. The course introduces essential game development concepts, focusing on visual scripting using Blueprints, and provides a step-by-step guide to creating an engaging and functional game.Students will build a game where a ball character navigates through a procedurally generated tunnel, avoiding obstacles and passing through gates to score points. By the end of the course, learners will have developed a fully functional endless runner and gained foundational skills to expand their game development knowledge.
This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), …
This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), apply these concepts to computer networks, and amplify the theory with hands-on aspects of configuring and using secure networks. Topics include: review of networking concepts, general security concepts, user authentication and authorization, encryption, network attacks (including hacking, viruses, worms and denial of service) and network protection. Defense tools including firewalls, Virtual Private Networks (VPNs), and filters will be discussed in depth, as they relate to effective and safe e-commerce and other applications in the real world. Case studies along with projects will be assigned and performed.
This course is designed to familiarize students with basic computer architecture and …
This course is designed to familiarize students with basic computer architecture and operating systems and the relationships between hardware and operating systems will be explored. A student who successfully completes this course will also be able to gain strong foundation in the core fundamentals of digital technology. Basic concepts are reinforced by exercises, and hand-on applications. Students will also program and run simple macros in Linux shell. Employability skills, such as Problem solving, Teamwork, Communications and Critical Thinking are integrated into the course work. 4 hours’ lecture. All course content created by Syeda Ferdous Arar Begum. Content added to OER Commons by Joanna Gray.
“Culturally Responsive Computing” is a groundbreaking textbook that addresses the critical intersection …
“Culturally Responsive Computing” is a groundbreaking textbook that addresses the critical intersection of technology and cultural diversity in our increasingly interconnected world. This comprehensive guide delves into how cultural contexts influence every aspect of computing, from the fundamentals of programming languages to the intricacies of human-computer interaction.
The book begins by exploring the cultural dimensions of core computing concepts, including data types, algorithms, and information security. It then expands into more complex topics such as artificial intelligence, user experience design, and the ethical considerations of technology deployment across different cultural landcapes.
Key features of the book include: o In-depth analysis of how cultural factors impact technology’s design, implementation, and adoption worldwide. o Exploration of computational thinking techniques that promote inclusive and culturally aware problem-solving. o Practical strategies for developing culturally sensitive user interfaces and accessible design practices. o Case studies from diverse global contexts illustrating real-world applications and challenges in cross-cultural computing. o Ethical considerations in technology design and deployment focus on respecting cultural differences and promoting digital equity. o Interdisciplinary connections, linking computing concepts with insights from anthropology, psychology, and other relevant fields.
This textbook is an invaluable resource for computer science students, software developers, UX/UI designers, and technology professionals seeking to create more inclusive and globally relevant digital solutions. It challenges readers to think beyond technical specifications and consider the broader cultural implications of their work.
By bridging the gap between technological innovation and cultural understanding, “Computing Across Cultures” prepares the next generation of tech leaders to build a more equitable and culturally responsive digital future. It is an essential read for anyone looking to thrive in the global tech industry and make a positive impact through culturally inclusive computing practices.
The Data Renaissance delves into the complexities of data's role in various …
The Data Renaissance delves into the complexities of data's role in various industries and its broader impact on society. It highlights the challenges in investigating data practices, citing examples like TikTok, where algorithms and data handling are closely guarded secrets. The content, contributed by students under the guidance of an expert, covers a wide range of topics, including the ethical aspects of generative AI in education and the workplace, and case studies reflecting real-world experiences. This evolving text, intended to be updated with each class, serves as a dynamic resource for educators and students alike, offering insights and discussion guides for an in-depth understanding of the ever-changing landscape of data in our digital age.
Electronic commerce (e-commerce) and electronic business (e-business) are vital to business. E-commerce …
Electronic commerce (e-commerce) and electronic business (e-business) are vital to business. E-commerce is one of the core courses in the management information systems (MIS) curriculum. It explains the business practices in the information technology era. The course also introduces the tools that can be applied to e-commerce project development. Information technology has become a commodity, and the e-commerce course has become a widely accepted business elective course forall business majors.The objective of this textbook is to help business students understand the concept of e-commerce and e-business and develop practical skills of e-commerce project development. Upon completion of the course, students will understand e-commerce and e-business, and be able to develop an e-commerce project. This resource was supported by funding from the OER Creator Program at UMass Dartmouth.
Ethical Hacking is a course in our IT Cyber Security Program created …
Ethical Hacking is a course in our IT Cyber Security Program created by Syeda Ferdous Ara Begum. This course teaches students how to properly secure a network by introducing them to various methodologies and techniques of attacking and disabling a network. Students will receive a hands-on practical approach in penetration testing measures and ethical hacking. Coursework is supplemented by hands-on exercises of attacking and disabling a network, and the use of appropriate tools for defense and countermeasures, with emphasis on teaching students to use what they learn ethically and legally. Students will be required to sign the White Hat Oath. All course content created by Syeda Ferdous Ara Begum. Content added to OER Commons by Jordana Shaw.
"Introduction to Communication and Media Studies" is an in-depth exploration of how …
"Introduction to Communication and Media Studies" is an in-depth exploration of how communication shapes our world. This book traces the historical evolution of media, from the early days of the printing press to today’s digital age, examining key developments such as the telegraph, radio, television, and the internet. It also covers critical theories that explain media’s impact on society, including the effects of advertising, the role of public relations, and the emergence of social media as a powerful force in modern communication. Chapters on media literacy, critical thinking, and rhetorical analysis help students develop critical skills for understanding and analyzing media messages.
This is an introductory course in data literacy and databases. The course …
This is an introductory course in data literacy and databases. The course includes aspects of database design including entity relationship modeling, tables, and queries. Students will utilize database applications and Structured Query Language (SQL). Data science including data collection, modeling, and visualization will be discussed. Best practices for data security and privacy in regards to current regulations around the world will be emphasized in this course. Learning Objectives
Classify a diverse variety of data and construct usable data models Identify and apply industry best practices Demonstrate how to effectively use data within your job/industry Articulate how to collect and handle data Visualize and present data in ways that are easy to communicate with others Write efficient SQL statements Practice and implement database modeling and design Utilize and implement industry best practices for security and data standards
This is a project based course to introduce students to a Linux/Unix …
This is a project based course to introduce students to a Linux/Unix type environment. This course will cover system navigation, file manipulation, text processing utilities and shell scripting. This course will primarily be done using a CLI, with a focus on Bash.
Learning Objectives: Organize and manage files within the system Comfortable using basic commands from the command line Edit files using editors such as VI and/or Emacs Usefully combine tools and features such as filters, pipes, appends and redirection Know how to do some basic shell scripting, and successfully read, write and debug basic bash scripts Know how to use resources online and off to find additional information about the commands and system
This is an advanced course in system administration with a heavy focus …
This is an advanced course in system administration with a heavy focus on Linux. The course utilizes hands-on labs for topics such as software configuration and installation. Students will build and maintain a small network of virtualized Linux servers from the ground up employing best practices for all aspects of backups, disaster recovery, planning, testing and troubleshooting. Students will read, utilize, and produce technical documentation.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.