Updating search results...

Search Resources

1644 Results

View
Selected filters:
  • Module
A&P Identification PowerPoint Presentations
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Anatomy and Physiology Lab I slide decks created by Steven Lee M.S. Pathology, FTCC. The PowerPoints include labeled body images to assist students in identifying body parts. Nicole Shaw is only responsible for assisting Steven with licensing his work under an open license and uploading content to the Commons. 

Subject:
Higher Education
Anatomy/Physiology
Biology
Material Type:
Module
Author:
Nicole Shaw
Date Added:
02/16/2022
Abstract Algebra
Unrestricted Use
CC BY
Rating
0.0 stars

This module aims to acquaint you with the mathematical aspects of rings and groups and the underlying algebraic structures and when they are looked at as non-empty sets, how their elements are combined by binary operations as well as how those elements behave under transformations such finding inverses. Some non-empty sets, under the operation of addition or multiplication do not include the inverses of their elements as members of the set and they are called semi-groups. The non-empty sets that include the inverses of their elements are full fledged groups. This module fills the gap arising from basic mathematics.

Subject:
Algebra
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Othow Onak Giel
Date Added:
03/10/2018
Advanced Computer Organisation Architecture
Unrestricted Use
CC BY
Rating
0.0 stars

This course introduces students to Advanced Computer Organization and Architecture. Where architecture is a term used to describe the attributes of a system as seen by the programmer. Its concerned with designs and operations of a computer. Computer organization is the way the system is structured so that all those cataloged tools can be used, and that in an efficient fashion. This course has its emphasis on system design and performance.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Harrison Njoroge
Date Added:
02/22/2018
Advanced Database Systems
Unrestricted Use
CC BY
Rating
0.0 stars

At the heart of any major system is a data storage back-end. This back-end is what is refered to as a database. Taking that a database forms the core of systems, there is every need for the data to have integrity and also available for use. Database systems when well designed will ensure the system achieves those goals. Persons with skills to develop and manage these databases are therefore vital in modern day systems. The course principals of Database Systems is needed to help provide the competencies and skills needed by entry-level systems analyst or programmers. This course is about understanding and developing application logic in databases.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
John Kandiri
Date Added:
02/22/2018
African American Culture
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The development of African American culture and the reciprocal effects of that development are analyzed in this video along with a brief examination of the Stono Rebellion. When watching the video, consider what characterized the slave labor system? How did the slaves cope? What choices did they have? To what extent was an African American culture emerging in colonial America? What characterized this culture? What happened during the Stono rebellion? How did white southerners react to it?

Subject:
U.S. History
Material Type:
Module
Author:
William Black
Date Added:
02/14/2022
Algorithim Design and Analysis
Unrestricted Use
CC BY
Rating
0.0 stars

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

This course aim to provide an in-depth understanding of the fundamental algorithmic techniques for design and analysis, in turn impart knowledge and practical competence in use of advanced data structures and the design and analysis of algorithms.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Godfry Justo
Date Added:
02/22/2018
Algorithim Design and Analysis
Unrestricted Use
CC BY
Rating
0.0 stars

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

This course aim to provide an in-depth understanding of the fundamental algorithmic techniques for design and analysis, in turn impart knowledge and practical competence in use of advanced data structures and the design and Welcome to Advanced computer Security Module. This module provides a study of high-level computer security issues in computer networks and advanced methods of data encryption. It focuses on advanced aspects of computer security, such as encryption, security practices, system security, security for authentication on the Web and password management techniques. Finally this module, students should be able to create secure network architectures adapted to the investment level and required security. Take responsibility for installation, configuration and network security maintenance.

The module aims to give IT infrastructure management skills, where the role of computer security is critical to ensure the integrity of data and the normal operation of the various systems: computer networks, servers and personal computers in the organization. The course will also explore various Information Security controls, how to handle various risk assessment in an organization and finally creating a security policy in organization.

Today, we note that the information is considered the key business of an organization / company due to its usefulness and importance, however, the issue of the company’s Information Security is a priority task for managers, because they recognize the value it has and therefore organizations must make sure that it is managed effectively. For this reason, this module is important because you will learn the methods and tools for computer security that can ensure the confidentiality of information in organizations and also learn how to protect their information and systems in a network environment.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Richard Musabe
Date Added:
02/22/2018
All Men Are Created Equal?
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

America looked quite different in 1801 than it had in 1760. Thirteen separate colonies had become a nation with generous boundaries and an emerging identity. Idealistic principles espousing freedom and equality were becoming part of a national creed. While American Indians were being separated from the rest of the nation, women and African Americans had some hope that they might be included on a more equal basis.

Subject:
U.S. History
Material Type:
Module
Author:
William Black
Date Added:
02/15/2022
The American Creed
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The American Creed briefly examines the origins of the Declaration of Independence, its "magic words," and the profound effects the document would have on the history of the modern world.

Subject:
U.S. History
Material Type:
Module
Author:
William Black
Date Added:
02/15/2022