Skip to main content

Home/ ACSE Discussion/ Group items tagged list

Rss Feed Group items tagged

Peter Beens

There Is More To Computing Than Computer Science - Computer Science Teacher - Thoughts ... - 1 views

  •  
    Last week Doug Peterson pointed me to an article called "Let's not call it computer science if we really mean computer programming." My initial reaction was "Let's not call it computer programming if we really mean software engineering."  Really the author was talking more about the difference between CS and SE than much else.The ACM has a great Computing Careers web site which lists a number of computing fields and degrees. I recommend this series to teachers and guidance councilors all the time. They list five different degree paths:
  •  
    Last week Doug Peterson pointed me to an article called "Let's not call it computer science if we really mean computer programming." My initial reaction was "Let's not call it computer programming if we really mean software engineering."  Really the author was talking more about the difference between CS and SE than much else.The ACM has a great Computing Careers web site which lists a number of computing fields and degrees. I recommend this series to teachers and guidance councilors all the time. They list five different degree paths:
Doug Peterson

alice-teachers Info Page - 0 views

  •  
    Alice is an engaging, introductory programming environment for the creation of animations and games using 3D models. Alice features a drag-and-drop interface that eliminates the frustration of syntax errors for beginning programmers.  This list is for educators who are teaching with Alice or who are considering teaching with Alice (either 2.2 or 3). The purpose of this list is to provide and quick and easy way to ask questions, post ideas and nifty assignments, and generally support all members of the Alice teaching community. 
Doug Peterson

9 Must Have Open Source Apps For Web Developers - 0 views

  •  
    "A plethora of cool open source tools is available out there, but not all of them are up to the mark. So today we have a list of 9 Must Have Open Source Apps For Web Developers. Check this list out and pick the ones that suit your needs the best."
Doug Peterson

Default Password List - Submit - 0 views

  •  
    Default Password List
Doug Peterson

Books for Computer Science Students - Computer Science Teacher - Thoughts and Informati... - 0 views

  •  
    Ever since I was told about a list of Movies for Computer Science Students and wrote some comments about that list I have been thinking book. Fiction books. Novels that tell stories that involve computer science and the sorts of issues of privacy, philosophy, ethics and social change that computers make in our society.
tech vedic

How to export song lists from iTunes? - 0 views

  •  
    Sometimes you just want to send a playlist to a friend through mail. But, you don't know how to do it? Then you are at the right place. You can break your library data out of iTunes as a tab-separated list, PDF file, or Web database. With this tutorial, you can find the way of doing this.
Doug Peterson

Reference Guide (v2.0) - Google Documents List Data API v2.0 - Google Code - 0 views

  •  
    This document provides detailed reference documentation for the Google Documents List Data API
Doug Peterson

10000 things all ICS students should do before graduating | Tagide - 2 views

  •  
    So I thought I'd compile a list of 1010 10000 things I believe all ICS students should have done (by  themselves) by the time they get their diplomas. With luck, students have come across some of these in courses. Most likely, that won't happen, so students need to make time for extra-curricular activities.
tech vedic

Recycle your old tech gear - 0 views

  •  
    In springtime, people's fancies may turn to love, but their to-do list turns to cleaning. Make this the year that you finally recycle all the ancient MP3 players, toner cartridges, ethernet cables, and bulky monitors out of the closets, garages, and spare rooms where they've been lurking. Your home will feel more modern, and you'll be doing your part to boost the 27 percent electronics recycling rate. Just in time for another spring constant, Earth Day. Before you get rid of any of your electronics The first step on your recycling journey: Make sure that none of your personal data will be leaving the house along with your soon-to-be-discarded electronics. If you're using Apple's iTunes to manage your digital music and video, be sure you deauthorize any device you're recycling. "But that computer is dead" is no excuse: Apple expects you to simply deauthorize all your devices via the iTunes app, then reauthorize the ones that are still alive If you're recycling a smartphone, do a complete reset of your phone to wipe out its data and restore it to its factory settings. Before you do this, however, make sure that you've got your data backed up someplace else If you're recycling a computer or a hard drive, don't just assume that deleting files will wipe the data off your system, because it won't. All it does is reformat the space on the drive, and the data can be snagged using tools designed for disaster recovery. Now, on to recycling Broadly speaking, you have three recycling options: You can drop off your unwanted stuff in person somewhere; you can ship it away; or you can donate it to a willing organization. Drop it off in person. The advantage to dropping off your gear is that you don't need to really plan ahead and print out prepaid labels (as you would if you were shipping things away); you just toss your stuff in the car and go Another option that's cropping up across the U.S. is the electronics recyc
tech vedic

Make your passwords harder to crack - 0 views

  •  
    There's nothing you can do if hackers get into a database with your password in it, but you can still protect yourself for all the other worst-case scenarios involving hacking. First, don't make it easy on hackers by choosing a common password. Splashdata uses security breaches to gather 'most popular passwords' lists each year. The word 'password', number sequences, and other simplistic phrases or numbers fill the top spots. Also, don't use your name, a password related to another one you might have on a different site, or a login name. Instead, experts recommend using 15 characters, upper-case letters, better yet nonsensical words with special characters and numbers inside them. By-The Xpert Crew @ http://techvedic.com
Peter Beens

Computer Science Circles | 01000011 01010011 01000011 - 2 views

  • This website teaches computer programming
  • A computer program is a series of instructions, written in words, numbers and symbols
  • We have chosen to teach Python since it is both simple enough for beginners and powerful enough to be used by modern companies
  •  
    This website teaches computer programming. This skill is very useful: with programming you can automate computer tasks, make art and music, interpret and analyze survey results, build tools for other people, create custom websites, write games, examine genetic data, connect people with each other, and the list goes on and on.
Peter McAsh

20 amazing tools to modify images - 1 views

  •  
    An excellent list (with links)
Doug Peterson

Learn common PC hardware terms - 2 views

  •  
    Learn common PC hardware terms If you haven't shopped for a computer for a while, the following list of terms used for common PC features and functionality can help you make sure you get everything you need in your new PC.
Doug Peterson

Large collection of Free Microsoft eBooks for you, including: SharePoint, Visual Studio... - 1 views

  •  
    Throughout the year I try to share resources and information with you that I think will be helpful for you. Often times these resources will include links to free eBooks that we make available on a variety of topics. Today, I thought I would post a large collection of eBooks for you here so that you can find them in one place and consume them as you see fit. Also, if you find this list helpful, please share it with your peers and colleagues so that they too can benefit from these resources.
Doug Peterson

20 Hilarious Programming Jargon Phrases You Should Know When Talking To Engineers - Bus... - 1 views

  •  
    Jeff Atwood, co-founder of question-and-answer site Stack Exchange, has a huge list of 30 new pieces of programming jargon that have emerged on the question-and-answer site.
Peter Beens

Build Your Own Blocks (BYOB) - 0 views

  •  
    Welcome to the distribution center for BYOB (Build Your Own Blocks), an advanced offshoot of Scratch, a visual programming language primarily for kids from the Lifelong Kindergarten Group at the MIT Media Lab. This version, developed by Jens Mönig with design input and documentation from Brian Harvey, is an attempt to extend the brilliant accessibility of Scratch to somewhat older users-in particular, non-CS-major computer science students-without becoming inaccessible to its original audience. BYOB 3 adds first class lists, sprites, and procedures to BYOB's original contribution of custom blocks and recursion.
tech vedic

Add checkboxes to an Excel spreadsheet - 0 views

  •  
    If you're setting up a worksheet only for yourself, you can simply leave an empty cell for this purpose. To check it, just type in an x or any other character. Then use a formula with the =isblank() function to make the contents of that cell affect the rest of the spreadsheet. But you might want something more mouse-friendly--especially if you're designing a spreadsheet for other people. I've tested the technique below on Excel 2007, 2010, and 2013. I'm not sure about earlier versions. You can insert checkboxes on Excel's Developer tab. Unfortunately, that tab is hidden by default. To make it visible in Excel 2010 or 2013, click the File tab and select Options. ClickCustomize Ribbon. You'll see two lists. Make sure that the one on the right is titled Main Tabs. Check Developer.
tech vedic

Top 5 enterprise security threats - 0 views

  •  
    Nowadays, the list of security concerns is getting bigger and bigger. All enterprises have five types of security threats. Here in this tutorial, let's uncover these top five security threats of enterprises.
1 - 20 of 42 Next › Last »
Showing 20 items per page