Skip to main content

Home/ ACSE Discussion/ Group items matching "used" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Doug Peterson

Learn common PC hardware terms - 2 views

  •  
    Learn common PC hardware terms If you haven't shopped for a computer for a while, the following list of terms used for common PC features and functionality can help you make sure you get everything you need in your new PC.
Peter Beens

Python | Codecademy - 1 views

  •  
    "Python is a powerful and expressive language that has very simple syntax. If you're unsure of which programming language to learn, Python is a great choice. The language is used in a variety of disciplines: application, web, and game development. Python can do it all. Courses are based on Python 2.7.3."
Doug Peterson

The Johnson Pyramid Of Programmer Greatness. « jjmojojjmojo: In Effect - 0 views

  •  
    "The full-sized image is approximately 48 by 36 inches @ 150dpi, but the form factor will scale down to fit on US letter-sized paper. I hope you enjoy it. I, for one, will be plastering it all over my place of employment."
Peter Beens

Algorithms, 4th Edition by Robert Sedgewick and Kevin Wayne - 0 views

  •  
    Textbook. The textbook Algorithms, 4th Edition by Robert Sedgewick and Kevin Wayne [ Amazon · Pearson · InformIT ] surveys the most important algorithms and data structures in use today. The textbook is organized into six chapters: Chapter 1: Fundamentals introduces a scientific and engineering basis for comparing algorithms and making predictions. It also includes our programming model. Chapter 2: Sorting considers several classic sorting algorithms, including insertion sort, mergesort, and quicksort. It also includes a binary heap implementation of a priority queue. Chapter 3: Searching describes several classic symbol table implementations, including binary search trees, red-black trees, and hash tables. Chapter 4: Graphs surveys the most important graph processing problems, including depth-first search, breadth-first search, minimum spanning trees, and shortest paths. Chapter 5: Strings investigates specialized algorithms for string processing, including radix sorting, substring search, tries, regular expressions, and data compression. Chapter 6: Context highlights connections to systems programming, scientific computing, commercial applications, operations research, and intractability.
Doug Peterson

This 13 Year Old App Developer Puts Us All To Shame | Cult of Mac - 1 views

  •  
    "Last year, Nicholas G. was 12-years-old. He convinced his dad to get him a developer account from Apple, and began to learn how to program apps. Nicholas is now 13, and the second update to his first app, Quick Notes!!, is out on the App Store. Version 1.0, says Nicholas, has already accrued over 3,000 downloads. How many downloads did your app have when you were 13? Mine didn't have any. It still doesn't."
Peter Beens

Neil Postman: Five Things We Need to Know About Technological Change - Wikiversity - 0 views

  •  
    First, that we always pay a price for technology; the greater the technology, the greater the price Second, that there are always winners and losers, and that the winners always try to persuade the losers that they are really winners Third, that there is embedded in every great technology an epistemological, political or social prejudice. Sometimes that bias is greatly to our advantage. Sometimes it is not. The printing press annihilated the oral tradition; telegraphy annihilated space; television has humiliated the word; the computer, perhaps, will degrade community life. And so on. Fourth, technological change is not additive; it is ecological, which means, it changes everything and is, therefore, too important to be left entirely in the hands of Bill Gates. And fifth, technology tends to become mythic; that is, perceived as part of the natural order of things, and therefore tends to control more of our lives than is good for us. .... When a technology become mythic, it is always dangerous because it is then accepted as it is, and is therefore not easily susceptible to modification or control.
Doug Peterson

60+ educational resources for teaching yourself anything. - 2 views

  •  
    This collection of links and applications highlights just the tip of the iceberg of educational resources that are available on the web. If you are interested in teaching yourself a new skill or learning a new topic indepth in your spare time, hopefully some of these will be of use. ** Collection of Computer Science courses **
Doug Peterson

Run Android On Your PC From a USB Stick - 0 views

  •  
    With the help of LiveAndroid you don't have to wait to try it out. LiveAndroid has been around for a while now. Originally launched in May, LiveCD allows you to run the Android OS on x86 platforms without actually installing the software. Up until now this was only useful to those with netbooks that actually have an optical drive. However, the folks at LiveAndroid last week announced a LiveUSB version, especially handy for those of you with netbooks or notebooks that don't have a disc drive.
Peter Beens

Turn an Old Computer into a Networked Backup, Streaming, or Torrenting Machine with Ubuntu - 0 views

  •  
    You've heard the word "server" thrown around a lot, but usually in the context of web sites or big companies that have a lot of data to store. In reality, a server can be just as useful in your home. In this guide, we'll walk through how to create your own server at home that you can put in the closet and leave on 24/7, ready to do any streaming, downloading, or backup you might need at a moment's notice.
Doug Peterson

Another reason you should learn to code: Python for Excel - Tech News and Analysis - 3 views

  •  
    Anyone who has used Microsoft Excel since 1993 has likely dabbled at least once with VBA, or Visual Basic for Applications, scripting: That's the year Excel 5.0 arrived with VBA support. The feature allows users to create automated tasks and functions in the spreadsheet application, extending the software's potential.
tech vedic

How to install DOS operating system? - 0 views

  •  
    Whether you love to play DOS games or want to use DOS for some other reason, you need to download the latest version as it supports both old and new DOS commands. Here is this tutorial for you to install DOS operating system.
tech vedic

Add checkboxes to an Excel spreadsheet - 0 views

  •  
    If you're setting up a worksheet only for yourself, you can simply leave an empty cell for this purpose. To check it, just type in an x or any other character. Then use a formula with the =isblank() function to make the contents of that cell affect the rest of the spreadsheet. But you might want something more mouse-friendly--especially if you're designing a spreadsheet for other people. I've tested the technique below on Excel 2007, 2010, and 2013. I'm not sure about earlier versions. You can insert checkboxes on Excel's Developer tab. Unfortunately, that tab is hidden by default. To make it visible in Excel 2010 or 2013, click the File tab and select Options. ClickCustomize Ribbon. You'll see two lists. Make sure that the one on the right is titled Main Tabs. Check Developer.
tech vedic

Clever adapter connects USB accessories to your Android device - 0 views

  •  
    You can connect keyboard, USB hard drives as well as gaming controllers to your Android phone or tablet using a USB OTG adapter. Have a look on this tutorial.
tech vedic

Five tips for the new Google Maps on Android - 0 views

  •  
    The new and advanced version of Google maps is entering via Google Play to Android devices. Here are five tips to use new Google Maps on Android.
tech vedic

KEYS TO A SECURE PASSWORD - 0 views

  •  
    Are you in a habit of using short or same passwords? Then change it now. Online world is becoming risky day by day. Hackers are always ready to hack your account and thus, it is your responsibility to protect yourself against cyber-crimes. We are providing you important tips to create strong as well as secure password.
tech vedic

How to mute annoying email threads in Gmail? - 0 views

  •  
    You often use the "Reply All" button in group communication. At that time, it may seem convenient, though it may be distressing later one, when different recipients start reverting on it, even when you don't expect. No matter how many times you delete these messages from your inbox, the next message in the chain will make it all come flashing back.
tech vedic

How to secure your Tablet? - 0 views

  •  
    Using a wireless technology for browsing websites, checking mails, chatting on social networking sites, etc. is very common nowadays. But, this easy networking comes at a risk. Let's go through this tutorial for making your web browsing safer in tablets.
tech vedic

Repair disk permissions to speed up your Mac - 0 views

  •  
    Whenever you install something in Mac OS X then it gets installed from package files. Along with installing something from package files, a "Bill of Materials" file is stored in the package receipt file. These ".bom" files contain a list of the files installed by that package as well as the proper permissions for each file. But, in future, these permissions can get changed resulting in freezing or crashing of your Mac.
tech vedic

Use Onefeed to replace your New Tab page in Chrome - 0 views

  •  
    Want to add information on your new Tab page in Chrome? Here is a solution with OneFeed. With OneFeed, you can add custom newsfeed as well as get alerts from your social media accounts.
tech vedic

How to do smarter file searches in Windows 8? - 0 views

  •  
    For searching your important files and documents, Windows 8 dynamic search option immediately displays and filters results. But, for documents located outside Libraries you can use File Explorer formerly known as Windows Explorer.
« First ‹ Previous 101 - 120 of 229 Next › Last »
Showing 20 items per page