SiteMap Course Shells
- Page ID
- 32182
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)
- Bucknell University
- CEEG 445: Environmental Engineering Chemistry (Fall 2021)
- Cañada College
- Circuits and Devices
- Front Matter
- 1: Basic Concepts and Quantitites
- 2: Fundamental Laws
- 3: Circuit Simulations Using Computers
- 4: Analysis Theorems and Techniques
- 5: Nodal and Mesh Analysis, Dependent Sources
- 6: Capacitors and Inductors
- 7: Advanced Topic- Operational Amplifiers
- 8: Transient Behavior- First and Second Order Circuits
- 9: AC Signal Fundamentals
- 10: Series RLC Circuits
- 11: Parallel RLC Circuits
- 12: AC Circuit Analysis Theorems and Techniques
- 13: AC Power
- 14: Advanced Topic- Magnetic Circuits and Transformers
- Back Matter
- Circuits and Devices: Laboratory
- Front Matter
- 1: The Electrical Laboratory
- 2: Sources and Instruments
- 3: Relating V, I and R
- 4: Important Theorems
- 5: Circuit Analysis Techniques
- 6: First Order Circuits
- 7: AC Circuits
- 8: Introduction to RL and RC Circuits
- 9: Series RLC Circuits
- 10: Parallel RLC Circuits
- 11: DC Operational Amplifiers (Op Amps)
- Back Matter
- Circuits and Devices
- Delta College
- CS11 - Informations Systems
- Front Matter
- 1: What is an Information System?
- 2: Information Systems for Strategic Advantage
- 2.1: Does IT Matter?
- 2.2: Business Processes
- 2.3: The People in Information Systems
- 2.4: Information Systems Development
- 3: Information Systems Beyond the Organization
- Back Matter
- CSP31A - C Programming
- Introduction to Programming Concepts - Python
- Front Matter
- 1: Introduction
- 1.1: Why should you learn to write programs?
- 1.2: Creativity and Motivation
- 1.3: Computer Hardware Architecture
- 1.4: Understanding Programming
- 1.5: Words and Sentences
- 1.6: Conversing with Python
- 1.7: Terminology - Interpreter and Compiler
- 1.8: Writing a Program
- 1.9: What is a program?
- 1.10: The Building Blocks of Programs
- 1.11: What could possibly go wrong?
- 1.12: The Learning Journey
- 1.13: Introduction (Exercises)
- 1.14: Introduction (Glossary)
- 2: Variables, Expressions, and Statements
- 2.1: Values and Types
- 2.2: Variables
- 2.3: Variable names and Keywords
- 2.4: Statements
- 2.5: Operators and Operands
- 2.6: Expressions
- 2.7: Order of Operations
- 2.8: Modulus Operator
- 2.9: String Operations
- 2.10: Asking the user for input
- 2.11: Comments
- 2.12: Choosing Mnemonic Variable Names
- 2.13: Debugging
- 2.14: Variables, Expressions, and Statements (Exercises)
- 2.15: Glossary
- 3: Conditional Execution
- 3.1: Boolean Expressions
- 3.2: Logical Operators
- 3.3: Conditional Execution
- 3.4: Alternative Execution
- 3.5: Chained Conditionals
- 3.6: Nested Conditionals
- 3.7: Catching exceptions Using Try and Except
- 3.8: Short-Circuit Evaluation of Logical Expressions
- 3.9: Debugging
- 3.10: Conditional Execution (Exercises)
- 3.11: Conditional Execution (Glossary)
- 4: Functions
- 4.1: Function Calls
- 4.2: Built-in Functions
- 4.3: Type Conversion Functions
- 4.4: Random Numbers
- 4.5: Math Functions
- 4.6: Adding New Functions
- 4.7: Definitions and Uses
- 4.8: Flow of Execution
- 4.9: Parameters and Arguments
- 4.10: Fruitful functions and void functions
- 4.11: Why functions?
- 4.12: Debugging
- 4.13: Functions (Exercises)
- 4.14: Functions (Glossary)
- 5: Iterations
- 5.1: Updating Variables
- 5.2: The while Statement
- 5.3: Infinite Loops
- 5.4: "Infinite loops" and break
- 5.5: Finishing iterations with continue
- 5.6: Definite loops using for
- 5.7: Loop patterns
- 5.8: Counting and Summing Loops
- 5.9: Maximum and Minimum Loops
- 5.10: Debugging
- 5.11: Iterations (Exercises)
- 5.12: Iterations (Glossary)
- 6: Strings
- 6.1: A string is a sequence
- 6.2: Getting the length of a string using len
- 6.3: Traversal through a string with a loop
- 6.4: String Slices
- 6.5: Strings are immutable
- 6.6: Looping and Counting
- 6.7: The in operator
- 6.8: String Comparison
- 6.9: String Methods
- 6.10: Parsing strings
- 6.11: Format operator
- 6.12: Debugging
- 6.13: Strings (Exercises)
- 6.14: Strings (Glossary)
- 7: Files
- 8: Lists
- 8.1: A list is a sequence
- 8.2: Lists are mutable
- 8.3: Traversing a List
- 8.4: List operations
- 8.5: List Slices
- 8.6: List Methods
- 8.7: Deleting Elements
- 8.8: Lists and Functions
- 8.9: Lists and Strings
- 8.10: Parsing lines
- 8.11: Objects and Values
- 8.12: Aliasing
- 8.13: List arguments
- 8.14: Debugging
- 8.15: Lists (Exercises)
- 8.16: Lists (Glossary)
- 9: Dictionaries
- 10: Tuples
- 10.1: Tuples are Immutable
- 10.2: Comparing Tuples
- 10.3: Tuple Assignment
- 10.4: Dictionaries and Tuples
- 10.5: Multiple assignment with dictionaries
- 10.6: The most common words
- 10.7: Using Tuples as Keys in Dictionaries
- 10.8: Sequences: strings, lists, and tuples - Oh My!
- 10.9: Debugging
- 10.10: Tuples (Exercises)
- 10.11: Tuples (Glossary)
- 11: Regular Expressions
- 11.1: Regular Expressions
- 11.2: Character matching in regular expressions
- 11.3: Extracting data using regular expressions
- 11.4: Combining searching and extracting
- 11.5: Escape Character
- 11.06: Bonus section for Unix
- 11.7: Debugging
- 11.8: Regular Expressions (Exercises)
- 11.9: Regular Expressions (Glossary)
- 11.10: Regular Expressions (Summary)
- 12: Networked Programs
- 12.1: HyperText Transfer Protocol - HTTP
- 12.2: The World's Simplest Web Browser
- 12.3: Retrieving an image over HTTP
- 12.4: Retrieving web pages with urllib
- 12.5: Parsing HTML and scraping the web
- 12.6: Parsing HTML using regular expressions
- 12.7: Parsing HTML using BeautifulSoup
- 12.8: Reading binary files using urllib
- 12.9: Networked Programs (Exercises)
- 12.10: Networked Programs (Glossary)
- 13: Python and Web Services
- 13.1: eXtensible Markup Language - XML
- 13.2: Looping through Nodes
- 13.3: JavaScript Object Notation - JSON
- 13.4: Parsing JSON
- 13.5: Application Programming Interfaces
- 13.6: Google geocoding web service
- 13.7: Security and API usage
- 13.8: Python and Web Services (Exercises)
- 13.9: Python and Web Services (Glossary)
- 14: Object-Oriented Programming
- 14.1: Managing Larger Programs
- 14.2: Getting Started
- 14.3: Using Objects
- 14.4: Starting with Programs
- 14.5: Subdividing a Problem - Encapsulation
- 14.6: Our First Python Object
- 14.7: Classes as Types
- 14.8: Many Instances
- 14.9: Object Lifecycle
- 14.10: Inheritance
- 14.11: Object-Oriented Programming (Glossary)
- 14.12: Object-Oriented Programming (Summary)
- 15: Using Databases and SQL
- Front Matter
- 15.1: What is a database?
- 15.2: Database Concepts
- 15.3: Database Browser for SQLite
- 15.4: Creating a database table
- 15.5: Structured Query Language summary
- 15.6: Spidering Twitter using a database
- 15.7: Basic data modeling
- 15.8: Programming with Multiple Tables
- 15.9: Constraints in Database Tables
- 15.10: Retrieve and
- 15.11: Storing the friend relationship
- 15.12: Three Kinds of Keys
- 15.13: Using JOIN to retrieve data
- 15.14: Degugging
- 15.15: Using Databases and SQL (Glossary)
- 15.16: Using Databases and SQL (Summary)
- Back Matter
- 16: Visualizing data
- Back Matter
- C++ Programming I (McClanahan)
- Front Matter
- 1: Building and Running C++ Code
- 2: C++ Basics
- 3: Program Planning and Design
- 4: Data and Operators
- 4.1: We Begin to Code...
- 4.2: Data Types in C++
- 4.3: Identifier Names
- 4.4: Constants and Variables
- 4.5: Data Manipulation
- 4.6: Assignment Operator
- 4.7: L Value and R Value
- 4.8: Sizeof Operator
- 4.9: Arithmetric Operators
- 4.10: Data Type Conversions
- 4.11: Operator Overloading
- 4.12: Unary Positive and Negative Operators
- 4.13: Bitwise Operators
- 5: Common Data Types
- 6: Conditional Execution
- 7: Conditional Loops
- 8: Counting Loops
- 9: Introduction to Arrays
- 10: Functions
- 11: C++ Input and Output
- 12: Pointers
- 13: Object Oriented C++
- 14: Overloading in C++
- 15: Polymorphism
- 16: Inheritance
- 19: Handling Errors
- Back Matter
- Information Systems for Business
- Front Matter
- 1: Introduction to Information Systems?
- 2: Hardware
- 3: Software
- 4: Data and Databases
- 5: Networking and Communication
- 6: Information Systems Security
- 7: Does IT Matter?
- 8: Business Processes
- 9: The People in Information Systems
- 10: Information Systems Development
- 11: Globalization and the Digital Divide
- 12: The Ethical and Legal Implications of Information Systems
- 13: Future Trends in Information Systems
- Back Matter
- C++ Data Structures
- Front Matter
- 1: OOP Concepts
- 2: C++ Pointers
- 3: Dynamic Memory Allocation and Arrays
- 4: Inheritence
- 4.1: The Concept of Inheritance
- 4.2: Why and when to use inheritance?
- 4.3: Implementing inheritance in C++
- 4.4: Modes of Inheritance
- 4.5: Types of Inheritance in C++
- 4.6: Types of Inheritance in C++
- 4.7: Types of Inheritance
- 4.8: Types of Inheritance
- 4.9: Types of Inheritance
- 4.10: Programming Assignment- Inheritance
- 5: Polymorphism
- 6: Abstraction / Encapsulation
- 7: Linked Lists
- 8: Recursion
- 9: Stack Data Structure
- 10: Queues Data Structures
- 11: Hashing
- 12: Heap
- 13: Sorting
- 14: Binary Trees
- Back Matter
- Operating System: The Basics
- 1: The Basics - An Overview
- 2: Operating System Overview
- 3: Processes - What and How
- 4: Threads
- 5: Concurrency and Process Synchronization
- 6: Concurrency: Deadlock and Starvation
- 7: Memory Management
- 8: Virtual Memory
- 9: Uniprocessor CPU Scheduling
- 10: Multiprocessor Scheduling
- 12: File Management
- Information Security
- Front Matter
- 1: Information Security Defined
- 2: Authenticate and Identify
- 3: Authorize and Access Control
- 4: Auditing and Accountability
- 5: Cryptography
- 6: Compliance , Laws and Regulations
- 7: Operations Security
- 8: Human Element Security
- 9: Physical Security
- 10: Network Security
- 11: Operating Systems Security
- 12: Mobile, Embedded, and Internet of Things Security
- 13: Application Security
- 14: Assessing Security
- Back Matter
- Web Animation
- Front Matter
- 1: Values, Types, and Operators
- 2: Program Structure
- 3: Functions
- 4: Objects and Arrays
- 5: The Secret Life of Objects
- 6: Bugs and Errors
- 7: Regular Expressions
- 8: Modules
- 9: Asynchronous Programming
- 10: JavaScript and the Browser
- 11: The Document Object Model
- 12: Handling Events
- 13: Drawing on Canvas
- 14: Projects
- 15: Node
- 16: Uncovered Chapters
- Back Matter
- Computer Science from the Bottom Up (Wienand)
- 0.01: Implementing abstraction
- 0.02: File Descriptors
- 0.03: Types and Number Representation
- 0.04: Memory
- 0.05: Peripherals and buses
- 0.06: Small to big systems
- 0.07: Operating System Organisation
- 0.08: System Calls
- 0.09: Privileges
- 0.10: Elements of a process
- 0.11: Process Hierarchy
- 0.12: Fork and Exec
- 0.13: Context Switching
- 0.14: Scheduling
- 0.15: The Shell
- 0.16: Signals
- 0.17: What virtual memory is
- 0.18: Pages
- 0.19: Physical Memory
- 0.20: Pages + Frames = Page Tables
- 0.21: Virtual Addresses
- 0.22: Consequences of virtual addresses, pages and page tables
- 0.23: Hardware Support
- 0.24: Linux Specifics
- 0.25: Hardware support for virtual memory
- 0.26: Building an executable
- 0.27: Compiling
- 0.28: Assembler
- 0.29: Linker
- 0.30: A practical example
- 0.31: Representing executable files
- 0.32: ELF
- 0.33: ELF Executables
- 0.34: Libraries
- 0.35: Extending ELF concepts
- 0.36: ABIs
- 0.37: Starting a process
- 0.38: The Dynamic Linker
- 0.39: Global Offset Tables
- 0.40: Libraries
- 0.41: Working with libraries and the linker
- Front Matter
- Behind the process
- Binary and Number Representation
- Computer Architecture
- Computer Science from the Bottom Up
- Dynamic Linking
- General Unix and Advanced C
- Glossary
- Introduction
- The Operating System
- The Process
- The Toolchain
- Untitled Page 01
- Virtual Memory
- Back Matter
- Introduction to Operating Systems
- Front Matter
- 1: Binary and Number Representation
- 2: The Basics - An Overview
- 3: The Operating System
- 4: Computer Architecture - the CPU
- 5: Computer Architecture - Memory
- 6: Computer Architecture - Peripherals and Buses
- 7: Small to Big Systems
- 8: Processes
- 9: Threads
- 10: Concurrency and Process Synchronization
- 11: Concurrency- Deadlock and Starvation
- 12: Memory Management
- 13: Virtual Memory
- 14: Uniprocessor CPU Scheduling
- 15: Multiprocessor Scheduling
- 16: I/O and Disk Management
- 17: File Management
- Back Matter
- CS11 - Informations Systems
- Diablo Valley College
- ENGTC168 - Intro To Computer Numerical Control (CNC)
- Front Matter
- 1: Overview Of CNC Machining
- 2: Introduction To G-code Programming
- 3: CNC Control Systems
- 4: CNC Milling Machine Setup For Part Production
- 5: Introduction To Cutting Tool Characteristics
- 6: Post-Processing Part Files For Machining
- 7: 3D Modeling Of Parts And Components (CAD)
- 8: Introduction to Computer Aided Machining (CAM) Software
- 8.1: Graphic user interface and operating environment
- 8.2: Tools menu
- 8.3: Lab - Tool libraries and tool length offsets
- 8.4: Lab - Types of tool paths
- 8.5: Cartesian coordinate systems
- 8.6: Graphic standards and representation methods
- 8.7: Creating part geometry
- 8.8: Creating points, lines, and arcs using CAM software
- 8.9: Lab - Creating tool paths in 2D
- 8.10: Lab - Creating tool paths in 3D
- 8.11: Assembly design workflow
- 8.12: Lab - Additional instructions and operations
- 8.13: Lab - Previewing a tool path
- Back Matter
- ENGTC168 - Intro To Computer Numerical Control (CNC)
- Folsom Lake College
- Fresno City College
- Hawaii Community College
- Ecology and Environment: BIOL 124 at Hawaii Community College
- Front Matter
- 1: Environmental Science
- 2: The Physical World
- 3: Matter, Energy, and Life
- 4: Biomes and the Biosphere
- 5: Community and Population Ecology
- 6: Conventional and Sustainable Energy
- 7: Conservation and Biodiversity
- 8: Environmental Hazards and Human Health
- 9: Water Availability and Use
- 10: Food and Hunger
- 11: Conventional and Sustainable Agriculture
- 12: Environmental Effects of Forestry
- 13: Air Pollution, Climate Change, and Ozone Depletion
- 14: Sustainability - Ethics, Culture, and History
- Page 14.1: The Human Dimensions of Sustainability- History, Culture, Ethics
- Page 14.2: It’s Not Easy Being Green- Anti-Environmental Discourse, Behavior, and Ideology
- Page 14.3: The Industrialization of Nature- A Modern History (1500 to the present)
- Page 14.4: Case Study- Agriculture and the Global Bee Colony Collapse
- Page 14.5: Sustainability Ethics
- Back Matter
- Environment and Ecology: Oceans in Peril
- Front Matter
- 1: Oceans and Coastal Environments
- 2: Climate and Carbon Cycle
- 3: El Niño and La Niña
- 4: The Warming of Our Oceans
- 5: Ocean Acidification
- 6: Pollution- Sources and Types
- 7: Coral Reefs and Diversity
- 8: Invasive Species
- 9: Fisheries Management
- 9.1: Managing Fisheries
- 9.2: Overfishing
- 9.3: Destructive fishing methods
- 9.4: Fisheries Law, Policy and International Issues
- 9.5: Marine Protected Areas
- 9.6: Whaling
- 9.7: Diseases and Pathogens
- 9.8: Aquaculture
- 9.9: Human Factors
- 9.10: Climate Change
- 9.11: Management Mechanisms, Catch Quotas
- 9.12: Population Dynamics
- 10: Energy From the Sea
- 11: Major Environmental Events
- 12: Volunteer to be Victorious
- Back Matter
- Ecology and Environment: BIOL 124 at Hawaii Community College
- Lumen
- Prince George's Community College
- INT 1010: Concepts in Computing
- Front Matter
- 1: Introduction to INT 1010 - Introduction to Information Technology
- 2: Introduction to Information Systems
- 3: Hardware Components of an Information System
- 4: Software Component of an Information System
- 5: Issues in Computing
- 6: Networking and Communication
- 7: Databases
- 8: The People in Information Systems
- 9: Introduction to Web Development
- 10: Internet Privacy, Internet Security, and Netiquette
- 11: Communication and the Internet
- 11.1: Internet Browsers
- 11.2: Basic Browser Tools
- 11.3: Data and Customer Rights
- 11.4: Web Searching
- 11.5: Identifying Search Results
- 11.6: Web Browsers and the Internet
- 11.7: Web Literacy for Student Fact-Checker Topics
- 11.8: Getting Started in Chrome - Bookmarking in Chrome and more
- 11.9: Introduction to Internet Safety
- 11.10: Using Windows Defender Scan
- 11.11: Internet and Computer Safety Tips
- 11.12: Fresh Start
- 11.13: Automatic Updates
- 11.14: Avast Academy – How to Open Incognito Mode in Chrome
- 11.15: Avast Academy – How to Clear Your Browser History
- 11.16: Avast Academy – What are cookies and how to clear them
- 11.17: Email Basics
- 11.18: INTERNET PRIVACY, COMPUTER SECURITY AND NETIQUETTE
- 11.19: INTERNET PRIVACY, COMPUTER SECURITY AND NETIQUETTE
- 12: Information Systems for Business
- Front Matter
- 12.1: Introduction to Information Systems?
- 12.2: Hardware
- 12.3: Software
- 12.4: Data and Databases
- 12.5: Networking and Communication
- 12.6: Information Systems Security
- 12.7: Does IT Matter?
- 12.8: Business Processes
- 12.9: The People in Information Systems
- 12.10: Information Systems Development
- 12.11: Globalization and the Digital Divide
- 12.12: The Ethical and Legal Implications of Information Systems
- 12.13: Future Trends in Information Systems
- Back Matter
- Back Matter
- INT 2080: The Missing Link - An Introduction to Web Development (Mendez)
- INT 2840: Systems Analysis and Project Management
- Front Matter
- 1: Introduction to Information Systems and Business Processes
- 1.1: Components of an Information System
- 1.1.1: The People in Information Systems
- 1.1.2: Data Asset in Action- Harrah’s Solid Gold CRM for the Service Sector
- 1.1.3: The Role of Information Systems
- 1.1.4: Competitive Advantage
- 1.1.5: Section 1 Summary
- 1.2: Business Processes
- 1.1: Components of an Information System
- 2: Information Systems Development & RFPs
- 3: Software
- 4: Project Scheduling Tools
- 5: Project Management
- 6: Teamwork and Leadership
- 7: Fact-Finding Techniques and Data
- 8: Information Systems Security
- 9: Appendix
- 9.1: supplemental- Logical Models
- 9.2: Project Management
- 9.2.1: Stakeholder Management
- 9.2.2: Culture and Project Management
- 9.2.3: Team Formation, Team Management, and Project Leadership
- 9.2.4: Project Initiation
- 9.2.5: Project Schedule Planning
- 9.2.6: Resource Planning
- 9.2.7: Budget Planning
- 9.2.8: Procurement Management
- 9.2.9: Quality Planning
- 9.2.10: Project Implementation Overview
- 9.2.11: Project Completion
- Back Matter
- INT 1010: Concepts in Computing
- Remixer University
- University of Arkansas Little Rock
- IFSC 4399 - The Internet of Things (IoT)
- introduction to the Internet of Things
- Introduction to the Raspberry Pi
- Putting the Raspberry Pi on the network, residential version
- Communication with the RPi using VNC and SSH
- Introduction to Linux for the Raspberry Pi-history
- Introduction to Linux for the Raspberry Pi-command line
- The Linux philosophy, Legos and the RPi
- Putting the OS on your Raspberry Pi SD card
- Setup Adafruit IO account for IoT
- Linux commands in the bash environment
- Cyber security
- The pwnagotchi filter? Or Invasion of the pwnagotchi!
- Backup your RPi data using rsync
- Secure shell keys
- Data wrangling
- Setting up a WiFi hotspot using the RPi
- Editors, IDEs, scripts, interpreters, and compiled code
- Setup pitunnel for VNC access
- The Linux crontab, scheduling events
- MCP3008 Raspberry Pi Interfacing
- BME680 sensor setup using I2C
- Setting up the 1-wire interface for the RPi
- Digital and analog signals
- Hats for the Raspberry Pi
- Grove connectors
- Grove LED
- Controllable Four Outlet Power Relay
- Grove Resistive Plant Moisture Sensor
- Grove Air Quality Sensor
- Grove IR Interrupter Detector
- LIS3DH Triple-Axis Accelerometer
- Introduction to Control Systems (Iqbal)
- 1: Mathematical Models of Physical Systems
- 1.1: Model Variables and Element Types
- 1.2: First-Order ODE Models
- 1.3: Solving First-Order ODE Models
- 1.4: Second-Order ODE Models
- 1.5: Solving Second-Order ODE models
- 1.6: Obtaining Transfer Function Models
- 1.7: DC Motor Model
- 1.8: Industrial Process Models
- 1.9: State Variable Models
- 1.10: Linearization of Nonlinear Models
- 1: Mathematical Models of Physical Systems
- IFSC 4399 - The Internet of Things (IoT)
- University of California San Diego