![](images/graphics/blank.gif)
Computational thinking
-
Studies have acknowledged computational thinking (CT) as an efficient approach for problem-solving particularly required in digital workplaces. This research aims to identify indicators for a holistic CT assessment instrument for undergraduate students.
18p
viarnault
25-04-2024
3
1
Download
-
The Computer has occupied a comprehensive coverage, especially in education scopes, including in learning-teaching processes, testing, and evaluating. This research aimed to develop computerized adaptive testing (CAT) to measure physics higher-order thinking skills (HOTS), namely PhysTHOTS-CAT.
11p
viarnault
25-04-2024
1
1
Download
-
Using unplugged coding activities to promote computational thinking (CT) among secondary learners has become increasing popular. Benefits of using unplugged coding activities involve the cost-effective implementation, the ability to promote computer science concepts and self-efficacy in learning computer programming, and the engaging nature of active learning through collaboration.
21p
viarnault
25-04-2024
2
1
Download
-
Computational thinking (CT) is a method for solving complex problems, but also gives people an inventive inspiration to adapt to our smart and changing society. Globally it has been considered as vital abilities for solving genuine issues successfully and efficiently in the 21st century. Recent studies have revealed that the nurture of CT mainly centered on measuring the technical skill.
14p
viarnault
25-04-2024
7
2
Download
-
Prospective teachers facing the 21st century are expected to have the ability to solve problems with a computer mindset. Problems in learning mathematics also require the concept of computational thinking (CT). However, many still find it challenging to solve this problem.
13p
viarnault
25-04-2024
2
1
Download
-
The delivery of science, technology, engineering and mathematics (STEM) learning to improve an individual’s competence and future career interests has become a critical scientific undertaking for teachers and researchers alike. A plethora of research has proposed various hands-on robotics activities built on constructivist theories, thereby facilitating the development of knowledge based on reality for scientific and non-scientific stakeholders.
16p
viarnault
25-04-2024
4
3
Download
-
A good defense starts with a thorough understanding of your opponent’s offense. Hackers Beware teaches you how hackers think, what tools they use, and the techniques they utilize to compromise a machine. Eric Cole, a leading expert in information security, shows you not only how to detect these attacks, but what you can do to protect yourself against them. When it comes to securing your site, knowledge is power. This book gives you the knowledge to build a proper defense against attackers.
817p
longtimenosee05
31-03-2024
3
0
Download
-
The main objective of paper "Hybrid systems of soft computing technologies in designing team decision for supply chain management systems of organizations" is development of hybrid systems for adaptive designing and supply chain management / strategizing of team decision “packages” for design work based on the use of soft computing technologies and system-creative thinking (SCT).
14p
longtimenosee07
29-03-2024
4
2
Download
-
Ebook "Valuing environmental amenities using stated choice studies: A common sense approach to theory and practice" focuses on the practice of conducting stated choice studies, looking at the entire process from start to finish. Within the discussion, a lot of theory is covered, but the book is meant to be, first and foremost, a practical guide. It begins at the beginning: when researchers start to think about a problem and plan their study.
344p
loivantrinh
29-10-2023
6
2
Download
-
Ebook "Help your kids with computer science: A unique visual step-by-step guide to computers, coding, and communication" guide examines the technical aspects of computers, such as how they function, the latest digital devices and software, and how the Internet works. It also builds the confidence of parents and kids when facing challenges such as staying safe online, digital etiquette, and how to navigate the potential pitfalls of social media.
258p
dangsovu
20-10-2023
5
4
Download
-
Continued part 1, part 2 of ebook "Think Java: How to think like a computer scientist" provides readers with contents including: mutable objects; designing classes; arrays of objects; objects of arrays; extending classes; arrays of arrays; reusing classes; advanced topics;...
186p
tieulangtran
28-09-2023
10
5
Download
-
Part 1 of ebook "Think Java: How to think like a computer scientist" provides readers with contents including: computer programming; variables and operators; input and output; methods and testing; conditionals and logic; loops and strings; arrays and references; recursive methods; immutable objects;...
188p
tieulangtran
28-09-2023
9
3
Download
-
Lecture Discrete mathematics: Chapter 1.1 helps you to explore concepts in discrete mathematics using in computer systems. By following the book "Discrete Mathematics and Its Applications," Seventh Edition, by Kenneth H. Rosen, an introduction to the mathematical structures and concepts used in computing: sets, mathematical induction, ordered sets, Boolean algebras, predicate calculus, graphs, trees and relations will be presented in the course. Please refer to the detailed lecture content!
15p
diepkhinhchau
18-09-2023
5
3
Download
-
This book is an attempt to raise the level of awareness about the cyber threat and what to do about it. The cyber threat is a board of directors’ issue. Yet when some senior executives and board members hear the word “security” or “technology,” there’s a disconnect. They think it’s not their issue. Let the technology people deal with it. Let the security people deal with it. Although there is evidence that this perception is changing, we have a long way to go. The word “cyber,” they’re starting to get.
224p
haojiubujain06
05-09-2023
23
2
Download
-
Ebook Hack proofing coldfusion - The only way to stop a hacker is to think like one Part 2 includes contents: Chapter 7 securing the coldfusion server after installation, chapter 8 securing Windows and IIS, chapter 9 securing solaris, Linux, and Apache, chapter 10 database security, chapter 11 securing your coldfusion applications using third-party tools, chapter 12 security features in coldfusion MX.
292p
haojiubujain06
05-09-2023
4
3
Download
-
Ebook Hack proofing your ecommerce site - The only way to stop a hacker is to think like one: Part 2
Ebook Hack proofing your ecommerce site - The only way to stop a hacker is to think like one Part 2 includes contents: Chapter 6 Securing financial transactions; Chapter 7 Hacking your own site; Chapter 8 Disaster recovery planning: the best defense; Chapter 9 Handling large volumes of network traffic; Chapter 10 Incident response, forensics, and the law; Appendix A Cisco solutions for content delivery; Appendix B Hack proofing your e-commerce site fast track.
350p
haojiubujain06
05-09-2023
9
3
Download
-
Ebook Hack proofing coldfusion - The only way to stop a hacker is to think like one Part 1 includes contents: Chapter 1 thinking like a hacker, chapter 2 securing your coldfusion development, chapter 3 securing your coldfusion tags, chapter 4 securing your coldfusion applications, chapter 5 the coldfusion development system, chapter 6 configuring coldfusion server security.
253p
haojiubujain06
05-09-2023
5
2
Download
-
Ebook Hack proofing XML - The only way to stop a hacker is to think like one: Part 1 includes contents: Chapter 1 The zen of hack proofing, Chapter 2 Classes of attack, Chapter 3 Reviewing the fundamentals of XML, Chapter 4 Document type: The validation gateway, Chapter 5 XML digital signatures.
205p
haojiubujain06
05-09-2023
2
2
Download
-
Ebook Hack proofing your ecommerce site - The only way to stop a hacker is to think like one: Part 1
Ebook Hack proofing your ecommerce site - The only way to stop a hacker is to think like one Part 1 includes contents: Chapter 1 Applying security principles to your e-business; Chapter 2 DDoS attacks: Intent, tools, and defense; Chapter 3 Secure web site design; Chapter 4 Designing and implementing security policies; Chapter 5 Implementing a secure e-commerce web site.
339p
haojiubujain06
05-09-2023
7
2
Download
-
Ebook Hack proofing XML - The only way to stop a hacker is to think like one: Part 2 includes contents: Chapter 6 Encryption in XML, Chapter 7 Role-based access control, Chapter 8 Understanding .NET and XML Security, Chapter 9 Reporting security problems.
197p
haojiubujain06
05-09-2023
2
1
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)