A broad survey of the computer science discipline, focusing on the computer's role in representing, storing, manipulating, organizing and communicating information. Topics include hardware, software, ...
In five years of writing for various audiences, Uche has learned to simplify career-focused content for ambitious learners regardless of their qualifications. Her work is published in notable ...
Schools expanded the availability of foundational computer science classes this year at a faster clip than at any other time in the past five years, but stubborn gaps in access to those courses ...
Students must complete two science courses in two different disciplines (BL, CH, KIP, FW, GE, PH, SS) from the general education science course list; at least one of these must include or be taken ...
The departments with courses in the top 20 most enrolled this quarter include Civic, Liberal and Global Education (COLLEGE), computer science (CS), aeronautics and astronautics (AA) and math, among ...
Introduction to human-computer interaction and the design of systems that work for people and their organizations. The goal is to understand the manner in which humans interact with, and use, their ...
As automatic decision-making systems are integrated into the judicial system and workplace, people could potentially be sent to prison or fired, in part, by automated forces. Without people in the ...
Harvard University is now making its most sought-after computer science courses accessible for free. Topics include AI, Python, cybersecurity, and web development. These courses come with no fees or ...
Gabriel Guimaraes grew up in Vitória, Brazil, in a yellow house surrounded by star-fruit trees and chicken coops. His father, who wrote software for a local bank, instilled in him an interest in ...
Intended for students who have completed COMP_SCI 111, but don’t have any other formal Computer Science background. It will provide an introduction to object-oriented programming in Python, preparing ...
The event is designed to provide instruction on methods and processes for implementing computer security in ICSs for nuclear security. Participants should have hands-on experience in computer or ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results