|
|
Books > Computing & IT
With Computational Thinking in Sound, veteran educators Gena R.
Greher and Jesse M. Heines provide the first book ever written for
music fundamentals educators which is devoted specifically to
music, sound, and technology. The authors demonstrate how the range
of mental tools in computer science - for example, analytical
thought, system design, and problem design and solution - can be
fruitfully applied to music education, including examples of
successful student work. While technology instruction in music
education has traditionally focused on teaching how computers and
software work to produce music, Greher and Heines offer context: a
clear understanding of how music technology can be structured
around a set of learning challenges and tasks of the type common in
computer science classrooms. Using a learner-centered approach that
emphasizes project-based experiences, the book provides music
educators with multiple strategies to explore, create, and solve
problems with music and technology in equal parts. It also provides
examples of hands-on activities which encourage students, alone and
in interdisciplinary groups, to explore the basic principles that
underlie today's music technology and which expose them to current
multimedia development tools.
Written on the occasion of copyright's 300th anniversary, John
Tehranian's Infringement Nation presents an engaging and accessible
analysis of the history and evolution of copyright law and its
profound impact on the lives of ordinary individuals in the
twenty-first century. Organized around the trope of the individual
in five different copyright-related contexts - as an infringer,
transformer, pure user, creator and reformer - the book charts the
changing contours of our copyright regime and assesses its vitality
in the digital age. In the process, Tehranian questions some of our
most basic assumptions about copyright law by highlighting the
unseemly amount of infringement liability an average person rings
up in a single day, the counterintuitive role of the fair use
doctrine in radically expanding the copyright monopoly, the
important expressive interests at play in even the unauthorized use
of copyright works, the surprisingly low level of protection that
American copyright law grants many creators, and the broader
political import of copyright law on the exertion of social
regulation and control.
Drawing upon both theory and the author's own experiences
representing clients in various high-profile copyright infringement
suits, Tehranian supports his arguments with a rich array of
diverse examples crossing various subject matters - from the
unusual origins of Nirvana's "Smells Like Teen Spirit," the
question of numeracy among Amazonian hunter-gatherers, the history
of stand-offs at papal nunciatures, and the tradition of judicial
plagiarism to contemplations on Slash's criminal record, Barbie's
retrousse nose, the poisonous tomato, flag burning, music as a form
of torture, the smell of rotting film, William Shakespeare as a man
of the people, Charles Dickens as a lobbyist, Ashley Wilkes's
sexual orientation, Captain Kirk's reincarnation, and Holden
Caulfield's maturation. In the end, Infringement Nation makes a
sophisticated yet lucid case for reform of existing doctrine and
the development of a copyright 2.0."
CCNA Interactive Learning: More than 300 labs More than 4,000
hands-on tasks Four Kinds of Labs: Skill Builders Subnetting
Exercises Configuration Scenarios Troubleshooting Scenarios The
CCNA 200-301 Network Simulator is a single-user software package.
It helps you develop and improve hands-on configuration and
troubleshooting skills without the investment in expensive lab
hardware. This state-of-the-art, interactive simulation software
enables you to practice your networking skills with more than 300
structured labs designed to help you learn by doing, the most
effective method of learning. Experience realistic network device
responses as you perform each lab, which include detailed
instructions, topology diagrams, critical-thinking questions,
hints, and answers. Working through the labs, you will quickly
become proficient with all the common Cisco IOS version 15 router
and switch commands on the CCNA exam. Unlike other simulators on
the market, the lab scenarios included in the CCNA 200-301 Network
Simulator are far more complex, challenging you to learn how to
perform real-world network configuration and troubleshooting tasks.
Master the hands-on skills needed to succeed on the CCNA exam,
including: Network fundamentals Network access IP connectivity IP
services Security fundamentals IP Subnetting Skill Builders: These
175+ labs are narrowly focused, enabling you to practice your
configuration skills on a single topic. Coverage includes:
Interface settings and status Router and Switch CLI Exec Mode and
config process Telnet, Ping, Traceroute, and terminal history
Switch IP address, connectivity, and forwarding PC IP commands
Configuring IP addresses Subnet Zero IP addressing and IPv6 address
configuration CDP and LLDP VLANs and Trunking Router-on-a-stick STP
and MLS Static and Dynamic EtherChannel Wireless LAN Controllers
Connected, static, and default routes OSPF SSH NAT NTP Router and
switch security fundamentals ACL CHCP Dynamic ARP Port security IOS
backup Subnetting Exercises: These 80 labs help you to perform
subnetting calculations quickly and accurately, a critical skill
for success on the CCNA exam. Topics covered include: IPv4 and IPv6
subnet ID calculation IP address rejection IP route selection VLSM
overlaps IPv6 EUI-64 calculation Selecting VLSM routes
Configuration Scenarios: These 40+ labs are more broadly focused,
combining multiple technologies into configuration scenarios that
mimic real-world environments. These labs are longer and more
complex,challenging you to put your configuration skills to the
test. Topics covered include: IP and MAC comparisons Switch IP
connectivity and security Subnetting and addressing IP addressing
and configuration IPv6 configuraiton Switch interfaces and
forwarding VLAN trunking STP analysis, configuration, and
prediction Wireless LAN Controllers Static routing Configuring
default routes OSPF Router-on-a-stick to MLS SSH and Telnet NAT ACL
Password recovery Rebuilding a configuration Troubleshooting
Scenarios: These 18 labs present typical troubleshooting scenarios
and require you to explore the misconfigured network, isolate the
issues, and correct the problems. These are very complicated and
realistic scenarios that truly test your ability to perform the job
of a network engineer. Topics covered include: Switch forwarding
Path analysis and troubleshooting IPv4/IPv6 addressing IP routing
OSPF VLAN troubleshooting STP Network discovery Port security
System requirements: Operating Systems: Windows 10 (32/64 bit)
Windows 8.1 (32/64 bit) Mac OS 10.15 (Catalina) Mac OS 10.14
(Mojave) Mac OS 10.13 (High Sierra) Free Storage Space: 1 GB
(minimum) System memory (RAM): 4 GB (minimum) Processor: i3 3.4 GHz
(minimum) and above Software Pre-requisites: Node JS 10 PDF reader
Monitor resolution: Minimum resolution: 1024 X 768 Best viewed:
1280 X 800 and above Internet speed: 2 Mbps (minimum) is needed
only during software activation, reporting feedback and receiving
updates. After activation, Internet is not needed for accessing the
labs in the application. Language: English (US)
For courses in Human-Computer Interaction The Sixth Edition of
Designing the User Interface provides a comprehensive,
authoritative, and up-to-date introduction to the dynamic field of
human-computer interaction (HCI) and user experience (UX) design.
This classic book has defined and charted the astonishing evolution
of user interfaces for three decades. Students and professionals
learn practical principles and guidelines needed to develop high
quality interface designs that users can understand, predict, and
control. The book covers theoretical foundations and design
processes such as expert reviews and usability testing. By
presenting current research and innovations in human-computer
interaction, the authors strive to inspire students, guide
designers, and provoke researchers to seek solutions that improve
the experiences of novice and expert users, while achieving
universal usability. The authors also provide balanced
presentations on controversial topics such as augmented and virtual
reality, voice and natural language interfaces, and information
visualization. Updates include current HCI design methods, new
design examples, and totally revamped coverage of social media,
search and voice interaction. Major revisions were made to EVERY
chapter, changing almost every figure (170 new color figures) and
substantially updating the references.
Get the most out of your computer with our quick and easy 6-page
laminated guide focusing on configuration and management of your
system for you, with guidance for setting up and securing other
users that may use your computer. Joan Lambert, author of multiple
books on the Microsoft Office Suite, creator of many Lynda.com
videos and an experienced corporate trainer used her experience and
knowledge to cover the most relevant functions for users at
different levels. Suggested uses: Workplace -- easy access at a
moments notice to find a function you need to use; Company Training
-- reduce help-desk calls and keep productivity flowing for a team
or for your entire company; Family & Shared -- admin and set up
secure family accounts to keep things separated while controlling
time spent on the computer; Students/Teachers/Parents -- help with
the learning curve in a classroom or at home; College Students --
make sure you are set-up, secure and using features that can make
your life easier.
From the boardrooms to the court rooms, this is the gripping story of
how Apple became the world's most valuable company, and of the
lawmakers and entrepreneurs determined to knock it off its pedestal.
Since the invention of the iPhone and App Store, Apple has built a near
unassailable market power, controlling not only commerce, but also
culture, and - increasingly - the flow of ideas.
In response, a loose rebel alliance of tech entrepreneurs has formed to
lay siege to Apple, bringing together Epic Games' Tim Sweeney,
Spotify's Daniel Ek, X's Elon Musk and WeChat's Pony Ma. In the
trenches of popular opinion and now in the courtrooms of Europe and the
United States, this rebellion aims to tear down Apple's walls and
dismantle its alleged monopoly.
iWar weaves together the story of Apple's rise and reign with the
political and international forces arrayed against it in the fight over
control of the global digital economy. The stakes couldn't be higher.
Helping you quickly get up to speed, THE SHELLY CASHMAN SERIES (R)
MICROSOFT (R) 365 (R) & OFFICE (R) 2021 INTRODUCTORY, 1st
edition, includes the latest on Microsoft 365 and Office 2021
features along with enhanced support for Mac users. Its trademark
step-by-step, screen-by-screen, project-based approach enables you
to expand your understanding of Office applications through
hands-on experimentation and critical thinking. Module Learning
Objectives are mapped to Microsoft Office Specialist (MOS)
certification objectives, reinforcing the critical skills needed
for college and career success. Other Ways boxes reveal alternate
click paths to achieve a step, while BTW call-outs offer helpful
hints as you work through your projects so you can make the most of
Microsoft Office tools. In addition, MindTap and SAM (Skills
Assessment Manager) online resources help maximize your study time
-- and results.
The Business Analysts completely dissolves the perception that the IT industry dictates to businesses what IT systems they will use and dispels the myth that business users and IT technicians are from different planets. It suggests how to create an environment in which everybody works together in an exciting and refreshing way – a paradigm shift in the way business analysis projects are done.
The IT industry has to move to a point where it realises that the users of IT systems and the technical personnel are both equally responsible for getting the system to work. The users of the IT system should be an integral part of the team when the system is being put together. This, unfortunately, is not the norm within the industry. It is the business analyst’s responsibility, among others, to make sure that communication flows freely between all the parties involved.
This book gives the business analyst the tools and techniques to find out what the business users of IT systems really need and to guide the project to meet those needs.
In Advanced Visual Basic 6, two of the world's leading VB experts take experienced developers "under the hood" with VB, introducing powerful techniques for writing high-performance, reusable code that leverages the close relationships between VB, COM, and OLE Automation. This book presents advanced VB programming from a COM data type approach, helping developers build more robust, effective code -- and overcome obstacles that appear as they "push the envelope" with VB.KEY TOPICS:Developers learn how VB describes arrays, and how to duplicate that definition manually to perform simple type casting, and gain unprecedented control over how their programs use memory. The authors introduce best practices for interface-based design using normal VB class modules; show how to partition code for optimal reuse; and more. Next, they present advanced techniques for creating COM lightweight objects; and alternate memory management techniques that allow the creation of complex systems with many objects and minimal overhead. The book also covers threading, type libraries, component versioning, and more. The accompanying CD-ROM contains extensive source code, plus powerful utilities for advanced VB development.MARKET:For all experienced Visual Basic developers.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|