Search

You can find the results of your search below.

Fulltext results:

hacker_culture
10 Hits, Last modified:
All levels of technological prowess are welcome, but expect to learn some skills and to help teach oth... Grades are not especially conducive to hacking, but we need some equivalent in order for this course ... gram). These are functionally the same as grades, but perhaps giving them a different name will prevent... he total bounty per day. ### Objective 0: Contribute *25 points* Computers count from zero, so hack
media_activism
5 Hits, Last modified:
cessarily mean microscopic reading of every page, but it does mean engaging rigorously with portions of... ents should be active participants and make contributions to the oral discussion that reflect strenuous... ] with the assigned texts. Come prepared to contribute original analysis, reflections, and critique. Evaluation of discussion contributions takes place twice: at the middle of the semes
university_policies
4 Hits, Last modified:
en in close contact with someone who has COVID-19 but do not have any symptoms and have not tested positive for COVID-19, you do not need to stay home but should follow the [guidance of the CDC for maskin... or Code. Violations of the Honor Code may include but are not limited to: plagiarism (including use of ... page: * if you need support or other resources but don’t know where to turn * if any aspect of you
whitepaper
4 Hits, Last modified:
per is a kind of document little-used in academia but much more common in business and policy contexts.... tures * A tone that is serious and impersonal, but clear and direct above all. It is more technical than journalistic writing, but less formal and jargon-laden than academic writin... e topic of the future of Palestine * "[On Distributed Communications](https://www.rand.org/content/da
disruptive_entrepreneurship
4 Hits, Last modified:
ect to enlarge their entrepreneurial repertoires, but also to experience fresh trepidation about disrup... icipation *10 percent* All students should contribute to class discussions as active listeners, questi... ncouraged. Attendance will not be taken formally, but meaningful participation is not compatible with a... eighted equally. Evaluation is based on: * Contributing comments and questions that advance the conver
academic_honesty
3 Hits, Last modified:
of creating original work and crediting the contributions of others. The university [defines](https://... rning process. Academic dishonesty also includes, but is not limited to, providing false or misleading ... to reference the ideas and words of other people, but we must never submit someone else's work as if it
introduction_to_social_media
3 Hits, Last modified:
ughtful and creative fashion * Constructive contribution to the class discussion in comments * Evidence... ls Each week, extra-credit bounties may be distributed to authors of the most successful posts. Criter... re designed to be used without any documentation. But what do we lose when we don't really understand s
email_etiquette
2 Hits, Last modified:
ely on any one company or entity to make it work. But often I find that students come to college in nee... name at the bottom. Emails aren't formal letters, but if they're too conversational, or include bad gra
internships
1 Hits, Last modified:
u read. The length may vary depending on context, but a good target is about 2,000 words. Remember to f
screen_devices
1 Hits, Last modified:
1, 2017) * Susan Dynarski, "[Laptops Are Great. But Not During a Lecture or a Meeting.](https://www.n