{"id":110,"date":"2022-05-10T09:14:29","date_gmt":"2022-05-10T14:14:29","guid":{"rendered":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/?page_id=110"},"modified":"2023-08-15T13:45:45","modified_gmt":"2023-08-15T18:45:45","slug":"knowledge-area-listing-of-evaluations","status":"publish","type":"page","link":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/knowledge-area-listing-of-evaluations\/","title":{"rendered":"Knowledge Area Listing of Evaluations"},"content":{"rendered":"<p class=\"intro\">These modules are organized by Knowledge Areas to help discover modules that are based on topics.<\/p>\n<p class=\"intro\">Our hope is to assist instructors in adopting modules by providing evaluations that will help prepare them on what they need to consider before adopting the module.<\/p>\n<h2>Algorithms and Complexity<\/h2>\n<h3>Basic Analysis<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/energy-usage\/\">Energy Usage, Complexity, Data Deduplication, and Voter Rolls<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/polling-data-binary-trees-and-heaps\/\">Polling Data, Binary Trees, and Heaps<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/energy-usage\/\">Energy Usage and Complexity<\/a><\/li>\n<\/ul>\n<h3>Fundamental Data Structures and Algorithms<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/covid-scheduling-problem\/\">COVID Scheduling Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/broadband-access\/\">Broadband Access<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/thesis-advisor-allocation-problem\/\">Thesis Advisor Allocation Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-registrars-problem\/\">The Registrar&rsquo;s Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/traffic-impact-analysis\/\">Traffic Impact Analysis<\/a><\/li>\n<\/ul>\n<h3>Advanced Data Structures Algorithms and Analysis<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/covid-scheduling-problem\/\">COVID Scheduling Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/broadband-access\/\">Broadband Access<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/thesis-advisor-allocation-problem\/\">Thesis Advisor Allocation Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-registrars-problem\/\">The Registrar&rsquo;s Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/traffic-impact-analysis\/\">Traffic Impact Analysis<\/a><\/li>\n<\/ul>\n<h3>Algorithmic Strategies<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/traffic-impact-analysis\/\">Traffic Impact Analysis<\/a><\/p>\n<h2>Computational Science<\/h2>\n<h3>Introduction to Modeling and Simulation<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/college-admissions-algorithms\/\">College Admissions Algorithms<\/a><\/p>\n<h3>Interactive Visualization<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-implications-of-the-adoption-of-facial-recognition-technology-2\/\">Ethical Implications of the Adoption of Facial Recognition Technology<\/a><\/p>\n<h2>Discrete Structures<\/h2>\n<h3>Graphs and Trees<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/polling-data-binary-trees-and-heaps\/\">Polling Data, Binary Trees, and Heaps<\/a><\/p>\n<h2>Graphics and Visualization<\/h2>\n<h3>Visualization<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/white-hat-black-hat-visualization\/\">White Hat\/Black Hat Visualization<\/a><\/p>\n<h2>Human-Computer Interaction<\/h2>\n<h3>Foundations<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/inclusive-design\/\">Inclusive Design<\/a><\/p>\n<h3>Human Factors and Security<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/surveillance-in-the-times-of-covid\/\">Surveillance in the Times of Covid<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Transparency in Decision-Making Interfaces<\/a><\/li>\n<\/ul>\n<h2>Information Assurance and Security<\/h2>\n<h3>Security Policy and Governance<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ownership-and-privacy\/\">Ownership and Privacy<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Transparency in Decision-Making Interfaces<\/a><\/li>\n<\/ul>\n<h3>Foundational Concepts in Security<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Surveillance in the Times of Covid<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/self-driving-buses\/\">Self-driving Buses<\/a><\/li>\n<\/ul>\n<h3>Cybersecurity<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-cybersecurity-ethics\/\">An Introduction to Cybersecurity Ethics<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/crypto-and-cypherpunk-ethics\/\">Crypto and Cypherpunk Ethics<\/a><\/li>\n<\/ul>\n<h2>Information Management<\/h2>\n<h3>Data Mining<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/biases-in-predicting-recidivism-and-questions-of-fairness\/\">Biases in Predicting Recidivism and Questions of Fairness<\/a><\/p>\n<h3>Information Management Concepts<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Transparency in Decision-Making Interfaces<\/a><\/p>\n<h3>Information Storage and Retrieval<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Transparency in Decision-Making Interfaces<\/a><\/p>\n<h2>Intelligent Systems<\/h2>\n<h3>Basic Knowledge Representation and Reasoning<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ai-admissions-app\/\">AI Admissions App<\/a><\/p>\n<h3>Basic Machine Learning<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/fairness-accountability-transparency-privacy\/\">Fairness, Accountability, Transparency, Privacy<\/a><\/p>\n<h3>Advanced Machine Learning<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/fairness-accountability-transparency-privacy\/\">Fairness, Accountability, Transparency, Privacy<\/a><\/p>\n<h3>Fundamental Issues<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/self-driving-buses\/\">Self-driving Buses<\/a><\/p>\n<h3>Agents<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-ethics-of-lethal-autonomous-weapons\/\">The Ethics of Lethal Autonomous Weapons<\/a><\/p>\n<h3>Robotics<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-ethics-of-lethal-autonomous-weapons\/\">The Ethics of Lethal Autonomous Weapons<\/a><\/p>\n<h3>Perception and Computer Vision<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-ethics-of-lethal-autonomous-weapons\/\">The Ethics of Lethal Autonomous Weapons<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/self-driving-buses\/\">Self-driving Buses<\/a><\/li>\n<\/ul>\n<h2>Parallel and Distributed Computing<\/h2>\n<h3>Cloud Computing<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ownership-and-privacy\/\">Ownership and Privacy<\/a><\/p>\n<h2>Platform-Based Development<\/h2>\n<h3>Mobile Platforms<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/surveillance-in-the-times-of-covid\/\">Surveillance in the Times of Covid<\/a><\/p>\n<h2>Software Development Fundamentals<\/h2>\n<h3>Algorithms and Design<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/machine-bias\/\">Machine Bias<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/personalized-ads\/\">Personalized Ads<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/college-admissions-algorithms\/\">College Admissions Algorithms<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-decision-makers\/\">Developers as Decision Makers<\/a><\/li>\n<\/ul>\n<h3>Fundamental Programming Concepts<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/personalized-ads\/\">Machine Bias<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/personalized-ads\/\">Personalized Ads<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-gatekeepers\/\">Developers as Gatekeepers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/college-admissions-algorithms\/\">College Admissions Algorithms<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-image-manipulators\/\">Developers as Image Manipulators<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-decision-makers\/\">Developers as Decision Makers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-future-makers\/\">Developers as Future Makers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-prioritizers\/\">Developers as Prioritizers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/gerrymandering\/\">Gerrymandering<\/a><\/li>\n<\/ul>\n<h3>Fundamental Data Structures<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/machine-bias\/\">Machine Bias<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-gatekeepers\/\">Developers as Gatekeepers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-image-manipulators\/\">Developers as Image Manipulators<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/college-admissions-algorithms\/\">College Admissions Algorithms<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-future-makers\/\">Developers as Future Makers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-prioritizers\/\">Developers as Prioritizers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/gerrymandering\/\">Gerrymandering<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/predictive-policing\/\">Predictive Policing<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/biases-in-predicting-recidivism-and-questions-of-fairness\/\">Biases in Predicting Recidivism and Questions of Fairness<\/a><\/li>\n<\/ul>\n<h3>Development Methods<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-software-engineering-ethics\/\">An Introduction to Software Engineering Ethics<\/a><\/p>\n<h2>Software Engineering<\/h2>\n<h3>Software Processes<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ai-admissions-app\/\">AI Admissions App<\/a><\/p>\n<h3>Software Design<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ai-admissions-app\/\">AI Admissions App<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-design-and-the-philosophy-of-technology\/\">Ethical Design and the Philosophy of Technology<\/a><\/li>\n<\/ul>\n<h3>Software Project Management<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/automated-healthcare-app\/\">Automated Healthcare App<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-software-engineering-ethics\/\">An Introduction to Software Engineering Ethics<\/a><\/li>\n<\/ul>\n<h3>Requirements Engineering<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/automated-healthcare-app\/\">Automated Healthcare App<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-software-engineering-ethics\/\">An Introduction to Software Engineering Ethics<\/a><\/li>\n<\/ul>\n<h3>Software Verification and Validation<\/h3>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-software-engineering-ethics\/\">An Introduction to Software Engineering Ethics<\/a><\/p>\n<h2>Social Issues and Professional Practice<\/h2>\n<p>While all of the modules evaluated here fall into this knowledge area in one way or another, there are some that are particularly well-suited for a course focused on Responsible Computer Science.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ai-admissions-app\/\">AI Admissions App<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-ethics-of-artificial-intelligence\/\">An Ethics of Artificial Intelligence<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/privacy-and-big-data\/\">Privacy and Big Data<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/discrimination-in-machine-learning\/\">Discrimination in Machine Learning<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-cybersecurity-ethics\/\">An Introduction to Cybersecurity Ethics<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-ethics-of-lethal-autonomous-weapons\/\">The Ethics of Lethal Autonomous Weapons<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Transparency in Decision-Making Interfaces<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/race-after-technology\/\">Race After Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-software-engineering-ethics\/\">An Introduction to Software Engineering Ethics<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/deep-fakes\/\">Deep Fakes<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-ethics-of-artificial-intelligence\/\">An Ethics of Artificial Intelligence<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">RCS in Programming Assignments<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-design-and-the-philosophy-of-technology\/\">Ethical Design and the Philosophy of Technology<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>These modules are organized by Knowledge Areas to help discover modules that are based on topics. Our hope is to assist instructors in adopting modules by providing evaluations that will help prepare them on what they need to consider before adopting the module. Algorithms and Complexity Basic Analysis Energy Usage, Complexity, Data Deduplication, and Voter [&hellip;]<\/p>\n","protected":false},"author":33,"featured_media":0,"parent":26,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-110","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":6,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":336,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/110\/revisions\/336"}],"up":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/26"}],"wp:attachment":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}