{"id":29,"date":"2022-05-09T16:16:32","date_gmt":"2022-05-09T21:16:32","guid":{"rendered":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/?page_id=29"},"modified":"2023-08-17T11:17:45","modified_gmt":"2023-08-17T16:17:45","slug":"course-listing-of-evaluations","status":"publish","type":"page","link":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/","title":{"rendered":"Course Listing of Evaluations"},"content":{"rendered":"<p class=\"intro\">These modules are organized by Common Course Names to help discover modules that could be integrated into a course.<\/p>\n<p class=\"intro\">Our hope is to assist instructors in adopting modules by providing evaluations that will help prepare them on what they need to consider before adopting the module.<\/p>\n<h2>Computer Science 0<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/personalized-ads\/\">Personalized Ads<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-ethics-of-artificial-intelligence\/\">An Ethics of Artificial Intelligence<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-implications-of-the-adoption-of-facial-recognition-technology-2\/\">Ethical Implications of the Adoption of Facial Recognition Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/college-admissions-algorithms\/\">College Admissions Algorithms<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Transparency in Decision-Making Interfaces<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/deep-fakes\/\">Deep Fakes<\/a><\/li>\n<\/ul>\n<h2>Computer Science I<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-gatekeepers\/\">Developers as Gatekeepers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-decision-makers\/\">Developers as Decision Makers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-image-manipulators\/\">Developers as Image Manipulators<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-future-makers\/\">Developers as Future Makers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/developers-as-prioritizers\/\">Developers as Prioritizers<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-implications-of-the-adoption-of-facial-recognition-technology-2\/\">Ethical Implications of the Adoption of Facial Recognition Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/gerrymandering\/\">Gerrymandering<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">RCS in Programming Assignments<\/a><\/li>\n<\/ul>\n<h2>Computer Science II<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/machine-bias\/\">Machine Bias<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/energy-usage\/\">Energy Usage, Complexity, Data Deduplication, and Voter Rolls<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/polling-data-binary-trees-and-heaps\/\">Polling Data, Binary Trees, and Heaps<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-implications-of-the-adoption-of-facial-recognition-technology-2\/\">Ethical Implications of the Adoption of Facial Recognition Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/energy-usage\/\">Energy Usage and Complexity<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/predictive-policing\/\">Predictive Policing<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-design-and-the-philosophy-of-technology-2\/\">Ethical Design and the Philosophy of Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">RCS in Programming Assignments<\/a><\/li>\n<\/ul>\n<h2>Algorithms<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/covid-scheduling-problem\/\">COVID Scheduling Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/broadband-access\/\">Broadband Access<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/energy-usage\/\">Energy Usage and Complexity<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/thesis-advisor-allocation-problem\/\">Thesis Advisor Allocation Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-registrars-problem\/\">The Registrar&rsquo;s Problem<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/traffic-impact-analysis\/\">Traffic Impact Analysis<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-design-and-the-philosophy-of-technology\/\">Ethical Design and the Philosophy of Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">RCS in Programming Assignments<\/a><\/li>\n<\/ul>\n<h2>Databases<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/privacy-and-big-data\/\">Privacy and Big Data<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/biases-in-predicting-recidivism-and-questions-of-fairness\/\">Biases in Predicting Recidivism and Questions of Fairness<\/a><\/li>\n<\/ul>\n<h2>Software Engineering<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ai-admissions-app\/\">AI Admissions App<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/automated-healthcare-app\/\">Automated Healthcare App<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-software-engineering-ethics\/\">An Introduction to Software Engineering Ethics<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-design-and-the-philosophy-of-technology\/\">Ethical Design and the Philosophy of Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">RCS in Programming Assignments<\/a><\/li>\n<\/ul>\n<h2>Artificial Intelligence<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ai-admissions-app\/\">AI Admissions App<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/privacy-and-big-data\/\">Privacy and Big Data<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/fairness-accountability-transparency-privacy\/\">Fairness, Accountability, Transparency, Privacy<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-ethics-of-lethal-autonomous-weapons\/\">The Ethics of Lethal Autonomous Weapons<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">RCS in Programming Assignments<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">An Ethics of Artificial Intelligence<\/a><\/li>\n<\/ul>\n<h2>Data Visualization<\/h2>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/white-hat-black-hat-visualization\/\">White Hat\/Black Hat Visualization<\/a><\/p>\n<h2>Information Security<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/privacy-and-big-data\/\">Privacy and Big Data<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ownership-and-privacy\/\">Ownership and Privacy<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/surveillance-in-the-times-of-covid\/\">Surveillance in the Times of Covid<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-cybersecurity-ethics\/\">An Introduction to Cybersecurity Ethics<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/crypto-and-cypherpunk-ethics\/\">Crypto and Cypherpunk Ethics<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/self-driving-buses\/\">Self-driving Buses<\/a><\/li>\n<\/ul>\n<h2>Machine Learning<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/discrimination-in-machine-learning\/\">Discrimination in Machine Learning<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/fairness-accountability-transparency-privacy\/\">Fairness, Accountability, Transparency, Privacy<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/deep-fakes\/\">Deep Fakes<\/a><\/li>\n<\/ul>\n<h2>Data Science<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/discrimination-in-machine-learning\/\">Discrimination in Machine Learning<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/fairness-accountability-transparency-privacy\/\">Fairness, Accountability, Transparency, Privacy<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/biases-in-predicting-recidivism-and-questions-of-fairness\/\">Biases in Predicting Recidivism and Questions of Fairness<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Transparency in Decision-Making Interfaces<\/a><\/li>\n<\/ul>\n<h2>Cloud Computing<\/h2>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ownership-and-privacy\/\">Ownership and Privacy<\/a><\/p>\n<h2>Mobile Applications<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/surveillance-in-the-times-of-covid\/\">Surveillance in the Times of Covid<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">RCS in Programming Assignments<\/a><\/li>\n<\/ul>\n<h2>Human Computer Interaction<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/surveillance-in-the-times-of-covid\/\">Surveillance in the Times of Covid<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/inclusive-design\/\">Inclusive Design<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-design-and-the-philosophy-of-technology\/\">Ethical Design and the Philosophy of Technology<\/a><\/li>\n<\/ul>\n<h2>Image Processing<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ethical-implications-of-the-adoption-of-facial-recognition-technology-2\/\">Ethical Implications of the Adoption of Facial Recognition Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/self-driving-buses\/\">Self-driving Buses<\/a><\/li>\n<\/ul>\n<h2>Networking<\/h2>\n<p><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/self-driving-buses\/\">Self-driving Buses<\/a><\/p>\n<h2>Web Programming<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/gerrymandering\/\">Gerrymandering<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/rcs-in-programming-assignments\/\">RCS in Programming Assignments<\/a><\/li>\n<\/ul>\n<h2>Ethics, Social Issues, and Professional Practice in Computing<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/ai-admissions-app\/\">AI Admissions App<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-ethics-of-artificial-intelligence\/\">An Ethics of Artificial Intelligence<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/privacy-and-big-data\/\">Privacy and Big Data<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/discrimination-in-machine-learning\/\">Discrimination in Machine Learning<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-cybersecurity-ethics\/\">An Introduction to Cybersecurity Ethics<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/the-ethics-of-lethal-autonomous-weapons\/\">The Ethics of Lethal Autonomous Weapons<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/transparency-in-decision-making-interfaces\/\">Transparency in Decision-Making Interfaces<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/race-after-technology\/\">Race After Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/an-introduction-to-software-engineering-ethics\/\">An Introduction to Software Engineering Ethics<\/a><\/li>\n<li><a href=\"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/module-evaluations\/course-listing-of-evaluations\/deep-fakes\/\">Deep Fakes<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>These modules are organized by Common Course Names to help discover modules that could be integrated into a course. Our hope is to assist instructors in adopting modules by providing evaluations that will help prepare them on what they need to consider before adopting the module. Computer Science 0 Personalized Ads An Ethics of Artificial [&hellip;]<\/p>\n","protected":false},"author":33,"featured_media":0,"parent":26,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-29","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":8,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/29\/revisions\/338"}],"up":[{"embeddable":true,"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/pages\/26"}],"wp:attachment":[{"href":"https:\/\/www.bemidjistate.edu\/academics\/mathematics-computer-science\/rcs\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}