Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Education

Kennesaw State University

KSU Distinguished Course Repository

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Principles Of Chemistry Ii, Janet L. Shaw Sep 2023

Principles Of Chemistry Ii, Janet L. Shaw

KSU Distinguished Course Repository

Second course in a two-semester sequence covering the fundamental principles and applications of chemistry designed for science majors.

With a pre-requisite of CHEM 1211: Principles of Chemistry I, this course is part of a two-semester sequence covering principles and applications of chemistry. The course is designed to help students apply simplified models to complex systems to build critical thinking and problem-solving skills. A major goal of this course is to help students become self-directed learners thereby preparing them for whatever career path they choose. Although designed for science majors who typically complete the course during their freshman year, pre-health majors …


Principles Of Chemistry-1, Rajnish Singh Feb 2023

Principles Of Chemistry-1, Rajnish Singh

KSU Distinguished Course Repository

Principles of Chemistry, chem 1211, is a 3 credit hour course, the first in a two-semester sequence covering the fundamental principles and applications of chemistry for science majors. Course content includes electronic structure of atoms and molecules, bonding fundamentals, fundamentals of chemical reactions, and gas laws. The course is taught asynchronously and the final exam being a national exam offered by the American chemical society, (ACS), that has to be taken in person.


Principles Of Information Security, Alison Hedrick Oct 2022

Principles Of Information Security, Alison Hedrick

KSU Distinguished Course Repository

An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.