Computer use

Xem 1-20 trên 3529 kết quả Computer use
  • (BQ) Part 2 book "The practice of computing using python" has contents: Functions—QuickStart, lists and tuples, more on functions, dictionaries and sets, more program development, introduction to classes, more on classes, program development with classes, files and exceptions II,... and other contents.

    pdf510p bautroibinhyen20 06-03-2017 30 4   Download

  • (BQ) Part 1 book "The practice of computing using python" has contents: The study of computer science, beginnings, control, algorithms and program development, working with strings, files and exceptions I.

    pdf283p bautroibinhyen20 06-03-2017 27 3   Download

  • This module provides students with the skills and knowledge necessary to troubleshoot client startup and user logon problems. After completing this module, students will be able to: Describe the startup process and the required files for clients running Microsoft® Windows® 95 and Windows 98. Describe the startup process and the required files for clients running Microsoft Windows NT®. Use advanced startup options to start a computer. Use the Last Known Good configuration to start a computer. Install and use the Recovery Console to start a computer.

    pdf50p vuthuong 11-08-2009 104 7   Download

  • Tuyển tập các báo cáo nghiên cứu về sinh học được đăng trên tạp chí y học Molecular Biology cung cấp cho các bạn kiến thức về ngành sinh học đề tài: Effective p-value computations using Finite Markov Chain Imbedding (FMCI): application to local score and to pattern statistics...

    pdf14p hoami_2511 21-10-2011 28 2   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành y học dành cho các bạn tham khảo đề tài: Does computer use pose a hazard for future long-term sickness absence?

    pdf3p panasonic01 12-12-2011 19 2   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Fast Discrete Fourier Transform Computations Using the Reduced Adder Graph Technique

    pdf8p dauphong20 10-03-2012 17 2   Download

  • Chapter 1A - Introducing computer systems. This chapter includes contents: In basic terms, define the word com puter; discuss various ways computers can be categorized; identify six types of computers designed for individual use; identify four types of computers used primarily by organizations; explain the importance of computers in today's society; describe how computers are used in various sectors of our society.

    ppt17p tangtuy02 12-03-2016 11 2   Download

  • After studying this chapter you will be able to: Summarize the guidelines for creating an information privacy policy, identify the differences between an ethical computer use policy and an acceptable computer use policy, describe the relationship between an email privacy policy and an internet use policy, explain the effects of spam on an organization, summarize the different monitoring technologies and explain the importance of an employee monitoring policy.

    ppt29p tangtuy11 20-05-2016 8 2   Download

  • This paper raises concerns that natural language front ends for computer systems can limit a researcher's scope of thinking, yield inappropriately complex systems, and exaggerate public fear of computers. Alternative modes of computer use are suggested and the role of psychologically oriented controlled experimentation is emphasized. Research methods and recent experimental results are briefly reviewed.

    pdf4p bungio_1 03-05-2013 19 1   Download

  • Chapter 5A - Transforming data into information. This chapter explain why computers use the binary number system, list the two main parts of the CPU and explain how they work together, list the steps that make up a machine cycle, explain the difference between RAM and ROM, list three hardware factors that affect processing speed.

    ppt24p tangtuy02 12-03-2016 6 1   Download

  • Discovering Computers - Chapter 9: Communications and Networks includes Communications, Uses of Computer Communications, Networks, Network Communications Standards, Communications Software, Communications Over the Telephone Network.

    pdf49p maiyeumaiyeu25 16-12-2016 5 1   Download

  • Who is the book for? This book has been written for people whose first language is not English, and who use or are going to use computers and other information technology in an English-speaking environment. It covers the language needed to use information technology equipment, work with computer programs, discuss problems and plan projects. It does not cover advanced technical vocabulary for computer programmers or electronic engineers. All the language in the book is intended to be accessible to intermediate level students and above....

    pdf81p truongdoan 27-07-2009 1080 802   Download

  • information technology industry is the application of technology management and information processing IT industry to use computers and computer software to convert, store, protect, process, transmit, and gather information. This book is for those materials and specialized information technology and computers, including the words, English grammar information technology industry.

    pdf81p minhlong 27-07-2009 444 256   Download

  • A course for people studying computer science or working with computers. It covers a wide range of computing areas, giving practice in all four language skills. Particular emphasis is placed on the vocabulary and grammar of the English used in computer science.

    doc214p khanhprince9x 14-09-2010 605 202   Download

  • Documentation audio processing techniques involved khao.Tai image data compiled meticulously detailed, consistent with the needs of students who want to learn, want to refer to teaching arebe used. Documentary and was selected as the best material in the document image processing.

    pdf302p chelsea2501 09-05-2010 346 161   Download

  • This book is an introduction to computer science. Computer science is the study of computer hardware, algorithms, and data structures and how they fit together to provide information systems. Each of these topics can be studied at various levels. For example, physicists study the properties of matter that allow hardware components to be designed, electrical engineers study how the components can be combined to produce circuits, and computer engineers study how circuits can be combined to produce computers.

    pdf545p trannhu 05-08-2009 289 120   Download

  • The concept of IT is understood and defined in the Government Resolution 49/CP dated 04/08/1993 signed: Information Technology is a collection of scientific methods, the means of existing techniques and tools university - mainly computer technology and telecommunications - to organize the exploitation and efficient use of resources and information rich potential in all areas of human activity and society.

    pdf53p truongbao 25-07-2009 282 117   Download

  • Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is one of the least secure forms of security.Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks......

    ppt41p 260786 25-11-2009 204 108   Download

  • Computer technology has made incredible progress in the past half century. In 1945, there were no stored-program computers. Today, a few thousand dollars will purchase a personal computer that has more performance, more main memory, and more disk storage than a computer bought in 1965 for $1 million. This rapid rate of improvement has come both from advances in the technology used to build computers and from innovation in computer design. While technological improvements have been fairly steady, progress arising from better computer architectures has been much less consistent.

    pdf912p hoang3 04-11-2009 312 105   Download

  • Trong các bài trước, chúng ta đã học về các class và các mối quan hệ giữa chúng. Trong bài này, chúng ta tìm hiểu một mặt khác của UML – đó là use case. nội dung chính của bài: + Use case là gì? + Cách thức tạo use case + Các use case bao gồm (including use case) + Các use case mở rộng (extending use case) + Khởi động việc phân tích một use case Trong ba bài trước, chúng ta đã làm việc với các diagram cung cấp một cái nhìn tĩnh (static view) về các class...

    pdf4p vietcuong86 23-04-2010 766 102   Download


Đồng bộ tài khoản