Journal articles on the topic 'Computer programs'

To see the other types of publications on this topic, follow the link: Computer programs.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

WHITAKER, SIMON. "Computer programs." Journal of the British Institute of Mental Handicap (APEX) 17, no. 1 (August 26, 2009): 38–39. http://dx.doi.org/10.1111/j.1468-3156.1989.tb00509.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burns, Edward. "Computer programs." Journal of School Psychology 26, no. 4 (December 1988): 420–23. http://dx.doi.org/10.1016/0022-4405(88)90052-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Watkins, Marley. "Computer programs." Journal of School Psychology 27, no. 4 (1989): 433–35. http://dx.doi.org/10.1016/0022-4405(89)90020-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mcpherson, Gary. "Computer Programs." International Journal of Music Education os-11, no. 1 (May 1988): 74. http://dx.doi.org/10.1177/025576148801100111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mcpherson, Gary. "Computer Programs." International Journal of Music Education os-14, no. 1 (November 1989): 75–76. http://dx.doi.org/10.1177/025576148901400111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

lnqlis, V., D. Black, M. McNulty, and G. Gibson. "Helpful computer programs." Nursing Standard 2, no. 14 (January 9, 1988): 8. http://dx.doi.org/10.7748/ns.2.14.8.s18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Flemister, Michael G. "Computer Edification Programs." Journal of Research on Computing in Education 20, no. 3 (March 1988): 213–25. http://dx.doi.org/10.1080/08886504.1988.10781836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schoffeniels, E., and T. Swain. "Computer software programs." Biochemical Systematics and Ecology 13, no. 3 (1985): 213. http://dx.doi.org/10.1016/0305-1978(85)90028-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Deneen, Linda L., and Keith R. Pierce. "Development and documentation of computer programs in undergraduate computer science programs." ACM SIGCSE Bulletin 20, no. 1 (February 1988): 17–21. http://dx.doi.org/10.1145/52965.52970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abdullaeva, Rozanna, Gulbahor Mirrahimova, Guzal Aminova, Ilona Israilova, and Oybek Eshbaev. "Learning Foreign Vocabulary Using Computer Programs." International Journal of Psychosocial Rehabilitation 24, Special Issue 1 (February 28, 2020): 567–72. http://dx.doi.org/10.37200/ijpr/v24sp1/pr201192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Baxtiyarovna, Maxkamova Dildora. "COMPUTER TRAINING PROGRAMS AND ITS DEVELOPMENT." American Journal Of Social Sciences And Humanity Research 4, no. 3 (March 1, 2024): 175–81. http://dx.doi.org/10.37547/ajsshr/volume04issue03-23.

Full text
Abstract:
In today’s digital age, the use of computer training programs in education has become increasingly prevalent. Use of computer training programs in learning languages is one of the best recent and technological approaches in language learning and teaching, especially to strengthen the opportunities to achieve objectives of language pedagogy. Nowadays, many researchers and professionals get to know the significance of using various computer training programs in the procedure of language teaching and learning equally. These article aims to explore and analyze the theoretical background behind the methods of usage of computer training programs in language learning, especially in English lessons in the non-native speaking countries and to bring out the problems faced by both teachers and learners of English. In conclusion, the methods of usage of computer training programs in education are supported by several key theories in the field of educational.
APA, Harvard, Vancouver, ISO, and other styles
12

Yarkov, A. M., S. A. Bychkov, and S. G. Fokin. "Rational decompression using computer programs." Marine Medicine 9, no. 1 (April 20, 2023): 95–99. http://dx.doi.org/10.22328/2413-5747-2023-9-1-95-99.

Full text
Abstract:
Divers use tables with decompression modes when conducting diving descents. Currently, tables are being replaced by underwater computers, into which modern mathematical models of decompression algorithms are programmed. None of the existing models takes into account the individual characteristics of the organism, the processes occurring in the body under conditions of high pressure of the gas and water environment, and does not describe the real processes well enough. Modern diving computers are able to supply a diver with a large amount of information. Based on data on depth, time, number of dives and time of surface intervals, they help to plan dives, inform when it is necessary to make an ascent, assign, if necessary, safety stops and calculate the time before the flight by plane. Currently, it is safe to say that a computer is simply necessary for a diver. His health, and sometimes his life, depends on it.
APA, Harvard, Vancouver, ISO, and other styles
13

Venčkauskas, Algimantas, Jevgenijus Toldinas, and Vita Krivickienė. "Kompiuterių ir operacinių sistemų saugos modulio programos sudarymas." Informacijos mokslai 50 (January 1, 2009): 187–93. http://dx.doi.org/10.15388/im.2009.0.3240.

Full text
Abstract:
Informacinės technologijos turi tinkamai atlikti kontrolę, užtikrinančią informacijos saugą nuo įvairių pavojų – nepageidaujamo ar nesankcionuoto informacijos skleidimo, pakeitimo ar netekimo ir panašiai. Tarptautinių ir Lietuvos institucijų, tiriančių kompiuterių saugos incidentus, duomenimis, informacijos saugos pažeidimų skaičius nemažėja. Įvairūs tyrimai, atlikti Lietuvos valstybinių ir nepriklausomų organizacijų, rodo, kad Lietuvoje nėra specialių informacijos saugos specialistų rengimostudijų programų, nors jų poreikis yra akivaizdus. Europos ir JAV universitetuose kompiuterių saugos dalykai dėstomi įvairiais būdais – yra atskiros studijų programos arba saugos moduliai įtraukti į bendrąsias kompiuterių mokslo ar inžinerijos programas. Straipsnyje, išnagrinėjus Vakarų universitetų informacijos saugos studijų programas ir patirtį, siūloma Kompiuterių ir operacinių sistemų saugos modulio programa, apimanti svarbiausius informacijos saugos dalykus.Development of Computer and Operating Systems Security Module CurriculumAlgimantas Venčkauskas, Jevgenijus Toldinas, Vita Krivickienė SummaryThe purpose of Information technologies is to protect an organization’s valuable resources, such as information, from unauthorized publishing, changing or missing. Total number of information security breaches unabated, according to Worldwide and Lithuanian institutions inquiring computer security incidents. In recent years a number of Government and independence Lithuanian organizations have recognized the need for security education in Lithuania (especially in information security), and lack of information security courses. In Europe and USA computer security course modules are taught as separate study programs or they are integrated into existing computer science or engineering programs. In this paper we analyze information security programs curriculums and experiences of west universities in this area. We investigate the Computer and operating systems security module course curriculum where main information security priorities are included.
APA, Harvard, Vancouver, ISO, and other styles
14

Florey, C. Du V. "Reviews–Three Computer Programs." Medical Teacher 7, no. 3-4 (January 1985): 347. http://dx.doi.org/10.3109/01421598509036834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

McCauley, Renée, and Bill Manaris. "Computer science degree programs." ACM SIGCSE Bulletin 30, no. 1 (March 1998): 15–19. http://dx.doi.org/10.1145/274790.273141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Schultz, Lois. "Computer Programs and Cataloging:." OCLC Micro 4, no. 5 (May 1988): 22–26. http://dx.doi.org/10.1108/eb055913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Novak, Miroslav M. "Correlations in Computer Programs." Fractals 06, no. 02 (June 1998): 131–38. http://dx.doi.org/10.1142/s0218348x9800016x.

Full text
Abstract:
Numerical and statistical methods are used to analyze and classify computer programs. Both computer source code and object files are examined. The results of the application of the Pearson and Spearman correlation methods to the source code are coupled with the random walk model applied to the binary code. One of the practical consequences of the analysis is the ability to quantify the degree of similarity between different computer programs and, hence, identify cases of plagiarism.
APA, Harvard, Vancouver, ISO, and other styles
18

Billings, Karen. "Evaluating Computer Education Programs." SIG Bulletin 2, no. 3 (January 1986): 29–32. http://dx.doi.org/10.1080/07478046.1986.11008146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

WOOD, CARL MARTIN ALL, and TORBJÖN WIKSTRÖM. "Learning complex computer programs." Behaviour & Information Technology 5, no. 3 (July 1986): 217–25. http://dx.doi.org/10.1080/01449298608914515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Marion, Bill, John Impagliazzo, Caroline St. Clair, Barry Soroka, and Deborah Whitfield. "Assessing computer science programs." ACM SIGCSE Bulletin 39, no. 1 (March 7, 2007): 131–32. http://dx.doi.org/10.1145/1227504.1227358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hanson, Fredrick. "review of computer programs." Chest 93, no. 1 (January 1988): 197–98. http://dx.doi.org/10.1378/chest.93.1.197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Holl, Reinhard W. "Computer Programs and Datasheets." Hormone Research in Paediatrics 50, no. 1 (1998): 68–73. http://dx.doi.org/10.1159/000053108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jones, Antonia J. "Computer programs running wild." Nature 371, no. 6496 (September 1994): 453. http://dx.doi.org/10.1038/371453a0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sterling, J. A. L. "Copyright in computer programs." Computer Law & Security Review 3, no. 3 (September 1987): 21–28. http://dx.doi.org/10.1016/0267-3649(87)90024-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sterling, J. A. L. "Copyright in computer programs." Computer Law & Security Review 3, no. 2 (July 1987): 13–17. http://dx.doi.org/10.1016/0267-3649(87)90037-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ashfield, Alan. "Cable-sizing computer programs." Wiring Installations and Supplies 1985, no. 22 (1985): 21. http://dx.doi.org/10.1049/wis.1985.0005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Higgins, Norman. "Evaluating computer graphing programs." TechTrends 34, no. 3 (May 1989): 13–16. http://dx.doi.org/10.1007/bf02816647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Parnas, D. L. "Software engineering programs are not computer science programs." IEEE Software 16, no. 6 (1999): 19–30. http://dx.doi.org/10.1109/52.805469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

MuftiSau, Aftab A. "Development, availability, and use of engineering computer programs." Canadian Journal of Civil Engineering 12, no. 1 (March 1, 1985): 43–53. http://dx.doi.org/10.1139/l85-005.

Full text
Abstract:
In the last decade, software engineering has emerged as a discipline very useful for computer application programmers in various engineering fields. In this paper the author considers the programming and management techniques for developing useful and commercially viable engineering software that may be used in the analysis and design of civil engineering projects. The issue of utilizing existing software effectively and efficiently is also discussed. At the conclusion of the presentation, several recommendations are made to encourage engineering software development in Canada. Key words: engineering, software engineering, software, computers, computer service bureaus, software directories.
APA, Harvard, Vancouver, ISO, and other styles
30

Owen, Charles B., Laura Dillon, Alison Dobbins, Matthew Rhodes, Madeline Levinson, and Noah Keppers. "Computer literacy through dance: the dancing computer project." International Journal of Pervasive Computing and Communications 13, no. 1 (April 3, 2017): 26–40. http://dx.doi.org/10.1108/ijpcc-02-2017-0012.

Full text
Abstract:
Purpose The purpose of this paper is to present the design and evolution of the Dancing Computer project. Dancing Computer is an ongoing research project at the Michigan State University, which is developing a system that aims to increase computer literacy in elementary-aged children by teaching them first to read code before they write it. The main objective is to educate children on basic concepts of computer science. Design/methodology/approach Children are given tablet computers that present a simple program line-by-line that they execute as they pretend to be a computer. The programs are acted out on a portable dance floor consisting of colored tiles, and the program statements instruct the child to move, turn and act out dance poses and terminology. Findings The Dancing Computer prototype was tested in six different locations in 2016, reaching approximately 250 students. Learning was demonstrated by significant improvements in both task duration and error performance as students performed the activities. The most common errors were movement errors, where participants failed to move the correct number of squares. Social implications This project has the potential to increase the level of computer literacy for thousands of children. This project’s goal is to increase understanding of what a computer does, what a program does and the step-by-step nature of computer programs. Originality/value This is a unique and a different approach – the norm being to start students off writing code in some language. In Dancing Computer stages children as readers of programs, allowing them to pretend to be a computer in a fun and engaging activity while also learning how computers execute real programs.
APA, Harvard, Vancouver, ISO, and other styles
31

Guzev, M. A., M. A. Knyazeva, I. I. Moskalev, and E. Y. Nikitina. "Rank analysis of computer programs." Dal'nevostochnyi Matematicheskii Zhurnal 20, no. 2 (November 25, 2020): 155–63. http://dx.doi.org/10.47910/femj202017.

Full text
Abstract:
This paper describes the application of the rank analysis method for formal languages on the example of the source codes of programs in the Java language. When describing the technology for compiling frequency dictionaries, attention is focused on how the presence of anaphoric content in computer programs is taken into consideration. When discussing the results, it was noted that the structural components of programs for various purposes correspond to certain areas of the graph of the dependence of rank on the frequency of occurrence of a lexeme.
APA, Harvard, Vancouver, ISO, and other styles
32

Groves, Peter J. "EEC Directive on Computer Programs." European Business Law Review 1, Issue 2 (April 1, 1990): 36–38. http://dx.doi.org/10.54648/eulr1990014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zerov, Konstiantyn. "Copyright protection for computer programs." Theory and Practice of Intellectual Property, no. 6 (June 16, 2021): 5–14. http://dx.doi.org/10.33731/62020.233854.

Full text
Abstract:
Zerov K. Copyright protection for computer programs. The article discusses the main approaches to the legal protection of software, particularly computer programs, in accordance with the current legislation of Ukraine and foreign practices. It is concluded that copyright allows to adequately protect the forms of expression of a computer program: object and source codes of the program. It is noted that a computer program shall be protected if it is original in the sense that it is the author's own intellectual creation, and no other criteria shall be applied to determine its eligibility for protection in Ukraine. Like any other copyright object, a computer program has «legally indifferent» and «legally significant» elements of the form of expression. The legally indifferent elements of a computer program should include a) elements dictated by the efficiency of a computer program; (b) elements that are dictated by external factors; and (c) elements that the original programmer had taken from the public domain. The main approaches to the use (copying) of the source or object code of computer programs as part of other computer programs are given: «literal copying» and «non-literal copying.» It is concluded that «non-literal copying» of a computer program cannot violate the copyright law in Ukraine since the ideas and principles on which any element of a computer program is based are not protected by copyright. It is assumed that the modification of a computer program by eliminating technical means of protection and further use of computer program gives grounds to qualify such actions as two separate types of copyright infringement: infringement of the copyright holder's property rights and deliberately circumventing technical means of copyright protection. It is noted that in some scenarios, theuse of works under the limitation of copyright without circumvention of technical means may be impossible. The proposal to legislatively provide for the possibility of a person who has the right to freely use work to contact the copyright holder with a request to remove technical means solely for such use, as well as cases of permissible circumvention of technical means, has been made.Keywords: computer program, copyright, literal copying, non-literal copying
APA, Harvard, Vancouver, ISO, and other styles
34

Perera, Thomas B. "Implementing faculty computer literacy programs." Behavior Research Methods, Instruments, & Computers 18, no. 2 (March 1986): 162–64. http://dx.doi.org/10.3758/bf03201017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Davies, J. R. "Index of Computer programs list." Anaesthesia 45, no. 1 (January 1990): 90–91. http://dx.doi.org/10.1111/j.1365-2044.1990.tb14557.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

AGTERBERG, F. P. "Computer Programs for Mineral Exploration." Science 245, no. 4913 (July 7, 1989): 76–81. http://dx.doi.org/10.1126/science.245.4913.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kongolo, Tshimanga. "Computer programs protection in Africa." International Journal of Technology Transfer and Commercialisation 2, no. 2 (2003): 139. http://dx.doi.org/10.1504/ijttc.2003.003164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Tse, C. S. Ted, and Albert J. Madura. "Antimicrobial cost-comparison computer programs." American Journal of Health-System Pharmacy 44, no. 2 (February 1, 1987): 284–86. http://dx.doi.org/10.1093/ajhp/44.2.284a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Karczmarczuk, Jerzy. "Functional differentiation of computer programs." ACM SIGPLAN Notices 34, no. 1 (January 1999): 195–203. http://dx.doi.org/10.1145/291251.289442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ferguson, Ernest. "Conference grading of computer programs." ACM SIGCSE Bulletin 19, no. 1 (February 1987): 361–65. http://dx.doi.org/10.1145/31726.31787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Magliaro, Sue, and John K. Burton. "Adolescents' Chunking of Computer Programs." Computers in the Schools 4, no. 3-4 (August 9, 1988): 129–38. http://dx.doi.org/10.1300/j025v04n03_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Nalley, Elliot Turner. "Intellectual property in computer programs." Business Horizons 43, no. 4 (July 2000): 43–51. http://dx.doi.org/10.1016/s0007-6813(00)00070-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Eerkes, Gary L. "Profiling computer science master's programs." Communications of the ACM 34, no. 1 (January 3, 1991): 100–109. http://dx.doi.org/10.1145/99977.99999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Oermann, Marilyn H. "Computer Use in ADN Programs." Nurse Educator 22, no. 6 (November 1997): 8. http://dx.doi.org/10.1097/00006223-199711000-00005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Harvey, R. J. "Language processing and computer programs." Behavioral and Brain Sciences 9, no. 3 (September 1986): 549–50. http://dx.doi.org/10.1017/s0140525x00047038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Milne, Robert. "The specification of computer programs." Science of Computer Programming 10, no. 3 (June 1988): 333–34. http://dx.doi.org/10.1016/0167-6423(88)90057-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Blandford, A. E. "Interactive computer programs for education." Computers & Education 11, no. 3 (January 1987): 230–31. http://dx.doi.org/10.1016/0360-1315(87)90060-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

JOHNSON, DEBORAH G. "SHOULD COMPUTER PROGRAMS BE OWNED?" Metaphilosophy 16, no. 4 (October 1985): 276–88. http://dx.doi.org/10.1111/j.1467-9973.1985.tb00174.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

CAREY, DAVID H. "SHOULD COMPUTER PROGRAMS BE OWNABLE?" Metaphilosophy 24, no. 1-2 (January 1993): 76–84. http://dx.doi.org/10.1111/j.1467-9973.1993.tb00446.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Godlovitch, S. "Artists, computer programs and performance." Australasian Journal of Philosophy 68, no. 3 (September 1990): 301–12. http://dx.doi.org/10.1080/00048409012344321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography