Artykuły w czasopismach na temat „Computer programs”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Computer programs.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Computer programs”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

WHITAKER, SIMON. "Computer programs". Journal of the British Institute of Mental Handicap (APEX) 17, nr 1 (26.08.2009): 38–39. http://dx.doi.org/10.1111/j.1468-3156.1989.tb00509.x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Burns, Edward. "Computer programs". Journal of School Psychology 26, nr 4 (grudzień 1988): 420–23. http://dx.doi.org/10.1016/0022-4405(88)90052-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Watkins, Marley. "Computer programs". Journal of School Psychology 27, nr 4 (1989): 433–35. http://dx.doi.org/10.1016/0022-4405(89)90020-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mcpherson, Gary. "Computer Programs". International Journal of Music Education os-11, nr 1 (maj 1988): 74. http://dx.doi.org/10.1177/025576148801100111.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Mcpherson, Gary. "Computer Programs". International Journal of Music Education os-14, nr 1 (listopad 1989): 75–76. http://dx.doi.org/10.1177/025576148901400111.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

lnqlis, V., D. Black, M. McNulty i G. Gibson. "Helpful computer programs". Nursing Standard 2, nr 14 (9.01.1988): 8. http://dx.doi.org/10.7748/ns.2.14.8.s18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Flemister, Michael G. "Computer Edification Programs". Journal of Research on Computing in Education 20, nr 3 (marzec 1988): 213–25. http://dx.doi.org/10.1080/08886504.1988.10781836.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Schoffeniels, E., i T. Swain. "Computer software programs". Biochemical Systematics and Ecology 13, nr 3 (1985): 213. http://dx.doi.org/10.1016/0305-1978(85)90028-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Deneen, Linda L., i Keith R. Pierce. "Development and documentation of computer programs in undergraduate computer science programs". ACM SIGCSE Bulletin 20, nr 1 (luty 1988): 17–21. http://dx.doi.org/10.1145/52965.52970.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Abdullaeva, Rozanna, Gulbahor Mirrahimova, Guzal Aminova, Ilona Israilova i Oybek Eshbaev. "Learning Foreign Vocabulary Using Computer Programs". International Journal of Psychosocial Rehabilitation 24, Special Issue 1 (28.02.2020): 567–72. http://dx.doi.org/10.37200/ijpr/v24sp1/pr201192.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Baxtiyarovna, Maxkamova Dildora. "COMPUTER TRAINING PROGRAMS AND ITS DEVELOPMENT". American Journal Of Social Sciences And Humanity Research 4, nr 3 (1.03.2024): 175–81. http://dx.doi.org/10.37547/ajsshr/volume04issue03-23.

Pełny tekst źródła
Streszczenie:
In today’s digital age, the use of computer training programs in education has become increasingly prevalent. Use of computer training programs in learning languages is one of the best recent and technological approaches in language learning and teaching, especially to strengthen the opportunities to achieve objectives of language pedagogy. Nowadays, many researchers and professionals get to know the significance of using various computer training programs in the procedure of language teaching and learning equally. These article aims to explore and analyze the theoretical background behind the methods of usage of computer training programs in language learning, especially in English lessons in the non-native speaking countries and to bring out the problems faced by both teachers and learners of English. In conclusion, the methods of usage of computer training programs in education are supported by several key theories in the field of educational.
Style APA, Harvard, Vancouver, ISO itp.
12

Yarkov, A. M., S. A. Bychkov i S. G. Fokin. "Rational decompression using computer programs". Marine Medicine 9, nr 1 (20.04.2023): 95–99. http://dx.doi.org/10.22328/2413-5747-2023-9-1-95-99.

Pełny tekst źródła
Streszczenie:
Divers use tables with decompression modes when conducting diving descents. Currently, tables are being replaced by underwater computers, into which modern mathematical models of decompression algorithms are programmed. None of the existing models takes into account the individual characteristics of the organism, the processes occurring in the body under conditions of high pressure of the gas and water environment, and does not describe the real processes well enough. Modern diving computers are able to supply a diver with a large amount of information. Based on data on depth, time, number of dives and time of surface intervals, they help to plan dives, inform when it is necessary to make an ascent, assign, if necessary, safety stops and calculate the time before the flight by plane. Currently, it is safe to say that a computer is simply necessary for a diver. His health, and sometimes his life, depends on it.
Style APA, Harvard, Vancouver, ISO itp.
13

Venčkauskas, Algimantas, Jevgenijus Toldinas i Vita Krivickienė. "Kompiuterių ir operacinių sistemų saugos modulio programos sudarymas". Informacijos mokslai 50 (1.01.2009): 187–93. http://dx.doi.org/10.15388/im.2009.0.3240.

Pełny tekst źródła
Streszczenie:
Informacinės technologijos turi tinkamai atlikti kontrolę, užtikrinančią informacijos saugą nuo įvairių pavojų – nepageidaujamo ar nesankcionuoto informacijos skleidimo, pakeitimo ar netekimo ir panašiai. Tarptautinių ir Lietuvos institucijų, tiriančių kompiuterių saugos incidentus, duomenimis, informacijos saugos pažeidimų skaičius nemažėja. Įvairūs tyrimai, atlikti Lietuvos valstybinių ir nepriklausomų organizacijų, rodo, kad Lietuvoje nėra specialių informacijos saugos specialistų rengimostudijų programų, nors jų poreikis yra akivaizdus. Europos ir JAV universitetuose kompiuterių saugos dalykai dėstomi įvairiais būdais – yra atskiros studijų programos arba saugos moduliai įtraukti į bendrąsias kompiuterių mokslo ar inžinerijos programas. Straipsnyje, išnagrinėjus Vakarų universitetų informacijos saugos studijų programas ir patirtį, siūloma Kompiuterių ir operacinių sistemų saugos modulio programa, apimanti svarbiausius informacijos saugos dalykus.Development of Computer and Operating Systems Security Module CurriculumAlgimantas Venčkauskas, Jevgenijus Toldinas, Vita Krivickienė SummaryThe purpose of Information technologies is to protect an organization’s valuable resources, such as information, from unauthorized publishing, changing or missing. Total number of information security breaches unabated, according to Worldwide and Lithuanian institutions inquiring computer security incidents. In recent years a number of Government and independence Lithuanian organizations have recognized the need for security education in Lithuania (especially in information security), and lack of information security courses. In Europe and USA computer security course modules are taught as separate study programs or they are integrated into existing computer science or engineering programs. In this paper we analyze information security programs curriculums and experiences of west universities in this area. We investigate the Computer and operating systems security module course curriculum where main information security priorities are included.
Style APA, Harvard, Vancouver, ISO itp.
14

Florey, C. Du V. "Reviews–Three Computer Programs". Medical Teacher 7, nr 3-4 (styczeń 1985): 347. http://dx.doi.org/10.3109/01421598509036834.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

McCauley, Renée, i Bill Manaris. "Computer science degree programs". ACM SIGCSE Bulletin 30, nr 1 (marzec 1998): 15–19. http://dx.doi.org/10.1145/274790.273141.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Schultz, Lois. "Computer Programs and Cataloging:". OCLC Micro 4, nr 5 (maj 1988): 22–26. http://dx.doi.org/10.1108/eb055913.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Novak, Miroslav M. "Correlations in Computer Programs". Fractals 06, nr 02 (czerwiec 1998): 131–38. http://dx.doi.org/10.1142/s0218348x9800016x.

Pełny tekst źródła
Streszczenie:
Numerical and statistical methods are used to analyze and classify computer programs. Both computer source code and object files are examined. The results of the application of the Pearson and Spearman correlation methods to the source code are coupled with the random walk model applied to the binary code. One of the practical consequences of the analysis is the ability to quantify the degree of similarity between different computer programs and, hence, identify cases of plagiarism.
Style APA, Harvard, Vancouver, ISO itp.
18

Billings, Karen. "Evaluating Computer Education Programs". SIG Bulletin 2, nr 3 (styczeń 1986): 29–32. http://dx.doi.org/10.1080/07478046.1986.11008146.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

WOOD, CARL MARTIN ALL, i TORBJÖN WIKSTRÖM. "Learning complex computer programs". Behaviour & Information Technology 5, nr 3 (lipiec 1986): 217–25. http://dx.doi.org/10.1080/01449298608914515.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Marion, Bill, John Impagliazzo, Caroline St. Clair, Barry Soroka i Deborah Whitfield. "Assessing computer science programs". ACM SIGCSE Bulletin 39, nr 1 (7.03.2007): 131–32. http://dx.doi.org/10.1145/1227504.1227358.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Hanson, Fredrick. "review of computer programs". Chest 93, nr 1 (styczeń 1988): 197–98. http://dx.doi.org/10.1378/chest.93.1.197.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Holl, Reinhard W. "Computer Programs and Datasheets". Hormone Research in Paediatrics 50, nr 1 (1998): 68–73. http://dx.doi.org/10.1159/000053108.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Jones, Antonia J. "Computer programs running wild". Nature 371, nr 6496 (wrzesień 1994): 453. http://dx.doi.org/10.1038/371453a0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Sterling, J. A. L. "Copyright in computer programs". Computer Law & Security Review 3, nr 3 (wrzesień 1987): 21–28. http://dx.doi.org/10.1016/0267-3649(87)90024-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Sterling, J. A. L. "Copyright in computer programs". Computer Law & Security Review 3, nr 2 (lipiec 1987): 13–17. http://dx.doi.org/10.1016/0267-3649(87)90037-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Ashfield, Alan. "Cable-sizing computer programs". Wiring Installations and Supplies 1985, nr 22 (1985): 21. http://dx.doi.org/10.1049/wis.1985.0005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Higgins, Norman. "Evaluating computer graphing programs". TechTrends 34, nr 3 (maj 1989): 13–16. http://dx.doi.org/10.1007/bf02816647.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Parnas, D. L. "Software engineering programs are not computer science programs". IEEE Software 16, nr 6 (1999): 19–30. http://dx.doi.org/10.1109/52.805469.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

MuftiSau, Aftab A. "Development, availability, and use of engineering computer programs". Canadian Journal of Civil Engineering 12, nr 1 (1.03.1985): 43–53. http://dx.doi.org/10.1139/l85-005.

Pełny tekst źródła
Streszczenie:
In the last decade, software engineering has emerged as a discipline very useful for computer application programmers in various engineering fields. In this paper the author considers the programming and management techniques for developing useful and commercially viable engineering software that may be used in the analysis and design of civil engineering projects. The issue of utilizing existing software effectively and efficiently is also discussed. At the conclusion of the presentation, several recommendations are made to encourage engineering software development in Canada. Key words: engineering, software engineering, software, computers, computer service bureaus, software directories.
Style APA, Harvard, Vancouver, ISO itp.
30

Owen, Charles B., Laura Dillon, Alison Dobbins, Matthew Rhodes, Madeline Levinson i Noah Keppers. "Computer literacy through dance: the dancing computer project". International Journal of Pervasive Computing and Communications 13, nr 1 (3.04.2017): 26–40. http://dx.doi.org/10.1108/ijpcc-02-2017-0012.

Pełny tekst źródła
Streszczenie:
Purpose The purpose of this paper is to present the design and evolution of the Dancing Computer project. Dancing Computer is an ongoing research project at the Michigan State University, which is developing a system that aims to increase computer literacy in elementary-aged children by teaching them first to read code before they write it. The main objective is to educate children on basic concepts of computer science. Design/methodology/approach Children are given tablet computers that present a simple program line-by-line that they execute as they pretend to be a computer. The programs are acted out on a portable dance floor consisting of colored tiles, and the program statements instruct the child to move, turn and act out dance poses and terminology. Findings The Dancing Computer prototype was tested in six different locations in 2016, reaching approximately 250 students. Learning was demonstrated by significant improvements in both task duration and error performance as students performed the activities. The most common errors were movement errors, where participants failed to move the correct number of squares. Social implications This project has the potential to increase the level of computer literacy for thousands of children. This project’s goal is to increase understanding of what a computer does, what a program does and the step-by-step nature of computer programs. Originality/value This is a unique and a different approach – the norm being to start students off writing code in some language. In Dancing Computer stages children as readers of programs, allowing them to pretend to be a computer in a fun and engaging activity while also learning how computers execute real programs.
Style APA, Harvard, Vancouver, ISO itp.
31

Guzev, M. A., M. A. Knyazeva, I. I. Moskalev i E. Y. Nikitina. "Rank analysis of computer programs". Dal'nevostochnyi Matematicheskii Zhurnal 20, nr 2 (25.11.2020): 155–63. http://dx.doi.org/10.47910/femj202017.

Pełny tekst źródła
Streszczenie:
This paper describes the application of the rank analysis method for formal languages on the example of the source codes of programs in the Java language. When describing the technology for compiling frequency dictionaries, attention is focused on how the presence of anaphoric content in computer programs is taken into consideration. When discussing the results, it was noted that the structural components of programs for various purposes correspond to certain areas of the graph of the dependence of rank on the frequency of occurrence of a lexeme.
Style APA, Harvard, Vancouver, ISO itp.
32

Groves, Peter J. "EEC Directive on Computer Programs". European Business Law Review 1, Issue 2 (1.04.1990): 36–38. http://dx.doi.org/10.54648/eulr1990014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Zerov, Konstiantyn. "Copyright protection for computer programs". Theory and Practice of Intellectual Property, nr 6 (16.06.2021): 5–14. http://dx.doi.org/10.33731/62020.233854.

Pełny tekst źródła
Streszczenie:
Zerov K. Copyright protection for computer programs. The article discusses the main approaches to the legal protection of software, particularly computer programs, in accordance with the current legislation of Ukraine and foreign practices. It is concluded that copyright allows to adequately protect the forms of expression of a computer program: object and source codes of the program. It is noted that a computer program shall be protected if it is original in the sense that it is the author's own intellectual creation, and no other criteria shall be applied to determine its eligibility for protection in Ukraine. Like any other copyright object, a computer program has «legally indifferent» and «legally significant» elements of the form of expression. The legally indifferent elements of a computer program should include a) elements dictated by the efficiency of a computer program; (b) elements that are dictated by external factors; and (c) elements that the original programmer had taken from the public domain. The main approaches to the use (copying) of the source or object code of computer programs as part of other computer programs are given: «literal copying» and «non-literal copying.» It is concluded that «non-literal copying» of a computer program cannot violate the copyright law in Ukraine since the ideas and principles on which any element of a computer program is based are not protected by copyright. It is assumed that the modification of a computer program by eliminating technical means of protection and further use of computer program gives grounds to qualify such actions as two separate types of copyright infringement: infringement of the copyright holder's property rights and deliberately circumventing technical means of copyright protection. It is noted that in some scenarios, theuse of works under the limitation of copyright without circumvention of technical means may be impossible. The proposal to legislatively provide for the possibility of a person who has the right to freely use work to contact the copyright holder with a request to remove technical means solely for such use, as well as cases of permissible circumvention of technical means, has been made.Keywords: computer program, copyright, literal copying, non-literal copying
Style APA, Harvard, Vancouver, ISO itp.
34

Perera, Thomas B. "Implementing faculty computer literacy programs". Behavior Research Methods, Instruments, & Computers 18, nr 2 (marzec 1986): 162–64. http://dx.doi.org/10.3758/bf03201017.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Davies, J. R. "Index of Computer programs list". Anaesthesia 45, nr 1 (styczeń 1990): 90–91. http://dx.doi.org/10.1111/j.1365-2044.1990.tb14557.x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

AGTERBERG, F. P. "Computer Programs for Mineral Exploration". Science 245, nr 4913 (7.07.1989): 76–81. http://dx.doi.org/10.1126/science.245.4913.76.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Kongolo, Tshimanga. "Computer programs protection in Africa". International Journal of Technology Transfer and Commercialisation 2, nr 2 (2003): 139. http://dx.doi.org/10.1504/ijttc.2003.003164.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Tse, C. S. Ted, i Albert J. Madura. "Antimicrobial cost-comparison computer programs". American Journal of Health-System Pharmacy 44, nr 2 (1.02.1987): 284–86. http://dx.doi.org/10.1093/ajhp/44.2.284a.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Karczmarczuk, Jerzy. "Functional differentiation of computer programs". ACM SIGPLAN Notices 34, nr 1 (styczeń 1999): 195–203. http://dx.doi.org/10.1145/291251.289442.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Ferguson, Ernest. "Conference grading of computer programs". ACM SIGCSE Bulletin 19, nr 1 (luty 1987): 361–65. http://dx.doi.org/10.1145/31726.31787.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Magliaro, Sue, i John K. Burton. "Adolescents' Chunking of Computer Programs". Computers in the Schools 4, nr 3-4 (9.08.1988): 129–38. http://dx.doi.org/10.1300/j025v04n03_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Nalley, Elliot Turner. "Intellectual property in computer programs". Business Horizons 43, nr 4 (lipiec 2000): 43–51. http://dx.doi.org/10.1016/s0007-6813(00)00070-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Eerkes, Gary L. "Profiling computer science master's programs". Communications of the ACM 34, nr 1 (3.01.1991): 100–109. http://dx.doi.org/10.1145/99977.99999.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Oermann, Marilyn H. "Computer Use in ADN Programs". Nurse Educator 22, nr 6 (listopad 1997): 8. http://dx.doi.org/10.1097/00006223-199711000-00005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Harvey, R. J. "Language processing and computer programs". Behavioral and Brain Sciences 9, nr 3 (wrzesień 1986): 549–50. http://dx.doi.org/10.1017/s0140525x00047038.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Milne, Robert. "The specification of computer programs". Science of Computer Programming 10, nr 3 (czerwiec 1988): 333–34. http://dx.doi.org/10.1016/0167-6423(88)90057-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Blandford, A. E. "Interactive computer programs for education". Computers & Education 11, nr 3 (styczeń 1987): 230–31. http://dx.doi.org/10.1016/0360-1315(87)90060-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

JOHNSON, DEBORAH G. "SHOULD COMPUTER PROGRAMS BE OWNED?" Metaphilosophy 16, nr 4 (październik 1985): 276–88. http://dx.doi.org/10.1111/j.1467-9973.1985.tb00174.x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

CAREY, DAVID H. "SHOULD COMPUTER PROGRAMS BE OWNABLE?" Metaphilosophy 24, nr 1-2 (styczeń 1993): 76–84. http://dx.doi.org/10.1111/j.1467-9973.1993.tb00446.x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Godlovitch, S. "Artists, computer programs and performance". Australasian Journal of Philosophy 68, nr 3 (wrzesień 1990): 301–12. http://dx.doi.org/10.1080/00048409012344321.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii