首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35篇
  免费   1篇
教育   24篇
科学研究   3篇
各国文化   2篇
信息传播   7篇
  2022年   1篇
  2021年   1篇
  2018年   6篇
  2016年   3篇
  2015年   1篇
  2014年   2篇
  2013年   11篇
  2012年   1篇
  2009年   1篇
  2008年   1篇
  2004年   1篇
  2000年   1篇
  1997年   1篇
  1994年   1篇
  1992年   1篇
  1990年   1篇
  1987年   1篇
  1980年   1篇
排序方式: 共有36条查询结果,搜索用时 0 毫秒
31.
32.
This is the 13th in a series of articles exploring international trends in health science librarianship in the 21st century. It is the first devoted to four different regions in the African continent. The present issue focuses on countries in Southern Africa – South Africa and Zimbabwe. The next issue will examine East Africa.  相似文献   
33.
34.
Information protection is of paramount importance in today's world. From information involving the highest level of government administration and national security, to information existing at the level of the private company in the form of trade secrets or personal data, all are under the constant threat of being compromised. In this study, the researchers attempt to evaluate the information security maturity level and provide clear thoughtful analysis of the information security landscapes of the Malaysian Public Service (MPS) organizations. This study uses convenience sampling and the required data collected from 970 targeted individuals through a self-administrated survey. In addition, a survey questionnaire is utilized to gauge the security landscape and to further understand the occurrence of incidents, the sources of attack, and the types of technical safeguard. Findings revealed that the highest security incidents experienced by the MPS were spamming (42%), followed by attacks of malicious codes (41%). Twenty-five percent of incidents originated from within the organizations, 15% originated from outside, and 11% were from a mixture of internal and external sources. Also, it shows that 49% of incidents were from sources unknown to the respondents. The top most deployed safeguards by the MPS were found to be firewalls (95%), followed by anti-virus software (92%), and access control to information system (89%). Findings on the maturity level show that 61% of respondents are at Level 3, followed by 21% at Level 2 where the information security processes are still considered an Information and Communication Technology (ICT) domain. At the higher end of the continuum lies 13% for Level 4 and 1% at Level 5.  相似文献   
35.
His particular academic interests are in mathematics teaching and curriculum development. Author of a series of mathematics textbooks with teachers' guides.  相似文献   
36.
In recent years the interest in preschool mathematics has increased. However, studies seldom focus on children under the age of three and research is scarce on the early use of mathematics observed in natural settings. This article reports a study of mathematical possibilities during diaper changing in a preschool setting. A diaper change can be a communicative moment when the child can experience mathematics with a professional preschool teacher, but it can also be a moment of mechanical routine with no pedagogical context. The intention of the study presented here was to investigate the mathematical potential preschool teachers described in relation to diaper changing and to examine the ways this potential was put into action. Both similarities and differences emerged regarding the mathematical potential preschool teachers described in relation to diaper changing and the mathematical content that they were observed to communicate. The results show that it is possible to communicate mathematical content in a pedagogical way during diaper changes, making this routine a learning opportunity for children. However, the results also show variations in the observed range and context of such communication, and therefore the potential for mathematical learning during diaper changes seems to differ widely.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号