Results 21 to 30 of about 6,803,534 (331)

The relationships between English literacy skills and learner academic performance in Mathematics [PDF]

open access: yesJournal of Studies in Social Sciences and Humanities, 2021
The study investigated the relationship between English literacy skills and learner academic performance in Mathematics. The researcher used a quantitative research approach in this study.
S. A. Tachie, E-Mail: simon.tachie@gmail.com   +1 more
doaj  

On Universality in Human Correspondence Activity [PDF]

open access: yes, 2009
Identifying and modeling patterns of human activity has important ramifications in applications ranging from predicting disease spread to optimizing resource allocation.
A. S. L. O. Campanharo   +9 more
core   +4 more sources

Improvements in mentoring of pre-service teachers: Experiences of field placement [PDF]

open access: yesJournal of Studies in Social Sciences and Humanities, 2020
The latest shift in teacher education gives more responsibilities in the preparation of teachers to schools. This places special demands on the classroom teacher who acts as a teacher educator in a mentoring role that requires specialist skills.
Barnabas Muyengwa, E-mail: muyengwab@zou.ac.zw.   +1 more
doaj  

Influence of rapid urbanization on environmental quality in selected neighborhoods of Port Harcourt Metropolis [PDF]

open access: yesJournal of Studies in Social Sciences and Humanities, 2020
This study assessed the influence of rapid urbanization on environmental quality in selected neighborhoods of Port Harcourt city. The investigation used both primary and secondary data sources.
Asa Ekpo Bassey, E-mail: asabassey20@gmail.com   +2 more
doaj  

E‐mail attachments [PDF]

open access: yesLibrary Hi Tech, 1999
Many practices that are legal or at least clearly “fair use” in the paper world encounter serious complications in digital form. This is partly because the statutes and case law mostly do not refer to electronic situations, and analogies which one person finds reasonable may seem absurd and unacceptable to another.
openaire   +2 more sources

Analysis of security extension protocol in e-mail system

open access: yes网络与信息安全学报, 2020
E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e ...
Jingjing SHANG, Yujia ZHU, Qingyun LIU
doaj   +3 more sources

04. Mongo Give Good E-Mail [PDF]

open access: yes, 2020
The first time I met Richard C. Richards (whom I later learned was also known as Mongo) we were at the 2013 LPS conference on the west coast of Florida. He was wearing a T-shirt that said something about having attended his own funeral, so I figured that
Atkinson, Camille
core   +1 more source

“I h 8 u”: Findings from a five-year study of text and e-mail bullying [PDF]

open access: yes, 2010
Copyright @ 2010 British Educational Research Association. The final version of this article is available at the link below.This study charts reports of nasty or threatening text and e-mail messages received by students in academic years 7 and 8 (11-13 ...
Agatston P. W.   +51 more
core   +2 more sources

SDN based e-mail repudiation source restraining method

open access: yesTongxin xuebao, 2016
With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data ...
Zhi-geng HAN, Xia FENG, Geng CHEN
doaj   +2 more sources

Bilingual negotiation via e-mail: an international project [PDF]

open access: yes, 2003
This article examines selective results of an international e-mail project between 24 students studying law with German (in England) and English (in Germany).1 It refers to outcomes as manifested in the students' written reports and oral assessments, but
Leahy, C
core   +1 more source

Home - About - Disclaimer - Privacy