Results 21 to 30 of about 6,803,534 (331)
The relationships between English literacy skills and learner academic performance in Mathematics [PDF]
The study investigated the relationship between English literacy skills and learner academic performance in Mathematics. The researcher used a quantitative research approach in this study.
S. A. Tachie, E-Mail: simon.tachie@gmail.com +1 more
doaj
On Universality in Human Correspondence Activity [PDF]
Identifying and modeling patterns of human activity has important ramifications in applications ranging from predicting disease spread to optimizing resource allocation.
A. S. L. O. Campanharo +9 more
core +4 more sources
Improvements in mentoring of pre-service teachers: Experiences of field placement [PDF]
The latest shift in teacher education gives more responsibilities in the preparation of teachers to schools. This places special demands on the classroom teacher who acts as a teacher educator in a mentoring role that requires specialist skills.
Barnabas Muyengwa, E-mail: muyengwab@zou.ac.zw. +1 more
doaj
Influence of rapid urbanization on environmental quality in selected neighborhoods of Port Harcourt Metropolis [PDF]
This study assessed the influence of rapid urbanization on environmental quality in selected neighborhoods of Port Harcourt city. The investigation used both primary and secondary data sources.
Asa Ekpo Bassey, E-mail: asabassey20@gmail.com +2 more
doaj
Many practices that are legal or at least clearly “fair use” in the paper world encounter serious complications in digital form. This is partly because the statutes and case law mostly do not refer to electronic situations, and analogies which one person finds reasonable may seem absurd and unacceptable to another.
openaire +2 more sources
Analysis of security extension protocol in e-mail system
E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e ...
Jingjing SHANG, Yujia ZHU, Qingyun LIU
doaj +3 more sources
04. Mongo Give Good E-Mail [PDF]
The first time I met Richard C. Richards (whom I later learned was also known as Mongo) we were at the 2013 LPS conference on the west coast of Florida. He was wearing a T-shirt that said something about having attended his own funeral, so I figured that
Atkinson, Camille
core +1 more source
“I h 8 u”: Findings from a five-year study of text and e-mail bullying [PDF]
Copyright @ 2010 British Educational Research Association. The final version of this article is available at the link below.This study charts reports of nasty or threatening text and e-mail messages received by students in academic years 7 and 8 (11-13 ...
Agatston P. W. +51 more
core +2 more sources
SDN based e-mail repudiation source restraining method
With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data ...
Zhi-geng HAN, Xia FENG, Geng CHEN
doaj +2 more sources
Bilingual negotiation via e-mail: an international project [PDF]
This article examines selective results of an international e-mail project between 24 students studying law with German (in England) and English (in Germany).1 It refers to outcomes as manifested in the students' written reports and oral assessments, but
Leahy, C
core +1 more source

