Academic literacies: the word is not enough
نویسندگان
چکیده
منابع مشابه
Not Enough Points Is Enough
Models of the untyped λ-calculus may be defined either as applicative structures satisfying a bunch of first order axioms, known as “λ-models”, or as (structures arising from) any reflexive object in a cartesian closed category (ccc, for brevity). These notions are tightly linked in the sense that: given a λ-model A, one may define a ccc in which A (the carrier set) is a reflexive object; conve...
متن کاملWhen Enough Is Not Enough
People are often exposed to more information than they can actually remember. Despite this frequent form of information overload, little is known about how much information people choose to remember. Using a novel “stop” paradigm, the current research examined whether and how people choose to stop receiving new—possibly overwhelming—information with the intent to maximize memory performance. Pa...
متن کاملCorrectness is not enough
The usual aim of spreadsheet audit is to verify correctness. There are two problems with this: first, it is often difficult to tell whether the spreadsheets in question are correct, and second, even if they are, they may still give the wrong results. These problems are explained in this paper, which presents the key criteria for judging a spreadsheet and discusses how those criteria can be achi...
متن کاملTranslation Is Not Enough
ED INLINE CODES Inline codes, such as markers for bold or italics, links information or image references, can be represented using either an encapsulation mechanism or a placeholder method. Those are derived respectively from TMX and OpenTag. The encapsulation mechanism consists of bracketing the inline codes between special elements. XLIFF keeps a syntax very close to TMX: (begin paired-...
متن کاملWORM is not enough !
Important documents like financial reports, customer communications etc are increasingly being maintained by businesses in electronic format. These represent much of the data on which key decisions in business operations are based and hence must be maintained in a trustworthy fashion safe from destruction or clandestine modification. Secure retention of such data is also increasingly being regu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Teaching in Higher Education
سال: 2017
ISSN: 1356-2517,1470-1294
DOI: 10.1080/13562517.2017.1360270