ЕЛЕКТРОННЕ НАВЧАННЯ ЗАСОБАМИ MICROSOFT OFFICE 365

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bimanual Interaction on the Microsoft Office Keyboard

The Office Keyboard (on store shelves in major markets since October, 2001) seeks to enhance efficiency through unique application of bimanual interaction principles. The left hand performs navigation tasks (including view scrolling, application switching, and internet forward & back) as well as editing commands (Cut, Copy, and Paste) that are typically part of a compound mouse-keyboard action....

متن کامل

Evaluation of the Microsoft office familiarity of the medical students of Hormozgan Medical University in 2006

The ability to access, evaluate and use information in each profession is one of the most effective materials of individual success. Accessing updated medical information is vital for physicians (1-5). In a descriptive cross sectional study performed in Bandar Abbas, the capital city of Hormozgan province in the southern part of Iran. Data the internet and computer usage was examined among m...

متن کامل

Preventing Exploits in Microsoft Office Documents Through Content Randomization

Malware laden documents are a common exploit vector, often used as attachments to phishing emails. Current approaches seek to detect the malicious attributes of documents through signature matching, dynamic analysis, or machine learning. We take a different approach: we perform transformations on documents that render exploits inoperable while maintaining the visual interpretation of the docume...

متن کامل

Essential SharePoint - Microsoft office document collaboration in action

Reading a book is also kind of better solution when you have no enough money or time to get your own adventure. This is one of the reasons we show the essential sharepoint microsoft office document collaboration in action as your friend in spending the time. For more representative collections, this book not only offers it's strategically book resource. It can be a good friend, really good frie...

متن کامل

Using Microsoft Office Infopath to Generate XACML Policies

Today, when organizations perform access control over their resources they are not only interested in the user’s identity, but in other data such as user’s attributes or contextual information. These requirements can be found, for example, in a network access control scenario where end users pay for a specific access level and depending on it, they can get different network quality of service. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Міжнародні відносини, суспільні комунікації та регіональні студії

سال: 2018

ISSN: 2524-2679,2522-1663

DOI: 10.29038/2524-2679-2018-02-30-40