ЕЛЕКТРОННЕ НАВЧАННЯ ЗАСОБАМИ MICROSOFT OFFICE 365
نویسندگان
چکیده
منابع مشابه
Bimanual Interaction on the Microsoft Office Keyboard
The Office Keyboard (on store shelves in major markets since October, 2001) seeks to enhance efficiency through unique application of bimanual interaction principles. The left hand performs navigation tasks (including view scrolling, application switching, and internet forward & back) as well as editing commands (Cut, Copy, and Paste) that are typically part of a compound mouse-keyboard action....
متن کاملEvaluation of the Microsoft office familiarity of the medical students of Hormozgan Medical University in 2006
The ability to access, evaluate and use information in each profession is one of the most effective materials of individual success. Accessing updated medical information is vital for physicians (1-5). In a descriptive cross sectional study performed in Bandar Abbas, the capital city of Hormozgan province in the southern part of Iran. Data the internet and computer usage was examined among m...
متن کاملPreventing Exploits in Microsoft Office Documents Through Content Randomization
Malware laden documents are a common exploit vector, often used as attachments to phishing emails. Current approaches seek to detect the malicious attributes of documents through signature matching, dynamic analysis, or machine learning. We take a different approach: we perform transformations on documents that render exploits inoperable while maintaining the visual interpretation of the docume...
متن کاملEssential SharePoint - Microsoft office document collaboration in action
Reading a book is also kind of better solution when you have no enough money or time to get your own adventure. This is one of the reasons we show the essential sharepoint microsoft office document collaboration in action as your friend in spending the time. For more representative collections, this book not only offers it's strategically book resource. It can be a good friend, really good frie...
متن کاملUsing Microsoft Office Infopath to Generate XACML Policies
Today, when organizations perform access control over their resources they are not only interested in the user’s identity, but in other data such as user’s attributes or contextual information. These requirements can be found, for example, in a network access control scenario where end users pay for a specific access level and depending on it, they can get different network quality of service. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Міжнародні відносини, суспільні комунікації та регіональні студії
سال: 2018
ISSN: 2524-2679,2522-1663
DOI: 10.29038/2524-2679-2018-02-30-40