Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse
Ega pea pole prügikast! Tõsta enda õppeedukust ja õpi targalt. Telli VIP ja lae alla päris inimeste tehtu õppematerjale LOE EDASI Sulge

"users" - 240 õppematerjali

thumbnail
40
doc

Veebiteenused (kordamisküsimused ja vastused kontrolltööks)

parsimine lihtsam JSON is much easier for human to read than SIMPLICITY XML. It is easier to write, too. It is also easier XML is simpler than SGML, but JSON is much for machines to read and write. simpler than XML. JSON has a much smaller XML CAN BE USED AS AN EXCHANGE grammar and maps more directly onto the data FORMAT TO ENABLE USERS TO structures used in modern programming MOVE THEIR DATA BETWEEN languages. SIMILAR APPLICATIONS EXTENSIBILITY The same is true for JSON. JSON is not extensible because it does not XML PROVIDES A STRUCTURE TO DATA SO need to be. JSON is not a document markup THAT IT IS RICHER IN INFORMATION

Informaatika → Programmeerimine
55 allalaadimist
thumbnail
724
odt

Windows vene keeles

полномочиями администратора и запустите следующие команды для создания папки, предоставления разрешения NTFS Изменение для группы Пользователи и назначения общего доступа к папке. Так вы продублируете общую папку, созданную на машине Dcsrvl: mkdir C:Files icacls C:Files /grant users:M net share Files=C:Files /GRANT:Users, READ /GRANT:Administrators, FULL /CACHE:None 8. На Dcsrvl ПКМ \nwtmders.msftPublicFiles и примените команду Добавить конечный объект папки (Add Folder Target) (если нажимать не на что, то сначала нажми Обновить). В диалоговом окне

Keeled → Vene keel
3 allalaadimist
thumbnail
1
doc

Side- spikker eksamiks

Nii sildu kui ka marsruutereid nim. sageli lüüsideks (gateway - OSI 4.-7.kihis). Mikroarvutivõrkudes tähendab lüüs siiski tüüpiliselt masinat ja PPPoE, Point-to-Point Protocol over Ethernet, is a network protocol for encapsulating PPP frames inside Ethernet frames. It is used mainly with ADSL services where tarkvara, mis pakuvad kõigile võrgu tööjaamadele tsentraliseeritud ava, mis viib võrgust välja. Lüüse nim. ka andmesideserveriteks. individual users connect to the ADSL transceiver (modem) over Ethernet Marsruutimine koosneb kahest põhilisest komponendist: optimaalse marsruutimistee kindlaksmääramine ja andmepakettide transport ehk kommuteerimine Wifi ruuter ­ 22MHz võtab wifi enda alla

Informaatika → Side
415 allalaadimist
thumbnail
18
docx

The Medium Is the Message

1 The Medium Is the Message In a culture like ours, long accustomed to splitting and dividing all things as a means of control, it is sometimes a bit of a shock to be reminded that, in operational and practical fact,, the medium is the message. This is merely to say that the personal and social consequences of any medium-that is, of any extension of ourselves-result from the new scale that is introduced into our affairs by each extension of ourselves, or by any new technology. Thus, with automation, for example, the new patterns of human association tend to eliminate jobs, it is true. That is the negative result. Positively, automation creates roles for people, which is to say depth of involvement in their work and human association that our preceding mechanical technology had destroyed. Many people would be disposed to say that it was not the machine, but what one did with the machine, that was its meaning or message. In terms of the ...

Keeled → Inglise keel
1 allalaadimist
thumbnail
575
docx

Nimetu

Järgmiseks tuleb anda ligipääs kõigile kasutajatele/kasutajagruppidele keda soovite oma veebile ligi lasta ning keelata ära ligipääs ülejäänutele. Ligipääsu andmiseks või keelamiseks tuleb autorization elemendi sisse lisada allow ja deny alamelemendid vastavalt ligipääsu andmiseks ja keelamiseks. Kasutajale ligipääsu andmiseks või keelamiseks tuleb lisada allow elemendi sisse atribuut users. Näiteks: Annab ligipääsu kasutajale mati. Lisaks sellele on võimalik kasutada ka kahte erimärki * (tärn) ning ? (küsimärk). Tärniga tähistatakse kõiki kasutajaid ning küsimärgiga tähistatakse anonüümseid ehk autentimata kasutajaid. Kuni te autoriseerimisreegleid ei ole kehtestanud kehtivad vaikimise määratud autoriseerimisreeglid, mis annavad ligipääsu kõigile kasutajatele:

Informaatika → Informaatika
32 allalaadimist
thumbnail
184
docx

Andmebaasipõhiste veebirakenduste arendamine Microsoft Visual Studio ja SQL Server’i baasil

Andmebaasipõhiste veebirakenduste arendamine Microsoft Visual Studio ja SQL Server'i baasil C# Tallinn 2011 C# Mõnigi võib ohata, et jälle üks uus programmeerimiskeel siia ilma välja mõeldud. Teine jälle rõõmustab, et midagi uut ja huvitavat sünnib. Kolmas aga hakkas äsja veebilahendusi kirjutama ja sai mõnegi ilusa näite lihtsasti kokku. Oma soovide arvutile selgemaks tegemise juures läheb varsti vaja teada, "mis karul kõhus on", et oleks võimalik täpsemalt öelda, mida ja kuidas masin tegema peaks. Loodetavasti on järgnevatel lehekülgedel kõigile siia sattunute jaoks midagi sobivat. Mis liialt lihtne ja igav tundub, sellest saab kiiresti üle lapata. Mis esimesel pilgul paistab arusaamatu, kuid siiski vajalik, seda tasub teist korda lugeda. Ning polegi loota, et kõik kohe lennult külge jääks!? Selle jaoks on teksti sees koodinäited, mida saab kopeerida ja arvutis tööle panna....

Informaatika → Algoritmid ja andmestruktuurid
42 allalaadimist
thumbnail
18
doc

Valimid kvantitatiivsetes ja kvalitatiivsetes uurimustes

loodusteaduste tundides. [Magistritöö] http://www.google.ee/url? sa=t&rct=j&q=mugavusvalim&source=web&cd=10&ved=0CFYQFjAJ&url=http%3A%2F%2Fwww.ut.ee %2Fbiodida%2Fmagfail%2Fkristi_rikka_bioloogiaop_magtoo2010.pdf&ei=10vcTvq7A4md wbytrCRAQ&usg=AFQjCNFa4Wkos8yMcQvoaYgGnrg5keMJIw&cad=rja (25.03.2012). Rudolph, A.E., Craford, N.D., Latkin, C., Heimer, R., Benjamin, E.O., Jones, K.C., Fuller, C.M. (2011) Subpopulations of Illicit Drug Users Reached by Targeted Street Outreach and Respondent Driven Sampling Strategies: Implications for Research and Public Health Practice. Annals of Epidemiology, Vol.21, No 4, p 280289. Salganik, M.J., Heckathorn, D.D. (2004). Sampling and Estimation in Hidden Populations Using RespondentDriven Sampling. Sociological Methodology, 34, 193239. Salla, KA. (2011) Noorte subkultuur erikoolis kui totaalses asutuses. [Magistritöö]. Tallinna ülikool.

Muu → Teadustöö metoodika
177 allalaadimist
thumbnail
46
docx

Kommunikatsiooni eetika eksami kordamisküsimused

• Media accountability instruments - Any non-state means of making media responsible towards the public. (Bertrand) • Media accountability – voluntary or involuntary process by which the media answer directly or indirectly to their society for the quality and/or consequences of publication (McQuail) • Any informal institution, both offline and online, performed by both media professionals and media users, which intend to monitor, comment on and criticize journalism and seeks to expose and debate problems of journalism: • Eesmärk: • Tagada läbipaistvus • Tagada kvaliteet • Tagada tasakaal meedia ettevõtte erahuvide ja avalike huvide vahel MAI instrumendid: 19 Traditsioonilised: • Pressinõukogud + koodeksid

Meedia → Kommunikatsiooni eetika
38 allalaadimist
thumbnail
15
docx

The Rise and Demise of the New Public Management, 28 10

The Rise and Demise of the New Public Management Wolfgang Drechsler (University of Tartu and Tallinn University of Technology, Estonia) © Copyright: Wolfgang Drechsler 2005 Within the public sphere, the most important reform movement of the last quarter of a century has been the New Public Management (NPM). It is of particular interest in the post-autistic economics (pae) context because NPM largely rests on the same ideology and epistemology as standard textbook economics (STE) is based (for my take on this, see Drechsler 2000), and it has had, and still has, similar results. Already more on the defensive within public administration (PA) than STE is within economics, NPM also shows that such major paradigm shifts in theory and policy may actually happen. In addition, it occasionally appears that pae-oriented scholars have overlooked the fact that some features in public management refo...

Ühiskond → Avalik haldus
16 allalaadimist
thumbnail
102
pdf

Kommunikatsioonimudel

Kurose raamatust lk 436-441, toon ära PPP üldise kirjelduse: As its name implies, the Point-to-Point Protocol (PPP) is a data link layer protocol that operates over a point-to-point link - a link connecting two communicating link-level peers, one on each end of the link The point-to-point link over which PPP operates might be a serial dialup telephone line, a SONET/SDH link, an X.25 connection, or over an ISDN circuit. PPP has become the protocol of choice for connecting home users to their ISP's over a dialup connection. It is instructive to examine the original requirements that the IETF placed on the design of PPP: • Packet framing. The PPP protocol data link layer sender must be able to take a network-level packet and frame (a.k.a encapsulate) it within the PPP data link layer frame such that the receiver will be able to identify the start and end of both the data link frame, and the network layer packet within the frame. • Transparency

Tehnoloogia → Tehnoloogia
16 allalaadimist
thumbnail
62
doc

Kahe inimese kooselu

SISSEJUHATUS........................................................................................................................2 1.TRADITSIOONILINE ABIELU............................................................................................4 Abielu definitsioon.................................................................................................................4 1.1 Abielu reguleerimine Eestis perekonnaseaduse kaudu.....................................................4 1.2 Abiellumise ajalugu Eestis...............................................................................................5 1.3 Abielu traditsioonid ja pulmatavad Eestis........................................................................7 1.4 Abielutüübid...................................................................................................................10 1.5 Hoiakud abielu suhtes..................................

Ühiskond → Ühiskond
19 allalaadimist
thumbnail
32
doc

Network üldiselt

masina.nimi käsk käsu-võtmed kasutaja2 on kasutajanimi teises masinas, kelle õigustes seal tegutsetakse. Sõltuvalt korralduse iseloomust võib väljund esituda ekraanil. Korralduse täitmisele eelneb varemkirjeldatud autentimine. Anname näiteks teises masinas korralduse 'hostname -f' gnoom~$ ssh -l kasutaja2 reptilus.zoo.tartu.ee hostname -f reptilus.zoo.tartu.ee gnoom~$ või korralduse 'w' gnoom~$ ssh [email protected] w 12:10PM up 9 days, 21:18, 8 users, load averages: 0.02, 0.03, 0.00 USER TTY FROM LOGIN@ IDLE WHAT mart tty2 mammal 11:09AM 0:05 bash gnoom~$ Paralleelselt on lubatud kasutada ka konstruktsiooni [email protected]. Mõned programmid, nagu näiteks mc eeldavad, et neile eraldatakse kauges masinas terminal, seda peab näitama võtmega -t gnoom~$ ssh -t [email protected] mc Failide kopeerimine

Informaatika → Arvutiõpetus
86 allalaadimist
thumbnail
40
doc

E-turunduse eksami kordamisküsimused

E-turunduse ja e-kaubanduse alused 2016, kordamisküsimused 1. Kas Internetiturundus ja e-turundus on üks ja seesama? Kui jah, siis kuidas, kui ei, siis miks. E-turundust peetakse laiemaks mõisteks kui Internetiturundust. Viimane tähendab kitsalt just Internetile (veeb, elektronpost) orienteeritud meetmeid. Internetiturunduse puhul on kasutatavaks meediumiks Internet. E-turundus aga hõlmab lisaks ka mobiilse ja muu traadita meediumi kasutamist ning digitaalset kliendiandmete haldamist ja kliendisuhete juhtimist. Digitaalne keskkond ei koosne enam ammu ainult klassikalistest veebirakendustest ja elektronpostipõhisest kommunikatsioonist. Lisandunud on mitmesugused mobiilsed personaliseerimise (NFC, QR-koodid) tehnoloogiad ning asukohapõhised (GPS) teenused. Nende puhul on Internet käsitletav vaid puhtalt andmevahetuskanalite komplektina, turundustegevus ise toimub kommunikatsioonimudeli järgmisel, kõrgemal kihil. Seetõttu on mõistlik...

Majandus → Turundus
52 allalaadimist
thumbnail
555
doc

Programmeerimiskeel

psychotic PARRY (at Stanford) discusses its problems with the Doctor (at BBN)  Two important programming concepts introduced:  The first object-oriented language Smalltalk developed at XEROX PARC, bsaed on ideas by Alana Kay.  The first logic programming language Prolog developed by Alan Colmerauer at University of Marseilles  Hewlett-Packard introduces a programmable calculator with a magnetic stripe memory for storing programs.  Users could write programs up to 100 lines in length and record them on blank cards, or they could buy pre-programmed cards.  In 1975 it is used on Soyuz-Apollo mission for calculating critical course-correction maneuvers. 1973  Intel files a patent application for a "memory system for a multichip digital computer".  The first prototype Alto workstation computer is turned on at Xerox' Palo Alto Research Center

Informaatika → Infotehnoloogia
148 allalaadimist
thumbnail
19
pdf

Strateegiline juhtimine kordamisküsimused

x Võimendamaks olemasolevaid ressursse ja võimekusi. x Mandaadi moodustamine x Kulude minimeerimine x Strateegilise positsiooni saavutamine Näited: x Microsoft + Nokia: Windows'i tarkvara Nokia telefonidele. x Facebook + Skype: In July 2011, Facebook announced a strategic alliance with Skype, which had been recently acquired by Microsoft. This allowed Microsoft to quickly move into the social networking space, Skype received access to a large number of new users and Facebook could leverage Skype's technology to enable video chat without making the investment in building it. x Star Alliance: the world's first and largest global airline alliance. Star Alliance has since grown considerably and now has 28 member airlines with more than 21,100 daily departures combined. These flights reach 1,356 airports in 193 countries, with an annual passenger number of 678.5 million. Globaalne ja piiriülene liit (motivatsioon ja eelised)

Haldus → Strateegiline juhtimine
290 allalaadimist
thumbnail
14
doc

Suurbritannia ühiskond ja kultuur konspekt

1. Ancient Britain: the Celtic tribes. 2000 years ago there was an Iron Age Celtic culture throughout the Br Isles. It seems that the Celts, who had been arriving from Europe from the 8th cent BC onward, intermingled with the peoples who were already there. The Celts were extremely talented people, creative and artistic. More than 1 Celtic tribe invaded Br. The descendants of ancient Celts live in Wales, Scotland, Cornwall and Ireland. They lived in primitive society. Druids ­ priests, more powerful than chiefs. Acted like prophets. 2. Stonehenge From prehistoric period. Was built on Salisbury plain between 2500 and 1500 bc. One of the most famous and mysterious archaeological sites in the world. One of the mysteries is how it was built at all with the technology of the time. Another is its purpose. It appears to function as a kind on astronomical clock and we know it was used by the Druids for ceremonies marking the passing ...

Kultuur-Kunst → Suurbritannia ühiskond ja...
71 allalaadimist
thumbnail
120
doc

Lühendite seletus

FK Foreign Key FLA Four Letter Acronym FLC Ferro-electric Liquid Crystal FLD Field FLIR Forward Looking Infrared (system) FLL FoxPro Link Library [Microsoft Fox Pro] FLOPS Floating Point Operations Per Second .FLR Folder (file name extension) FLV Flash Video FM Frequency Modulation FMD Fluorescent Multilayer Disk FMRI Functional Magnetic Resonance Imaging FMS Forms Management System FMT Format FMV Full Motion Video FNT Font FOCUS Forum of Control Data Users FOD Fax On Demand FOG First Osborne Group FOIP Fax Over Internet Protocol FOIRL Fiber Optic Inter Repeater Link [IEEE] FOLDOC Free On-Line Dictionary Of Computing FOM Fiber Optics Modem .FON Font + Phone + Phone Directory (all file name extensions) .FOR Fortran source code (file name extension) FORTH (Programming Language)(See HLL) FORTRAN Formula Translator (Programming Language)(See HLL) FOSE Federal Office Systems Exposition

Informaatika → Informaatika
117 allalaadimist
thumbnail
81
doc

Andmebaaside programmeerimine

TALLINNA TEHNIKAÜLIKOOL Infotehnoloogia teaduskond Informaatikainstituut Infosüsteemide õppetool Online Restoran Andmebaaside programmeerimine IDU0120 Juhendaja: Erki Eessaar Tallinn 2011 Sisukord SISUKORD 4 SISSEJUHATUS 8 1. STRATEEGIA ETAPP............................................................................................................ 9 1.1 TERVIKSÜSTEEMI ÜLDVAADE.................................................................................................... 9 1.1.1 ORGANISATSIOONI EESMÄRGID................................................................................................ 9 1.1.2 INFOSÜSTEEMI EESMÄRGID................................................................................

Informaatika → Andmebaaside projekteerimine
263 allalaadimist
thumbnail
62
doc

Energy - põhjalik referaat energiast

Roughly seventy percent of the reactors operating in the U.S. are PWR. Nuclear reactors are basically machines that contain and control chain reactions, while releasing heat at a controlled rate. In electric power plants, the reactors supply the heat to turn water into steam, which drives the turbine-generators. The electricity travels through high voltage transmission lines and low voltage distribution lines to homes, schools, hospitals, factories, office buildings, rail systems and other users. 12.4 Nuclear power and the environment Compared to electricity generated by burning fossil fuels, nuclear energy is clean. Nuclear power plants produce no air pollution or carbon dioxide but a small amount of emissions result from processing the uranium that is used in nuclear reactors. Like all industrial processes, nuclear power generation has by-product wastes: spent (used) fuels, other radioactive waste, and heat. Spent fuels and other radioactive wastes are the

Keeled → Inglise keele foneetika ja...
18 allalaadimist
thumbnail
228
pdf

Kuidas muudab mudelprojekteerimine teraskonstruktsioonide valmistamist ja ehitamist

301. These are not standalone contracts, but have to be attached to the owner-contractor or owner-architect agreements. E202 establishes the requirements for model content at five progressive levels of development and the authorized uses of the model content at each level of development. This document assigns authorship of each model element by project phase, much like Appendix 1. of the Estonian BIM guidelines. In addition, E202 defines the extent to which model users may rely on model content, clarifies model ownership, sets forth BIM standards and file formats and provides scope of responsibility for model management from the beginning to the end of the project. The purpose of AIA Document E201 is to establish the procedures parties agree to follow with respect to the transmission or exchange of data. The central idea of AGC’s ConsensusDOCS 301 is that the contractual relationships

Ehitus → Ehituskonstruktsioonid
23 allalaadimist
thumbnail
25
docx

Eksami küsimuste põhjalikud vastused

Minitel // 100,000 hosts connected to confederation of networks. 1990, 2000's: commercialization, the Web, new apps: Early 1990's: ARPAnet decommissioned // early 1990s: Web hypertext [Bush 1945, Nelson1960's] // HTML, HTTP: Berners-Lee // 1994: Mosaic, later Netscape // late 1990's: commercialization of the Web // Late 1990's ­ 2000's: more killer apps: instant messaging, peer2peer file sharing (e.g.,Napster), network security to forefront, est. 50 million host, 100 million+ users // backbone links running at Gbps 12. MIDA ERINEVAD RAKENDUSED NÕUAVAD VÕRKUDELT ==> Kui kaks rakendust asuvad ühes arvutis kasutatakse omavaheliseks suhtlemiseks operatsioonisüsteemi. Kui aga andmevahetus toimub üle võrgu, siis vajatakse rakenduskihi protokolle. Rakendused nõuavad kahetasemelist adresseerimist: IP-aadressi ja pordi kaudu. /////// ==> Rakenduse jaoks võrku iseloomustavad parameetrid: Andmete kadu- see võib olla

Informaatika → Arvutivõrgud
410 allalaadimist
thumbnail
52
docx

Kommunikatsiooni eksami küsimuste põhjalikud vastused

networks. 1990, 2000’s: commercialization, the Web, new apps: Early 1990’s: ARPAnet decommissioned // early 1990s: Web hypertext [Bush 1945, Nelson1960’s] // HTML, HTTP: Berners-Lee // 1994: Mosaic, later Netscape // late 1990’s: commercialization of the Web // Late 1990’s – 2000’s: more killer apps: instant messaging, peer2peer file sharing (e.g.,Napster), network security to forefront, est. 50 million host, 100 million+ users // backbone links running at Gbps 12. MIDA ERINEVAD RAKENDUSED NÕUAVAD VÕRKUDELT ==> Kui kaks rakendust asuvad ühes arvutis kasutatakse omavaheliseks suhtlemiseks operatsioonisüsteemi. Kui aga andmevahetus toimub üle võrgu, siis vajatakse rakenduskihi protokolle. Rakendused nõuavad kahetasemelist adresseerimist: IP-aadressi ja pordi kaudu. /////// ==> Rakenduse jaoks võrku iseloomustavad parameetrid: Andmete kadu-

Tehnoloogia → Tehnoloogia
18 allalaadimist
thumbnail
59
pdf

ETTEVÕTTE MAKSEVÕIME PARENDAMINE

and air conditioners concerning the period to be studied compiled by the Statistical Office of Estonia are used for the analysis and the different indexes of AS Even of different years are compared and representative calculations are made. In order to get a better overview, the indexes are concentrated in charts and a graphic presentation of data has been used. In the first part of the Bachelor's thesis the nature and the users of the analysis of solvency was studied. An overview of the sources of information of the analysis, the different types of the analysis, and the phases of the compilation of the analysis was given. It was found that the primary foundation material of the analysis comprises the financial statements of the enterprise including in the annual report of the enterprise and, in turn, composed of a balance sheet, a profit and loss statement, a statement of cash flows and annexes thereto. It

Majandus → Finantsjuhtimine
415 allalaadimist
thumbnail
101
pdf

Projektipersonali juhtimine konspekt

John Wiley & Sons, Inc. Bell, B.S. Kozlowski, S.W. A typology of virtual teams. Group & Organization Management, March 2002, Vol. 27(1), pp.14-49. Brewster, C., Mayrhofer, W., Morley, M. 2004. Human Resource Management in Europe: Evidence of Convergence? Elsevier. Brod, C. 1984. Technostress: the Human Cost of the Computer Revolution, Addison- Wesley, Reading, MA. - Sami, L.K., Pangannaiah, N.B. ``Technostress'': A Literature Survey on the Effect of Information Technology on Library Users. Library Review, 2006, Vol. 55 No. 7, pp. 429-439, vahendusel. Chakravarthy, B., Gargiulo, M. Maintaining Leadership Legitimacy in the Transition to New Organisational Forms. Journal of Management Studies, Vol.35, No.4, pp.437-456 ­ Mayrhofer, W., Morley, M., Brewster, C. 2004. Convergence, Stasis, or Divergence? Human, Resource Management in Europe: Evidence of Convergence? Elsevier, vahendusel. Clegg, S.R. 1990. Modern Organizations: Organizational Studies in the Post Modern World. Sage

Sotsioloogia → Organisatsioon ja juhtimine
111 allalaadimist
thumbnail
63
docx

Andmeturve konspekt / kokkuvõte

et ise ka enam oma süsteemidest aru ei saa Mõned suured prohmakad uskumises · Marcus Ranum: ­ Default permit - vaikimisi lubame, keelame vajadusel (tuleks toimida vastupidi) ­ Enumerating badness - keelame halvad asjad (nt antiviirus) ­ Penetrate and patch - lubame kellelgi sisse murda ning paikame ära avastatud turvaaugud ­ Hacking is cool - kuritegelik ­ Action is better than inaction - liigne agarus on ogarus ­ Educating users solves problem - kindlasti muutub olukord paremaks, aga pahalased on kavalad ning kasutaja ei peagi tingimata midagi valesti tegema ­ We are not a target - kes meid ikka ründab? Botid jms ei pruugi eristada ­ Everyone would be secure if they all just ran Z - nt Win 10 saadab kahtlased failid põhjalikumaks uurimiseks pilve (turvaauk on lahendusse sisseehitatud) ­ We don't need a firewall, we have good host security - kogu võrgu kohta puudub ülevaade, ründaja katsetab igat masinat eraldi

Informaatika → Andmeturbe alused
32 allalaadimist
thumbnail
21
pdf

Suhted laste ja vanematega

she would have gone to school yesterday. 8A The Internet page 65 1 1 networking 6 launched 2 late 7 protests 1 words down: desktop, operating 3 users 8 options 8F Discussion page 71 system, web browser, back button, 1 1 a completely b couldn't 4 website 9 opt out document, address bar, wireless 2 a think b see

Inimeseõpetus → Inimeseõpetus
16 allalaadimist
thumbnail
109
pdf

Integration of Lean Con. and Building Information Modelling

Therefore, it is essential to educate people in the private sector and students at universities in the matter of BIM and its benefits and obstacles. Lack of training is the main reason why BIM is not being made significant use of in the Estonian construction industry. As BIM requires a new way of thinking, people with a steep learning curve must be committed and passionate in a collaborative environment to be successful BIM users. The author of this thesis argues that a comprehensive use of BIM should be the first step in the near future to improving productivity in the Estonian construction industry. 58 CHAPTER 5- INTEGRATION OF LEAN CONSTRUCTION AND BUILDING INFORMATION MODELLING In the first chapter, the main problems connected with the construction industry were discussed, more

Ehitus → Ehitusjuhtimine
70 allalaadimist
thumbnail
49
doc

Kaasaegse ergonoomika alused

workers of different ages during a 2-year educational program. Læring og forandring ­ veden til et bedre arbeidsmiljø? Denmark, Nyborg. 1999. ISBN 87-987551-0-2. O´Leary, D. E. Knowledge management systems: converting and connecting. IEEE Intelligent Systems. 1998 May-June. Pp. 30-33. Oxford English Dictionary, 2nd ed. Oxford. 1991. Clarendon. Vol. 5. Sarafino, E. P. Health Psychology. 2nd ed. N. Y. John Wiley. 1994. Smith, A. Human Computer Factors: A Study of Users and Information Systems. L. McGraw Hill. 1997. Van Bezoojien, C. F. A. Biological ageing, theoretical ageing, age-associated diseases and their interventions. Ageing and Work. Hague, 1996. ISBN 90-803145-1-X. Vahlens Groes Wirtschaftslexikon. Franz Vahlen. 1987. Bd. 1. Watson, J., Richardson, S. J. Modelling the world to the production engineer and the palce of ergonomics within it ­ a case study. From Experience to Innovation. IEA '97. Helsinki. 1997. Vol. 2. Pp. 261-263.

Ergonoomika → Ergonoomika
48 allalaadimist
thumbnail
144
docx

Arvutivõrkude eksami konspekt

(now performed by IP). IP was seperated when it was realised that passing data around while trying to find the real host was unreasonable. This was all researched by DARPA. Meanwhile ALOHAnet was being developed in Hawaii. It was a packet-based radio network that allowed multiple remote sites communicate with one another (islands and all that). ALOHA protocol was the first multiple-access protocol to allow users to share a single broadcast communication medium while being in random locations (radio freq). The research was later used while developing the Ethernet protocol. Ethernet protocol was supposed to connect multiple PCs, printers etc, meaning they were pretty much trying to develop LAN. 1980-90 The number of hosts connected to ARPAnet was around 200. The 80s was a period of rapid growth, much of that a direct result of several efforts to connect several universities. BITNET

Informaatika → Arvutivõrgud
41 allalaadimist
thumbnail
95
pdf

Projektijuhtimise e-konspekt

graduate paper. 60 In conclusion the objective of post-graduation paper was completed. It is possible to divide project management knowledge into small modules, describe them with metadata and reuse learning objects. The modulation succeeded because the main knowledge source PMI PMBOK Guide is well structured. That book provides a good overview of Project Management field, without forcing users to read deep details of some method. In process of making the real learning objects transpired that it is reasonable to make small changes in activity tree. It included the capacity and content of modules to improve reusability but in top levels the structure stayed unchangeable. The metadata database (supporting product of post-graduation paper) is usable in other courses and training materials design. It helps to reuse of learning objects maid for one course to in other. In

Informaatika → Infosüsteemi projekteerimine
39 allalaadimist
thumbnail
574
pdf

The 4-Hour Body - An Uncommon Guide to Rapid Fat-Loss, Incredible Sex, and Becoming Superhuman - Timothy Ferriss

Use this site to find BodPod assessment centers, which are located in almost all 50 states. BodyMetrix (www.fourhourbody.com/bodymetrix) The hand-held BodyMetrix device uses ultrasound to measure body composition down to the millimeter. For those with the means, it is an outstanding option and my default choice. Escali Bio-impedance Scale (www.fourhourbody.com/escalibio) Escali's bio-impedance scale measures weight and percentage of bodyfat for up to 10 users. Slim Guide Skinfold Calipers (www.fourhourbody.com/slimguide) These are the most widely Slim Guide Skinfold Calipers (www.fourhourbody.com/slimguide) These are the most widely used calipers in the world. They're low-cost, but accurate enough for professional use. Be sure to include at least one leg measurement in all calculations. Cosmetic Fat vs. Evil Fat--How to Measure Visceral Fat (www.fourhourbody.com/evil) Ever

Keeled → Inglise keel
15 allalaadimist
thumbnail
91
doc

Exeli õpetus

eraldi märkimisi tegema ei pea. Siin on hästi näha, et tühje lahtreid arvestusse ei kaasata (Ignore blank). Printimisel need punased rõngakesed ei tule! Töölehe ja töövihiku kaitse Siinses peatükis tutvustamisele tulevad keelud-võimalused asuvad kahes kohas: 1. Kodu ­ Lahtrite vormindamine (Ctrl+1) 2. Läbivaatus ­ Kaitse lehte o Protect Sheet o Allow Users to Edit Ranges o Protect Workbook o Protect and Share Workbook Alustan sellest, kuidas piirata töölehel tehtavaid võimalusi. Algselt on kõik lahtrid lukus (Locked). Tõsi küll, see lukus olemine rakendub alles siis, kui oled menüüst klõpsanud Tools>Protection>Protect Sheet ja teinud siin soovitud täiendused, näidates mida töölehel kaitsed. Võimalik on panna ka piirangute sisse-välja lülitamine parooli alla.

Informaatika → Informaatika
208 allalaadimist
thumbnail
239
xls

Tõmbeomadused kuumutamisel

Test Type Tension Method Name C:Documents and SettingsAll UsersDocumentsInstronBluehillTemplatesInstron Example Sample name C:Documents and SettingsAndres KrummeDesktopAlina,Olga,Inga,wool_1,is_tens User Sample note 1 Sample note 2 Sample note 3 Geometry Fiber Specimen 1 Specimen label Width 10,000000000 mm Thickness 1,000000000 mm Length 20,000000000 mm Diameter 10,000000000 mm Inner diameter 8,000000000 mm Outer diameter 10,000000000 mm Wall thickness 1,000000000 mm Area 0,100000000 cm^2 Linear density 22,200000000 dtex Sled weight 10,000000000 N Loading span 10,000000000 mm Support span 100,000000000 mm Span ratio 2 Fixture type 4-point Included Final...

Materjaliteadus → Kiuteadus
6 allalaadimist
thumbnail
159
doc

Kultuurialaste veebisaitide kvaliteedikäsiraamat

gov.uk/assetRoot/04/00/09/20/04000920.pdf 155 Quick: the Quality information checklist (Informatsiooni kvaliteedi kontroll- nimestik). http://www.hfht.org/chiq/Quick/docs/index.html QUIS. Questionnaire for user interaction satisfaction (Kasutaja interaktsiooniga rahulolu ankeet) http://www.lap.umd.edu/QUIS/index.html SUMI Standard evaluation questionnaire for assessing quality of use of software by end users (Lõppkasutajate tarkvara kvaliteedi hindamise standardankeet). http://www.ucc.ie/hfrg/questionnaires/sumi/index.html Tillman, Hope N., Evaluating quality on the Net (Veebikvaliteedi hindamine), märts 2003 www.hopetillman.com/findqual.html 4. Universaalne projekteerimine The Center for Universal Design ­ Universal Design Manifesto. Universaalse Projekteerimise Keskuse projekteerimise üldpõhimõtete manifest. http://www.design.ncsu.edu:8120/cud/univ_design/princ_overview.htm

Kultuur-Kunst → Kultuurilugu
4 allalaadimist
thumbnail
946
pdf

TheCodeBreakers

What had they accomplished? They had achieved some remarkable technical successes, and for some that was enough. Kunze and the other mathematicians usually lost interest in a problem after its cryptanalytic difficulties had been surmounted. Even the codebreakers who were interested in their influence on their country's policy could rarely learn anything about it: the diplomats seldom told them, and Selchow stood between them and the users. Moreover, the effects were diffused over many messages, commingled with other sources of information, distorted by Nazi preconceptions, so that it was virtually impossible to single out cryptanalyzed information as critical in a specific event. Finally, and most important, Germany lost the war, reducing all the Pers z efforts in the final analysis to nullity. "As I am accustomed to say," said Schauffler, "a bridge builder can see what he has done for his countrymen, but we

Informaatika → krüptograafia
14 allalaadimist
thumbnail
115
pdf

Student World Atlas (Maailma atlas)

Source IM I Telecommunicat ion Unton IC n eed . Also , au thoritaria n govern me nts may anem p[ to lirrur [h e use o f co m puters, feanng the un resrrtcred acc ess to glo bal in fo rm s n on [ ha c email and [he Intern et offer. Internet Users, 2001 u.s. 142,823,000 J ap an 57,900,000 China 33,700 ,000 Germ any 30,000,000 South Korea 24,380 ,000

Geograafia → Geograafia
97 allalaadimist
thumbnail
402
pdf

CPM1A Programmable Controllers Operation Manual 1784470

ÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁ PERFORMANCE DATA ÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁ ÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁ Performance data given in this manual is provided as a guide for the user in determining suitability and does not constitute a warranty. It may represent the result of OMRON’s test conditions, and the users ÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁ must correlate it to actual application requirements. Actual performance is subject to the OMRON ÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁ Warranty and Limitations of Liability. ÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁ ÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁ ERRORS AND OMISSIONS

Tehnika → Automatiseerimistehnika
9 allalaadimist
thumbnail
548
pdf

Cialdini raamat

Certain people were instrumental at the beginning stages. John Staley was the first publishing professional to recognize the project's potential. Jim Sherman, Al Goethals, John Keating, Dan Wagner, Dalmas Taylor, Wendy Wood, and David Wat- son provided early, positive reviews that encouraged author and editors alike. My editors at Allyn and Bacon, Michelle Limoges and Liz Napolitano, were consistently congenial, helpful, and insightful. I would like to thank the following users of the book for their feedback during a telephone survey: Emory Griffin, Wheaton Col- lege; Robert Levine, California State, Fresno; Jeffrey Lewin, Georgia State Univer- sity; David Miller, Daytona Beach Community College; Lois Mohr, Georgia State University; and Richard Rogers, Daytona Beach Community College. The past edi- tions benefited substantially from the reviews of Assaad Azzi, Yale University; Robert M. Brady, University of Arkansas; Brian M. Cohen, University of Texas at

Psühholoogia → Psühholoogia
24 allalaadimist
thumbnail
580
pdf

CHANGE YOUR THINKING CHANGE YOUR LIFE

thereby doubling and tripling their outputs. ➤ Technological Advances The explosion in technology and high-speed computers is literally breathtaking. Today, you can e-mail a message around the world to dozens, hundreds, or even thousands of people simultaneously, in a matter of seconds, at a cost of pennies. The World Wide Web gives you access to tens of millions of other Internet users, as well as to the accumulated knowledge stored in more than 50,000 libraries and research institutes. Instantaneous transmission of data enables the money markets to move a trillion dollars per day, sometimes in seconds, making it impossible for countries to control their curren- cies, much less their economies. In the twenty-first century, you will own a laptop computer with

Keeled → Inglise keel
19 allalaadimist
thumbnail
1168
pdf

Liha töötlemine

wiley.com/ wiley-blackwell. Authorization to photocopy items for internal or personal use, or the internal or personal use of specific clients, is granted by Blackwell Publishing, provided that the base fee is paid directly to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For those organizations that have been granted a photocopy license by CCC, a separate system of payments has been arranged. The fee codes for users of the Transactional Reporting Service are ISBN-13: 978-0-8138-2182-5/2010. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor men- tioned in this book. This publication is designed to provide accurate and authoritative information in

Keeled → Inglise keel
21 allalaadimist


Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun