Resultados de búsqueda - "syntax"
Dewey Classification dentro de su búsqueda.
Dewey Classification dentro de su búsqueda.
Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Grammar, Comparative and general 4
- Syntax 3
- Database management 2
- Generative grammar 2
- Language morphology 2
- Morphology and lexis 2
- Bantu syntax 1
- Business 1
- Computer literacy 1
- Computer programming 1
- Computer software 1
- Database design 1
- Databases 1
- Electronic data processing 1
- English syntax 1
- English-Swahili language 1
- Information technology 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Morphology 1
- Language Arts & discipline / Linguistics / Syntax 1
- Language analogy 1
- Language theories 1
- Linguistics 1
- Management information systems 1
- Microsoft Windows NT 1
- NetWare (Computer file) 1
- Nouns in sheng 1
- Sheng 1
- Sheng grammar 1
- Sheng phonolgy 1
- Sheng styles 1
-
1
Syntax : a generative introduction /
Publicado 2013Materias: “…Language Arts & discipline / Linguistics / Syntax.…”
Libro -
2
-
3
An introduction to syntax /
Publicado 2001Enlace del recurso
Enlace del recurso
Enlace del recurso
Libro -
4
-
5
-
6
-
7
Structural infuluence of Sheng on Kiswahili language : text book of African linguistics /
Publicado 2012Materias: Enlace del recurso
Libro -
8
-
9
Database systems : introduction to databases and data warehouses /
Publicado 2014Tabla de Contenidos: “…Note continued: JOIN without Using a Primary Key/Foreign Key Combination IS NULL EXISTS NOT Inserting from a Query Other SQL Functionalities A Note About Inappropriate Use of Observed Values in SQL A Note About SQL Standard and SQL Syntax Differences SQL Syntax Difference Note 1: DATE and TIME Data Types SQL Syntax Difference Note 2: FOREIGN KEY SQL Syntax Difference Note 3: Usage of AS Keyword with Aliases SQL Syntax Difference Note 4: ALTER TABLE SQL Syntax Difference Note 5: Set Operators SQL Syntax Difference Note 6: FULL OUTER JOIN SQL Syntax Difference Note 7: Constraint Management SQL Syntax Difference Note 8: GROUP BY Key Terms Review Questions Exercises Mini Cases ch. 6 Database Implementation And Use Introduction Referential Integrity Constraint: Delete and Update Implementation Options Delete Options Update Options Implementing Delete and Update Options. …”
Libro -
10
-
11
Database management systems : designing and building business applications /
Publicado 1999Tabla de Contenidos: “…Introduction 2 (23) PART 1 Systems Design 25 (98) Database Design 26 (37) Data Normalization 63 (60) PART 2 Queries 123 (66) Data Queries 124 (33) Advanced Queries and Subqueries 157 (32) Appendix: SQL Syntax 187 (2) PART 3 Applications 189 (132) Forms and Reports 190 (41) Calculations and Data Manipulation 231 (46) Appendix: Introduction to Programming 267 (10) Application Development 277 (44) Appendix: Database Applications in Visual Basic 310 (11) PART 4 Database Administration 321 (60) Physical Design 322 (29) Database Administration 351 (30) PART 5 Distribution and Integration of Data 381 (63) Distributed Databases and the Internet 382 (36) Appendix: Introduction to Oracle PL/SQL 412 (6) Object-Oriented Databases and Integrated Applications 418 (26) APPENDIX 444 (39) Database Projects 444 (39) Glossary 483 (17) Index 500…”
Libro -
12
-
13
Fluency with information technology : skills, concepts & capabilities /
Publicado 2004Tabla de Contenidos: “…Overview: Programming Concepts.Names, Values, and Variables.A Variable Declaration Statement.Three Basic Types of JavaScript.The Assignment Statement.An Expression and its Syntax.A Conditional Statement.The Espresso Program.19. …”
Libro -
14
Software engineering : a programming approach /
Publicado 2000Tabla de Contenidos: “…200 (1) Formal development: a case study 201 (7) The role of formal development 208 (1) Summary 209 (6) Exercises 210 (1) Answers to self test questions 211 (1) Further reading 211 (4) Part D Programming paradigms The programming language 215 (50) Introduction 215 (1) Design principles 216 (2) Language syntax 218 (3) Control abstractions 221 (6) Data types and strong typing 227 (11) Procedural abstraction 238 (5) Abstract data types 243 (6) Programming in the large 249 (7) The role of programming languages 256 (2) Summary 258 (7) Exercises 258 (2) Answers to self test questions 260 (4) Further reading 264 (1) Object-oriented programming (OOP) 265 (21) Introduction 265 (1) Encapsulation 265 (2) Classes 267 (1) Creating objects 268 (1) Constructor methods 269 (1) Destructor methods 270 (1) Class or static methods 270 (1) Inheritance 271 (3) Single versus multiple inheritance 274 (1) Polymorphism 274 (1) Event-driven programming 275 (1) Case study -- a complete Java program 276 (4) The role of OOP 280 (1) Summary 281 (5) Exercises 282 (2) Answers to self test questions 284 (1) Further reading 285 (1) Concurrent programming 286 (35) Introduction 286 (2) Independent threads 288 (3) Dying and killing 291 (1) The state of a thread 292 (1) Scheduling and thread priorities 293 (1) Mutual exclusion 293 (3) Thread interaction 296 (5) The producer--consumer problem 301 (11) Interruptions 312 (1) Deadlock 313 (1) Conclusions 314 (2) Summary 316 (5) Exercises 316 (2) Answers to self test questions 318 (2) Further reading 320 (1) Functional programming 321 (17) Introduction 321 (1) Procedural languages 322 (2) Characteristics of functional programming 324 (7) Other functional languages 331 (2) The role of functional programming 333 (2) Summary 335 (3) Exercises 336 (1) Answers to self test questions 337 (1) Further reading 337 (1) Logic programming 338 (17) Introduction 338 (2) Facts and rules 340 (2) Execution mechanisms 342 (6) Prolog in use 348 (2) Conclusions 350 (1) Summary 351 (4) Exercises 352 (1) Further reading 352 (3) Part E Implementation Software tools 355 (17) Introduction 355 (1) Tools for programming 356 (1) Not programming tools 357 (1) Examples of tools 357 (8) Discussion 365 (1) Application development tools 365 (4) The physical environment 369 (1) Summary 370 (2) Exercises 371 (1) Answers to self test questions 371 (1) Further reading 371 (1) Verification 372 (24) Introduction 372 (1) The nature of errors 373 (1) The problem of testing 374 (1) Black box (functional) testing 375 (2) White box (structural) testing 377 (2) Walkthroughs and inspections 379 (3) Other testing strategies 382 (1) Discussion 383 (2) System (integration) testing 385 (1) Bottom-up testing 386 (1) Top-down development 387 (3) Summary 390 (6) Exercises 391 (2) Answers to self test questions 393 (2) Further reading 395 (1) Softwar fault tolerance and exceptions 396 (22) Introduction 396 (3) Fault detection by software 399 (3) Fault detection by hardware 402 (3) Dealing with damage 405 (2) Exceptions and exception handlers 407 (3) Recovery blocks 410 (3) N-version programming 413 (1) The role of fault tolerance 414 (1) Summary 414 (4) Exercises 415 (2) Answers to self test questions 417 (1) Further reading 417 (1) Software metrics and quality assurance 418 (12) Introduction 418 (1) Complexity metrics 419 (3) Faults and reliability -- estimating bugs 422 (1) Software quality 423 (2) Quality assurance 425 (1) Process improvement 426 (1) The capability maturity model (CMM) 426 (1) Summary 427 (3) Exercises 428 (1) Answers to self test questions 429 (1) Further reading 429 (1) Project management 430 (19) Introduction 430 (1) The challenge of project management 431 (1) The ingredients of project management 431 (1) Cost estimation 432 (2) Team organization 434 (7) Selecting tools and methods 441 (1) Introducing new methods 442 (1) The project plan 442 (1) Peopleware 443 (1) Summary 444 (5) Exercises 444 (1) Further reading 445 (4) Part F Review Review 449 (14) Introduction 449 (1) Assessing and comparing development methods 450 (2) Software tools 452 (1) Software re-usability 452 (1) The current state of methods 452 (1) A single development method? …”
Libro -
15
Netware to Windows NT complete /
Publicado 1998Tabla de Contenidos: “…66 (2) Single Point of Access to Network Resources 68 (1) Internetworking: Transport Protocol 69 (1) Interoperability: Service Protocol 69 (1) Security 70 (1) Maintenance 71 (1) Training 71 (1) Terminology 72 (1) Network Traffic 73 (1) File System Backup 74 (1) Complete Migration 74 (29) Getting All the Systems to Work Together 75 (1) The OSI Reference Model 75 (28) Chapter 3 Protocol Integration 103 (82) Chapter Objectives 104 (1) An Overview of the Communication Process 104 (1) An Analogy 105 (1) Addressing 106 (23) The Open Systems Interconnection (OSI) Reference Model 108 (2) The Physical Layer 110 (2) The Data Link Layer 112 (4) The Network Layer 116 (3) The Transport Layer 119 (1) The Session Layer 120 (2) The Presentation Layer 122 (2) The Application Layer 124 (2) The Complete OSI Model 126 (2) A Trekky Analogy 128 (1) Comparing Novell and Microsoft Networking Protocols 129 (1) Novell Netware Protocols 130 (10) Internetwork Packet eXchange (IPX) 135 (1) Sequenced Packet eXchange (SPX) 135 (1) Netware Core Protocol (NCP) 136 (1) Netware IP 137 (1) The Netware IP Client Architecture 137 (1) Routing Information Protocol (RIP) 138 (1) Netware Link State Protocol (NLSP) 138 (1) Service Advertising Protocol (SAP) 138 (1) Network Basic Input Output System (NetBIOS) 139 (1) Netware Remote Procedure Call (RPC) 139 (1) Apple Talk 139 (1) The NetWare Communication Process in Action 140 (1) Windows NT Networking Protocols 140 (5) Network Device Interface Specification (NDIS) 144 (1) Transport Level Protocols 145 (40) NetBIOS Extended User Interface (NetBEUI) 145 (2) NBF Limitation 147 (1) NWLink Internetwork Packet eXchange (NWLink IPX or NetWare Link Protocol) 147 (3) NetBIOS in TCP/IP (NBT) 150 (3) Transport Driver Interface (TDI) 153 (32) Chapter 4 Client Connectivity 185 (150) Chapter Objectives 186 (1) Overview of Multiplatform Connectivity from a Client Perspective 187 (2) Client Connectivity in a Heterogeneous Network Environment 189 (16) DOS/Windows Connectivity Options 189 (1) Installing the DOS/Windows 3.x Netware Client Drivers 190 (1) Supporting Multiple Protocol Stacks 190 (5) Connecting the DOS/Windows Client to NetWare and Windows NT 195 (1) NET Command Syntax 196 (1) Accessing NT Server Drives 197 (1) Accessing Windows NT Printers 198 (1) Another Alternative: Changing the Windows NT Server 198 (1) Using the NetWare MAP Command to Access a Windows NT Server Running File and Print Service for NetWare 198 (2) Integrating Windows for Workgroups with NetWare and Windows NT 200 (2) Supporting Non-Microsoft Windows Networks 202 (3) Making the Windows NT Network Connection from WFWG 205 (5) Configuring the Logon 205 (1) Logon Startup Settings 206 (1) The Logon to Windows NT 207 (1) Accessing File and Print Services 207 (3) Making the Novell NetWare Connection from WFWG 210 (76) The NetWare Login 210 (1) NetWare Client Redirector Options 211 (2) The NetWare User Tools 213 (1) Accessing NetWare File and Print Services 214 (1) The Latest Thing for Windows for Workgroups: 32-Bit Network Drivers 215 (5) Coordinating User Names and Passwords 220 (1) The Hidden User Name and Password File 220 (21) Profiles and Policies 241 (45) Windows NT Connectivity Options 286 (49) Windows NT Networking Architecture 288 (1) Windows NT Networking Architecture 289 (2) Overview of the Windows NT Logon Process 291 (2) NetWare Connectivity 293 (1) Windows NT Workstation Is Tightly Integrated with Windows NT Domains 293 (3) Logon Validation 296 (1) Loading the User Profile 297 (1) Microsoft's Client Services for NetWare (CSNW) 298 (1) Implementing CSNW for Windows NT 299 (2) Changing Your CSNW Settings 301 (2) Accessing NetWare Server Volumes and Directories 303 (1) Working with the MS-DOS-Compatible Command Prompt to Access Network Services 304 (1) Accessing Netware Print Queues 305 (2) Support for NetWare-Aware Applications and Utilities 307 (1) Don't Forget the Message Files 307 (1) Running NetWare-Aware Applications 308 (1) Monitoring CSNW Performance 309 (1) General CSNW Troubleshooting Tips 310 (1) Windows NT Workstation 4.0 and Client Services for NetWare 311 (3) Are Profiles and Policies Still Supported? …”
Libro -
16
Structured techniques : the basis for CASE /
Publicado 1988Tabla de Contenidos: “…279 (1) Using Decision Trees and Decision Tables 279 (1) Commentary 279 (2) 22 Data Analysis Diagrams 281 (16) Introduction 281 (1) Bubble Charts 281 (1) Associations Between Data Items 282 (1) One-to-One and One-to-Many Associations 283 (1) Types and Instances 284 (1) Reverse Associations 284 (2) Keys and Attributes 286 (1) Data-Item Groups 287 (1) Records 287 (1) Concatenated Keys 288 (2) Derived Data 290 (3) Optional Data Items 293 (4) 23 Entity-Relationship Diagrams 297 (28) Introduction 297 (1) Entities 297 (1) Entity Diagrams 298 (1) Concatenated Entity Type 299 (3) Labels and Sentences 302 (2) Subject and Predicate 304 (3) Basic Constructs 307 (1) Semantic Independence 307 (1) Inverted-L Diagrams 308 (2) Entity Subtypes 310 (1) Multiple Subtype Groupings 311 (1) Subtype Hierarchies 312 (2) Computer Representation of the Diagram 314 (1) Notation Styles 315 (10) 24 Data Navigation Diagrams 325 (14) Introduction 325 (1) Divide and Conquer 325 (1) Separating Data from Procedures 326 (1) Data Navigation Diagrams 327 (4) Procedure Design 331 (2) Physical Design 333 (1) Complexity 334 (1) Standard Procedure 335 (4) 25 Compound Data Accesses 339 (16) Introduction 339 (1) Relational Joins 340 (3) Automatic Navigation 343 (1) Simple Versus Compound Data-Base Accesses 343 (1) Intermixing Simple and Compound Actions 344 (3) Three-Way Joins 347 (1) Semantic Disintegrity 348 (2) Navigation Paths 350 (1) Fourth-Generation Languages 351 (4) 26 HOS Charts 355 (22) Introduction 355 (1) HOS 355 (1) Binary Trees 355 (2) Functions 357 (4) From Requirements Statements to Detailed Design 361 (1) Three Primitive Control Structures 361 (3) Control Maps 364 (1) Generation of Code 364 (1) Four Types of Leaf Nodes 364 (3) Static and Dynamic Testing of Programs 367 (1) Embellishments 367 (1) Other Control Structures 368 (2) Simplification 370 (1) User Functions Employed in a Defined Structure 370 (1) Extending the Power of HOS 370 (2) Discussion 372 (5) 27 A Consumer's Guide to Diagramming Techniques 377 (22) Introduction 377 (1) Criteria for Choice 378 (4) Data and Processes 382 (1) Data Flow Diagrams 382 (1) The Essential Trilogy 383 (1) Comprehensive Capabilities 383 (1) Ultimate Decomposition 384 (1) Drawing Speed 384 (2) Integrity Checking 386 (1) Code Generation 387 (1) User Friendliness 387 (1) Computer Graphics 388 (1) Summary of Properties 388 (6) Our Choice of Techniques 394 (1) Challenge 395 (4) PART IV ANALYSIS AND DESIGN 399 (118) 28 Structured Analysis and Design Techniques 399 (8) Software Analysis and Design 399 (1) The Desire to Skip Analysis 399 (1) Changing Requirements 399 (1) System Specification 400 (1) Poor Specification and Expensive Errors 400 (1) Importance of Analysis 401 (1) A Building Analogy 401 (1) Importance of Design 402 (1) A Systematic Design Approach 403 (1) Types of Software Design 403 (2) Structured Design Methodologies 405 (2) 29 Structured Analysis 407 (10) A Critical Step 407 (1) A Structured Discipline 407 (1) System Specification 408 (2) Data-Flow Diagram 410 (1) Data Dictionary 410 (1) Process Specification 411 (1) Steps of Structured Analysis 412 (2) Critique of Structured Analysis 414 (1) When to Use Structured Analysis 415 (2) 30 Top-Down Design 417 (6) Informal Design Strategy 417 (1) Design Process 417 (1) Decision Making 418 (1) Principles of Top-Down Design 419 (1) Documentation for Top-Down Design 419 (1) Top-Down Design of Data 419 (1) When to Use Top-Down Design 420 (3) 31 Structured Design 423 (18) Systematic Design Approach 423 (1) Structured Design: Step 1: Draw Data-Flow Diagram 424 (1) Step 2: Draw Structure Chart 424 (7) Step 3: Evaluate the Design 431 (4) Step 4: Prepare the Design for Implementation 435 (6) 32 An Evaluation of Structured Design 441 (14) Structured Design of the Credit Verification System 441 (1) Applying Transform Analysis 441 (2) Evaluating the Quality of the Design 443 (3) Critique of Structured Design 446 (1) Critique of Transform and Transaction Analysis 447 (4) Comparison with Top-Down Design 451 (1) Critique of Coupling and Cohesion 452 (1) Lack of Data Design 453 (2) 33 Jackson Design Methodology 455 (14) Jackson Design Versus Structured Design 455 (1) Data-Driven Program Design 455 (2) Example: Employee Skills System 457 (5) Designing Simple Programs 462 (2) Designing Complex Programs 464 (1) Structure Clash 465 (1) Program Inversion 466 (3) 34 An Evaluation of Jackson Design Methodology 469 (20) Constructive Design Method 469 (1) Designing the Subscription System 469 (6) Limitations of the Jackson Design Methodology 475 (3) Designing the Credit Verification System 478 (6) Summary 484 (5) 35 Warnier-Orr Design Methodology 489 (14) Background 489 (1) Set Theory 489 (1) Top-Down Approach 490 (1) Data-Driven Approach 491 (1) Design of the Employee Skills System 491 (12) 36 An Evaluation of the Warnier-Orr Design Methodology 503 (14) Input-Process-Output Model 503 (1) Objective of the Warnier-Orr Design Methodology 504 (1) Benefits of the Warnier-Orr Diagram 504 (2) Problems with the Warnier-Orr Diagram 506 (1) Bracketed Pseudocode 507 (1) Major Criticisms 507 (1) Design of the Subscription System 507 (1) Problems with Multiple Output Structures 508 (3) Incompatible Hierarchies 511 (1) Inadequate Input Design Guidelines 511 (1) Overemphasis on Output 511 (2) Recommendations 513 (4) PART V MORE AUTOMATED TECHNIQUES 517 (150) 37 A Higher Level of Automation 517 (16) Introduction 517 (1) Problems with Specifications 517 (1) Specification Languages 518 (1) Computer-Aided Specification Design 519 (1) Two Types of Languages 519 (1) Computable Specifications 520 (1) Automation of Design 521 (2) Integration of Definition Levels 523 (1) A Common Communication Vehicle 523 (1) Integrated Top-Down and Bottom-Up Design 524 (1) Mathematically Rigorous Languages 525 (1) User Friendliness 525 (1) Properties Needed 525 (1) Spectrum of Specification Languages 526 (7) 38 HOS Methodology 533 (24) Introduction 533 (1) USE IT 533 (2) JOIN, INCLUDE, and OR 535 (1) Generation of Code 535 (2) Four Types of Leaf Nodes 537 (1) Co-control Structures 538 (7) Local Variables 545 (1) N-way Branches 546 (1) Interactive Graphics Editor 546 (5) Simulation 551 (3) External Modules of Code 554 (1) Generation of Documentation 555 (2) 39 The Impact of Design Automation 557 (18) The Revolution 557 (1) Effect on Programming 557 (1) Effect on Specifications 558 (1) What Does "Provably Correct" Mean? 559 (1) Syntax and Semantics 559 (1) Internal and External Semantics 560 (1) Standards 561 (1) Verification and Testing 561 (1) Building Higher Levels of Trust 562 (1) Improvements in Productivity 562 (1) Cost Savings 563 (1) Effect of Program Size 564 (1) Error Statistics 565 (2) Human System Components 567 (1) Use of Other Front-End Methodologies 567 (2) Incorporation of Nonprocedural Languages 569 (1) Software Factories 569 (6) 40 Data-Base Planning 575 (10) Introduction 575 (1) Separate Developments with Incompatible Data 576 (2) Stable Foundation 578 (2) Stable Data Bases 580 (1) Logical Design of Data Bases 581 (1) The Failure of Data Administration 582 (3) 41 Third Normal Form 585 (20) Normalization of Data 585 (2) First Normal Form 587 (3) Functional Dependency 590 (1) Full Functional Dependency 591 (1) Second Normal Form 592 (2) Candidate Keys 594 (1) Third Normal Form 595 (1) Storage and Performance 596 (2) Semantic Disintegrity 598 (1) Clear Thinking About Data 598 (4) A Suggested Exercise 602 (1) An Example of Normalization 602 (3) 42 Automated Data Modeling 605 (26) Introduction 605 (1) The Synthesis Process 606 (1) Bubble Charts 607 (1) Synthesizing User Views 607 (1) Illustration of the Synthesis Process 607 (3) Levels of Primary Keys 610 (2) Canonical Data Structures 612 (1) Canonical Synthesis 613 (1) Elimination of Redundancies 614 (2) Candidate Keys 616 (1) Transitive Dependencies 617 (1) Concatenated Keys 618 (1) Intersection Data 619 (1) Many-to-Many Associations 620 (1) Mapping Between Primary Keys 620 (1) Intersecting Attributes 620 (3) Isolated Attributes 623 (1) Record Sequence 623 (1) Automating the Procedure 623 (1) Data Designer 624 (5) Conversion to HOS Notation 629 (2) 43 Computer-Aided Design 631 (20) Introduction 631 (1) Computerized Help in Design 632 (1) Developing a Data-Base Application 633 (7) Automatic Conversion 640 (3) Four Stages 643 (2) Logical and Physical Navigation Diagrams 645 (4) Physical Design 649 (1) Objectives of the Design Dialogue 649 (1) Variations 650 (1) 44 Information Engineering 651 (16) Introduction 651 (1) What Is Information Engineering? …”
Libro