Résultats de la recherche - (red OR read) (fort OR form)

Recherches alternatives:

Affiner les résultats
  1. 1

    The M-form society : how American teamwork can recapture the competitive edge / par Ouchi, William G.

    Publié 1984
    Livre
  2. 2

    Readings on cognitive ergonomics--mind and computers : proceedings of the 2nd European conference, Gmunden, Austria, September 10-14, 1984

    Publié 1984
    Livre
  3. 3

    Dispute processes : ADR and the primary forms of decision-making par PALMER, M. (Author)

    Publié 2020
    Table des matières: “…Some role plays; Bibliography; Further reading; Index. Find a Copy at a Library…”
    Livre
  4. 4

    Accounting : a book of readings /

    Publié 1977
    Livre
  5. 5

    An Introduction to social psychology : global perspectives / par Alcock, James

    Publié 2014
    Table des matières: “…Social perception and cognition Forming impressions of people Attributions of causality Attribution theories Attributional biases An evaluation of attribution theories Social cognition Categorical thinking: The schema Processing social information Note continued: Construal-level theory and counterfactual thinking Rapid reasoning Integrative complexity in thinking A final note Summary Further reading Weblinks 3. …”
    Livre
  6. 6

    Database concepts / par Kroenke, David M.

    Publié 2003
    Table des matières: “…16 (6) Functions of an Application Program 17 (1) Functions of a DBMS 18 (1) Definition and Components of a Database 19 (2) Desktop Versus Organizational Database Systems 21 (1) How to Build a Database System 22 (2) Building a Data Model 22 (1) Creating a Database Design 23 (1) Implementing a Database 24 (1) Summary 24 (2) Review Questions 26 (1) Exercises 27 (1) Garden Glory Project Questions 28 (1) James River Jewelry Project Questions 28 (2) The Relational Model 30 (24) Chapter Objectives 30 (1) Relations 31 (2) A Sample Relation and Two Nonrelations 31 (1) A Note on Terminology 32 (1) Types of Keys 33 (8) Composite Keys 34 (1) Primary and Candidate Keys 34 (1) Foreign Keys and Referential Integrity 34 (4) Surrogate Keys 38 (3) Functional Dependencies and Normalization 41 (6) Functional Dependencies 41 (1) Primary and Candidate Keys Revisited 42 (1) Normalization 43 (1) Relational Design Principles 44 (1) Normalization Examples 44 (3) The Problem of Null Values 47 (1) Summary 48 (1) Review Questions 49 (1) Exercises 50 (1) Garden Glory Project Questions 51 (1) James River Jewelry Project Questions 52 (2) Structured Query Language 54 (31) Chapter Objectives 54 (1) A Sample Database 55 (2) SQL for Data Definition 57 (4) Defining Primary Keys with the ALTER TABLE Statement 59 (1) Defining Foreign Keys with the ALTER TABLE Statement 59 (1) Submitting SQL to the DBMS 59 (1) DROP Statements 60 (1) SQL for Relational Query 61 (14) Reading Specified Columns from a Single Table 62 (1) Reading Specified Rows from a Single Table 62 (2) Reading Specified Columns and Specified Rows from a Single Table 64 (1) Ranges, Wildcards, and Nulls in WHERE Clauses 65 (1) Sorting the Results 66 (1) SQL Built-In Functions 67 (2) Built-In Functions and Groupings 69 (1) Querying Multiple Tables with Subqueries 70 (1) Querying Multiple Tables with Joins 71 (3) Outer Joins 74 (1) SQL for Relational Data Modification 75 (3) Inserting Data 75 (1) Modifying Data 76 (1) Deleting Data 77 (1) Summary 78 (1) Review Questions 79 (2) Exercises 81 (1) Garden Glory Project Questions 81 (1) James River Jewelry Project Questions 82 (3) PART 2 DATABASE DESIGN AND MANAGEMENT 85 (80) Data Modeling and the Entity-Relationship Model 86 (24) Chapter Objectives 86 (1) The Requirements Stage 87 (1) The Entity-Relationship Data Model 88 (6) Entities 88 (1) Attributes 89 (1) Identifiers 89 (1) Relationships 90 (1) Three Types of Binary Relationships 90 (1) Recursive Relationships 91 (1) Entity-Relationship Diagrams 92 (1) Weak Entities 92 (2) Unified Modeling Language Entity-Relationship Diagrams 94 (2) UML Entities and Relationships 94 (1) UML Representation of Weak Entities 95 (1) An Example 96 (10) Heather Sweeney Designs 96 (1) The Seminar Customer List 97 (1) The Customer Form Letter 98 (3) The Sales Invoice 101 (2) Attribute Specifications 103 (1) Business Rules 103 (1) Validating the Data Model 104 (2) Summary 106 (1) Review Questions 107 (1) Exercises 108 (1) Garden Glory Project Questions 108 (1) James River Jewelry Project Questions 109 (1) Database Design 110 (25) Chapter Objectives 110 (1) Representing Entities with the Relational Model 111 (6) Normalization, Second Verse 112 (1) Normal Forms 113 (1) Domain/Key Normal Form 113 (1) Using Normalization Criteria 114 (1) Denormalization 115 (1) Representing Weak Entities 115 (2) Representing Relationships 117 (10) Representing One-to-One Relationships 117 (2) Questionable One-to-One Relationships 119 (1) Representing One-to-Many Relationships 119 (2) Representing Many-to-Many Relationships 121 (2) Representing Recursive Relationships 123 (4) Database Design at Heather Sweeney Designs 127 (4) Weak Entities 128 (1) Relationships 128 (1) Enforcing Referential Integrity 129 (2) Summary 131 (1) Review Questions 131 (2) Exercises 133 (1) Garden Glory Project Questions 133 (1) James River Jewelry Project Questions 134 (1) Database Administration 135 (30) Chapter Objectives 135 (1) The Database Processing Environment 136 (4) Queries, Forms, and Reports 136 (1) Internet Application Processing 137 (1) Client/Server and Traditional Application Processing 138 (1) Stored Procedures and Triggers 138 (1) The Need for Control, Security and Reliability 139 (1) Concurrency Control 140 (10) The Need for Atomic Transactions 140 (1) Concurrent Transaction Processing 141 (2) The Lost Update Problem 143 (1) Concurrency Problems: Dirty Reads, Inconsistent Reads, Phantom Reads 143 (1) Resource Locking 144 (1) Lock Terminology 144 (1) Serializable Transactions 145 (1) Deadlock 145 (1) Optimistic Versus Pessimistic Locking 146 (1) Declaring Lock Characteristics 147 (1) Consistent Transactions 148 (1) Transaction Isolation Level 149 (1) Database Security 150 (3) Processing Rights and Responsibilities 150 (1) DBMS Security 151 (1) Application Security 152 (1) Database Backup and Recovery 153 (4) Recovery via Reprocessing 153 (1) Recovery via Rollback and Rollforward 154 (3) Additional DBA Responsibilities 157 (1) Summary 158 (1) Review Questions 159 (2) Exercises 161 (1) Garden Glory Project Questions 162 (1) James River Jewelry Project Questions 163 (2) Appendix Database Processing with Microsoft Access 165 (40) Appendix Objectives 165 (1) Database Schema for Carbon River Construction 166 (2) Carbon River Schema Data Structure Diagram 167 (1) Column Design 167 (1) Creating Tables and Relationships Using Access 168 (7) Creating Tables 170 (1) Creating Relationships 171 (4) Creating Queries and SQL Statements 175 (6) Creating Simple Queries with the Graphical Tool 175 (5) Action Queries 180 (1) Creating Access Data Entry Forms 181 (9) Creating a Simple Form 181 (2) Using Default Values and Combo Boxes with Forms 183 (5) Looking Up Nonkey Data 188 (2) Creating Access Reports 190 (7) Banded Report Writers 190 (2) Computations in Reports 192 (1) Parameterized Reports 193 (4) Summary 197 (1) Review Questions 198 (2) Exercises 200 (1) Garden Glory Project Questions 201 (1) James River Jewelry Project Questions 202 (3) Glossary 205 (9) Index 214…”
    Livre
  7. 7

    Computer systems : a programmer's perspective beta version / par Bryant, Randal E.

    Publié 2003
    Table des matières: “…Processors Read and Interpret Instructions Stored in Memory. …”
    Livre
  8. 8

    Consumer behavior : /understanding consumers--designing marketing activities par Hoffmann, Stefan

    Publié 2023
    Table des matières: “…Secondary Research 2.4 Forms of Information Retrieval 2.4.1 Surveys and Operationalization of Constructs 2.4.2 Observation of Subjects 2.4.3 Instrument-Based Procedures and Consumer Neuroscience 2.4.4 Experiments and the Proof of Causality 2.5 Learning Aid Further Reading References 3: Motivation 3.1 Characteristics of Motivated Action 3.1.1 Motives and Motivation 3.1.2 Pursuit of Effectivity 3.1.3 Goal Engagement and Goal Disengagement 3.2 Motivation as a Product of Person and Situation 3.2.1 Personal Factors 3.2.2 Situational Factors 3.3 Explaining Consumer Behavior Through Motivational Theories 3.3.1 Content Theories of Motivation 3.3.1.1 Maslow's Hierarchy of Needs 3.3.1.2 Herzberg's Two-Factor Theory 3.3.2 Process Theories of Motivation: The VIE Theory 3.3.3 Regulatory Focus Theory 3.3.4 Lewin's Field Theory 3.4 Motives of Consumer Behavior 3.4.1 Cross-Behavioral Consumer Motives 3.4.2 Behavior-Specific Consumer Motives 3.5 Measurement of Motives 3.6 Learning Aid Further Reading References 4: Emotion 4.1 Characteristics of Emotions 4.1.1 Features of Emotions 4.1.2 Components of an Emotion 4.1.3 From Consumer Emotion to Consumer Motivation 4.2 Emotion Theories to Explain Consumer Behavior 4.2.1 Biological Approaches 4.2.2 Cognitive Approaches 4.2.2.1 Two-Factor Theory of Emotion 4.2.2.2 Protection Motivation Theory 4.3 Making Consumer Emotions Measurable 4.3.1 Verbal Procedures 4.3.2 Instrument-Based Procedures 4.4 Learning Aid Further Reading…”
    Livre
  9. 9

    EU competition law : an analytical guide to the leading cases par Ezrachi Ariel

    Publié 2021
    Livre
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20