Spelling suggestions: "subject:"microcomputers"" "subject:"iicrocomputers""
41 |
Human factor's design of a home personal computer workstation /Gregerman, Rhonda Jo, January 1992 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1992. / Vita. Abstract. Includes bibliographical references (leaves 122-123). Also available via the Internet.
|
42 |
Microcomputer applications in music therapy /Krout, Robert. January 1988 (has links)
Thesis (Ed. D)--Teachers College, Columbia University. / Typescript; issued also on microfilm. Sponsor: Harold Abeles. Dissertation Committee: Lenore Pogonowski. Bibliography: leaves 157-188.
|
43 |
Congruencies of computer competencies as viewed by accounting practitioners and accounting educatorsMcKean, Gerald W. McCarthy, John R., January 1985 (has links)
Thesis (Ph. D.)--Illinois State University, 1985. / Title from title page screen, viewed June 8, 2005. Dissertation Committee: John McCarthy (chair), Timothy Duffy, Gary Fish, David Franklin, Ronald Halinski, James Hallam. Includes bibliographical references (leaves 187-192) and abstract. Also available in print.
|
44 |
Applications of a portable microcomputer to problems in communicative disordersBrinsko, Barbara Marie. January 1981 (has links)
Thesis (M.S.)--University of Wisconsin--Madison, 1981. / Typescript. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 24-25).
|
45 |
Finite element solution on microcomputers /Leung, Yew-wah. January 1989 (has links)
Thesis (M. Phil.)--University of Hong Kong, 1990.
|
46 |
Administrative uses of microcomputers in academic departments of community collegesRhodes, Elaine. Halinski, Ronald S. January 1990 (has links)
Thesis (Ph. D.)--Illinois State University, 1990. / Title from title page screen, viewed November 30, 2005. Dissertation Committee: Ronald S. Halinski (chair), Timothy Duffy, Edward R. Hines, Patricia H. Klass, John R. McCarthy. Includes bibliographical references (leaves 135-141) and abstract. Also available in print.
|
47 |
Impact of microcomputer managed instruction (MICRO-CMI) on satisfying the instructional management needs of teachersRomstad, David Anton. January 1981 (has links)
Thesis (Ph. D.)--University of Wisconsin--Madison, 1981. / Typescript. Vita. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 71-75).
|
48 |
Corporate adoption of microcomputers : an analysis of industrial buyer behavior /McNeeley, Brian James, January 1985 (has links)
Thesis (Ph. D.)--Ohio State University, 1985. / Includes vita. Includes bibliographical references (leaves 276-281). Available online via OhioLINK's ETD Center.
|
49 |
A critical evaluation of the destructive impact of computer viruses on files stored by personal computer usersWeideman, Melius January 1994 (has links)
Thesis (Masters Diploma (Information Technology))--Cape Technikon, Cape Town, 1994 / Computer virus programs are generally perceived to be a
threat to the information stored by computer users. This
research evaluated the impact computer viruses have on
information stored by computer users. The emphasis was on
the effects of computer viruses rather than on the detail of
their operation. The main hypotheses involved the question
of whether or not computer viruses do pose a threat to the
information stored by computer users.
The effect of computer viruses on the information of users
in industry was measured by sending a questionnaire to 388
companies country-wide. &~ average of 2l,5% of the
respondents claimed detrimental effects to information
stored on disk due to computer viruses. This and other data
was used to guide laboratory experiments on the actual
damage done by computer viruses to stored information.
A set of test disks was prepared to represent programs and
data of a typical PC user in industry. Fifteen different
virus programs were used individually to infect the test
disks. After each infection, all the test disks were
inspected to ascertain damage to data, system and program
files as well as to separate disk sectors. The research established that:
The damage done by computer viruses to stored
information is generally limited to one file or disk
area.
Where damage to stored information did occur, it was
often reversible.
Irrational user responses to virus symptoms provide a
large potential source for damage to stored
information.
The availability of master program disks (for program
file restoration) and recent, validated data backup is
essential to recovery from a computer virus infection.
A user can solve most problems caused by virus
infections if he has a basic understanding of disk
structure, i.e. tracks, sectors, sides, the FAT, etc,
and of the use of disk utility programs like Norton
Utilities or PCTools.
The fact that some of the findings of prominent virus
researchers could not be verified, suggests that virus
programs could be unstable.
Claims regarding the damage inflicted by viruses must
be considered to be valid only for a specific copy of
the virus under discussion. The importance of using original application software (to
minimize the transfer of viruses and to enable program file
restoration) , regular back-ups (to enable data file
restoration) and basic user awareness (infection prevention,
symptoms, the use of anti-viral and utility programs, etc.)
was emphasized.
The average PC user should be able to clear up a virus
infection without assistance by following the given
disinfection procedure. Suggestions for further study
include virus origins, generations, mutations, multiple
infections, and the effect of viruses on computer networks.
|
50 |
A study of real-time operating systems for microcomputersWells, George Clifford January 1990 (has links)
This thesis describes the evaluation of four operating systems for microcomputers. The emphasis of the study is on the suitability of the operating systems for use in real-time applications, such as process control. The evaluation was performed in two sections. The first section was a quantitative assessment of the performance of the real-time features of the operating system. This was performed using benchmarks. The criteria for the benchmarks and their design are discussed. The second section was a qualitative assessment of the suitability of the operating systems for the development and implementation of real-time systems. This was assessed through the implementation of a small simulation of a manufacturing process and its associated control system. The simulation was designed using the Ward and Mellor real-time design method which was extended to handle the special case of a real-time simulation. The operating systems which were selected for the study covered a spectrum from general purpose operating systems to small, specialised real-time operating systems. From the quantitative assessment it emerged that QNX (from Quantum Software Systems) had the best overall performance. Qualitatively, UNIX was found to offer the best system development environment, but it does not have the performance and the characteristics required for real-time applications. This suggests that versions of UNIX that are adapted for real-time applications are worth careful consideration for use both as development systems and implementation systems.
|
Page generated in 0.0844 seconds