Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
42701Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Chromebook -- Chapter 1 Choosing and Setting Up Your Chromebook -- Checking Under the Hood of the Chromebook -- The software -- The hardware -- Choosing a Chromebook -- Setting Up Your Chromebook -- Turning on your device -- Selecting a language -- Connecting to the internet -- Agreeing to the Terms of Service -- Adult or child user -- Logging In for the First Time -- Logging in using an existing Google Account -- Creating a new Google Account -- Using Chromebook as a guest -- Transitioning to a Chromebook from Mac, Linux, or Windows -- Where to Go Next -- Chapter 2 Working with the Chromebook Desktop -- Accessing the Chromebook Shelf -- Using the Launcher: Chromebook's Start Button -- Navigating the Launcher -- Organizing Launcher Icons -- Setting Up App Shortcuts -- Pinning app shortcuts to your shelf -- Removing app shortcuts from your shelf -- Getting the Scoop in the Status Area -- Taking Charge of Window Controls -- Multitasking with Multiple Windows -- Setting Up a Printer -- Direct connect printing -- Wi-Fi printing -- Chapter 3 Surveying the Chrome Browser -- Navigating the Chrome Browser -- Sizing the Chrome window -- Working with tabs -- Using the Omnibox and the navigation buttons -- Saving your place with the bookmark bar -- Customizing and Controlling Chrome -- Managing bookmarks -- Managing your history and downloads -- Erasing your browsing history -- Going incognito -- Changing Search Engine Providers -- Using Other Browsers -- Chapter 4 Getting Your Hands on the Keyboard and Touchpad -- The Chromebook Keyboard at a Glance -- Using Shortcut Key Combinations -- Configuring Keyboard Settings…”
Libro electrónico -
42702Publicado 2016Tabla de Contenidos: “…-- Monopsony -- Dominant Firm with a Competitive Fringe -- Why Some Firms Are Dominant -- The No-Entry Model -- The Dominant Firm-Competitive Fringe Equilibrium -- A Model with Free, Instantaneous Entry -- Summary -- Problems -- Suggested Readings -- EXAMPLE 4.1 Monopoly Newspaper Ad Prices -- EXAMPLE 4.2 Monopolizing by Merging -- EXAMPLE 4.3 Controlling a Key Ingredient -- EXAMPLE 4.4 Preventing Imitation-Cat Got Your Tongue? …”
Libro electrónico -
42703Publicado 2023Tabla de Contenidos: “…Intro -- Preface -- Organization -- Contents - Part III -- Probabilistic Systems -- A Flexible Toolchain for Symbolic Rabin Games under Fair and Stochastic Uncertainties -- 1 Introduction -- 2 Theoretical Background -- 2.1 Solving Rabin Games Symbolically -- 2.2 Computing Symbolic Controllers for Stochastic Dynamical Systems -- 3 Implementation Details -- 3.1 Genie -- 3.2 FairSyn -- 3.3 Mascot-SDS -- 4 Examples -- 4.1 Synthesizing Code-Aware Resource Mangers Using FairSyn -- 4.2 Synthesizing Controllers for Stochastic Dynamical Systems Using Mascot-SDS -- References -- Automated Tail Bound Analysis for Probabilistic Recurrence Relations -- 1 Introduction -- 2 Preliminaries -- 2.1 Probabilistic Recurrence Relations -- 3 Exponential Tail Bounds via Markov's Inequality -- 4 An Algorithmic Approach -- 4.1 The Guess Procedure Guess(f,t) -- 4.2 The Check Procedure CheckCond(cf,ct) -- 5 Experimental Results -- 6 Related Work -- References -- Compositional Probabilistic Model Checking with String Diagrams of MDPs -- 1 Introduction -- 2 String Diagrams of MDPs -- 2.1 Outline -- 2.2 Open MDPs -- 2.3 Rightward Open MDPs and Traced Monoidal String Diagrams -- 2.4 TSMC Equations Between roMDPs -- 2.5 Open MDPs and ``Compact Closed'' String Diagrams -- 3 Decomposition Equalities for Open Markov Chains -- 4 Semantic Categories and Solution Functors -- 4.1 Semantic Category for Rightward Open MCs -- 4.2 Semantic Category of Rightward Open MDPs -- 4.3 Semantic Category of MDPs -- 5 Implementation and Experiments -- References -- Efficient Sensitivity Analysis for Parametric Robust Markov Chains -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 4 Differentiating Solution Functions for pMCs -- 4.1 Computing Derivatives Explicitly -- 4.2 Computing k-Highest Derivatives -- 5 Differentiating Solution Functions for prMCs…”
Libro electrónico -
42704Publicado 2024Tabla de Contenidos: “…Configuring Guest Access and Sharing in the Microsoft 365 Admin Center -- Exercise 4.4: Configuring Guest Access and Sharing in the Microsoft Entra Admin Center -- Controlling the Guest Access of a Specific Team, Including Sensitivity Labels and Microsoft Entra ID -- Exercise 4.5: Limiting Who Can Invite Guests to a Specific Team -- Using Microsoft Graph Beta PowerShell to Restrict Guest Access to a Team -- Exercise 4.6: Using Sensitivity Labels to Control the Guest Access of a Team -- Removing Guests from Teams, including from a Team or a Tenant -- Exercise 4.7: Removing Guest Users from a Team -- Configuring Shared Channels for External Access -- Configuring and Managing Cross-Tenant Access for B2B Direct Connect in Microsoft Entra ID for Shared Channels -- Exercise 4.8: Adding the Organization -- Exercise 4.9: Configuring Inbound Settings -- Exercise 4.10: Configuring Outbound Settings -- Creating a Shared Channel for Cross-Tenant Collaboration -- Summary -- Further Reading -- Exam Readiness Drill - Chapter Review Questions -- Chapter 5: Managing Microsoft Teams Clients and Devices -- Technical Requirements -- Identifying Teams Phone and Resource Account Licensing Requirements -- Types of Calling Plans -- Licenses for Teams Phone Usage -- Identifying Teams Device Licensing Requirements -- Managing Teams Device Configuration Profiles -- Managing Configuration Profiles -- Exercise 5.1: Creating a Configuration Profile -- Configuring Microsoft Teams for VDI Environments -- Exercise 5.2: Installing Teams on VDI -- Configuring Teams Rooms Accounts and Systems -- Exercise 5.3: Manually Adding a Resource Account and Assigning It a License -- Managing Device Settings and Firmware -- Managing Device Tags for Microsoft Teams -- Exercise 5.4: Managing Tags -- Provisioning and Configuring Remote Sign-in for New Devices…”
Libro electrónico -
42705por O'Sullivan, BryanTabla de Contenidos: “…Avoiding Boilerplate with Lifting -- Gluing Predicates Together -- Defining and Using New Operators -- Controlling Traversal -- Density, Readability, and the Learning Process -- Another Way of Looking at Traversal -- Useful Coding Guidelines -- Common Layout Styles -- Chapter 10. …”
Publicado 2009
Libro electrónico -
42706Publicado 2002Tabla de Contenidos: “…Parallel System Support Program 3.5 enhancements -- 4.1 64-bit compatibility -- 4.2 New software packaging -- 4.2.1 Two install images -- 4.2.2 Reliable Scalable Cluster Technology -- 4.3 Eprimary modifications -- 4.4 Supper user (supman) password management -- 4.5 HMC-attached performance improvements -- 4.6 Virtual Shared Disk and Recoverable Virtual Shared Disk 3.5 -- 4.6.1 64-bit compatibility -- 4.6.2 Recoverable Virtual Shared Disk integration -- 4.6.3 Expanded Concurrent Virtual Shared Disk support -- 4.6.4 New command: updatevsdvg -- 4.6.5 Large and dynamic buddy buffer enhancement -- 4.6.6 IP flow control -- 4.6.7 FAStT support in RVSD -- 4.6.8 AIX trace hooks -- 4.7 Low-Level Application Programming Interface changes -- 4.8 General Parallel File System 2.1 -- 4.9 High Performance Computing software stack -- 4.9.1 LoadLeveler -- 4.9.2 Parallel Environment -- 4.9.3 Engineering and Scientific Subroutine Library and Parallel ESSL -- 4.10 New hardware -- Chapter 5. …”
Libro electrónico -
42707Publicado 2012Tabla de Contenidos: “…SAP NetWeaver Administrator -- Summary -- Additional Resources -- 2 SAP NetWeaver Application Server ABAP Overview -- Three-Tier Architecture -- SAP Presentation Tier -- SAP Application Tier -- SAP Database Tier -- Starting the SAP System -- Login Process to the SAP System -- Shut Down the SAP System -- Summary -- Additional Resources -- 3 SAP NetWeaver Application Server Java Overview -- Java Programming Language Concepts -- SAP Three-Tier Architecture for Java Applications -- SAP Java Cluster Architecture in NW 7.0 -- Constraints of the NW 7.0 Architecture -- Motivation for the NW 7.1 Architecture -- SAP Java Cluster Architecture in NW 7.1 -- Starting a SAP NW AS Java System -- Start and Shutdown Sequence -- Java Startup and Control Framework in NW 7.0 -- Verifying the SAP Java System Started Properly -- Java Startup Framework in NW 7.1 -- Dual-Stack Systems -- Starting a Dual-Stack SAP System -- Shutting Down a Dual-Stack SAP System -- SMICM Start and Shutdown Options -- Java System Logs -- SAP NW AS Java System Architecture -- Java System Administration Tools -- Java Application URLs -- Verify SAP Usage Types -- Transaction Codes -- Summary -- Additional Resources -- 4 SAP ERP Integration Overview with Other Systems -- Basic Communication in SAP Business Solutions -- SAProuter -- SAP EPR Integration with Other Business Suite Applications -- SAP ERP Integration with Other NetWeaver Applications -- SAP ERP Integration with Other Third-Party Enterprise Applications…”
Libro electrónico -
42708por Ramana, N. V.Tabla de Contenidos: “…Competitive Examination Questions -- Chapter 3: Power System Network Matrices-2 -- 3.1 Introduction -- 3.2 Partial Network -- 3.3 Case Studies in Zbus Algorithm -- 3.4 Algorithm for Formation of Bus Impedance Matrix-No Mutual Coupling between the Elements -- 3.4.1 Type-1 Modification -- 3.4.2 Type-2 Modification -- 3.4.3 Type-3 Modification -- 3.4.4 Type-4 Modification -- 3.4.5 MATLAB Program for Zbus Formation -- 3.5 Algorithm for the Formation of Zbus- Consideration of Mutually Coupled Elements -- 3.5.1 Type-1 and Type-2 Modifications -- 3.5.2 Type-3 and Type-4 Modifications -- 3.5.3 Summary of Formulas -- 3.6 Modifications In Zbus for Changes in the Network -- Questions from Previous Question Papers -- Competitive Examination Questions -- Chapter 4: Power Flow Studies-1 -- 4.1 Introduction -- 4.1.1 Basic Applications of Power Flow Studies and its Significance in Power System Operation and Control: -- 4.1.2 Data Preparation: -- 4.2 Network Modelling -- 4.3 Mathematical Modelling -- 4.3.1 Mathematical Model for Stage-1 Quantities -- 4.3.2 Mathematical Modeling for Stage-2 Quantities -- 4.4 Gauss-Seidel Iterative Method -- 4.5 Classification of Buses -- 4.5.1 PQ Bus or Load Bus -- 4.5.2 PV Bus or Generator Bus -- 4.5.3 Voltage Controlled Buses -- 4.5.4 Slack Bus/Swing Bus/Reference Bus -- 4.6 Case Studies in Power Flow Problem -- 4.7 Algorithm for Power Flow Solution by the Gauss-Seidel Method -- 4.7.1 Case-1: GS Method to obtain Bus Quantities when the PV Buses are Absent -- 4.7.2 Case-2: GS Method to obtain Bus Quantities when the PV Buses are Present -- 4.7.3 Flow Chart: Power Flow Solution by GS Method -- 4.8 Conclusion -- Questions from Previous Question Papers -- Competitive Examination Questions -- Chapter 5: Power Flow Studies-2 -- 5.1 Introduction -- 5.2 Newton-Raphson Method -- 5.2.1 NR Method for Single-Valued Functions…”
Publicado 2010
Libro electrónico -
42709Publicado 2012Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
Libro electrónico -
42710Publicado 2013Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- About the Authors -- Contents at a Glance -- Contents -- Acknowledgments -- Additional Resources for Teachers -- Chapter 1: The Path of the PC Tech -- Lab Exercise 1.01: Preparing to Study -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 1.02: Considering Other Certifications -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 1.03: Gathering Equipment -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Chapter 2: Visible Windows -- Lab Exercise 2.01: The Windows XP Interface -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 2.02: The Windows Vista Interface -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 2.03: The Windows 7 Interface -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 2.04: Discovering Aero in Windows 7 -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 2.05: Windows Explorer -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 2.06: The Windows Control Panel -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 2.07: The Windows Microsoft Management Console (MMC) Toolbox -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Analysis Test -- Key Term Quiz -- Chapter 3: Troubleshooting Essential Hardware -- Lab Exercise 3.01: Testing CPUs with CPU-Z -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 3.02: Testing RAM with MEMTEST86+ -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business…”
Libro electrónico -
42711Publicado 2004Tabla de Contenidos: “…Telnet on the iSeries -- 2.1 Virtual device descriptions -- 2.2 QAUTOVRT system value -- 2.3 Telnet naming conventions for virtual devices/controllers -- 2.3.1 Unpredictable system-assigned devices -- 2.3.2 Specifically assigned Telnet session device names -- 2.4 Telnet device initialization and termination exit points -- 2.4.1 Registering an exit program -- 2.5 Mapping a Virtual device description to an IP address -- 2.6 Other Telnet enhancements -- 2.6.1 Connection feedback to the Telnet client -- 2.6.2 Number of servers to start -- 2.7 Extended administrative flexibility -- 2.8 Security -- 2.8.1 Prevent Telnet access -- 2.8.2 Control Telnet client access -- 2.8.3 Telnet exit program security -- 2.9 Telnet problem determination -- 2.10 More information -- Chapter 3. …”
Libro electrónico -
42712Publicado 2022Tabla de Contenidos: “…-- How to Use This Book -- Interactive Online Learning Environment and Test Bank -- Tips for Taking the A+ Exams -- CompTIA A+ 1100 Series Exam Objectives -- Part I CompTIA A+ Core 1 Exam 220-1101 -- Chapter 1 Mobile Devices -- 1.1 Given a scenario, install and configure laptop hardware and components -- Hardware/device replacement -- Physical privacy and security components -- Exam essentials -- 1.2 Compare and contrast the display components of mobile devices -- Types -- Mobile display components -- Exam essentials -- 1.3 Given a scenario, set up and configure accessories and ports of mobile devices -- Connection methods -- Accessories -- Exam essentials -- 1.4 Given a scenario, configure basic mobile-device network connectivity and application support -- Wireless/cellular data network (enable/disable) -- Bluetooth -- Location services -- Mobile device management (MDM)/mobile application management (MAM) -- Mobile device synchronization -- Exam essentials -- Review Questions -- Chapter 2 Networking -- 2.1 Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes -- Ports and protocols -- TCP vs. …”
Libro electrónico -
42713por Cunico, HernanTabla de Contenidos: “…8.3 EJB and data bean best practices -- 8.3.1 Customizing WebSphere Commerce tables -- 8.3.2 Customizing WebSphere Commerce EJBs -- 8.3.3 SQL security considerations -- 8.3.4 Using well-formed ejbCreate constructors -- 8.3.5 Lazy fetch data retrieval -- 8.3.6 Handling database vendor specific code -- 8.3.7 Using session beans -- 8.3.8 Managing concurrent updates -- 8.3.9 Flush remote method -- 8.3.10 Generating primary keys -- 8.4 Best practices for JSP programming -- 8.4.1 Using JSTL in place of Java code -- 8.4.2 Using WebSphere Commerce activation tags -- 8.4.3 Using WebSphere Commerce maps to get request parameters -- 8.4.4 Using StoreErrorDataBean for error handling -- 8.4.5 Using an appropriate includes mechanism -- 8.4.6 Using the JSPF file extension for JSP segments -- 8.4.7 Using the escapeXml attribute to preserve HTML formatting -- 8.4.8 Ensuring XHTML compliance -- 8.4.9 Using CSS to separate layout from content -- 8.4.10 Adding id attributes to links and form elements -- 8.4.11 Invoking controller commands from within a JSP page -- 8.4.12 Using the post method for form submission -- 8.5 Command best practices -- 8.5.1 New command naming and hierarchy -- 8.5.2 Using constants to hold class and method name -- 8.5.3 Command error handling -- 8.5.4 Tracing -- 8.6 General security considerations -- 8.6.1 Access control -- 8.6.2 Encrypting sensitive information -- 8.6.3 Protecting sensitive configuration files -- 8.6.4 Protecting sensitive parameters -- 8.6.5 Avoiding default credentials and port numbers -- Chapter 9. …”
Publicado 2005
Libro electrónico -
42714Publicado 2023Tabla de Contenidos: “…-- How it Works -- Going Beyond What Headline Analysers Do -- Predicting Automatic Thoughts and Emotions -- Helping Your Business with Positioning -- Creating Channel-Specific Content -- Keeping the Software Updated -- On Humility and Trust -- How neuroflash Attracts Leads -- Chapter Nine: Social: Mobilise Your Whole Team With Shared Content -- The Whole Company as a Marketing Team -- Controlling Content -- How Mobibi Works -- Motivating Employees to Create Content -- Sharing Company Content -- Sticking to Brand Guidelines -- On Pricing and Promotion -- Chapter Ten: Social: Blockchain-Powered Hashtag Service -- How Zilliqa Works -- What to Expect from Zilliqa in Their Pilot Phase…”
Libro electrónico -
42715Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Compute, Network, and Security Services at the Edge -- Chapter 1: Getting Started with Edge Computing on AWS -- The intersection of cloud and edge computing -- Physics -- Economics -- Regulatory compliance -- Inertia -- The AWS edge computing strategy -- Disconnected, denied, intermittent, or low-bandwidth -- Multi-access edge computing -- Immersive experiences -- IIoT -- Overview of the AWS edge computing toolbox -- Localized AWS infrastructure and services -- Developer tools and resources -- Security and compliance -- Consistent experience -- Architectural guidance -- Summary -- Chapter 2: Understanding Network and Security for Near-Edge Computing -- Understanding internet challenges -- The impact of latency and packet loss -- Causes of packet loss on the internet -- TCP receive window (RWIN) -- User Datagram Protocol (UDP) -- Using a private wide-area network (WAN) -- Multiprotocol Label Switching (MPLS) -- Software-defined networking (SDN) -- Software-defined WAN (SD-WAN) -- Optimizing ingress with global server load balancing (GSLB) -- Internet Control Message Protocol (ICMP) triangulation -- IP geolocation database -- Custom rules -- Steering traffic at the network layer with IP Anycast -- Addressing TCP issues with HTTP/3 and QUIC -- Upsides of HTTP/3 and QUIC -- Downsides of HTTP/3 and QUIC -- Current status -- Securing networks at the near edge -- Identity and Access Management (IAM) -- Encryption -- Secure communication protocols -- Device hardening -- Network segmentation -- Monitoring and logging -- Security updates and vulnerability management -- Physical security -- Incident response and disaster recovery -- Training and awareness -- Summary -- Chapter 3: Understanding Network and Security for Far-Edge Computing…”
Libro electrónico -
42716por Simpson, AlanTabla de Contenidos: “…Creating valid variable names -- Creating variables in code -- Manipulating variables -- Saving your work -- Running your Python app in VS Code -- Understanding What Syntax Is and Why It Matters -- Book 2 Understanding Python Building Blocks -- Chapter 1 Working with Numbers, Text, and Dates -- Calculating Numbers with Functions -- Still More Math Functions -- Formatting Numbers -- Formatting with f-strings -- Showing dollar amounts -- Formatting percent numbers -- Making multiline format strings -- Formatting width and alignment -- Grappling with Weirder Numbers -- Binary, octal, and hexadecimal numbers -- Complex numbers -- Manipulating Strings -- Concatenating strings -- Getting the length of a string -- Working with common string operators -- Manipulating strings with methods -- Uncovering Dates and Times -- Working with dates -- Working with times -- Calculating timespans -- Accounting for Time Zones -- Working with Time Zones -- Chapter 2 Controlling the Action -- Main Operators for Controlling the Action -- Making Decisions with if -- Adding else to your if logic -- Handling multiple else statements with elif -- Ternary operations -- Repeating a Process with for -- Looping through numbers in a range -- Looping through a string -- Looping through a list -- Bailing out of a loop -- Looping with continue -- Nesting loops -- Looping with while -- Starting while loops over with continue -- Breaking while loops with break -- Chapter 3 Speeding Along with Lists and Tuples -- Defining and Using Lists -- Referencing list items by position -- Looping through a list -- Seeing whether a list contains an item -- Getting the length of a list -- Adding an item to the end of a list -- Inserting an item into a list -- Changing an item in a list -- Combining lists -- Removing list items -- Clearing out a list -- Counting how many times an item appears in a list…”
Publicado 2024
Libro electrónico -
42717Publicado 2019Tabla de Contenidos: “…-- Units of Energy -- 3.9 Energy and Chemical and Physical Change -- 3.10 Temperature: Random Motion of Molecules and Atoms -- 3.11 Temperature Changes: Heat Capacity -- EVERYDAY CHEMISTRY: Coolers, Camping, and the Heat Capacity of Water -- 3.12 Energy and Heat Capacity Calculations -- Self-Assessment Quiz -- Key Terms -- Exercises -- Answers to Skillbuilder Exercises -- Answers to Conceptual Checkpoints -- 4 Atoms and Elements -- 4.1 Experiencing Atoms at Tiburon -- 4.2 Indivisible: The Atomic Theory -- 4.3 The Nuclear Atom -- 4.4 The Properties of Protons, Neutrons, and Electrons -- EVERYDAY CHEMISTRY: Solid Matter? …”
Libro electrónico -
42718Publicado 2015Tabla de Contenidos: “…Cover -- Title -- Copyright -- Contents -- Preface -- 1 Atoms -- 1.1 A Particulate View of the World: Structure Determines Properties -- 1.2 Classifying Matter: A Particulate View -- The States of Matter: Solid, Liquid, and Gas -- Elements, Compounds, and Mixtures -- 1.3 The Scientific Approach to Knowledge -- The Importance of Measurement in Science -- Creativity and Subjectivity in Science -- 1.4 Early Ideas about the Building Blocks of Matter -- 1.5 Modern Atomic Theory and the Laws That Led to It -- The Law of Conservation of Mass -- The Law of Definite Proportions -- The Law of Multiple Proportions -- John Dalton and the Atomic Theory -- 1.6 The Discovery of the Electron -- Cathode Rays -- Millikan's Oil Drop Experiment: The Charge of the Electron -- 1.7 The Structure of the Atom -- 1.8 Subatomic Particles: Protons, Neutrons, and Electrons -- Elements: Defined by Their Numbers of Protons -- Isotopes: When the Number of Neutrons Varies -- Ions: Losing and Gaining Electrons -- 1.9 Atomic Mass: The Average Mass of an Element's Atoms -- Mass Spectrometry: Measuring the Mass of Atoms and Molecules -- 1.10 The Origins of Atoms and Elements -- REVIEW -- Self-Assessment Quiz -- Key Learning Outcomes -- Key Terms -- Key Concepts -- Key Equations and Relationships -- EXERCISES -- Review Questions -- Problems by Topic -- Cumulative Problems -- Challenge Problems -- Conceptual Problems -- Answers to Conceptual Connections -- 2 Measurement, Problem Solving, and the Mole Concept -- 2.1 The Metric Mix-up: A 125 Million Unit Error -- 2.2 The Reliability of a Measurement -- Reporting Measurements to Reflect Certainty -- Precision and Accuracy -- 2.3 Density -- 2.4 Energy and Its Units -- The Nature of Energy -- Energy Units -- Quantifying Changes in Energy -- 2.5 Converting between Units -- 2.6 Problem-Solving Strategies -- Units Raised to a Power…”
Libro electrónico -
42719Publicado 2023Tabla de Contenidos: “…Identify the Independent, Dependent, and Controlled Variables -- 5. Decide How to Collect Data -- 6. …”
Libro electrónico -
42720por Bosch, Thomas C. G.Tabla de Contenidos: “…Chapter 12: Symbiosis for insect cuticle formation -- 12.1 Introduction -- 12.2 Weevil-Nardonella endosymbiosis -- 12.3 Nardonella genome is extremely reduced and specialized for tyrosine synthesis -- 12.4 Nardonella endosymbiotic system in Pachyrhynchus infernalis -- 12.5 Nardonella-harboring bacteriome as a tyrosine-producing organ -- 12.6 Suppression of Nardonella by antibiotic and its effects on tyrosine and DOPA provisioning -- 12.7 Contribution of Nardonella to adult cuticle formation in Pachyrhynchus infernalis -- 12.8 Incomplete tyrosine synthesis pathway of Nardonella and complementation by host genes -- 12.9 Insights from weevil-Nardonella symbiosis: Host's final step control over symbiont's metabolic pathway -- 12.10 Insights from weevil-Nardonella symbiosis: How do symbiont replacements proceed? …”
Publicado 2020
Libro electrónico