Journal articles on the topic 'Microsoft PowerPoint for Windows (Computer)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Microsoft PowerPoint for Windows (Computer).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dyrud, Marilyn A. "An Exploration of Gender Bias in Computer Clip Art." Business Communication Quarterly 60, no. 4 (1997): 30–51. http://dx.doi.org/10.1177/108056999706000402.
Full textHui, Zi. "Design and Implement of Long-Distance Education System Base on Stream Media Technology." Advanced Materials Research 926-930 (May 2014): 4477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4477.
Full textMaulana, Hanhan, Irawan Afrianto, Angga Setiyadi, Richi Dwi Agustia, and Dedeng Hirawan. "Pelatihan Pembuatan Media Pembelajaran Di PGRI Kecamatan Cisarua." Indonesian Community Service and Empowerment (IComSE) 1, no. 2 (2020): 45–49. http://dx.doi.org/10.34010/icomse.v1i2.3874.
Full textBarbour, Leonard J. "EwaldSphere: an interactive approach to teaching the Ewald sphere construction." Journal of Applied Crystallography 51, no. 6 (2018): 1734–38. http://dx.doi.org/10.1107/s1600576718012876.
Full textTukino, Tukino. "Pelatihan Microsoft Office 2010 pada Kelompok Kerja Kepala TK (K3TK) dan Gugus Paud Naga di Kota Batam sebagai Aplikasi dari Pembelajaran Komputer pada Anak Usia Dini." J-ABDIPAMAS (Jurnal Pengabdian Kepada Masyarakat) 2, no. 2 (2018): 65. http://dx.doi.org/10.30734/j-abdipamas.v2i2.245.
Full textEichelberger, Michelle, and Bonnie Brubaker Imler. "“How do I send an Email?”." Library Hi Tech 33, no. 3 (2015): 329–39. http://dx.doi.org/10.1108/lht-03-2015-0027.
Full textPark, Jungheum, and Sangjin Lee. "Forensic investigation of Microsoft PowerPoint files." Digital Investigation 6, no. 1-2 (2009): 16–24. http://dx.doi.org/10.1016/j.diin.2009.05.001.
Full textPutri, Livia Agna, and Putri Sukma Dewi. "Media Pembelajaran Menggunakan Video Atraktif pada Materi Garis Singgung Lingkaran." MATHEMA: JURNAL PENDIDIKAN MATEMATIKA 2, no. 1 (2020): 32. http://dx.doi.org/10.33365/jm.v2i1.568.
Full textMathieson, SA. "Microsoft postpones more secure Windows." Infosecurity Today 3, no. 2 (2006): 10. http://dx.doi.org/10.1016/s1742-6847(06)70380-9.
Full textJones, T. "Vista vision [Microsoft Windows Vista]." Computing and Control Engineering 18, no. 2 (2007): 22–25. http://dx.doi.org/10.1049/cce:20070205.
Full textGamboa, Jerame, and Alberto G. Gamboa. "Impact to information computer technology: computer competency of Tinajero high school teachers in Philippines." Religación. Revista de Ciencias Sociales y Humanidades 5, no. 24 (2020): 152–57. http://dx.doi.org/10.46652/rgn.v5i24.645.
Full textCusumano, Michael A. "What road ahead for Microsoft and Windows?" Communications of the ACM 49, no. 7 (2006): 21–23. http://dx.doi.org/10.1145/1139922.1139938.
Full textMichener, John R. "Common Permissions in Microsoft Windows Server 2008 and Windows Vista." IEEE Security & Privacy Magazine 6, no. 3 (2008): 63–67. http://dx.doi.org/10.1109/msp.2008.59.
Full textImran, Muhammad, Shumaila Sharif, and Faryal Batool. "Evaluating the Constructive or Destructive Role of PowerPoint in Accounting Education." Journal of Accounting and Finance in Emerging Economies 1, no. 2 (2015): 69–86. http://dx.doi.org/10.26710/jafee.v1i2.65.
Full textMahachandra, Manik, Heru Prastawa, Novie Susanto, and Dhialma Yonathan Susilo. "Perception Analysis of Microsoft Windows OS Users." E3S Web of Conferences 73 (2018): 12008. http://dx.doi.org/10.1051/e3sconf/20187312008.
Full textKunsa’aidah, Kunsa’aidah. "Desain Video Pembelajaran Matematika dengan Aplikasi Microsoft Office Powerpoint." Jurnal Pendidikan dan Pembelajaran Indonesia (JPPI) 1, no. 2 (2021): 95–110. http://dx.doi.org/10.53299/jppi.v1i2.43.
Full textChang, Yu-Chang, and Tzong-Chen Wu. "Information Security Management for Microsoft Windows Enterprise Environments." Research Journal of Applied Sciences, Engineering and Technology 5, no. 13 (2013): 3586–93. http://dx.doi.org/10.19026/rjaset.5.4493.
Full textDjonov, Emilia, and Theo Van Leeuwen. "The semiotics of texture: from tactile to visual." Visual Communication 10, no. 4 (2011): 541–64. http://dx.doi.org/10.1177/1470357211415786.
Full textPermata, Endi, Yus Rama Denny M, Irwanto, and Mohammad Fatkhurrokhman. "Pelatihan Komputer Microsoft Office dan Media Pembelajaran Animasi untuk Meningkatkan Kompetensi Guru SDIT Al Muhajirin." Dinamisia : Jurnal Pengabdian Kepada Masyarakat 5, no. 2 (2021): 413–20. http://dx.doi.org/10.31849/dinamisia.v5i2.5265.
Full textCarlberg, Ulf. "Review: Insects - a World of Diversity." Entomologica Fennica 6, no. 1 (1995): 42. http://dx.doi.org/10.33338/ef.83838.
Full textAurangzeb, Sana, Rao Naveed Bin Rais, Muhammad Aleem, Muhammad Arshad Islam, and Muhammad Azhar Iqbal. "On the classification of Microsoft-Windows ransomware using hardware profile." PeerJ Computer Science 7 (February 2, 2021): e361. http://dx.doi.org/10.7717/peerj-cs.361.
Full textLi, Lin Lin, and Liang Xu Sun. "Online Examination System for Microsoft Office Software Operations." Advanced Materials Research 756-759 (September 2013): 911–15. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.911.
Full textSupardi, Supardi, Nurul Hikmah Kartini, and Agustina Fatmawati. "Pelatihan Komputer sebagai Bentuk Pengembangan Nilai-Nilai Karakter dalam Bidang Pendidikan." PengabdianMu: Jurnal Ilmiah Pengabdian kepada Masyarakat 2, no. 1 (2017): 53–62. http://dx.doi.org/10.33084/pengabdianmu.v2i1.120.
Full textHopper, Douglas A. "ROSESIM: An Interactive Tool for Plant Growth Modeling." HortTechnology 6, no. 1 (1996): 76–79. http://dx.doi.org/10.21273/horttech.6.1.76.
Full textSuyitno, Suyitno. "Diklat (Pendidikan dan Latihan): Strategi Peningkatan Kompetensi Komputer Karang Taruna dan Perangkat Desa Sukowuwuh, Purworejo." Surya Abdimas 3, no. 1 (2019): 6–11. http://dx.doi.org/10.37729/abdimas.v3i1.319.
Full textEichelberger, Michelle, and Bonnie Imler. "Academic technology confidence levels vs ability in first-year traditional and non-traditional undergraduates." Library Hi Tech 34, no. 3 (2016): 468–79. http://dx.doi.org/10.1108/lht-03-2016-0032.
Full textBarbour, Leonard J. "SECTION– a computer program for the graphic display of cross sections through a unit cell." Journal of Applied Crystallography 32, no. 2 (1999): 353–54. http://dx.doi.org/10.1107/s0021889898012679.
Full textKuokkala, V. T. "Computer simulation of transmission electron micrographs by microscope for windows." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 126–27. http://dx.doi.org/10.1017/s0424820100163095.
Full textSchuster, Andreas. "Searching for processes and threads in Microsoft Windows memory dumps." Digital Investigation 3 (September 2006): 10–16. http://dx.doi.org/10.1016/j.diin.2006.06.010.
Full textHarms, Kris. "Forensic analysis of System Restore points in Microsoft Windows XP." Digital Investigation 3, no. 3 (2006): 151–58. http://dx.doi.org/10.1016/j.diin.2006.08.008.
Full textKaminsky, Werner. "WinXMorph: a computer program to draw crystal morphology, growth sectors and cross sections with export files in VRML V2.0 utf8-virtual reality format." Journal of Applied Crystallography 38, no. 3 (2005): 566–67. http://dx.doi.org/10.1107/s0021889805012148.
Full textSeaward, JR, PA Wilson, and CA Stone. "Computer-aided surgical planning in the treatment of soft-tissue sarcoma." Annals of The Royal College of Surgeons of England 92, no. 8 (2010): 639–42. http://dx.doi.org/10.1308/003588410x12699663904556.
Full textAhmed Ali, Abdul Munem Hasan. "Effectiveness of the use of electronic educational blogs in teaching computers on the achievement of students." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 1 (2020): 489. http://dx.doi.org/10.11591/ijeecs.v17.i1.pp489-499.
Full textDiao, Jie Tao, Jing Guo, Hong Qi Yu, Zhao Lin Sun, Hai Jun Liu, and Hong Shan Nie. "The Implementation of a RAM Disk." Applied Mechanics and Materials 198-199 (September 2012): 672–77. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.672.
Full textKim, Ejin, and Hyoung-Kee Choi. "Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild." Security and Communication Networks 2021 (July 23, 2021): 1–13. http://dx.doi.org/10.1155/2021/6245306.
Full textPrice, T. E. "Use Help in Microsoft Windows to Create Your own Computer Assisted Learning Package." International Journal of Electrical Engineering & Education 31, no. 4 (1994): 342–47. http://dx.doi.org/10.1177/002072099403100408.
Full textSchuster, Andreas. "The impact of Microsoft Windows pool allocation strategies on memory forensics." Digital Investigation 5 (September 2008): S58—S64. http://dx.doi.org/10.1016/j.diin.2008.05.007.
Full textBarbour, Leonard J. "LAYER– a computer program for the graphic display of intensity data as simulated precession photographs." Journal of Applied Crystallography 32, no. 2 (1999): 351–52. http://dx.doi.org/10.1107/s0021889898012667.
Full textShuttleworth, Roger. "Computer Language Settings and Canadian Spellings." TESL Canada Journal 29, no. 1 (2012): 121. http://dx.doi.org/10.18806/tesl.v29i1.1094.
Full textDick, Stephanie, and Daniel Volmar. "DLL Hell: Software Dependencies, Failure, and the Maintenance of Microsoft Windows." IEEE Annals of the History of Computing 40, no. 4 (2018): 28–51. http://dx.doi.org/10.1109/mahc.2018.2877913.
Full textJohnson, A. P., and M. W. S. Macauley. "High precision timing within Microsoft Windows: threads, scheduling and system interrupts." Microprocessors and Microsystems 25, no. 6 (2001): 297–307. http://dx.doi.org/10.1016/s0141-9331(01)00122-3.
Full textPARK, J., Y. H. JANG, S. HONG, and Y. PARK. "Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments." Advances in Electrical and Computer Engineering 19, no. 2 (2019): 23–28. http://dx.doi.org/10.4316/aece.2019.02003.
Full textTown, William. "Computer Software Reviews. A Comparison of Microsoft Word for Windows Version 2.0 with Lotus Ami Pro for Windows Release 2.0." Journal of Chemical Information and Modeling 32, no. 5 (1992): 567–69. http://dx.doi.org/10.1021/ci00009a602.
Full textMomodahi, Juhuria, Yudi Klaus Patiro, Eliyah Acantha M. Sampetoding, and Esther Sanda Manapa. "Rancang Bangun Sistem Informasi Keuangan Badan Ta’mirul Masjid Nursalam Bantik Beo Kabupaten Kepulauan Talaud." JTIM : Jurnal Teknologi Informasi dan Multimedia 3, no. 1 (2021): 14–20. http://dx.doi.org/10.35746/jtim.v3i1.127.
Full textC, Jaymar, and Marifel Grace Capili-Kummer. "Giddy Ion Reloaded: Desktop Manager, Optimizer with Multi Utility Tool." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 154–58. http://dx.doi.org/10.35940/ijrte.e5238.019521.
Full textHanner, K., and R. Hörmanseder. "Managing Windows NT®file system permissions— A security tool to master the complexity of Microsoft Windows NT®file system permissions." Journal of Network and Computer Applications 22, no. 2 (1999): 119–31. http://dx.doi.org/10.1006/jnca.1999.0086.
Full textZadereyko, Olexander, Olena Trofymenko, and Nataliia Loginova. "ALGORITHM OF USER’S PERSONAL DATA PROTECTION AGAINST DATA LEAKS IN WINDOWS 10 OS." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 9, no. 1 (2019): 41–44. http://dx.doi.org/10.5604/01.3001.0013.0905.
Full textViduka, Dejan, and Vladimir Kraguljac. "Comparison of human computer interaction on Windows and Linux operations systems." Trendovi u poslovanju 7, no. 2 (2019): 95–101. http://dx.doi.org/10.5937/trendpos1902095v.
Full textNuin, Paulo A. S., and P. A. Otto. "A program for representing and simulating population genetic phenomena." Genetics and Molecular Biology 23, no. 1 (2000): 53–60. http://dx.doi.org/10.1590/s1415-47572000000100009.
Full textChaudri, Abida, and Ville Patja. "Windows v Lindows – have Microsoft won the battle only to lose the war?" Computer Law & Security Review 20, no. 4 (2004): 321–23. http://dx.doi.org/10.1016/s0267-3649(04)00057-3.
Full text