| Chapter 4 Computers This chapter is designed to invite your attention to a very wide range of possibilities for journalistic applications. As background for that broad spectrum, we shall now indulge in a little bit of nostalgia 81.57 Kb. 1 | read |
| An interview with Stephen Porges about his polyvagal theory By Ravi Dykema Based on the theory, Porges and his colleagues have developed treatment techniques that can help people communicate better and relate better to others 58.43 Kb. 1 | read |
| Irina Nikitina, the pupil of the 11 “B” form cg supervisors: L. I. Ivina, the teacher of Biology Katherine П, handed the whole horse regiment to the Tambov national militia in 1812, by putting on the horses his own bonded recruits. He also gave regimentals, armed and supplied the regiment with provisions for three months 53.23 Kb. 1 | read |
| Diffie-Hellman key exchange Furthermore, computers were able to encrypt any type of data represented in any binary format, unlike classical ciphers which only encrypted written language texts. Computer use has thus supplanted linguistic cryptography 56.07 Kb. 1 | read |
| Masaryk university brno faculty of education I would like to express my thanks to PhDr. Alena Kašpárková, who kindly assisted my effort as the supervisor of this bachelor thesis 3.57 Mb. 14 | read |
| The antediluvian world This book is an attempt to demonstrate several distinct and novel propositions. These are 1.44 Mb. 26 | read |