You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The study was led by six research questions, and six hypotheses were examined at a significance level of 0.05. The quasi-experimental design was used, notably the non-equivalent control group design for the pretest and posttest. 4,873 senior secondary school students in the Nnewi Education Zone of the state of Anambra make up the study’s population. In the study, 2.73 percent of the population was used. A sample of 133 Nnewi Education Zone SS2 computer science students was used. The Computer Studies Department and one knowledgeable computer studies teacher from Nnewi. Kudder-Richardson Formula 20 was used to determine the instrument’s reliability. The CSAT was used as a pretest and postt...
Discover techniques to summarize the characteristics of your data using PyPlot, NumPy, SciPy, and pandas Key FeaturesUnderstand the fundamental concepts of exploratory data analysis using PythonFind missing values in your data and identify the correlation between different variablesPractice graphical exploratory analysis techniques using Matplotlib and the Seaborn Python packageBook Description Exploratory Data Analysis (EDA) is an approach to data analysis that involves the application of diverse techniques to gain insights into a dataset. This book will help you gain practical knowledge of the main pillars of EDA - data cleaning, data preparation, data exploration, and data visualization. ...
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
This book on road traffic congestion in cities and suburbs describes congestion problems and shows how they can be relieved. The first part (Chapters 1 - 3) shows how congestion reflects transportation technologies and settlement patterns. The second part (Chapters 4 - 13) describes the causes, characteristics, and consequences of congestion. The third part (Chapters 14 - 23) presents various relief strategies - including supply adaptation and demand mitigation - for nonrecurring and recurring congestion. The last part (Chapter 24) gives general guidelines for congestion relief and provides a general outlook for the future. The book will be useful for a wide audience - including students, practitioners and researchers in a variety of professional endeavors: traffic engineers, transportation planners, public transport specialists, city planners, public administrators, and private enterprises that depend on transportation for their activities.
An Administrator’s Guide to Online Education is an essential resource for the higher education administrator. Unlike most books regarding online education, this book is not about teaching; it is about effectively administrating an online education program. Grounded in existing distance education theory, and drawing from best practices, current research, and an extensive review of current literature, An Administrator’s Guide to Online Education systematically identifies and discusses seven key issues that affect the practice of online education today: leadership and strategic planning, policy and operation, faculty, online student services, online student success, technology and the courseware management system, and finally marketing. Throughout the text, the authors provide case studies, examples, policies, and resources from actual institutions, which further enhance the value of this text. An Administrator’s Guide to Online Education, encompasses the issues and provides information on how to accomplish one specific task: successful online education administration.
This best-selling text continues in its eighth edition to provide the most current and comprehensive coverage of business research. Its student-friendly design contains numerous examples illustrating real-world research in management, marketing, finance, accounting, and other business areas. BUSINESS RESEARCH METHODS, 8E, is the ideal text for undergraduate and first year MBA courses in marketing, management, or quantitative studies.
One morning, Emma wakes up feeling excited about a very special dream. She flies up high through the clouds and comes to a beautiful land called heaven where she has all sorts of adventures. Is this just a dream, or is there something magical about her journey?
In response to the exponentially increasing need to analyze vast amounts of data, Neural Networks for Applied Sciences and Engineering: From Fundamentals to Complex Pattern Recognition provides scientists with a simple but systematic introduction to neural networks. Beginning with an introductory discussion on the role of neural networks in
An introduction to the politics and society of post-colonial Nigeria, highlighting the key themes of ethnicity, democracy, and development.
In this book you'll learn everything you wanted to know about computer viruses, ranging from the simplest 44-byte virus right on up to viruses for 32-bit Windows, Unix and the Internet. You'll learn how anti-virus programs stalk viruses and what viruses do to evade these digital policemen, including stealth techniques and poly-morphism. Next, you'll take a fascinating trip to the frontiers of science and learn about genetic viruses. Will such viruses take over the world, or will they become the tools of choice for the information warriors of the 21st century? Finally, you'll learn about payloads for viruses, not just destructive code, but also how to use a virus to compromise the security of a computer, and the possibility of beneficial viruses.