Bowes, 1990 - Google Patents
Computer technology, legal secretaries, and the law office: A case studyBowes, 1990
- Document ID
- 15101248962848941445
- Author
- Bowes L
- Publication year
External Links
Snippet
Untitled Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11
Page 12 Page 13 Page 14 Page 15 Page 16 Page 17 Page 18 Page 19 Page 20 Page 21 Page
22 Page 23 Page 24 Page 25 Page 26 Page 27 Page 28 Page 29 Page 30 Page 31 Page …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bagger et al. | Supersymmetry and supergravity | |
Naparsteck et al. | An Interview with Tim O'Brien | |
Bowes | Computer technology, legal secretaries, and the law office: A case study | |
Thörnqvist | Ungdomsved i barrträd | |
Hoffmeier | The Egyptians | |
McLeod | Change and development | |
MacDonald | Literature and society in the Canadas, 1830-1850. | |
Orlando | Santamarian 1991 | |
Dingping | Anyon, Chern-Somons theory, and FQHE | |
Gold | Teaching Classics: The Jesuit Way versus the Big Business Approach | |
Walsh | Writing in the dark: Cha (i) n (g) ing me anings | |
Warren | The first year for four elementary principals | |
Adam | On Plato's Euthyphro | |
Jones | Neoconservative ideology in Alberta Education policy | |
O'Hara | Selves in Flames: Derrida, Rorty, and the New Orthodoxy in Theory | |
Jaworsky | Dissent, ethnonationalism, and the politics of coercion in the USSR. | |
Viguers | Fairytales, authorship, and aesthetic response | |
Fougere | Santamarian 1992 | |
Duxbury | Santamarian 1989 | |
Kohl | Confronting Stravinsky: Man, Musician, and Modernist | |
Ewachow | A study to identify word processing competencies in office positions in the Yorkton, Saskatchewan, area | |
Shrestha et al. | Computer Bigyan | |
Vujić et al. | Matematičke metode u rudarstvu i geologiji | |
Buck | The McKracken | |
Fears | Extralegal restrictions on religious practice in the USSR, 1917-1953. |