Nothing Special   »   [go: up one dir, main page]

Bowes, 1990 - Google Patents

Computer technology, legal secretaries, and the law office: A case study

Bowes, 1990

Document ID
15101248962848941445
Author
Bowes L
Publication year

External Links

Snippet

Untitled Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 13 Page 14 Page 15 Page 16 Page 17 Page 18 Page 19 Page 20 Page 21 Page 22 Page 23 Page 24 Page 25 Page 26 Page 27 Page 28 Page 29 Page 30 Page 31 Page …
Continue reading at era.library.ualberta.ca (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/24Editing, e.g. insert/delete
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
Bagger et al. Supersymmetry and supergravity
Naparsteck et al. An Interview with Tim O'Brien
Bowes Computer technology, legal secretaries, and the law office: A case study
Thörnqvist Ungdomsved i barrträd
Hoffmeier The Egyptians
McLeod Change and development
MacDonald Literature and society in the Canadas, 1830-1850.
Orlando Santamarian 1991
Dingping Anyon, Chern-Somons theory, and FQHE
Gold Teaching Classics: The Jesuit Way versus the Big Business Approach
Walsh Writing in the dark: Cha (i) n (g) ing me anings
Warren The first year for four elementary principals
Adam On Plato's Euthyphro
Jones Neoconservative ideology in Alberta Education policy
O'Hara Selves in Flames: Derrida, Rorty, and the New Orthodoxy in Theory
Jaworsky Dissent, ethnonationalism, and the politics of coercion in the USSR.
Viguers Fairytales, authorship, and aesthetic response
Fougere Santamarian 1992
Duxbury Santamarian 1989
Kohl Confronting Stravinsky: Man, Musician, and Modernist
Ewachow A study to identify word processing competencies in office positions in the Yorkton, Saskatchewan, area
Shrestha et al. Computer Bigyan
Vujić et al. Matematičke metode u rudarstvu i geologiji
Buck The McKracken
Fears Extralegal restrictions on religious practice in the USSR, 1917-1953.