首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   27篇
  免费   2篇
教育   10篇
体育   2篇
信息传播   17篇
  2018年   1篇
  2015年   1篇
  2013年   2篇
  2012年   1篇
  2011年   2篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2007年   1篇
  2005年   2篇
  2000年   1篇
  1999年   1篇
  1992年   2篇
  1988年   1篇
  1986年   2篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1978年   1篇
  1973年   1篇
  1959年   1篇
  1955年   1篇
排序方式: 共有29条查询结果,搜索用时 31 毫秒
11.
12.
胡敏是阜阳市委原老干部局活动中心副主任,2006年8月退休。多年来,她一直积极地组织社会广大群众尤其足中老年朋友开展各种型式的体育健身活动,并不断地向区、县、乡镇社区拓展,对阜阳市群众体育活动的蓬勃发展做出了积极的贡献。  相似文献   
13.
14.
食指的诗对文革以后朦胧诗的诞生与形成起到决定性的影响。考察食指的诗,可以探究红卫兵的悲剧命运。诗人郭路生无法战胜文革的重压,自我分裂或许为他带来了不足为他人道的自由,但是文革之后,更多的红卫兵一代或成为潜在的分裂症患者,或成为社会的中坚力量。诗人选用“食指”作为笔名来表达自己的抵抗与嘲笑,具有与众不同的意味:中国的诗人在创作中或日常生活中,总会受到无形的压制,但是无论别人如何在背后指指点点,说三道四,人格健全的诗人也不会受到任何伤害。  相似文献   
15.
16.
As policy makers and educators respond to legislation promoting the inclusion of students with disabilities in general education classrooms, there is sometimes confusion about why this is being done and how it can be accomplished effectively. In this article, two categories of fallacies, or misunderstandings, are identified. The first fallacy is that students with disabilities are incapable of learning the general education curriculum. The second fallacy is that teachers are required to ‘cover’ the entire curriculum, sometimes at a pace that leaves students with and without disabilities behind. Facts are presented following each fallacy. These facts describe research‐based pedagogies effective for students with and without disabilities, indicating that students with mild disabilities can learn the general education curriculum when responsive pedagogies are used. These facts also describe how schools that promote differentiation can potentially achieve higher scores on large‐scale assessments than schools that promote ‘one size fits all’ instruction.  相似文献   
17.
When faced with an abundance of articles, readers must weigh the relative importance of various characteristics to select which articles to read. Over 400 researchers in 12 countries responded to a questionnaire that asked them to rank seven article characteristics and rate 16 article profiles. After article topic, the next most highly ranked characteristics were online accessibility and source of article. Conjoint analysis revealed the highest rated profiles to be (i) article written by a top‐tier author, in a top peer‐reviewed journal, available online at no personal cost to the reader; and (ii) article written by a top‐tier author, in a peer‐reviewed journal not in the top tier, available online at no personal cost to the reader. There were significant differences in characteristic rankings by discipline and geographic location.  相似文献   
18.
Cyber attacks are becoming commonplace in the business world today. But, it isn't just affecting the large businesses and conglomerates. Computer experts are indicating that it is affecting millions of computers worldwide and is causing professionals, academics, and government officials to rethink computer information's security. But how are these new age criminals gaining their skills? Many are suggesting it is the hallowed halls of the nation's and world's universities and colleges, and even the lower educational levels, which are providing the skills. As technology is exponentially increasing, so is the incidence of cyber attacks. In the recent episodes of computer espionage and attacks, hackers have become much more sophisticated and more alarmingly, much younger. The computer is a man-made device that requires political, legal, and ethical responsibilities. In assessing the social responsibilities associated with information technology as we move into the new millennium, the organization must address three simple questions: (1) Is it legal?; (2) Is it balanced?; and (3) How will it make me feel? An ethical environment within an organization utilizing information technology can be easily established, with or without an ethics officer, if the organization follows the guide of these questions. This ethical environment will demonstrate a corporate and educational conscience that could lead the organization into the next century. Colleges and universities call for proactivity rather than reactivity.  相似文献   
19.
Electronic journals are now the norm for accessing and reading scholarly articles. This article examines scholarly article reading patterns by faculty in five US universities in 2012. Selected findings are also compared to some general trends from studies conducted periodically since 1977. In the 2012 survey, over three‐quarters (76%) of the scholarly readings were obtained through electronic means and just over half (51%) of readings were read on a screen rather than from a print source or being printed out. Readings from library sources are overwhelmingly from e‐sources. The average number of articles read per month was 20.66, with most articles read by the medical and other sciences, and on average each article was read for 32 minutes.  相似文献   
20.
Traditionally, communication scholars have examined nuclear discourse at the expense of nuclear images. This essay compensates by developing a nuclear-critical iconology, one sensitive to the role of images in creating and disrupting popular consent to the production of nuclear weapons. As such, this essay contributes to larger critical projects concerned with visual rhetoric and post-Cold War culture. Following a review of Cold War nuclear iconography and the changing post-Cold War nuclear condition, I examine three aesthetics in post-Cold War nuclear iconography for their signi.cance and potential consequences.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号