Descriptor
Source
| Journal of Chemical Education | 1 |
| School Business Affairs | 1 |
| Special Libraries | 1 |
| Wilson Library Bulletin | 1 |
Author
| Candler, Ann C. | 1 |
| Carnahan, Lisa J. | 1 |
| Seaton, William H. | 1 |
| Soled, E. H. | 1 |
| Wack, John P. | 1 |
| Williams, Gene | 1 |
| Wold, Geoffrey H. | 1 |
Publication Type
| Journal Articles | 4 |
| Guides - General | 2 |
| Guides - Non-Classroom | 2 |
| Reports - Descriptive | 2 |
| Speeches/Meeting Papers | 1 |
Education Level
Audience
| Practitioners | 6 |
| Administrators | 2 |
| Media Staff | 2 |
| Researchers | 2 |
| Teachers | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Williams, Gene – Wilson Library Bulletin, 1986
Describes how to identify microcomputer problems and determine whether the services of a technician are required by troubleshooting, or using a process of elimination, without needing a technical background or special tools. Prevention methods and the use of diagnostic programs are also explained. (EM)
Descriptors: Computer Software, Equipment Maintenance, Microcomputers, Prevention
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
Wold, Geoffrey H. – School Business Affairs, 1988
The availability of micro-to-mainframe communications software has provided computer thieves with new tools. Explains how to establish and maintain proper electronic data processing controls. (MLF)
Descriptors: Computer Software, Computers, Crime Prevention, Documentation
Peer reviewedSoled, E. H.; And Others – Special Libraries, 1987
This description of the role of the Information Services Division of Exxon Research and Engineering Division in emergency management covers the information technology developed and used for internally generated and published information, and how this information is used to prevent emergencies and deal with them should they actually occur. (EM)
Descriptors: Computer Software, Emergency Programs, Indexing, Industry
Candler, Ann C.; And Others – 1990
Substance abuse is pervasive in both rural and urban settings. Previous attempts to educate America's youth as to its dangers have not reduced the numbers of adolescents involved in the drug culture. The assertiveness-based "Just Say No" campaign attempts to counter peer pressure to use drugs, but is hampered by our society's…
Descriptors: Computer Assisted Instruction, Computer Software, Distance Education, Drug Education
Peer reviewedSeaton, William H. – Journal of Chemical Education, 1989
Provided is an empirical method to train students to avoid physical disaster in their work experience. Discussed is a computer program, CHETAH, which can be used in advance of synthesis to classify the possible explosive nature of the products. Plosophoric and auxoplosive weights of many organic groups are listed. (MVL)
Descriptors: Accident Prevention, Chemical Reactions, Chemistry, College Science


