Showing 3,201 - 3,220 results of 4,289 for search 'Korsør~', query time: 1.62s Refine Results
  1. 3201
  2. 3202

    Kajian Strategi Pendidikan Vokasi Bidang Teknologi Informasi dan Komunikasi Menghadapi Bonus Demografi by Faizatul Amalia, Waras Kamdi, R. Machmud Sugandi

    Published 2023-10-01
    “…Untuk mencapai kompetensi siswa SMK TIK dapat dilakukan dengan: penerapan model pembelajaran di kelas seperti problem based learning dan project based learning, penggunaan metode pembelajaran demonstrasi dan discovery learning, penggunaan strategi problem solving, media pembelajaran yang dapat dimanfaatkan berupa e-learning, video, e-modul, software simulation, penggunaan fasilitas yang mumpuni di laboratorium, kurikulum yang disusun mencantumkan prakerin sebagai mata pelajaran yang harus diikuti oleh siswa, penggunaan perangkat pembelajaran melalui LKS berstruktur dan berbasis konstruktivisme, pembangunan sekolah kejuruan berdasarkan konsep corporate school,  kompetensi guru melalui keterampilan pedagogik, sosial dan kepribadian yang dapat mendukung peningkatan motivasi belajar yang nantinya memengaruhi kompetensi siswa, dan pengalaman prakerin dapat meningkatkan kompetensi siswa SMK.   …”
    Get full text
    Article
  3. 3203
  4. 3204
  5. 3205

    Mapping and Analysis of Exit Strategy Research: A Bibliometrics and Systematic Review by Alireza Valipour, Ali Heidari, Mohammad Ali Shahhosseini, Asadollah Kordnaiej

    Published 2024-06-01
    “…Additionally, several theoretical perspectives emerged, including agency theory, corporate governance, resource-based view, and dynamic capability theory.   …”
    Get full text
    Article
  6. 3206
  7. 3207

    Strategy, investment, behaviour and results by Richard Pettinger

    Published 2013-01-01
    “…This comfort and assurance is in turn driven by the fact that it is corporate rather than personal resources that are at risk and so on the face of it ‘there is little that can go wrong’. …”
    Get full text
    Article
  8. 3208

    Multi-level high utility-itemset hiding. by Loan T T Nguyen, Hoa Duong, An Mai, Bay Vo

    Published 2025-01-01
    “…Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …”
    Get full text
    Article
  9. 3209
  10. 3210
  11. 3211
  12. 3212
  13. 3213
  14. 3214
  15. 3215
  16. 3216
  17. 3217
  18. 3218
  19. 3219
  20. 3220