Langsung ke konten utama

Translating Time : Cinema, the Fantastic, and Temporal Critique (9780822345107)

Under modernity, time is regarded as linear and measurable by clocks and calendars. Despite the historicity of clock-time itself, the modern concept of time is considered universal and culturally neutral. What Walter Benjamin called "homogeneous, empty time" founds the modern notions of progress and a uniform global present in which the past and other forms of time consciousness are seen as superseded. In Translating Time, Bliss Cua Lim argues that fantastic cinema depicts the coexistence of other modes of being alongside and within the modern present, disclosing multiple "immiscible temporalities" that strain against the modern concept of homogeneous time. In this wide-ranging study-encompassing Asian American video (On Cannibalism), ghost films from the New Cinema movements of Hong Kong and the Philippines (Rouge, Itim, Haplos), Hollywood remakes of Asian horror films (Ju-on, The Grudge, A Tale of Two Sisters) and a Filipino horror film cycle on monstrous viscera ...

C# für IT-Berufe : mit WPF (3808585552)



Das vorliegende Buch vermittelt die Sprache C sharp anschaulich, praxis- und unterrichtsnah. Damit verfolgt dieses Buch einen praktischen Ansatz. So wird gerade in der schulischen Ausbildung der Zugang zu den komplexen Themen der Programmierung verstärkt durch anschauliche und praktische Umsetzung vorbereitet. Anschließend können allgemeine und komplexe Aspekte der Programmierung sowie der Softwareentwicklung besser verstanden und umgesetzt werden. Das Buch besteht aus drei Teilen. Der erste Teil des Buches dient als Informationsteil und bietet eine systematische Einführung in die Sprache C sharp und in die Grundlagen von .NET. Ein ausführlicher Einstieg in die Windows-Programmierung (sowohl mit Windows-Forms als auch mit WPF) rundet den Informationsteil ab.Der zweite Teil des Buches ist eine Sammlung von Übungsaufgaben. Nach der Erarbeitung der entsprechenden Kenntnisse aus dem Informationsteil können die Aufgaben aus diesem Teil zur weiteren Auseinandersetzung mit den Themen dienen und durch verschiedene Schwierigkeitsgrade auch die Differenzierung im Unterricht ermöglichen.Der dritte Teil des Buches beinhaltet Lernsituationen basierend auf dem Lernfeld "Entwickeln und Bereitstellen von Anwendungssystemen" aus dem Rahmenlehrplan für die IT-Berufe (speziell Fachinformatiker Anwendungsentwicklung). Lernsituationen konkretisieren sich aus den Lernfeldern und sollen im Idealfall vollständige Handlungen darstellen (Planen, Durchführen, Kontrollieren). Aus diesem Grund werden die Lernsituationen so angelegt, dass neben einer Planungsphase nicht nur die Durchführung (Implementation des Programms) im Blickpunkt steht, sondern auch geeignete Testverfahren zur Kontrolle des Programms bzw. des Entwicklungsprozesses in die Betrachtung einbezogen werden. Die Lernsituationen können aber auch als Projektideen verstanden werden. Das Buch ist für alle berufsbezogenen Ausbildungsgänge im IT-Bereich konzipiert. Durch die differenzierten Aufgabenstellungen kann es in allen IT-Berufen (speziell Fachinformatiker), aber auch von den informationstechnischen Assistenten genutzt werden.


Product details

  • Paperback | 328 pages
  • 210 x 240 x 18mm | 881g
  • German
  • 2. Auflage.
  • 2-fbg.
  • 3808585552
  • 9783808585559


Download C# für IT-Berufe : mit WPF (3808585552).pdf, available at ebookdownloadfree.co for free.

>DOWNLOAD NOW<

Komentar

Postingan populer dari blog ini

Ren Hang (9783836562072)

Ren Hang, who took his life February 23, 2017, was an unlikely rebel. Slight of build, shy by nature, prone to fits of depression, the 29-year-old Beijing photographer was nonetheless at the forefront Chinese artists' battle for creative freedom. Like his champion Ai Weiwei, Ren was controversial in his homeland and wildly popular in the rest of the world. He said, "I don't really view my work as taboo, because I don't think so much in cultural context, or political context. I don't intentionally push boundaries, I just do what I do." Why? Because his models, friends, and in his last years, fans, are naked, often outdoors, high in the trees or on the terrifyingly vertiginous rooftops of Beijing, stacked like building blocks, heads wrapped in octopi, body cavities sprouting phone cords and flowers, whatever entered his mind at the moment. He denied his intentions were sexual, and there is a clean detachment about even his most extreme images: the urine, the ...

RoomHate (9781523662449)

RoomHate: The #1 Wall Street Journal Bestseller From New York Times Bestselling Author, Penelope Ward, comes a new standalone novel. Sharing a summer house with a hot-as-hell roommate should be a dream come true, right? Not when it's Justin...the only person I'd ever loved...who now hates me. When my grandmother died and left me half of the house on Aquidneck Island, there was a catch: the other half would go to the boy she helped raise. The same boy who turned into the teenager whose heart I broke years ago. The same teenager who's now a man with a hard body and a hardass personality to match. I hadn't seen him in years, and now we're living together because neither one of us is willing to give up the house. The worst part? He didn't come alone. I'd soon realize there's a thin line between love and hate. I could see through that smug smile. Beneath it all...the boy is still there. So is our connection. The problem is...now that I can't have ...

Cyber Mercenaries : The State, Hackers, and Power (9781107566866)

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics. ...