Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- Evaluation research (Social action programs) 7
- Evaluation 4
- Business communication 3
- Criminal law 3
- Economic policy 3
- Molecular biology 3
- Social sciences 3
- BASIC (Computer program language) 2
- Biochemistry 2
- Business English 2
- Business writing 2
- Computer simulation 2
- Data processing 2
- Democracy 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Economic development 2
- English language 2
- Health 2
- Java (Computer program language) 2
- Methodology 2
- Program Evaluation 2
- Programmed instruction 2
- Research 2
- Social sciences--Data processing 2
- Statistical methods 2
- Sustainable development 2
-
41
Internal risk assessment of development and implementation of the state programs
Published 2022-09-01Subjects: Get full text
Article -
42
Business Retention and Expansion (BRE) Programs: Characteristics of Successful BRE Programs
Published 2008-04-01“…Cothran, is third in a series on establishing business retention and expansion (BRE) programs. It identifies and explores five of the most common characteristics of BRE programs recognized for their success. …”
Get full text
Article -
43
The Establishment of Agricultural Leadership Programs and the International Association of Programs for Agricultural Leadership
Published 2012-10-01“…The Kellogg Farmers Study Program established agricultural leadership programs in 1965. …”
Get full text
Article -
44
The Establishment of Agricultural Leadership Programs and the International Association of Programs for Agricultural Leadership
Published 2012-10-01“…The Kellogg Farmers Study Program established agricultural leadership programs in 1965. …”
Get full text
Article -
45
Business Retention and Expansion (BRE) Programs: Characteristics of Successful BRE Programs
Published 2008-04-01“…Cothran, is third in a series on establishing business retention and expansion (BRE) programs. It identifies and explores five of the most common characteristics of BRE programs recognized for their success. …”
Get full text
Article -
46
Business Retention and Expansion (BRE) Programs: Characteristics of Successful BRE Programs
Published 2008-04-01“…Cothran, is third in a series on establishing business retention and expansion (BRE) programs. It identifies and explores five of the most common characteristics of BRE programs recognized for their success. …”
Get full text
Article -
47
-
48
Program Evaluation : a primer for effectiveness, quality, value /
Published 2024Subjects: “…Program Evaluation 13667…”
View in OPAC
Book -
49
-
50
Developing a Program Plan Based on the Program Planning Cycle
Published 2017-12-01Subjects: “…program plan…”
Get full text
Article -
51
Developing a Program Plan Based on the Program Planning Cycle
Published 2017-12-01Subjects: “…program plan…”
Get full text
Article -
52
Program Logic Foundations: Putting the Logic Back into Program Logic
Published 2020-12-01Subjects: “…program logic…”
Get full text
Article -
53
A senior moment: What is the program of programmed cell death?
Published 2025-07-01Get full text
Article -
54
Developing a Program Plan Based on the Program Planning Cycle
Published 2017-12-01Subjects: “…program plan…”
Get full text
Article -
55
Evaluating Extension Programs
Published 2011-06-01“…Is program evaluation just a “necessary evil” for Extension program implementation? …”
Get full text
Article -
56
Splicing Programs and Cancer
Published 2012-01-01“…These observations suggest that splicing programs contribute to specific cellular programs that are altered during cancer initiation and progression. …”
Get full text
Article -
57
Evaluating Extension Programs
Published 2011-06-01“…Is program evaluation just a “necessary evil” for Extension program implementation? …”
Get full text
Article -
58
Non-Fungible Programs
Published 2025-08-01“…Here we introduce the Non-Fungible Program (NFP) model for developing self-contained frontend applications that are distributed via blockchain, powered by web technology, backed by encrypted databases, and controlled by confidential smart contracts. …”
Get full text
Article -
59
-
60