SEARCH RESULTS

YOU WERE LOOKING FOR :Application of Auditing Techniques of Information Systems

Essays 2371 - 2400

School Field Trips, Tort Liability, and In Loco Parentis

In eight pages school settings are considered in an in loco parentis application that discusses field trips and teacher liability ...

Reggio Emilia and the Zone of Proximal Development of Lev Vygotsky

and educational focus as a whole. II. Vygotsky Vygotsky suggests that learning is based within the zone of proximal developme...

Social Content and Literacy Connection

In six pages cultural literacy in the classroom is examined in terms of social studies course application that can bridge the gaps...

Educational Leadership Effectiveness

In five pages this essay considers what it takes to achieve effectiveness in educational leadership with an application of Scott's...

Foreign Language Instruction and Technologies

In ten pages this paper discusses foreign language teaching and the application of technology in the US and elsewhere. Twenty one...

Publishing and Applications That Are Intranet, Extranet, and Internet Based

We already see regular deployment being driven faster than we first anticipated" (Lange, 1997, p. 22). II. INTRANET-BASED APPLICA...

Overview of Digital Video Cameras

of a digital video camera before writing the check for $1,500-$2,500 to purchase the camera. According to Ozer (1998), the ...

Communications and Fiber Optics

In six pages communications and fiber optics technology in terms of development and applications are presented in this overview. ...

Medicine and the Use of Fiber Optics

In six pages the applications of fiber optics in medicine are explored. Seven sources are cited in the bibliography....

Twenty First Century US Army

In eight pages this essay examines the application of computer technology to the twenty first century American Army. Five sources...

VRML

which may be why VRML hasnt really caught on yet. However, those futuristic worlds of Hollywood are no longer "science fic...

Search Applications, Java, and Complexity of Symbolic Artificial Intelligence

Wide Web which previously had not existed, providing new dimensions for primarily static web-based material. Countless numbers of ...

Overview of Internet Protocol Multicasting

In ten pages this paper provides a technical overview of IP multicasting and discusses new software and hardware applications. Si...

Future of the Internet

In fourteen pages this history of the Internet also considers its future applications and uses. There are 8 sources cited in the ...

Individual Application of Cognitive Communication Theory

In four pages an individual's daily life and the application of cognitive communication theory are examined in terms of meaningful...

Nina Zaragoza's 'Rethinking Language Arts'

strengths and power of all children, rather than the weaknesses (Zaragoza, 1997) Perfectionism is an issue because it distances th...

Language Indirectness Uses and Linguistics

In fifteen pages this paper discusses language indirectness and its uses in a variety of situations and applications. Twelve sour...

Classrooms and Constructivism

In five pages the classroom application of the learning method known as constructivism is considered in terms of its definition, p...

Criminal Justice and Phrenology

This paper consists of ten pages and discusses the criminal justice applications of phrenology or studying the contours of the sku...

Music Instruction and the Use of Technology

the extent of that role and exactly what it should be is still a matter for conjecture. For example, Garvin (1994) believes that ...

Children's Reading Motivations and Effective Strategies

In ten pages this research paper discusses children's reading and various classroom motivational strategies with current research ...

Espionage and Game Theory

In ten pages this paper considers espionage through an application of game theory and as it has evolved from the fiction of James ...

Prostitution and Theories of Systematic Deviance

In four pages this paper examines prostitution through an application of systematic deviance sociological theories. Two sources a...

Overview of the Labeling Theory

According to Bartusch, "The delinquent label, in turn, influences the self-image of the youth, who comes to view himself or hersel...

Security Management and Social Theory

has decreased 50 percent overall. The psychology has changed and it is working. Enforcement forces in those cities are no longer t...

Social Learning Theory in '8 Ball Chicks'

there is nothing else "but us" to provide protection, safety and survival for the girls who join gangs. Within those gangs, they ...

Social Theory Application in the Polly Klaas Murder Case

The sociological reasons for committing crimes are considered in this paper consisting seven pages with the emphasis on Polly Klaa...

Application of Forensics in Explosives Investigations

This paper examines the various applications of forensic science in cases involving explosives. This eight page paper has seven ...

Law Enforcement and Public Administration

to accomplish community policing, all of these extend beyond the law enforcement agency and involve members of the community. New ...

Prison Recreation Specialist and Human and Health Performance Research

In twenty pages research conducting, reading, and application of research findings are considered within the context of a Prison R...