SEARCH RESULTS

YOU WERE LOOKING FOR :Cognitive Science And Information Technology

Essays 751 - 780

The Adoption of Technology by Senior Citizens

In a paper of seven pages, the writer looks at technology use by senior citizens. Adoption of technology is examined through the d...

Using Technology in Education

In a paper of ten pages, the author reflects on the use of technology as a tool for instruction. The author considers the use of ...

VoIP in the Commercial Environment

The writer looks at the potential value that may be realized by a firm implementing VoIP technology to save costs on telecommunic...

Research and the Value of Educational Technology

In a paper of nine pages, the writer looks at educational technology. The importance of planning and evaluation in the use of tech...

Educational Technology and its Many Uses

In a paper of eleven pages, the writer looks at educational technologies. A case study of a sophomore world history class is used ...

Communication and Technology

In a paper of six pages, the writer looks at communication and technology. The diminishing of interpersonal communication as a res...

Architecture - Technology and Art

form of structure, function, and aesthetics. This paper will explore how the evolution of technology has influenced the evolution ...

America’s Grade Schools and the Importance of Technology and Technology Integration

rest of the world in ways early educators would have thought unimaginable. From early ages, children are exposed to technology, a...

Wal-Mart And RFID

in the companys business management software (The Microsoft Corporation, 2005). Thus, RFID can track an item from its origination ...

Aviation Maintenance

mobile offices" (Pryma, 2002, p. NA). The portability of the laptops allows maintenance workers to bring them on the plane, if the...

An Interview Using the ADDRESSING Format

In a paper of six pages, the author integrates information derived from an interview into a specific format, providing information...

Architecture of Information Systems

this paradigm, it is also useful to understand that basic information systems architecture is divided into two key areas: hardware...

Assessing Individual Employee Motivation

This paper is based on information provided by the student. The motivational assessment has taken place on three employees, the w...

Survey Asthmatic Children

(HealthyPeople.gov, 2012)? All parents who have children with asthma will be invited to a meeting at the school. At that meeting,...

Sources of Information for a Strategic Analysis

realistic objectives or goals, whereas the vision statement should be inspirational. The values statements should be deemed as com...

Case Study Diagnosis

2010). In addition, Moniques behaviors, including drinking to the point where she blacks out and being unable to participate in w...

Competitive Advantage Through Information Systems

same way that would have once happened in a paper environment (Kumar & Babu, 2011). In other words, a J2EE developer in such an or...

Issues with RHIOs

A RHIO is a type of health information exchange organization where certain professionals upload health/medical data and other prof...

Explanation Two Therapeutic Models

Dialectical behavior therapy (DBT) is a very specific type of cognitive behavioral psychotherapy developed by Marsha M. Linehan to...

Adult Diabetic Education, Overview of a Meeting

This paper reports on an educational information intervention for adults with diabetes mellitus, which was designed to provided th...

Cognitive Development and Therapy

Piaget did not start out to be a developmental psychologist. He was very interested in natural sciences and did not turn to psycho...

Article Review on Skin Care

In a paper of three pages, the author reflects on an article entitled: Providing Patients with Information on Caring for Skin. T...

Overview of Crime

aggressively approach them, was no surprise. This particular writer also understood that there was a difference between mass murde...

Overview of Information Security Management

the ability to read directions can become a hacker because information on how to hack abounds on the Internet, in publications and...

Internet, Data Integrity, and Genealogical Research

"Genealogy links a person to their past ancestors and gives a sense of bringing a family together. But with this, the...

MIC Agents of Change

The broad framework of MIC systems includes a variety of systems and approaches. Among these are: * Costing systems, including ac...

A Consideration of Ann Wells' 'Who Owns Information?: From Privacy to Public Access'

risks which currently exist in regard to information privacy and eloquently addresses the evolutionary trend toward information ma...

Crime Investigations and the Media's Role

has also led to accusations of copycat crimes. Overall, it has been determined that the best balance of this relationship is too m...

Law Regarding Protecting Information

Online (Legal Information Institute, 2011). Websites that target children as their audience and deliberately collect unauthorized ...

Substance Abuse in Older Populations

processes, and appropriate diagnosing, as well as proposing specific interventions that can be used and preventative strategies fo...