SEARCH RESULTS

YOU WERE LOOKING FOR :Computer Use and Learning Principles

Essays 361 - 390

Technology Questions

In five pages a Q and A format is used to answer 2 questions posed by a student regarding health care professionals and the import...

Aviation Safety and Computer Simulation

real-time computing is essential within military aviation systems. The ongoing threat of global discord warrants military utiliza...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

The Organization as a Machine

The organization as a machine is one of the more common metaphors for organizations emerging in the early years of studying manage...

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Automobile Manufacturing and Computer Vision Solutions

cold-heading and forming process that can produce multifarious quantities at competitive prices with rapid delivery speeds. Moreov...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Overview of Prolog Programming Language

Phillippe Roussel went to Montreal and consulted with Colmerauer on natural languages and in a report he issued that September Col...

Acer Computers: A Case Analysis

research available. By conducting a case analysis, one is able to delve deeply into a topic, identifying not just the superficial ...

Statistical Methods

to be used depending on hoe many of the variables are dependent and the type of dependence, for example, where only one or more v...

Urban Combat Readiness and Computer Simulations

information technology has been growing at an exponential rate. In just a few short years, computers have evolved from large, clun...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

The Importance of Computers in the Food and Beverage Industry

numbers, or planning, computers can assist management in a variety of things. Not only is management provided with advantages with...

Upgrading Riordan Manufacturing's Working Information

production and procurement of raw materials also should assist the company in planning for the future. Riordan currently has mark...

Computers in the Twenty-First Century

it is the advent of the Internet that really changed things and rendered the computer a necessity. What might the typical computer...

Technology/Hospitality Industry

aided both brands in achieving the goal of operating more efficiently, as hotel management can now run the properties more effecti...

Computer Network Security: Security Devices

visited the most" (Surfing the Internet on-board the Web, 1995). Having this information allows these companies to create a target...

Recruitment in the Airline Industry

need to have a great deal of specific knowledge (Bureau of Labor Statistics, 2007). Some pilots are recruited from the military fo...

The Use of Songs and Games to Teach English as a Second Language

repetitive and consistent (Schoepp, 2001). 2. Affective reasons: this reason involves the Affective Filter Hypothesis and basicall...

Computer Assisted Design as a Tool in Organizational Communication

an excellent tool which free the architect/artist/creator a broader area of time and space to develop an appropriate solution to a...

Principles for Life/Apology and Crito

if "what he does is right or wrong, whether he is acting like a good or bad man" ("Apology" 28b)(Plato 32-33). In regards to how ...

Business and Information Technology

In five pages this paper explores the many business uses of information technology in a consideration of competitive advantage and...