SEARCH RESULTS

YOU WERE LOOKING FOR :How to Utilize Databases

Essays 181 - 210

Seiler and Moss (2012), Study Analysis

This analysis pertains to research conducted by Seiler and Moss (2012), which examined the experiences of nurse practitioners addr...

Texas Southern University, Change Leadership

This case study focuses on Texas Southern University, which experienced a scandal that threatened the institution in 2006. The wri...

US Soft Power Strategies During the Cold War

This research paper investigates and describes the various ways in which the US utilized soft power strategies to counter the infl...

Policy, Procedures and Training, Conflict Resolution

This research paper presents a discussion of workplace conflict that discusses what this topic involves, as well as the factors co...

Application to a Case Study, Stages of Change

This case study pertains to Manuel, a Hispanic 50-year-old who needs to lose weight in order to avoid the development of type 2 di...

Schizophrenic Homeless Placement, A Proposed Project

This research paper presents a plan for a proposed project that will utilize a sample group of 30 homeless male participants who ...

Sample Memorandum Regarding a Change in Email Communication Rules

One cannot express emotion in email, which is why we use emoticons. Of course, in formal messages, the emoticons are often not use...

1920s’ Berlin, German Expressionism, and the Architecture and Lighting in Orson Welles’ Film The Trial

Expressionists were predicting an urban catastrophe even before the First World War, and within the ruins that still existed in th...

Research Design and Methods Analysis

the traditional one-on-one model" (Herrara, Vang and Gale, 2002, p. 4). Prior to presenting their method analysis section, the res...

Software Selection Process

after sales support that will be needed. Two of the methods that are often used to select software are those of elimination...

Symbolism in Nathaniel Hawthorne’s The Scarlet Letter

were signified by it" (1323). He then goes into great narrative detail to describe the letter to emphasize its significance: "The...

Communication Models; Information Transfer, Transactional Process, Strategic Control, and As a Balance of Creativity and Constraint

another person (Eisenberg and Goodall, 2004). In this model communication is a tool which is utilized by individuals in order to a...

Anxiety in a Diabetic Patient, A Case Study

This essay draws on research to report a hypothetical case study, which concerns therapy utilized to aid a woman with type 2 diabe...

Economic Growth in Poor Countries in Africa

In a paper of eight pages, the author reflects on the problems involving topics of economic development in Sub-Saharan Africa. Th...

Sonnets 18 and 73, Shakespeare

This essay pertains to Sonnets 18 and 73 by William Shakespeare. Figurative speech that utilizes the changing of the seasons to ...

Supplemental Nutrition Assistance Program

In a paper of 8 pages, the author reflects on SNAP, a program designed to reduce food insecurity. There are eight sources utilize...

Assessing Risk in Critical Care

In a paper of three pages, the author reflects on the problem of infections contracted in the hospital setting and considers the i...

The Use of the Cloud in Banking

In a paper of 3 pages, the author reflects on the importance of cloud computing in the banking industry. Specifically, the resear...

“Slowing down heart rate cuts MI risk”

90bpm are of particular concern and associated with the worst outcomes but even resting heart rates exceeding 60bpm are reason for...

Blue Nile Inc.

of Porters Five Forces model can be used to assess the industry and the firms ability to compete in that industry, the way the fir...

Developing Identity: Gender in the 50s and 60s

to war because they felt it was their calling to engage in warfare. They were all relatively innocent and ignorant about war and a...

The Value of Podcasts and RSS Feed in the Research Act

older formats, such as printed formats, video or radio. Pod casts are already being used by some universities in the United States...

CSI Personal Code of Ethics

1. the best in the moral philosophy of all ages and places; 2. the moral standards of Christendom; 3. the ethics of the Christian ...

Erving Goffman's Dramaturgical Approach to Human Interaction

is indebted to both of these predecessors. Kenny (2008) observes that "Anyone familiar with Goffmans dramaturgical approach will n...

Evaluation of Usablity.gov

which entices the user to explore further. The target audience for this site is quite broad. As indicated in the introduction to ...

Coping with Being Understaffed

the ability of an institution to deliver quality, error-free care. At the Six Sigma level, there are roughly "3.4 errors per one m...

Post-Traumatic Stress Syndrome And The Counting Method

upon as wholly overwhelming. II. SUMMARY The individual conjures up a traumatic memory while the therapist counts from ...

Contingency Theory; Is It Valid?

level of variation and employee discretion is required then it is more likely the best approach to production control the one wher...

Democracies vs. Totalitarian and Authoritarian Regimes: the Threat of Nuclear Weapons

but also the only one to have ever actually used them aggressively. The reality is, however, that democracies inherently are less...

Role in Civil Rights Movement, To Kill a Mockingbird

This essay utilizes literature to put forth the argument that Harper Lee's To Kill a Mockingbird, both the novel and the film adap...