SEARCH RESULTS

YOU WERE LOOKING FOR :Human Learning and Computer Technology

Essays 61 - 90

Humanist and Existentialist Learning Development Compared

The learning theories of Erik Erikson, Victor Frankl, and Carl Rogers are compared in eight pages in terms of learning experience...

Learning and Theories of Human Development

under role model and peer pressure. A critical stage for developing self-identity (University of Hawaii, 1990). 6. Stage 6: Young ...

Human Learning

for even though humans as a species are much the same, individually there are many differences. There exist myriad areas where so...

Society and the Impact of Technoloyg

potential ramifications of cloning: "He believes that while it is impossible to accurately forecast what the psychological and soc...

Using Technology to Manage Ethics

point is valid. He asks his listeners to consider a situation in which the government "eliminates" someone; if a person were to ac...

Human Based Services Delivery

In eight pages the delivery of human care services are examined in terms of decision making, organizational structures, resource a...

How Some Government Mandates are Paid For

This paper provides a summary of one article by Joyce McKnight entitled "Public Funding of Human Services from the "Poor Laws" unt...

Comparing Human Learning and Reasoning Capacity to Artificial Intelligence

all: will machines one day outsmart their makers, and what consequences will this reap for the human race? When one considers the...

High-Tech Crime: How The Criminal Justice System Has Had To Change Its Approach

equipped to penetrate any computer system with the intent to take, destroy or manipulate the information found upon that system; i...

Le Guin/Left Hand of Darkness

eyes," but finds this awkward as he "self-consciously" sees a Gethenian "first as a man, then as a woman, forcing him into those c...

Kolb's Experiential Learning Theory

on the experience. The learning reflects on - analyzes, judges, evaluates - the experience (Davies, n.d.). 3. Abstract Conceptuali...

Does An Effective Learning And Development Strategy Enables Organizations To Compete More Effectively?

order to asses show firms can use learning to create and maintain competitive advantages it is first necessary to look at the conc...

Criminal Justice and Various Educational Strategies

appropriate way students are able to obtain a full and eclectic spectrum of what is being taught. Of course, not every subject ne...

Learning as Adults

This essay begins with a statement about what the writer expects to learn in the adult education program and whether the writer sh...

Training and Development in the Commercial Environment

the years, to return to a high reliance model would be difficult and would undermine motivation as adults would feel they were bei...

Memory and Learning

These problems have a neurological base. They can interfere in learning basic skills, such as reading, and they can also impede hi...

Word Processing Programs Support Cognitive Learning

Word processing programs support the cognitive learning theory by helping students learn how to edit their documents from beginnin...

Online Learning Issues

The purpose of Online learning, or, e-learning is to provide knowledge and enhance skills. There are many advantages to e-learning...

Experiential and Reflective Learning - A Presentation

A key skill for those pursuing a career in leadership is the ability to learn. This paper is a presentation looking at the experie...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...