SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories And Technology

Essays 2401 - 2430

Graduate Level Distance Learning Quality Assessment

In a paper consisting of seven pages the necessity of assessing the quality of graduate programs on the Internet is presented and ...

An Analysis of an Article on Business Programs' Advancements

In five pages Samuel Greengard's September 2000 article 'Making the Passage to a Portal' is analyzed in terms of how current bus...

Golf and Technology

In five pages this paper examines how technology has changed the game of golf in terms of design, chemistry, and in equipment chan...

Amazon.com and IT Competitive Advantage

In eight pages this paper discusses how competitive and cost advantages are achieved by Amazon.com through the use of information ...

Student Case Study on Mobil's Technology Uses

In five pages this student submitted case study considers how Mobil applied technology to its systems of order processing in an as...

Market and Position of Nokia Corporation

In five pages this paper examines Nokia in an overview of the cellular phone industry, the company's target market, future technol...

New York City's History and Impact of Immigration

parts of the city (1997). Upon arrival, the Jews formed groups and associations (Sarna, 1998). Today, the city has a great many m...

Barry Scheck's Innocent Project and DNA

of an individual in a criminal trial. Perhaps even more fascinating, however, is the use of DNA to prove the innocence of an indi...

A View of IEEE and ACM Organizations

In five pages the components of these organizations and their impact for professionals and students of information technology are ...

Criminal Justice, Law Enforcement, and the Impact of Technology

has developed over the past decade. Even more prevalent than in-field computer systems is the vast computer resources whi...

K through 12 Instructional Technology

best for them. * Provides a "full picture" result that standard approaches may not be capable of illustrating meaningfully....

Management Information Systems and the Credit Card Industry

style of credit cards, all the way to redeeming award points summary online, a service offered by Citibank both in Malaysia and in...

Technology and Visionary Design Systems

planning in the manufacturing sector. Product Data Management (PDM) was created in the 1980s as a means of storing CAD document...

Film Industry and Technology

Though the request for this paper was to focus on technology in film during the past 50 years, no paper on this would be complete...

WLAN Weaknesses in Security

A wireless LAN uses radio technology in order to transfer the data between the different terminals (Cisco, 2003). Institutions suc...

IT Value Assessment

but the ultimate cause of structural problems is that of organizational design. "Good people in a poorly designed organizational ...

Competitive Advantage and Southwest Airlines

the U.S. Department of Transportation gave a name to the phenomenon - the Southwest Effect (Southwest, 2003). It refers to the con...

5 'Golden Threads' and Their Implications

and Shared Minds Implications for business are clear. All of these threads weave together in the effective organization to...

8 Points of a Productivity Audit

take form. During necessary organizational strategy revisions, the mission statement is one of the first documents addressed; by ...

Internal Auditing and Use of Technology

they occur on a continuing and regular basis. This is the case for risk management; personnel database and skills inventory...

Contemporary World and 'Sacred' Technology

Work, Leisure, Community and Everyday Life" author Richard Florida (2002) contends that we have changed because we have sought ch...

Information Techology Outsourcing Trends

Outsourcing is becoming more and more prevalent. The purpose of outsourcing is to achieve optimum results for the functions that a...

Suppressing Fires with the New Sapphire System

want to consider replacing Halon systems if possible due to the environmental concerns. The introduction of the Sapphire Fire Supp...

Baker and Young Information Systems Upgrade Recommendations

had to call on them and they did not have to place a phone call. Likewise the process of delivering the information to a central d...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Accounting Profession and the Effects of Information Systems

however, technological accounting functions were mainly stand-alones - they werent a whole lot different from the old by hand ledg...

Students with ADHD and Educational Strategies

can be cared to asking the student what steps they need to take to complete the assignment (Salend, Elhoweris and Garderen, 2003)....

Classroom Technology and Research into Brain Function

prunes connections based on experience." The cycle is "most pronounced between the ages of 2 and 11, as different development are...

National Security and the Important Role of Technology

example of why the United States needs a national security strategy for technology. There are hundreds more. Since the Sep...

Brief Company Analysis of Vermont Teddy Bear Co.

sees the companys competitors not as other toy or plush doll/animal companies but as companies who sell greeting cards, chocolates...