SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories And Technology

Essays 2611 - 2640

Case Studies on the Integration of Technology

to Point B overnight. Where FedEx has led the way is in the area of value add, in other words, using technology to help provide mo...

Dissertation Proposal on the Commercial Value of IT

measure this value rather than the use of the traditional productivity measures. This can then be expanded into the way value meas...

At Risk African American Male Learning and a Discussion of Cognition and its Cultural Influences

2004). "The majority of reporting states-26 out of the 46 responding to the latest survey-have dropout rates ranging from 4.0% to...

Women's Rights and the Impact of Technology

little time for themselves, or to think about doing anything rather than staying ahead of what needed to be done. Because ...

Modern Economic Globalization and Changing Technology

part of the globalisation process over the last fifty years this is supported by the way the actual output increase has remained c...

Platform Game PACT Analysis

a mixture of male and females, but with a skew to males as these are the dominant user group. However, where the platform has the ...

Continuing Education and Online Learning Effectiveness

result; the achievement of something planned or attempted. We could conclude that effectiveness and success in education is define...

Globalism, Technology, Capitalism, and Sport

transnational, those that promote the American way of life and "transmit American popular culture" across the globe (Keys, 2000). ...

Strategy and Position of Cisco Systems

In this paper, well provide proof that Cisco knows what its doing by comparing its activities to that of one of its closest compet...

Supply Chain and Radio Frequency Identification Contributions

area of study sees an application in several contexts, goods in the supply chain may be working capital for a company, and as such...

Revolution Known as the Internet

their own by virtue of in-class Internet instruction. One of the most prevalent ways in which the Internet has changed the way to...

A Review of How Computers Work

and experts alike will find this book useful. It is mostly geared, however, to the user not to the computer repair technician but...

Case Study of Eastern Power Company

allowing bill payment online as well as facilitating complaints or communication with customer services by e-mail. However, these ...

Critical Response to the Film The Gods Must Be Crazy

anthropological data on this tribe, it is impossible to say precisely where this assessment errs, but err it must, simply because ...

Military and Technology Uses

be transported to other continents quite easily, other technological advances have contributed to a change in warfare as well. ...

Insurgent Threats, Technology Uses, and Spatial Analysis

pattern analysis mapping software, military officials can predict sites and the likely times of insurgent attack (Grau, 2004). Ano...

Inquiry Based Learning and Elementary School Science

inquiries, the scientific information covered in any particular lesson plan will undoubtedly be remembered long after memorized fa...

Learning that is Inquiry Based

may be given increasing autonomy in their learning activities. Martin-Hansen provides a chart that illustrates this by showing the...

National Football League and the Effects of Instant Replay Technology

bit (as he states) and managed to slow down the frame time. Stop Action was born. Soon the Airforce contacted Jim to ask if he mig...

2025 Organizations

is likely to be smaller, from the standpoint of square footages. With employees being able to connect with companies via intranets...

Critical Response to Cell Phone Technology

voice is composed of sine waves, each of which has amplitude, frequency, and phase (Stern and Mazella, 1996). Amplitude is the wa...

Asymmetrical Threat Assessment Through Geospatial Applications

"decision support tool " for those who work in the field of homeland security. It tells an observer where someone is, who he is as...

Critiquing an Assessment of the Research Study on Relationship Between Learning Disabilities and HIV Risks

students have numerous misconceptions about how HIV is transmitted (Blanchett, 2002). Blanchett (2002) attempts to provide more d...

Past and Present Artificial Intelligence

right now. AI is still in its infancy. However, as an application toward various processes, for example, the gaming industry, it i...

Impact of Inclusion Upon Learning Disabled Students

"like frequent breaks or a small-group setting" (Rubenstein and Quinones, 2004). The state reports that 84 percent of students wit...

Processes of Risk Management and Risk Assessment

One of the factors separating physical and IT projects is that in producing a building (or bridge, or airplane) everyone knows at ...

Comparison of 'Declaration of a Heretic' by Rifkin and 'The Existential Pleasures of Engineering' by Florman

order for work to be appropriately "subdivided into highly specialised, routine tasks."3 As enthusiastic as Florman (1996) is a...

Technology, Design, and Condoms

(b), 2004). One of the ways in which this has been prevented is through vulcanization of the material, a chemical curing process (...

Protocols in 802.11 Technology

of uniform standards to ensure different systems can be integrated and the wireless devices are not incompatible. IEEE developed t...

Ireland, China, and ICT

reforming the state owned IT enterprises as well as encouraging a range of research and development in the areas of software and i...