SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 1681 - 1710

SEABREEZE'S VIRTUALIZATION PROPOSAL

Discusses how fictitious city Seabreeze can convince both residents and its employees about the benefits of computers virtualizati...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Technology and its Importance in Business

This paper considers the way technology is at the heart of every business. Computer technology is of particular importance in thi...

A Study of Hollands Theory of Career Development

In a paper of ten pages, a case study example is used to explain Holland's theory. The author relates personal history of one wom...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...

Developmental Schemas for Children

Piaget is bast known for his stages of cognitive development. His theory is still being used today as well as being researched. Pi...

Corporate Culture Theories that Impact it

The corporate culture is like an unwritten code of conduct. It is not a document, it is just the way things get done in that organ...

Nursing Taxonomy, Orem, Watson and Personal

This paper begins by discusses the taxonomy of both Watson and Orem's theories and then draws on these theories to relate a person...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

James Piaget Erikson Vygotsky

This essay briefly explains these theories. The writer comments on preferred and less preferred theories and also comments on meta...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Catheter-Associated UTI Training

This essay offers a scenario teaching nurses and assistant to prevent UTIs associated with catheters. The essay describes the sett...

Theoretical Foundation for Humanitarianism

This essay discusses a specific theoretical foundation for humanitarianism called the theory of obligation which, in part, propose...

Emotional Intelligence

The theory of Emotional intelligence was introduced in 1995 by Daniel Goleman. This paper reports what it is and identifies the fi...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Natural Law Theory Ring of Gyges

This paper discusses different parts of Plato's Republic. There is a discussion of natural law legal theory and legal positivist t...

How Do People Perceive Risk

Risk has become a popular research topic in a number of different fields of study, each of which has its own theories. This paper ...

One Theory Related to Careers

This essay discusses the writer's job history and how the Social Cognitive Career Theory relates to those choices. The theory is e...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Organizational Study Contributions of Frederick Taylor

standardization of tools, machinery, and equipment, together with the systemization of the flow of production" (Nyland, 1996, p. 9...

Railroad Industry and Computers

firm. However, in imagining such a company, it pays to note that today, most railroad companies are huge conglomerates ("Whats Fre...

Achievement Motivation

This essay discusses achievement theories and achievement motivation theories. There are seven sources used in this 10 page paper....

Organizational Effectiveness and Theories of Leadership

was evil and President Clinton was insular (Randall, 2004). Clinton was so identified because "he did nothing to stop the massacr...

Publius Case Study

retrieve the document, hed go to a directory kept on "a Publius-affiliated Web site" and then the "network itself would do the wor...

David Ricardo's Comparative Advantage

manner than any other nation. Conversely, in international trade they should also import any commodity where they have the...

Specific and General Deterrence Criminological Theories

other citizens from committing the same behavior (Renteln 192). General deterrence operates under the assumption that no matter h...

The Theory of Utilitarianism

up with perhaps the earliest fully developed system of utilitarianism, of which two prominent features are noteworthy ("Utilitari...