SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 1711 - 1740

Middle Range Nursing Theories, An Overview

a profession, nursing theory has responded to meet the needs of nurses. For example, from the mid-1970s through the 1980s, the foc...

Assessment of Beer and Nohria Article "Cracking the Code of Change"

looking at their own model of Theory E and Theory O change. The change model that was developed in these two theories reflected th...

CAT and SISP - A Review of 2 Articles

evaluation may be useful (Thompson and Weiss, 2011). Once first stage is complete, and the determination that CAT is suitable, the...

Making Better Decision than Joe Schmoe

Joe Schmoe was a marketing manager for Clipboard Tablet Co. His decisions for three hand held computer ranges between 2012 and 10...

Social Psychology of Identity, An Article Analysis

is a cognitive skill necessary for survival. This innate tendency is the root cause for the formation of in-groups, people similar...

Analysis Two Major Computer Companies

a dictator. All final decisions were made by him, just like Jobs and like Jobs, he was a micromanager. Dell believed that good pla...

Post-Colonial Theories in Literature

the material hegemony of the colonizer, the colonized is forced into a position where in order to survive in the new culture force...

Jokinen's Family Life-Path Theory

also possess knowledge concerning a particular family as a whole, including the intricacies of its family system, the position of ...

Theory of Caring, Kristen M. Swanson

nursing from the time when Florence Nightingale founded modern nursing in the nineteenth century. Since Nightingale, a variety of ...

Self-Care Deficit Theory, Dorothea Orem

The SCDNT regards the meta-paradigm of "Nursing" as an art, that is, a "helping service," but also as a technology ("Dorothea," 20...

An Introduction to Studying International Relations

International Relations is studied looks at the way in which the different relationships between the international parties, whethe...

Notebook Computers

for mobile use and efficient power consumption" (Laptop, 2006). They usually have liquid crystal displays, a built-in keyboard, an...

Apple Computers

over to Mac systems, the ability of Intel chips to be used in iMacs has also helped the movement as well as the increasing realisa...

Eclectic Functionalism In Counseling

functional psychology: an emphasis on mental operations instead of mental elements; the mind as the mediator between needs and the...

Confidentiality and Three Nursing Models

nurse seeks to preserve any culture-specific aspect of the patients life everywhere possible. When some culturally-linked aspect ...

Humanist Theory, Self Disclosure and the Times

degree of self-disclosure benefits relationships, increases self-esteem and leads to a more stable self-image" (Underwood, 2003). ...

Nursing and the Interaction Between Theory, Research, and Practice

authors state that research "and theory are key underpinnings that guide safe, effective, and comprehensive" (p. 35) practice. As...

Organizational Structure of Dell Computer Corporation

and Dedrick, 2001). Dell has three primary customer segments: large corporate customers, referred to as relationship customers; h...

Carl Rogers and the Attachment Theory

Rogers originated the concept of client-centered therapy, which is characterized by three primary factors. First of all Rogers fel...

Overview of Digital Mammography

more difficult to spot in mammograms" (Screening Mammograms, 2002). Additionally, standard screening mammograms carry a fal...

Knowledge Management and the Roles of ICT and Social Processes

which interaction takes place and arte key to the formation of culture within an organization. Social process take place regardles...

DQs Week Three

(Monoky, 1998; p. 142) to result in four possible styles of communication and accomplishing tasks. This model provides variation ...

Modern Life Run by Technology and Computers

about half of all Americans, according to one source, have Internet access (Roberts, 2005). But still, the number of people buying...

ECONOMICS, SHORT-TERM AND LONG-TERM COSTS

cost in the short term" versus "production and cost in the long term." The short-term, also know as the short-run, is the period o...

MANAGEMENT THEORY, CREATION AND OVERVIEW

designed to meet an organizations goals and objectives. Then there is the top-down theory, which states that management doesnt wan...

How Computer Forensics are Used in Police Investigations

2005). Net Threat Analyzer is a software program that is booted from the computer itself and then makes use of filtering tools in ...

The Relationship between Positive Accounting Theory and World Dimensions of Habermas

warming. This has been seen by many as a claim rather than a fact, arguing that there is insufficient proof, it was this reasoning...

Literature Review for Use in a Project on Leadership in Kuwait

or values. It is by understanding leadership and its influences that the way leadership may be encouraged and developed in the con...

McGregor's Management Theories

work and directing their own tasks. Theory Y presumes that workers should have more autonomy while Theory X sees the manager as ne...

Laptops and Babies Are Not a Good Combination

way: "Have you called XYZ for technical support before? Ah, you have. And what is your case number?" This was usually followed by ...