SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 1801 - 1830

General Insurance Company Case Study

This 11 page paper looks at a case study supplied by the student, describing the current manual information systems that are in pl...

GIS Case Study

given regarding the way the system work, if we look at the inputs, the transformation process and the outputs we can consider the ...

The Development of Problem Solving Skills

we first need to look at the developmental model of Piaget and what developments are seen as taking place at the different stages ...

The Communication Privacy Management Theory - Evaluation

to keep private information private and everyone believes they own their own private information. This certainly echoes the cultur...

Study Questions on Management Theory

Kelleher could be used as an example of such a winning CEO. Superlative communications abilities of course are important, b...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Dell Computer Inc. and Strategic Choice

the early days, hopes that largely have gone unfulfilled until only recently in the consumer market. However, the business-to-bus...

Article Analysis/Evidence-Based Practice

study also examined the availability of information resources available to the RN respondents (both at work and at home). Their fi...

Enabling the Disabled Through Computer Technology

In twenty pages the argument is presented that computer technology is presenting greater opportunities for people with disabilitie...

Home PC Consumer Considerations

This paper considers home personal computer consumer purchasing decisions on three pages. Two sources are cited in the bibliograp...

Discussion of Freudian Theories

In five pages this paper assesses such theories of Sigmund Freud as the theories of seduction and fixation, the 3 mind components,...

Major Theories of Personality

In ten pages the personality theories of Maslow, Rogers, Adler, May, Skinner, Freud, and sociobiological theory are examined. Ten...

Drug Usage and Theories on Juvenile Crime

In ten pages this paper examines drug use as one of the primary juvenile crime causes in a consideration of various theories inclu...

U.S. Computer Age

In twelve pages this paper examines the U.S. in a consideration of the social impact of computers. Eight sources are listed in th...

Oil Industry's Changing Technology

In twelve pages this paper examines how the oil industry changed in the 20th century due to such technology as satellites, compute...

RAM and Computer Memory Overview

In six pages computer memory is discussed in terms of virtual memory and other various types. Four sources are listed in the bibl...

Overview of Dynamic Social Impact Theory

In ten pages dynamic social impact theory is discussed and related to other types of communications theories in order to reveal it...

Overview of Network Security

included. Other important considerations are Internet connections. They need an end-to-end policy of network security. The IS d...

Gateway and Dell Websites

In seven pages these two computer manufacturers' websites are evaluated with a brief corporate description provided and then an an...

Y2K Preparation

In seven pages this paper examines how an individual can prepare for the new millennium in terms of computer preparation. Ten sou...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...

Apple Computer Inc. and Its Organizational Culture

In twenty pages this paper examines Apple Computer Inc. in a consideration of its organizational culture. There are thirty source...

Video Visualization and Browsing Programs

1999). The key to this concept it to reduce of the amount of information to be viewed. Two main arrangements of...

Maintenance of Computers

cleaned. When computers are exposed to more dust and dirt than a normal computer would be, they should be cleaned more often. In...

Importance of the Locus of Control Theory

In 5 pages this paper discusses how life is affected by the Locus of Control concept in a consideration of this theory's significa...

Canada and Legal Issues Involving Regulation of the Internet and Computer Hacking

In twelve pages Canadian law is examined as it addresses such issues as regulating the Internet and computer hacking and considers...

Nursing and Computers

of first-year nursing courses for delivery on the Internet has afforded students the opportunity to complete didactic requirements...

Storage Capabilities and the Impact of Quantum Computing

In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capab...

Personality Theories

This paper consists of five pages and features a fictitious person in an application of Humanistic Approach, Social Cognitive Appr...

Strategies of Retail and Shopping

This paper consists of three pages in which retail and shopping strategies in times of globalization and computer technology are e...