SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 1831 - 1860

American Theories of Leadership and their Potential Application in other Cultures

leaders such as political and military leaders. Burns (1978) argued that the transformational leader may be seen as an extension o...

Issues of Capital Structure

at the theories regarding the way that capital structure may be determined, looking at ideas such as pecking order and trade-off t...

Computers Enhance Social Skills

isolate the children from each other but since few classrooms have one computer per child, the opposite has happened. Children clu...

Nursing Theory and Its Sub Specialties

and nursing literature abounds with how such theories influence and guide nursing practice in all of its varied aspects. For exa...

Classrooms, Technology, and Teacher Education

may inevitably have to use. The Problem Statement Increasingly, the use of microcomputers in the classroom setting has bee...

International Law and Commerce Issues

Federal Trade Commission, established in 1914 during Woodrow Wilsons term as President (Federal Trade Commission: A History, 2004)...

Democracy Critiqued by Plato

a democracy. Plato contended that it would be impossible within a democracy to have the kind of harmony and societal unit...

Election Process Impact of Computers

willing to give. "The chief problem with paper is that it takes too long to count thousands or millions of ballots. We are just ...

Computer Law Understanding and the Significance of System Administrators

act maybe hard for the system administrators as it is lengthy, with 75 sections and a total of 16 schedules. However, this...

Mobile Printer Product Management Plan

Product Protocol 12 The Marketing Mix 13 SWOT Analysis 14 Strengths 14 Weaknesses 14 Opportunities 14 Threats 14 Development 14 La...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

Society and the Individual

In nine pages this paper discusses society and the individual in a consideration of theories by Hegel, Veblen, Thoreau, Kant, Talc...

Historical Overview of the 'Big Bang' Theory

The Big Bang Theory is the focus of this historical overview consisting of five pages in which black holes, curved space, theories...

Social Movement and Law Enforcement

In five pages this paper examines how social movement and law enforcement are related as it pertains to the power theory with issu...

An Asymptotic Theory Analysis

In two pages Ravi Jagannathan and Zhenyu Wang's article, 'An Asymptotic Theory for Estimating Beta-Pricing Models Using Cross-Sect...

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...

Place, Space, an the 'Infobahn' in City of Bits by William J. Mitchell

A book report on City of Bits by William J. Mitchell consists of five pages and considers the pervasive social and individual infl...

Information Superhighways Multimedia Users and Futures by Stephen J. Emmott

This book report consists of five pages and considers various types of multimedia applications available in computer technology. ...

Political Theories of John C. Calhoun

to protect (Safford 211). Calhoun proposed giving to the minority not merely a proportionate voice, but an equal voice with that ...

Methods of Computer Storage

This paper consists of fifteen pages and examines the latest technology involving methods of computer storage with solid state sto...

A Surgincal Team Change Hypothetical Case

The procedures of a surgical team are presented in a hypothetical case that consists of 7 pages. These procedures are described w...

Computers and Business School

In five pages the value of a computer to college students studying business is examined. Seven sources are cited in the bibliogra...