SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 1861 - 1890

Theories on Motivation and Management

variation in task complexity and the relationships between workers and managers in each. An example of a high task - low relation...

Service Consultants and Differences Between Patents and Copyrights

copyright does not protect ideas but just the way the idea is expressed in a piece of work (UK, 2002). A patent, on the other han...

Computer Hacking and Ethics

productive. Like having a firewall, these individuals can help people protect their sites from unscrupulous individuals who want t...

Forging a Committed and Motivated Workforce- An In-Depth Case Study

turnover rate of 22 to 33 percent per year. While it is not unusual for employee turnover to reach even 25 or 35 percent in a year...

19th Century French Mathematician Augustin Louis Cauchy

own background also needs consideration, as the work was also a reflection of the man and his circumstances. After this some examp...

Present and Future Virtual Currencies

This paper examines the impact of globalization upon national currencies and considers the present increasing phenomenon of virtua...

Society and the Individual

In nine pages this paper discusses society and the individual in a consideration of theories by Hegel, Veblen, Thoreau, Kant, Talc...

Historical Overview of the 'Big Bang' Theory

The Big Bang Theory is the focus of this historical overview consisting of five pages in which black holes, curved space, theories...

Social Movement and Law Enforcement

In five pages this paper examines how social movement and law enforcement are related as it pertains to the power theory with issu...

An Asymptotic Theory Analysis

In two pages Ravi Jagannathan and Zhenyu Wang's article, 'An Asymptotic Theory for Estimating Beta-Pricing Models Using Cross-Sect...

South Africa as a Location for the Construction of a Computer Manufacturer

Called "Growth, Employment and Redistribution," this policy framework includes the introduction of tax incentives to stimulate new...

A Surgincal Team Change Hypothetical Case

The procedures of a surgical team are presented in a hypothetical case that consists of 7 pages. These procedures are described w...

Political Theories of John C. Calhoun

to protect (Safford 211). Calhoun proposed giving to the minority not merely a proportionate voice, but an equal voice with that ...

Methods of Computer Storage

This paper consists of fifteen pages and examines the latest technology involving methods of computer storage with solid state sto...

Computers and Business School

In five pages the value of a computer to college students studying business is examined. Seven sources are cited in the bibliogra...

B.F. Skinner and Erik Erikson on Personality

In five pages this paper examines Skinner's operant conditioning theory and his views on stimulus and response along with Erikson'...

Place, Space, an the 'Infobahn' in City of Bits by William J. Mitchell

A book report on City of Bits by William J. Mitchell consists of five pages and considers the pervasive social and individual infl...

Information Superhighways Multimedia Users and Futures by Stephen J. Emmott

This book report consists of five pages and considers various types of multimedia applications available in computer technology. ...

Saudi Arabia Software CDs and Music Marketing

In ten pages this paper examines the prospect of conducting limited business in Saudi Arabia in this case study of Soft Sound, a c...

History and Future of Computer Networking

In eight pages the history of computer networking is discussed along with the importance of operating system choice, policy establ...

Descartes' Psychology and the 'Conscious Mental State' Theory of William James

This paper examines the 'constant mental state' theory of psychology William James created to improve the theoretical limitations ...

Stakeholder and Philanthropy Responsibility in Business Ethics

In five pages philanthropy is examined in terms of the ethical use of assets with Adam Smith's theory of the 'invisible hand' and ...

Computer Systems and Disaster Recovery Plans

In a paper consisting of five pages computer systems protection through disaster recovery plans are discussed. Five sources are c...

Dell Computer Inc. and Strategic Choice

the early days, hopes that largely have gone unfulfilled until only recently in the consumer market. However, the business-to-bus...

'Magic Bullet' Theory in the Assassination of John F. Kennedy

easily draw his own conclusions as to why these members would be eager to see such a thing occur, in that they would become furthe...

Communications of the Future and IT

In five pages this paper discusses information technology in a consideration of computer developments past, present, and changes r...

Educational Theory and Army ROTC

In ten pages this paper examines the Army ROTC program through an application of basic educational theory within the contexts of F...

Plan Proposal for Computer Game Business

In thirteen pages and five sections the CuttingEdge computer game business is examined in a proposed plan that includes company in...

Video to Go Hypothetical Business Case Study

This paper consists of six pages and discusses the importance of computer technology to the hypothetical Video to Go company and e...

Real Estate Property Management and Computer Networking

Real Estate property management and the importance of computer office networking are discussed in five pages. Three sources are c...