SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 2071 - 2100

Urbanization in the 20th Century

This 6 page paper examines the theory put forth by the Chicago School sociologists that all urban areas assimilated their immigran...

Technology and Leadership

their life or the life of those around them? A leader has the "capacity to create or catch vision." In other words a leader has ...

Computer Hardware Change Management and its Implications

In six pages this paper examines how computer hardware changes have significant risk and reward implications for corporate managem...

Successful Ecommerce Website Design

This paper considers how to successfully design a corporate ecommerce website in an overview of ten pages that considers character...

Using Computer Networks and Security Issues

In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of...

All About Eve and the Introduction by Marilyn Monroe.

she chooses to apply it in the wrong manner. It is interesting that the film never shows Baxter acting in front of the camera, but...

David Hume and John Locke on Perception

In five pages this paper contrasts and compares the perception theories of David Hume and John Locke and exposes flaws in the empi...

J.J.C. Smart and the Identity Theory

In five pages this paper examines the relationship between the mind and brain in a consideration of UT Place and Herbert Feigl's i...

Theory of Attribution

In a paper consisting of five pages attribution theory is examined along with the motivation theory of Alderfer as a way of explai...

Work Organization Principles Compared

In five pages a work organization is compared by utilizing motivation theory in order to determine the effectiveness of two theori...

Issues Involving Computer Viruses

In a paper consisting of twenty one pages compromised computer security and Internet privacy are just two of the issues considered...

Computers and Floating Point Arithmetic

yet "This computer also had nonzero numbers so tiny that dividing them by themselves would overflow" (Severance, 1998, PG). On ye...

Computer Security Business Marketing Plan

ways to market your own business. In starting a new business probably the single most important thing that one can do is to creat...

Chief Executive Officer's Organizational Management Tools

Achievement Theory and Maslows Hierarchy of Needs (reviewed below). Content and process theories are both in place to explain what...

The Division of Labor and Adam Smith

for only one small part of the production process. The worker concentrating his or her full effort on being the best that he or sh...

Careers in the US State Department- IT Security

It seeks an Information Technology Specialist to design and implement functional goals and protocols "for the rapid sharing and st...

Processes and Theories in Career Counseling

subordinate roles, and achieves goals through conformity. 5) Enterprising -- person prefers verbal skills in situations, which pro...

Computer Information System Design

the file specifies the rest of the information in arbitrary order. Each piece of information is specified by that information foll...

Industry Report of Internet Computer Marketing in Europe

higher tech products, such as computers it may be argued that the potential market may be more attractive. Simply by the nature of...

Dell - A Case Study

U.K. and Canada, and the company is aggressively pushing into Asia and Europe (Gibbs 35). The role of formal knowledge in develop...

Case Study on Decision Making

the different aspects will be considered, rather than a single item gaining a disproportional relevance. Question 2 After readi...

Case Study on New Technology Systems Introduction

these stages involves sending the report between individuals, taking up time, often this will also be between offices with a two d...

History and Testing Measures of Intelligence Theory

is supplemented by innate elements of the intellect (DeLouth, 2002). This theory keyed into the nature-nurture debate. Skipping ...

Computer Security and Internal Corporate Hacking

dissatisfaction with administrative policies. It might be a reaction against a proposed merger that threatens job security throug...

Stephen Jay Gould's Bully for Brontosaurus

books, and view the publishing arm of their diversified empire as but one more item for the ultimate balance"(Gould 157). Apparent...

Can Computer Crime Be Effectively Fought?

attracting the novice-to-intermediate computer user; however, the growth rate for the Internet was no less than fifteen percent ba...

Cultural Diversity and Human Communication Theories

In seven pages this paper discusses immigrant issues in an examination of human communication theories which includes self social ...

Telecommunication Battery Industry

good time, the likely culprit could be the battery. A dead battery in a computer means more than the fact that the computer wont b...

Computer Games and Gender Prejudice

conspicuous, while at other times remain quite subtle; however, one thing is certain: the formation of these variations originates...

Social Evolution During the Nineteenth Century

their perception of his genius. (Gould 26) Where gender behavior is concerned, a complicated and controversial issue of de...