SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 2161 - 2190

Consideration of Computer Technology

In a paper consisting of four pages the origins of modern computer technology, the abacus, are considered as their evolution progr...

Comparison of the Inventions of Computers and Trains

This essay consists of fifteen pages and considers whether the computer or the train was the more significant invention in terms o...

The role of emotion and cognition in the development of consciousness.

This paper looks at the part played by emotion and cognition in the way we develop consciousness. Psychologists such as Ellis have...

Classical Conditioning Theory of Pavlov

In about six pages this report analyzes the Classical Conditioning theory of Pavlov in a consideration of the theories it spawned....

The Psychology of Education

This paper addresses the educational theories of Knapp and Needels. The author provides relevant literary examples that support t...

Contemporary Psychology and Pragmatism

In six pages this paper discusses the relationship between contemporary psychology and pragmatism philosophy in a theoretical cons...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

Effective Educator Computer Technology Communications Annotated Bibliography

technology" (Ebersole and Vorndam, 2002). The researchers found "time, resources, and lack of confidence in the benefit of educat...

Criminal Investigations and Forensic Psychology

To understand the growing importance of computers in criminal investigation consider the practically limitless applications of DNA...

International Law and Commerce Issues

Federal Trade Commission, established in 1914 during Woodrow Wilsons term as President (Federal Trade Commission: A History, 2004)...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

Considerations When Carrying Out Market Research

purchase from the firm in the last twelve months, alternatively the definition may be the last six months1. The way that t...

Computer Security Issues

types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystro...

LEGITIMACY THEORY AND SOCIAL CONTRACTS: AN ANALYSIS

section, well discuss ExxonMobil and how it behaved when its tanker Valdez ran aground on Prince Island Sound in Alaska. The compa...

Strategy Decisions; To Compete or Co-operate?

investment made to support a belief or idea rather than to create a profit, but even where this occurs the firm need to remain via...

Project Proposal; A New Computer System for a Retail Firm

more accurately to changes in demand. The implementation of a system, to allow for the different elements of the business to be br...

Development - Self-Appraisal

but otherwise, they are content with companions or short-term relationships. Erikson identified love and affiliation as outcomes...

Choosing a Leadership Position

There are a number of different models of leadership. The first we can consider and apply to the situation of the firm and the div...

Four Nursing Theorists

explain Watsons Caring Theory, including "Caring Science Ten Caritas Processes," "definitions," "Ten Caritas Processes" and more. ...

Self Actualization: Maslow, Rogers, Fromm and Kelly

shaping our self actualization but also emphasized that the environment and our interaction with it was constantly changing (Roger...

Operations Management; Principle Healthcare Case Study

to identify the main activities of the company, as to gain accreditation under EMAS, or ISO 14001, a company needs to "establish a...

Various Evolution Theories

In six pages this paper examines Charles Darwin's natural selection theories of evolution in a comparison with the views of creati...

COMPUTER MOTHER BOARD

typically include functional units of a computer including the central processing unit, microprocessor, memory, the basic input/ou...

Article Summaries on Topics of Computer Viruses, CPUs and Speed, and the Internet

than normal, unexplainable file size changes, program-operating problems, difficulties in booting the system, and bizarre graphics...

Life and Theoretical Contributions of Pierre de Fermat

the work of Apollonius concerning plane loci (Ball Fermat.html). In his youth, Fermat was friends with the French scientis...

Uses of Computer Protocols

In eight pages computer protocols are examined in terms of their data transfer and communication uses with types such as IPX, PPP,...