SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 2251 - 2280

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Catheter-Associated UTI Training

This essay offers a scenario teaching nurses and assistant to prevent UTIs associated with catheters. The essay describes the sett...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Theoretical Foundation for Humanitarianism

This essay discusses a specific theoretical foundation for humanitarianism called the theory of obligation which, in part, propose...

Emotional Intelligence

The theory of Emotional intelligence was introduced in 1995 by Daniel Goleman. This paper reports what it is and identifies the fi...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Gang Membership and Criminology Theory

This research paper/essay pertains to Strain theory and Routine Activity theory as explanation for gang involvement among young pe...

One Theory Related to Careers

This essay discusses the writer's job history and how the Social Cognitive Career Theory relates to those choices. The theory is e...

Natural Law Theory Ring of Gyges

This paper discusses different parts of Plato's Republic. There is a discussion of natural law legal theory and legal positivist t...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Museum Needs and Challenge, New CMS

This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...

Espoused Values vs. Actual Behavior

This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Nursing Practice Theories

This 2 page paper gives an overview of using middle range theory on regards to the nursing practice. This paper explains how evalu...

How Do People Perceive Risk

Risk has become a popular research topic in a number of different fields of study, each of which has its own theories. This paper ...

Development by Eras

Child development theories did not really come to fore until the late 19th and early 20th centuries. In fact, the word ‘childhood’...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Multicultural Workforce

This paper discusses why employees consistently fail a test following diversity training. The paper discusses expectancy theory an...

Technology and its Importance in Business

This paper considers the way technology is at the heart of every business. Computer technology is of particular importance in thi...

Nursing Philosophy and Practice, Their Relationship

This research paper discusses nursing theory and nursing practice, as well as the theories of Watson and Orem. Seven pages in leng...

Reading Text: Electronic Versus Paper

This 5 page paper gives an explanation of reading electronic text versus reading hard copy text. This paper includes studies about...

SEABREEZE'S VIRTUALIZATION PROPOSAL

Discusses how fictitious city Seabreeze can convince both residents and its employees about the benefits of computers virtualizati...

A Study of Hollands Theory of Career Development

In a paper of ten pages, a case study example is used to explain Holland's theory. The author relates personal history of one wom...

Two Theories, Domestic Violence

This paper pertains to two theories that explain the causation of domestic violence, feminist theory and the social-ecological mod...

Fudage Factor Theory

This essay discusses two scenarios that involved honesty and ethics. Theories included are the Fudge Factor Theory, depleted ego, ...

Developmental Schemas for Children

Piaget is bast known for his stages of cognitive development. His theory is still being used today as well as being researched. Pi...

Impact on Those Who Play Computer Games

There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...

Apple in Russia

Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...