SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 2251 - 2280

Classical Conditioning Theory of Pavlov

In about six pages this report analyzes the Classical Conditioning theory of Pavlov in a consideration of the theories it spawned....

The Psychology of Education

This paper addresses the educational theories of Knapp and Needels. The author provides relevant literary examples that support t...

Contemporary Psychology and Pragmatism

In six pages this paper discusses the relationship between contemporary psychology and pragmatism philosophy in a theoretical cons...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

Theoretical Foundation for Humanitarianism

This essay discusses a specific theoretical foundation for humanitarianism called the theory of obligation which, in part, propose...

HRM at Acer

The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...

Emotional Intelligence

The theory of Emotional intelligence was introduced in 1995 by Daniel Goleman. This paper reports what it is and identifies the fi...

Development by Eras

Child development theories did not really come to fore until the late 19th and early 20th centuries. In fact, the word ‘childhood’...

Job Analysis in Electronic Equipment

This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Natural Law Theory Ring of Gyges

This paper discusses different parts of Plato's Republic. There is a discussion of natural law legal theory and legal positivist t...

How Do People Perceive Risk

Risk has become a popular research topic in a number of different fields of study, each of which has its own theories. This paper ...

Gang Membership and Criminology Theory

This research paper/essay pertains to Strain theory and Routine Activity theory as explanation for gang involvement among young pe...

One Theory Related to Careers

This essay discusses the writer's job history and how the Social Cognitive Career Theory relates to those choices. The theory is e...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

Concepts in Password Security

In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...

Catheter-Associated UTI Training

This essay offers a scenario teaching nurses and assistant to prevent UTIs associated with catheters. The essay describes the sett...

Evaluating Caltron's Accounting Practices

secondary public stock offering in early February following the current reporting period. Managements concerns should lie with de...

Crime, Victimology and Victimization

get close with one another. Another theorist contends it is segmentation that would divide people (Lilly, 2002). Lilly (2002) rela...

Human Resource Management Trends

training program that should be included is that of cultural sensitivity training (Banerjee, 2007). This all means the human resou...

Supermassive Black Holes

2005). Black holes are thought to have originated from the collapse of very large stars, but it is also hypothesized that mini bla...

Why did communism fail?

not dictate some of the things that manifest as a result of unscrupulous and greedy dictators. In evaluating the situation, a focu...

“On Variation in Interlanguage: A Response to Gregg”

unknown and that a learners performance is optimal at all times. In reality, Tarone argues, this optimal situation is seldom in p...

Book Review: "The Nature Of Leadership" By Antonakis et al

what we know about leadership. This context also shows us patterns of leadership that we can use to analyze contemporary problems...

Recruitment in the Airline Industry

need to have a great deal of specific knowledge (Bureau of Labor Statistics, 2007). Some pilots are recruited from the military fo...

Malicious Codes

an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the...

An Evaluation of the Steady-State Theory

the earth and so quasars are objects that come form the past, and this suggest that a few billion years earlier, the universe was ...

Internet History and ARPANET

This research paper is on the history of ARPANET, which was the world's first heterogeneous computer network, and how it contribut...

James Piaget Erikson Vygotsky

This essay briefly explains these theories. The writer comments on preferred and less preferred theories and also comments on meta...