YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education
Essays 2251 - 2280
In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...
The writer looks at the way human resource management takes place at the computer firm Acer. Three different HR policies are used ...
In a paper of four pages, the writer looks at computer security issues. Strong password development is emphasized. Paper uses six ...
This essay offers a scenario teaching nurses and assistant to prevent UTIs associated with catheters. The essay describes the sett...
In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...
This essay discusses a specific theoretical foundation for humanitarianism called the theory of obligation which, in part, propose...
The theory of Emotional intelligence was introduced in 1995 by Daniel Goleman. This paper reports what it is and identifies the fi...
This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...
This research paper/essay pertains to Strain theory and Routine Activity theory as explanation for gang involvement among young pe...
This essay discusses the writer's job history and how the Social Cognitive Career Theory relates to those choices. The theory is e...
This paper discusses different parts of Plato's Republic. There is a discussion of natural law legal theory and legal positivist t...
In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....
This paper pertains to computer and collections management systems (CMS) as they are used in contemporary museums. It also address...
This essay discusses what happens when there is a discrepancy between espoused organizational values and what is actually practice...
Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...
This 2 page paper gives an overview of using middle range theory on regards to the nursing practice. This paper explains how evalu...
Risk has become a popular research topic in a number of different fields of study, each of which has its own theories. This paper ...
Child development theories did not really come to fore until the late 19th and early 20th centuries. In fact, the word ‘childhood’...
This essay offers a job analysis. The job description was obtained through a Dept. of Labor publication and compared to what an em...
This paper discusses why employees consistently fail a test following diversity training. The paper discusses expectancy theory an...
This paper considers the way technology is at the heart of every business. Computer technology is of particular importance in thi...
This research paper discusses nursing theory and nursing practice, as well as the theories of Watson and Orem. Seven pages in leng...
This 5 page paper gives an explanation of reading electronic text versus reading hard copy text. This paper includes studies about...
Discusses how fictitious city Seabreeze can convince both residents and its employees about the benefits of computers virtualizati...
In a paper of ten pages, a case study example is used to explain Holland's theory. The author relates personal history of one wom...
This paper pertains to two theories that explain the causation of domestic violence, feminist theory and the social-ecological mod...
This essay discusses two scenarios that involved honesty and ethics. Theories included are the Fudge Factor Theory, depleted ego, ...
Piaget is bast known for his stages of cognitive development. His theory is still being used today as well as being researched. Pi...
There has been a debate about the impact of action and violent video and computer games on those who play them. This especially pe...
Apple Computer is a unique company and has been since it was founded in 1976. Today, they manufacture many different hardware item...