SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 2341 - 2370

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

A Contemporary Feminist Critiquing of the Liberal Tradition

for the legitimacy of modern civil government is to be found by treating our society as if it had originated in a contract. The a...

High School Implementation of Computer Network Technology

instructor more accessible than they were only a few years ago. In the highly interconnected world of the new communications era,...

2004 Articles on Personal Computing

the world even more than the Internet alone, were looking at huge storage and filing and tracking problems. That means were also g...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Corporate Theories of Modigliani and Miller

"accounting numbers" is relevant. According to M-M, the company should disregard the "numbers" and instead look at the ways in whi...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Language Theories of Cummins, Krashen, and Vygotsky

problems unaided, and their potential for improved problem-solving if guided by another. Within the ZPD was a process known as sca...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sociology Q and A

of psychology so the attraction to social factors is often minimized. Another reason why Freud was influential in terms of soci...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

The Kennedy Conspiracies

alone. We remember Kennedy in two very different lights, first as a great man, a great politician who had the interest of t...

Computer Hacking's Impact

in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

Modern Life Run by Technology and Computers

about half of all Americans, according to one source, have Internet access (Roberts, 2005). But still, the number of people buying...

ECONOMICS, SHORT-TERM AND LONG-TERM COSTS

cost in the short term" versus "production and cost in the long term." The short-term, also know as the short-run, is the period o...

Literature Review for Use in a Project on Leadership in Kuwait

or values. It is by understanding leadership and its influences that the way leadership may be encouraged and developed in the con...

MANAGEMENT THEORY, CREATION AND OVERVIEW

designed to meet an organizations goals and objectives. Then there is the top-down theory, which states that management doesnt wan...

How Computer Forensics are Used in Police Investigations

2005). Net Threat Analyzer is a software program that is booted from the computer itself and then makes use of filtering tools in ...

The Relationship between Positive Accounting Theory and World Dimensions of Habermas

warming. This has been seen by many as a claim rather than a fact, arguing that there is insufficient proof, it was this reasoning...

Using Gestalt Theory with Families

own feelings, behaviors and thoughts. The phenomenological method of gaining awareness is about "perceiving, feeling and acting" (...

Computer Crime Of The Future

great extent, the need for technical patches will still remain pertinent to meeting, if not deflecting, the growth of hacking crim...

International Trade Theory in the Real World

1 using the SITC categories. All figures given are in $ millions unless otherwise stated. Figure 1 Imports and Exports of chemica...

McGregor's Management Theories

work and directing their own tasks. Theory Y presumes that workers should have more autonomy while Theory X sees the manager as ne...