SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 2401 - 2430

ECONOMICS, SHORT-TERM AND LONG-TERM COSTS

cost in the short term" versus "production and cost in the long term." The short-term, also know as the short-run, is the period o...

MANAGEMENT THEORY, CREATION AND OVERVIEW

designed to meet an organizations goals and objectives. Then there is the top-down theory, which states that management doesnt wan...

How Computer Forensics are Used in Police Investigations

2005). Net Threat Analyzer is a software program that is booted from the computer itself and then makes use of filtering tools in ...

Using Gestalt Theory with Families

own feelings, behaviors and thoughts. The phenomenological method of gaining awareness is about "perceiving, feeling and acting" (...

The Relationship between Positive Accounting Theory and World Dimensions of Habermas

warming. This has been seen by many as a claim rather than a fact, arguing that there is insufficient proof, it was this reasoning...

Literature Review for Use in a Project on Leadership in Kuwait

or values. It is by understanding leadership and its influences that the way leadership may be encouraged and developed in the con...

Laptops and Babies Are Not a Good Combination

way: "Have you called XYZ for technical support before? Ah, you have. And what is your case number?" This was usually followed by ...

McGregor's Management Theories

work and directing their own tasks. Theory Y presumes that workers should have more autonomy while Theory X sees the manager as ne...

Computer Crime Of The Future

great extent, the need for technical patches will still remain pertinent to meeting, if not deflecting, the growth of hacking crim...

Overview and Criticism of the Welsh School (Aberystwyth) of Critical Security Studies

where there is the argument for the need to eliminate unjust social relationship, including gender relations and needs to be seen ...

MCBRIDE MEMO - A RESPONSE

be accessed from almost any computer. These are run through a web browser or equivalent type of program. Probably the two best-kno...

International Trade Theory in the Real World

1 using the SITC categories. All figures given are in $ millions unless otherwise stated. Figure 1 Imports and Exports of chemica...

UK and US Copyright for Computer Porgrams

patent as the process was in the ROM. If the patent application was a development that included a computer programme but was not a...

Children and Computer Introduction

This is where interactive technology will help to ease such a burden (Block, Gambrell and Pressley, 2004). Numerous studies...

Computers Enhance Social Skills

isolate the children from each other but since few classrooms have one computer per child, the opposite has happened. Children clu...

Issues of Capital Structure

at the theories regarding the way that capital structure may be determined, looking at ideas such as pecking order and trade-off t...

American Theories of Leadership and their Potential Application in other Cultures

leaders such as political and military leaders. Burns (1978) argued that the transformational leader may be seen as an extension o...

Don Tapscott's Promise and Peril in the Age of Networked Intelligence

The 'digital economy' is the focus of this paper consisting of five pages with computer networking's advantages viewed within the ...

Computer Espionage and Emergencies of National Security

In five pages this paper examines the computer espionage threats to national security and technology being developed to eliminate ...

Home Businesses and Computer Generated Changes

In a paper consisting of five pages home businesses are examined in terms of the changes brought about by computers. Eight source...

Global Impact of Computers

parts of the world. In Japan the realities that involve the computer and the participation in such is called maruchmedia, or mu...

A Feasibility Study of Marketing Economics in Spain

This paper examines marketing concepts pertinent to a multinational computer company entering into business in Spain. This ten pa...

Business World, Computability, and Machine Languages

the work, or the game, or the information beyond the commands and the toolbars. He or she knows the limits of what the computer c...

Corporate Management and Information System Security

In seventy five pages this paper discusses IS security training and computer crime issues. Fifty five sources are cited in the bi...

Societal and Workplace Impact of Computers

COBOL, PL1, RAMIS, FORTRAN and many others. While some languages have survived the PC revolution, many languages have become obsol...

Proposal for a Small Business Management Information System

In fifteen pages this paper examines how a small business can create a management information system to meet its need in a proposa...

Computer Automation in the Workplace II

In nine pages this paper discusses office automation in the form of computers in the workplace. Nine sources are cited in the bib...

Electronic Data Transfer Evolution Through the Internet

In ten pages this paper examines how EDI has evolved as a result of the Internet and considers the future of business computer net...

Computers in the Future and the Internet

In seven pages this paper considers Ralph M. Stair and George Walter Reynolds' text Principles of Information Systems - A Manageri...

Overview of Dell Computer Company

In eighteen pages the rise of Dell to the leading personal computer manufacturer is documented with an examination of the current ...