SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 2431 - 2460

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Developmental Schemas for Children

Piaget is bast known for his stages of cognitive development. His theory is still being used today as well as being researched. Pi...

Corporate Culture Theories that Impact it

The corporate culture is like an unwritten code of conduct. It is not a document, it is just the way things get done in that organ...

Nursing Taxonomy, Orem, Watson and Personal

This paper begins by discusses the taxonomy of both Watson and Orem's theories and then draws on these theories to relate a person...

Publius Case Study

retrieve the document, hed go to a directory kept on "a Publius-affiliated Web site" and then the "network itself would do the wor...

Specific and General Deterrence Criminological Theories

other citizens from committing the same behavior (Renteln 192). General deterrence operates under the assumption that no matter h...

The Theory of Utilitarianism

up with perhaps the earliest fully developed system of utilitarianism, of which two prominent features are noteworthy ("Utilitari...

Organizational Study Contributions of Frederick Taylor

standardization of tools, machinery, and equipment, together with the systemization of the flow of production" (Nyland, 1996, p. 9...

Railroad Industry and Computers

firm. However, in imagining such a company, it pays to note that today, most railroad companies are huge conglomerates ("Whats Fre...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Missing Theory and Mate Selection

exclusion of all traditional theories in current research. This is an interesting development when Freud was the first to enumerat...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Computer Software and Hardware Purchasing

the DRU-810A Double Layer & Dual Format DVD Burner that is manufactured by Sony and sells for $61.95 ("PCCConnection," 2006). Wh...

Various Levels of Classroom Computer Integration

fact, become one of the most innovative and captivating educational tools currently in use in the classroom and in the home....

Selection of Management Information Systems

However, it may be more beneficial to use a stand-alone application which is designed specifically for e-mail. These stand-alone ...

Claims Processing and IBM and EDS Affiliated Computer Services

are from magazines and journals. The Internet, used properly, is a sound and reliable resource, as long as researchers remember t...

Examination of Computer Ethics

an apparatus for automatic control; and that its input and output need not be in the form of numbers or diagrams. ...... Long befo...

Claims Processing Outsourcing

of shifting/delegating/transferring a service/process/function to a third-parties/external service provider which would otherwise ...

Total Quality Management in Nonprofits, Retail, and Manufacturing

customization" into practice - and its quality always was superlative. The end result was that customers overwhelmingly approved ...

Social Reality Construct and Crime

The theory states that there is something missing in the criminal, one of the links that controls then actions and links the...

Types of Computer Viruses

piggybacks on other real programs is known as a virus (Brain, 2005). For example, a virus could attach itself to a spreadsheet pr...

Rapid Response Team Establishment and Change Process

This is the list of alternative solutions to address the identified problem. For example, training and education will be needed in...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

David Ricardo's Comparative Advantage

manner than any other nation. Conversely, in international trade they should also import any commodity where they have the...

Colombia and the Marketing of Computers

There were 488 radio stations in Colombia in 1999, 454 AM and 34 FM, as well as 60 television broadcast stations (Colombia). Thou...