SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 2521 - 2550

Ceramics and Computer Technology

product classifications and in 1974, the U.S. market for the ceramic industry was estimated at $20 million (2003, p.PG). Today, th...

Measurement Inc. Decision for Purchasing a Computer System

than sixty employees, four managers and a senior manager who reports directly to the president of the company. This senior manage...

CD Store Suggested Scenario

that at some point we could work or details of individual tasks. This can be built into a database by adding an extra stem or lea...

Comparative Analysis of Procedural and Nonprocedural Computer Programming Languages

Because the object-oriented languages and paradigms (i.e., non-procedural) ended up providing a stronger return on investment for ...

A Program of Audience Development Assessment

Opies Museum of Memories there is the ability to experience the entire twentieth century in a single day. The audience developme...

Computer Graphic Designers and Their Role

and the ultimate three-dimensional effect is what becomes the final stage of the overall process, as the designer calculates his e...

Personality Approaches East and West

notes, in other words, people are constantly changing and re-inventing aspects of themselves in order to adapt to the equivalent c...

A Dell Computer Corporation Analysis

terms of computer sales, selling a $999 PC in 1999 (Hoovers Company Profiles, 2003). Dell has also pioneered another busine...

International Motivation in respect to Globalization and Sovereinty

this particular position believes that everything revolves around the individual state without any collaborative endeavors with ot...

Carr, Gillepsie, and Drucker on Business Ethics

It appears that Carr has not even a speaking acquaintance with the concepts of integrity and trust. Neither does he effectively s...

Processes of Decision Making

present in some models, however, the older models still remain as the basis of decision making theory, with most studies still loo...

Slammer Sapphire Virus of January 2003

is very efficient," said Greg Shipley, director of consulting for security firm Neohapsis. "So there may be less number of hosts a...

A Pentium 4 and 4M Processors' Overview

(2003). In addition to providing wonderful graphics, 4 and 4M processors are useful in a computer utilized for general purposes. ...

Routers and the History of Computer Networking

In five pages this paper discusses computer networking in an historical overview that includes routers and other types of hardware...

Types of Computer Programming Languages

of that market. The very first programming languages, back in the...

Service Consultants and Differences Between Patents and Copyrights

copyright does not protect ideas but just the way the idea is expressed in a piece of work (UK, 2002). A patent, on the other han...

Computer Hacking and Ethics

productive. Like having a firewall, these individuals can help people protect their sites from unscrupulous individuals who want t...

Modernist and Postmodernist Architectural Theories of Le Corbusier and Robert Venturi

generator" which "holds in itself the essence of sensation" (Le Corbusier, 1924, p. 8). For Le Corbusier, the idea that the plan "...

Theories on Motivation and Management

variation in task complexity and the relationships between workers and managers in each. An example of a high task - low relation...

Home Lifestyle Changes Due to Computers

make life so much easier. Anymore, there is no reason to slave over a hot stove when one can come home from work with a hot, nour...

Forging a Committed and Motivated Workforce- An In-Depth Case Study

turnover rate of 22 to 33 percent per year. While it is not unusual for employee turnover to reach even 25 or 35 percent in a year...

19th Century French Mathematician Augustin Louis Cauchy

own background also needs consideration, as the work was also a reflection of the man and his circumstances. After this some examp...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Developmental Theories Compared

theory form of human development. Freud discussed psychosexual development, Erikson discussed psychosocial development and Piaget ...

Three Personality Theorists Compared

a little less complicated. Freud discussed many of his ideas in abstract terms making it very difficult for a novice to really und...

Implementing an Inventory Control System

The paper uses a information technology development lifecycle approach to assess the way that a firm may introduce a computer syst...

BUSINESS CONTINUITY PLAN: DATA PROTECTION

In a previous paper, the writer pointed out that illegal intrusion into a database - whether physical or via Internet - is a huge ...

Acer Computers: A Case Analysis

research available. By conducting a case analysis, one is able to delve deeply into a topic, identifying not just the superficial ...

Organizational Systems: A Pervasive Overview

we process information as human beings. Human epistemology is constructed as a system of categories; when we learn new information...

Theories in Criminology

of success that society all but demands. In essence, people are not considered successful unless they are well off financially and...