SEARCH RESULTS

YOU WERE LOOKING FOR :Technology and Communication

Essays 1771 - 1800

Marketing Developments

of the internet and both eComerce and mCommerce approaches to marketing is not a new idea, this has been predicted as increasing i...

Incorporating New Approaches in Policing

The question of how to address crime has plagued civilization throughout history. The old approach to crime was to make the...

VERBAL COMMUNICATIONS, EYE CONTACT, SIGNS AND SYMBOLS

specifically instruct a person to stop. Another comparison is that a dove with an olive branch in its claw symbolizes peace, much ...

Multiple Intelligences and the Use of Technology in Education

In a paper of four pages, the writer looks at Gardner's multiple intelligences. The use of technology to effectively teach to a wi...

Diverse Learning Styles and the Use of Technology

In a paper of three pages, the writer looks at differing learning styles such as auditory, visual, and kinesthetic. The ability of...

Correctional Institutiones go Hi-Tech

RAND corporation (Bulman, 2009). It will be an empirical study that will reveal before and after incidents of violence. Prisons h...

Technology Helps Health Care

a drivable distance. This rural population currently exceeds 35 million in the country (America Telemedicine Association, 2007). ...

Summary and Analysis of a Nursing Practicum

catheterization provides an effective method for evaluating the effectiveness of medications while also assessing cardiac function...

Education and the Integration of Technology

as keeping track of grades and attendance records (Gray 2010). By the same token, at least 96% of teachers report the use of word ...

The Impacts of Digital Technology on the Production and Consumption of Media in Indonesia

and a range of problems for women, the "New Order" regime under Suharto focused on mass media messages that put women in their pla...

e-Learning Personnel Development

and mirrors used in these machines. The overhead projectors of the 1940s capitalized on the slide projector technology that had b...

Security The Perimeter to the Innermost Recesses

whether it be private physical or commercial physical security is much more complex than it was just a few decades ago. Physical ...

Communication by Dove

Dove's Campaign for Real Beauty has been very successful. AS great deal of the success has been the ability of the fir to communi...

US Productivity and Quality of Life as Pertaining to Information Technology

In a paper of three pages, the writer looks at information technology. Productivity and quality of life impacts are assessed. Pape...

Creating Value With Supply Chain Integration

In 2002 the National Institute of Standards and Technology estimated that in the US alone more than $1 billion a year could be sa...

The Potential Benefits of Implanted Bio Fuel Cells

The writer looks at the topic of bio batteries and the benefits they may provide if designed for implanting in the human body. Th...

Future Concepts of Creativity

In a paper of five pages, the writer looks at creativity. The intersections of human creativity with technology is focused upon. P...

The Use of the Clicker System

In a paper of eight pages, the author reflects on the use of technology in nursing education, specifically the use of a clicker sy...

Effective Educational Tenets

In a paper of three pages, the writer looks at higher education and its pillars. Technology and funding are explored as important ...

Dayton Dry Goods Becomes Target

This paper offers an organizational analysis of Target Corporation. Organizational structure, mission, beliefs, social responsibil...

Read 180 and Fluency

A case study of a student who has fluency problems. The technology selected to help the student is Read 180 because it is a compre...

Green Buildings and Sustainable Design

The built environment has a significant impact on general ecological environment, causing damage and pollution with the construct...

INFORMATION TECHNOLOGY – TRENDS AND USAGE

Focuses on using smart phone technology for a supply chain in a Fortune 500 company. There are 3 sources listed in the bibliograph...

An Overview of Tablet Computers

Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the...

Classroom Use of Internet Tools

In a paper of three pages, the writer looks at using information technology in the classroom. Blogs and wikis are explored for the...

Tablets - The Benefits and Risks

In a paper of four pages, the writer looks at tablet computers. Benefits and risks inherent to the technology are explored. Paper ...

The Use of Coaxial Cable in Communications

bus, tree, ring and star6. A bus typology references a type of network where the relevant devices are all connected to one cable t...

Language and Communication in South Africa

of people in the nation are illiterate (Kenny, 2003). When examining poorer populations, most people who live on one dollar per d...

Effective Communication in the Context of Group Leadership

their work environments. Most employees do not conform to a particular protocol but are essential in creating their own roles. Par...

Why Passwords and Good Information Security Technologies Are Compromised by Users

cases, there are four critical factors that affect the proper usage of passwords: Multiple passwords; Password content; Perceived ...