SEARCH RESULTS

YOU WERE LOOKING FOR :Using Technology To Support Learning

Essays 901 - 930

Security in Schools and Technology

in schools can solve all problems, but that it can be used to benefit schools if used properly: "National School Safety and Securi...

Technology and Price Waterhouse Coopers

this set-up is that the SAP system stays Online while employees make the copy of what they need, which is a major time-saver (Stor...

Success Factors, Technology, and Knowledge Management at Price Waterhouse Coopers

able to communicate with one another -- and that transparency of information between the communities was important (Anonymous, 199...

Case Study on Dubai Ports Authority

the Bill of Lading, the delivery order, and the bill of entry. Another major player in the situation was the Dubai Customers Depa...

Human Resource Case Study on Micronics Technology

dependent upon Carol having dinner with Buddy, the supervisor. It is also a hostile environment case because Buddy touches her, re...

Precision Rectifiers and Circuit Design

In sixty pages this paper examines precision rectification circuits that are high speed in terms of design, uses, and also conside...

Technology in The Writings of Mark Twain

This paper examines Twain's perspectives on technology as seen in both his writing and his life. The author uses examples from th...

Class Size Reduction and Technology

In eight pages this paper discusses whether instruments of technology technology are more important than class size with an argume...

Information Transference Analysis

the value of grassroots knowledge is a managerial investment. Management may feel more comfortable in hiring outside of the ranks...

Diplomatic Organization and the Effects of Internet Technology

In eleven pages this paper examines diplomatic organizations in an assessment of Internet technology's pros and cons. Twelve sour...

History, Present, and Future of SQL

In five pages this paper discusses SQL in a consideration of its history, uses in the present, and the future promise it holds in ...

The Use of the Clicker System

In a paper of eight pages, the author reflects on the use of technology in nursing education, specifically the use of a clicker sy...

Effective Educational Tenets

In a paper of three pages, the writer looks at higher education and its pillars. Technology and funding are explored as important ...

Identity and Digital Communications

In a paper of six pages, the writer looks at digital communications and identity. The relationship between technology and identity...

Perspectives on Technology in the 21st Century

In a paper of five pages, the writer looks at technological perspectives. The media, consumers, and community are all analyzed for...

Aging of the World

This study uses several research studies about social workers as its core. The focus is on social workers and the elderly. Technol...

Educational Policies and Technology

In a paper of three pages, the writer looks at educational policies. Improvements in policies to better handle the use of technolo...

Research on Stem Cells

This essay discusses several aspects of stem cells and stem cell research beginning with what are stem cells and why are they so i...

The American Civil War and Modern Warfare

In a paper of three pages, the writer looks at the American Civil War. Modern aspects such as civic participation and the use of a...

Technology Vendors and Marketing Issues

In a paper of eight pages, the writer looks at technology vendors and potential marketing issues. A case study is presented as a h...

The Impact of Technology in Preschool

(Schmid, Miodrag and Di Francesco, 2008; Chatel, 2005; Macpherson, 2005; Weikle and Hadadian, 2003). Does this media help or hinde...

Integratihng IT through a Paperless System

the global operations (Microsoft, 2009). If a system, is going to be paperless it is essential that it is up to date....

AN ANALYSIS OF EMERGING TECHNOLOGIES

introduced, werent necessarily thought to have much of an impact at the time. For example, looking back on the printing press, we ...

Proposal for a New Security Model Using Integrated Circuit Card Embedded with User’s Biometrics

to the appearance of the person standing in from of them. Over time the change in what is and is not accepted as identifying and t...

EuroDisney Analysis

had begun to explore locations in Europe. Not only did the government sell Disney the land at a ridiculous price, it promised to e...

Technology In The Doctor's Office

checks appointments and other information on the computer. One works with patients who have just been seen, setting up the next ap...

WAL-MART, TECHNOLOGY AND ETHICS

health records (Technology Harnessed to Improve the System, 2009). The purpose behind Dossia is to bring a record-keeping system i...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

Essays on Computer Management

in it (especially on the Internet). The problem is, however, that "privacy" is one of those concepts that is difficult to ...

Security and Wireless Technologies

issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One...