Make
Your Selection Below:
Papers On Computers & The Internet
Page 35 of 168
|
|
Computer Domains: Criteria for Selection of Equipment and Software :
[ send me this paper ]
A 2 page discussion of computer domains and the types of equipment which are necessary to access them. Bibliography lists 1 source.
Filename: PPDomain.wps
Computer Educational Project
[ send me this paper ]
(6 pp). This education project addresses the use
of the computer as a valuable learning tool.
Major areas of study will be 1) access to
technology in the classroom; 2) cognitive learning and technology; 3) multimedia learning combined with 4) instructional software (Toolbox); and 5) ethics and technology in the classroom.
Activities, games, and projects done individually,
with a partner, and in a group have been
incorporated into the design of this educational
project. The six levels of Bloom's taxonomy:
knowledge, comprehension, application, analysis,
synthesis, and evaluation, will be used as c
onstants throughout the project.
Bibliography lists 4 sources; includes abstract.
Filename: BBcompEd.doc
Computer Educational Project
[ send me this paper ]
(6 pp). This education project addresses the use
of the computer as a valuable learning tool. Major
areas of study will be 1) access to technology in
the classroom; 2) cognitive learning and
technology; 3) multimedia learning combined with
4) instructional software (Toolbox); and
5) ethics and technology in the classroom.
Activities, games, and projects done individually,
with a partner, and in a group have been
incorporated into the design of this educational
project. The six levels of Bloom's taxonomy:
knowledge, comprehension, application, analysis,
synthesis, and evaluation, will be used as
constants throughout the project. Bibliography
lists 4 sources; includes abstract.
Filename: BBcmpEdR.doc
Computer Ethics
[ send me this paper ]
This 5 page paper explores computer ethics in the workplace and why managers should study the subject. The difference between ordinary ethical dilemmas and those involving computers are discussed. Bibliography lists 3 sources.
Filename: SA044Com.rtf
Computer Ethics in Corporate America
[ send me this paper ]
This 6 page paper takes a look at corporate ethics as it pertains to computer usage. Software piracy is highlighted. Bibliography lists 6 sources.
Filename: SA325eth.rtf
Computer Field Trips
[ send me this paper ]
A 3 page paper assessing two �virtual fieldtrips,� one to an elementary class and one to a high school class, and placing their educational outcomes on a scale relating to Bloom�s Taxonomy. The lessons taught by these two �field trips� are that instructional technology tools enhance the teaching effort. They are not the electronic babysitters that parents fear, but only in the hands of dedicated teachers who seek to use their full potential. Bibliography lists 1 source.
Filename: KSeduCompField.rtf
Computer Graphics' Future in the Film Industry
[ send me this paper ]
A 10 page paper evaluating whether
computer-generated graphics and special effects is a passing fad in the film industry or is a
young industry poised to take on a lasting presence. The paper discusses aspects of special
effects in Jaws, Titanic, The American President, Casper, Forrest Gump and others; and
notes that the use of available technology allows filmmakers to increase quality while
simultaneously reducing costs. Computer-generated graphics and special effects has passed
the point at which it was at the brink of bringing revolution to filmmaking. It surpassed
novelty status years ago, and now stands to become a standard and integral process of film
production. Bibliography lists 6 sources.
Filename: KScompGrFilm.wps
Computer Hashing
[ send me this paper ]
A 5 page paper discussing this programming and functional technique that has existed for many years, dating at least from the 1980s and before. In the early days, it provided an alternative to the sort function within database applications. Today, it still functions similarly but rather than becoming anachronistic among programmers, it has gained renewed life in security application. One of the most common uses for hashing today is in conjunction with the use of electronic signatures. Bibliography lists 8 sources.
Filename: KSitHashing.rtf
Computer Industry/Governmental Alliances
[ send me this paper ]
A 5 page overview of the importance of the alliances between the computer industry and various branches of government. Discusses such innovations as the Internet, law enforcement software, and data encryption software which are a direct result of these alliances. Bibliography lists 6 sources.
Filename: PPCompAl.wps
COMPUTER MANAGEMENT ESSAYS
[ send me this paper ]
This 5-page paper provides a series of questions to be answered dealing with technology and computers. Questions include ethics over selling names to other businesses, competitive advantage and technology, how to configure a system for a small business and advice to an employee who is looking for a promotion
Filename: MTcomess.rtf
The Paper Store Enterprises, Inc. Gladly Accepts:
Request A Free
Excerpt From Any Paper Before Ordering!
Be
sure to also visit:
Term Paper Help On
File, 12000 Papers,
Research Papers Dot Net,
Essay Site, Paper
Geeks, Paper or Essay
Finder, The Essay Page,
Reports and Papers,
Report Finders, 12000
Papers, Real Papers, E
- Coursework, Choose
a Paper,
Pick a Paper, Paper
Download, & Expert
Term Paper Advice
(Click Here For MORE Term Paper &
Research Paper Help Sites!)
|