917 Search Results for Annotated Bibliography in Education
Graves, R.N. (1995). Hardy's "The Convergence of the Twain." The Explicator, 53 (2): 96-99.
In this essay, the eventual unity of the iceberg and the Titanic is described as a kind of love relationship. Ironically, the supposedly unsinkable ship an Continue Reading...
Einstein, A. "Religion and Science." Retrieved August 19, 2013, from http://www.sacred-texts.com/aor/einstein/einsci.htm
This article is intriguing because it was written by one of history's most renowned scientists with the purpose of clearing th Continue Reading...
Depression and Eating Disorders
The eating disorder category in the DSM-IV includes Anorexia Nervosa, Bulimia Nervosa, and the Eating Disorder Not Otherwise Specified categories. Peck and Lightsey (2008) note that while the DSM classification sympto Continue Reading...
Bullies
Cornell, Dewey; Limber, Susan P. (2015). Law and policy on the concept of bullying at school. American Psychologist. 70(4), 333-343.
This article focuses on the legal circumscriptions for counteracting the effects of bullying and the very Continue Reading...
The authors have expertise with Oracle databases and use examples from the enterprise products this software vendor provides to make their point regarding security of highly distributed networks. One of the more valuable aspects of this specific pap Continue Reading...
A few of the most notable include: social networking / fake emails and cloud computing. The information from this source is useful, as it is illustrating the current challenges facing the database security of most organizations. (Kark, 2011)
Olzak, Continue Reading...
Authors present the results of a national law enforcement technology survey and comparable forensics technology survey that was conducted by the RAND Corporation to assess the effectiveness of this support and constraints to applying forensic techno Continue Reading...
Unix provides many more options to an administrator, and having a consultant may help decide what methods would be best for the individual circumstances; administrators making the switch from other platforms will be used to having to just make do wi Continue Reading...
Theoretical Framework
The balancing of social media data for optimizing the customer experience online vs. its use for advertising and selling, including the reselling of the data to other companies anchor the two continuums of the ethical spectru Continue Reading...
Clemmitt, Marcia. "Cyber Socializing: Are Internet sites like MySpace potentially dangerous?" Congressional Quarterly Researcher 16.27 (2006): 627-47. cqresearcher.com Web. 28 Jul 2006.
Marcia Clemmitt, a veteran social-policy reporter for CQ Resear Continue Reading...
This double-edged sword of new technology is being increasingly being relied on for capturing knowledge in the organization, serving as a vital catalyst for higher levels of collaboration Condon, 55):
According to Jorge Lopez, industry research chi Continue Reading...
Useful DSS will challenge and eventually change decision makers. By contrast, management information systems (MIS) provide output but no real impetus for change in the person receiving it. Interacting with DSS will provide to be new and challenging Continue Reading...
Alonso, J., Banegas, J.R., Graciani, A., Guallar-Castillon, P., Gutierrez-Fisac, J.L., Lopez-Garcia, E., & Rodriguez-Artalejo, F. (2007). Relationship between obesity, hypertension and diabetes, and health-related quality of life among the elderl Continue Reading...
valuable model in any way.as a, matter of fact I consider them very constricting. This is because one's mind is restrained towards having an essay that has an introduction, a thesis which normally has three points supporting it and a conclusion. Thi Continue Reading...
(1996) that do not this particular element as a deciding factor in the procedures (e.g., Meltzoff, 1988).
Research Question will explore the dimension and effect of vicarious learning and its importance in today's world at a very early stage of a p Continue Reading...
childhood obesity and its correlation to social-economic background. The researchers argued that attention to childhood obesity focuses on genetic and environmental factors, and there is the increasingly prevalent belief that pediatric obesity may b Continue Reading...
Marketing in Banking
The topic being researched for this doctoral work is marketing in the banking industry. Before delving into the research too much for this topic, the researcher will first enumerate the goals that are to be attained. These goals Continue Reading...
Youth violence is a major problem in the world today that must be continually researched and examined in order to reduce its harmful grasp. According to the Centers for Disease Control (CDC), violent acts were the second leading cause of death for yo Continue Reading...
He had built a wall around him that was preventing his normal interaction with people. This was causing real suffering and sickness. "What then became of me? I know not; I lost sensation, and chains and darkness were the only objects that pressed up Continue Reading...
Industrial Organizational Psychology: Motivation
Applied behavioral science
This is a branch of science that comprises of fields such as sociology, psychology and anthropology that deals primarily with the human actions and seeks to give a general Continue Reading...
Wallace says, "If we consider the number of perspective problems attendant to painting on the curved and irregular surfaces of the vault, it is reasonable that Michelangelo entrusted some of the architectural painting to Aristotile, thereby fosterin Continue Reading...
Omnivore's Dilemma
The research question to be approached in this paper: Is there a link between morality and vegetarianism? The answer is: Yes there is a link between ethics and moral values when it comes to substituting healthy vegetables for meat Continue Reading...
Combating Future Terrorism
The Continuing Threat Posed by Islamic Terrorists
Brinkley. J. (2013). Islamic Terror: Decentralized, Franchised, Global. World Affairs, 176(2),
Professor of Journalism Joel Brinkley explains that many countries around t Continue Reading...
).
It had been complicated for Cubans to be assimilated by the American community right away, as the fact that they came in large numbers prevented them from socializing with U.S. citizens to a large degree. Determined to keep their cultural identit Continue Reading...
human intelligence particularly in the context of Afghanistan war. Afghanistan is a Muslim Asian state which has been victimised by external forces of USA and Russia. The internal state of Afghanistan is very unfavourable for the development of coun Continue Reading...
Space
New York City
Use of Temporary Space
(NYC Department of Parks & Recreation)
Images & Charts
Illy Push Button House
Store Front Library
Brooklyn Bridge Park
Chashama
Images & Charts
According to the NYC Department of Parks Continue Reading...
We are proposing a new set of rules and guidelines Drexel should follow to ensure the success of its students moving forward.
The current policy for the underage consumption of alcohol here at Drexel University goes as followed. Obviously the consu Continue Reading...
Mental therapy using non-intense video games and how it affects brain health among the aged population showing early symptoms of dementia.
The deterioration of cognitive abilities and brain tissue due to age could have several adverse effects on men Continue Reading...
Connectionism and Learning: A Web of Development
I have chosen connectionism and its potential ability to model various learning processes in the brain by a multi-disciplinary approach that combines many different theoretical approaches that have re Continue Reading...
This study underscores the presumption that where public health information campaigns are concerned, information is often accessed but forgotten or ignored. By connecting this information to certain compensatory incentives, those who make up a likel Continue Reading...
Vermont's Junior Senator, Bernard Sanders introduced to the Senate the Stop Outsourcing Security Act S. 2398. The Stop Outsourcing Security Act will help solve the lack of oversight of contractors in Iraq by requiring that by June 2008, "the Preside Continue Reading...
The findings reveal that the pain is unbearable yet the patients tend to become immune from it, or at least surrender to it. The purpose of this article as it relates to the topic of euthanasia is that one popular argument for the legalization of eu Continue Reading...
A few years ago there were congressional hearings about the accusation against the larger airlines actively working to shut out any smaller newcomer to certain hubs around the world.
While the ability and willingness of incumbent airlines to respo Continue Reading...
Inflated Executive Salaries
In the following paper the researcher will analyze the reasons why companies feel CEOs are justified to have inflated salaries. The researcher will first outline the issue of executive inflated salaries, then sum up the a Continue Reading...
Phishing Spear Phishing and Pharming
The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is k Continue Reading...
There is a modern emphasis, which has resulted from the experience of the economic impact of disaster, on a more extensive and 'distributed' mode of thinking about disaster recovery. This is an important factor that should be stressed as it has dire Continue Reading...
While hockey may have masculine connotations for the single sportsman watching a game, a father watching the same game may see the sport as a way to bring the family together, while a mother next to him in the stands may marvel at its sociological i Continue Reading...