713 Search Results for Psychological Tests and Internet
In addition to supplying training so that workers can obtain and maintain entry-level jobs, training must be given that is based on national skills principles, assessments, and qualifications that will improve a participant's ability to compete succ Continue Reading...
In 2004, it established its operations in Mexico to cash in on the high rate of diabetes in this country. Diabetes is responsible for 13 out of every 100 deaths in Mexico and Novo Nordisk expanded into this Latin American market. It also encompassed Continue Reading...
Beck Depression Inventory-II (BDI-II) is a 21-item clinician administered and scored scale that is designed to measure a person's mood and symptoms related to depression. The BDI-II was designed to conform to the DSM-IV depression diagnostic criteri Continue Reading...
Rosenberg Self-Esteem Scale
Test Title: The Rosenberg Self-Esteem Scale (RSES)
Publisher and Date: 1965 by W.W. Norton, New York and Princeton University Press.
Description and Purpose: The Rosenberg Self-Esteem Scale (RSES) was developed by socio Continue Reading...
" (Wagner, 2000, p. 6)
As an almost limitless tool for advertisement, though some self censorship has recently occurred as more and more people reduce ad time by restricting adware and popup ads on their computer systems, the internet can ad to the Continue Reading...
Social Psychology of Hate Groups
Content Analysis of the Social Psychology of Hate Groups
Over a decade ago, it was already apparent that the Internet had advantages for social organization on the part of marginalized groups -- and that some of the Continue Reading...
In many ways, students live both in the land-based or physical world as well as in the virtual world; leading what some considers parallel lives.
Helliwell & Putman (2004) posit that social networking sites may offer an avenue for the developm Continue Reading...
FCAT Today (…and Tomorrow?)
FCAT History
The Florida Comprehensive Assessment Test (FCAT) is Florida's response to the contemporary focus on increasing student achievement by establishing processes and platforms that promote the accomplishmen Continue Reading...
82).
Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actua Continue Reading...
Vedantam, 2006), Americans are more socially isolated than they were in 1985, with the number of people with whom they can confide dropping by one third, from three close confidents to two. American is viewed as a fragmented society with splinters o Continue Reading...
The extreme power of this new cultural tool is the very nature -- it depends on nothing but an electronic connection. it, like many things in the modern world, is instantaneous, satisfying the 21st century need to have both dependence and independen Continue Reading...
Cyber Crimes
The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagin Continue Reading...
However, cursory studies that have been conducted are either biased because they seem to present a biased review of certain products or are insufficient because of their limitations and shallowness. Those studies that have been considered to be usef Continue Reading...
The use of open-ended questions that require multiple items in the answering points were observed to lead to a sharp increase in the attrition rate (Crawford et al.,2001). The use of questions that are organized into tables in conducting the various Continue Reading...
Marketing
Grade Course
Satisfaction of Market Needs as the First Step towards Product Development
Product, Price, Place, and Promotion are the core foundation of the marketing mix. The designing of a product initially goes through the product-deve Continue Reading...
Software Testing Strategy
Computers and their applications have brought about waves of changes in various areas of science and technology. It is also gaining widespread prominence in the field of business and management. So the requirement of a qual Continue Reading...
Management
Annotated Bibliography
Ahronovitz, Miha, Amrhein, Dustin, Anderson, Patrick, & de Andrade, Andrew. (2010).
Cloud computing use cases white paper. Cloud Computing Use Case Discussion Group. Web. Retrieved February 3, 2014 from http: Continue Reading...
i.e. modifying the domain name system.
7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address.
8. Content-In Continue Reading...
Grief Schiz
Precautions and Procedures for the Prevention of Suicide and the Treatment of Depression in Recently Diagnosed Schizophrenics
Any major chronic medical diagnosis can have psychological and emotional reverberations for the patient, as ch Continue Reading...
IT Ethics -- Annotated Bibliography
Bowie, Norman E. (2005). Digital Rights and Wrongs: Intellectual Property in the Information
Age. Business and Society Review, 110(1), 77-96.
Norman Bowie takes great pains in his peer-reviewed article to point Continue Reading...
Essential Mental Functions: the new senior developers are expected to reveal fair behavior towards their colleagues, subalterns, supervisors and clients. Among the most important mental functions that need to be possessed are: the ability to discer Continue Reading...
According to Toronto Star reporter Stephan Handelman in an article printed in 2005, the U.S. senior intelligence analysts consider China to be the greatest long-term threat to U.S. stability. China's military force and computer intelligence has rea Continue Reading...
This lesson would itself actually consist of several smaller lessons in order to incorporate all tasks and provide proper room for learning and absorption. This extended time period will also assist learners in making greater strides with the multim Continue Reading...
Children's Drawing Ability and Cognitive Development
There is scarcely a refrigerator door in America in homes with children that does not have one or more pictures attached to it with magnets providing proof positive that these young learners are Continue Reading...
Firewalls
Once upon a time a firewall was a physical barrier that kept a literal fire from spreading from one building to another. Now the term is more often used to refer to a variety of devices - both hardware and software - meant to keep informat Continue Reading...
Within each of these are discriminatory and generalized patterns of learning; and can be incorporated into learning models.
My own learning style is a combination of listening (learning from others) and then doing. It depends on the material; for a Continue Reading...
Psychology
Describe the relationship between Behaviorism and Cognitive psychology as movements within the science of psychology in the last century. Is one better than the other? Why or why not? Compare and contrast.
The Behavioral School of though Continue Reading...
Learning Organization
Prelude
The present enterprises are up against strict challenges, of which the most strenuous are fast technology adaptation, worldwide competition and clients demand for enhanced quality. This is just the tip of the iceberg. Continue Reading...
Cyber Security Vulnerabilities
Single Most Important Cybersecurity Vulnerability Facing IT Managers Today
Cyber Security Vulnerabilities Facing IT Managers Today
At present, computers link people to their finances through online banking and a numb Continue Reading...
2003, pg. 3191). While the human analysis component of this definition is important, very little research has looked at it in any level of detail. Combining the various BI definitions we will use the following definition for BI in this research: Bus Continue Reading...
Mobile phones are another major area of emerging technologies. Not just for phoning home anymore, mobile phones are becoming more and more robust, integrating full PDA functionality and even permitting streaming video content. Communications provide Continue Reading...
Counterterrorism
In the contemporary world, terrorists are groups or individuals who use covert warfare to press for political, social, or cultural reform. Rather than using the political process though, they believe that violence is the only way th Continue Reading...
This will not only create a higher level of trust in the actual implementation, it will also set the foundation for more effective ongoing support for these users if they have any problems with the systems once they are installed. An effective chang Continue Reading...
Decision Analysis System
Computers have brought a great change in our lives. A software program called spreadsheet turns the computer screen into a paper sheet one is working on. This program saves time by reducing the errors and repetitions of cal Continue Reading...
Cyber Bullying
One definition of Cyber bullying is that it is the employment of technology by a person to intimidate, upset, harass, demean and humiliate another person. Targets chosen by cyber bullies are no different from those picked by face-to-f Continue Reading...
Test Development
This research is a mixed methods study designed to explore the perceptions of self-identifying individuals with anxiety and depression regarding any relation between their conditions and their ability to access appropriate healthca Continue Reading...
Divorce on the Lives of Children
In today's society, half of all marriages end in divorce. Many of those marriages involve children. Parents who are involved in a divorce are often concerned about the effect of the divorce on their children. During Continue Reading...
The third position means stepping outside the situation and seeing issues from the point-of-view of a third party. NLP reminds us that people receive information in various sensory channels: the visual, the auditory, the kinaesthetic (perception of Continue Reading...
(Snyder & DeBono quoted in Kjeldal 2003, Introduction section, ¶ 6).
The results from the study Kjeldal (2003) conducted with 70 participants in two stages suggest that the word association responses high self-monitors (HSMs) produce refle Continue Reading...
Computer Games Research
When considering the short history of computers, video and PC gaming are very recent on the timeline of technology. This is one of the reasons why there have not been many conclusive studies on the negative and/or positive ef Continue Reading...