- Full text PDF available (7)
Identifying variables that predict computer aptitude can help educators and employers target potential students and employees. The authors examine a number of possible explanatory variables including demographic profiles, high school achievements, prior computer training and experience, cognitive styles, and problem-solving abilities.
Instructors can use both " multiple-choice " (MC) and " constructed response " (CR) questions (such as short answer, essay, or problem-solving questions) to evaluate student understanding of course materials and principles. This article begins by discussing the advantages and concerns of using these alternate test formats and reviews the studies conducted… (More)
Purpose – Increasing enrollments in colleges of business have not been matched by women majoring in the field of information systems (IS). This paper explores reasons why women choose not to major in information technology disciplines and suggests potential solutions. Design/methodology/approach – The authors used a behavioral model based on the theory of… (More)
More is known about the pervasiveness of college cheating than reasons why students cheat. This article reports the results of a study that applied the theory of reasoned action and partial least squares methodology to analyze the responses of 144 students to a survey on cheating behavior. Approximately 60% of the business students and 64% of the… (More)
Several wireless sensor network applications ought to decide the intrinsic variance between energy efficient communication and the requirement to attain preferred quality of service (QoS) such as packet delivery ratio, delay and to reduce the power consumption of wireless sensor nodes. Also the intended protocols that are developed aims in providing better… (More)
Yes, your test bank and solutions manual arelor sale and it is very easy for students to acquire them. Using a srakeholderframework, we analyze the ethical issues involved in acquiring, using, and distributing these instructional resources by individuals besides the professors for whom they are intended. We also discuss countermeasures that stakeholders… (More)