Research Paper

Discover a comprehensive resource for research papers, offering insights, methodologies, and expert guidance to enhance your academic writing and research skills.

General

School Violence In The USA – Research Paper

School Violence School violence is acknowledged as a main social issue which not only influences the students’ educational achievement and well-being, but can as well establish citizenship education and democratic value. School violence is referred to as youth violence which takes place in school property, in a school sponsored events, or on the way from […]

General

Chronic Obstructive Pulmonary Disease (COPD) Research Paper

Introduction In America, Medicare is deemed as a national social insurance program which was administered by the United States  federal administration starting from 1966 and it is currently employing about thirty private insurance companies within United States. Medicare offers community with health insurance particularly to younger individuals cumbered with diverse disabilities and various illnesses. By

General

The Watergate Scandal Research Paper

The break-in occurred in where burglars attempted to access the Democratic National Committee office housed in the Watergate building. The break-in took place on June, 17, 1972 at a time when there was internal division and where the United States was involved in the Vietnam war. The breaking in was linked to President Nixon, and

General

Heroin Epidemic in West Virginia – Research Paper

Heroin Heroin has alwas posed a threat in the United States and in the entire world at large. However, the level of threat posed varies from region to the other depending on dependent variables. The threat posedby heroin to West Vigeniahas always been low but over the resent past, it has been steadily increasing to

General

Thou Shalt Not Use a Computer Steal – Research Paper

Studies regarding moral and ethical issues in information systems have become increasingly accepted as significant and legitimate. This is because of the way they raise various challenges that are, somehow, difficult for information system scholars to note and address. In this paper, an explanation of why people should not use computers to steal will be

General

Training in Tough Times – Research Paper

When economic times are good, most companies spend a lot of money on training as a way of developing employees. However, it is quite unfortunate that training is often the first activity to be cut during tough economic times instead of them being increased. As Lipman (2013) points out, companies should not ignore training during

General

Free Market System – Research Paper

A Free Market System Definition A free market system refers to a setup where the market economy is based on forces of demand and supply with minimal or no government manipulation. A completely free market would be an idealmarket economy system is where buyers and sellers are allowed to buy, sell and trade freely based

General

Instructional Design Models Research Paper

Instructional Design Similarities and differences between Bloom’s Taxonomy and Gagne’s Taxonomy of Learning Outcomes Bloom’s Taxonomy is somehow similar to Gagne’s taxonomy of learning outcomes. The main similarity centers in how the two theorists view human learning outcomes. Both Bloom and Gagne believe that it is relevant to split the learned capabilities of humans into

General

Obesity in America – Research Paper

Obesity in America An individual being obese or overweight is not a cosmetic problem. These conditions critically raise once risk for other health complications. Obesity is body weight that contributes substantial risk for adverse health outcomes. The predominance of obesity has greatly increased markedly in U.S. adolescents and children in the past 30 years. Obesity-related

General

Computer Memory / Ram Hacking – Research Paper

Hardware hackingis a term used to refer to the act of altering a partor parts of an existing electronic with the aim of using the machine in a way other than which it is intended (Levy, 2001). The method used to modify a device is dependent on the purpose of the hack. These alterations include,

Scroll to Top