Chap2

In: Social Issues

Submitted By annieme
Words 3536
Pages 15
CHAPTER II
REVIEW OF RELATED LITERATURE AND STUDIES

Local Studies
Tapalla (1986) conducted on the study habits of first year college students of southwestern University. She conducted that academic achievement was clearly affected by study habits and attitudes and was not affected by other factors like sex, types of residence, best place of study, sources of allowance and the tome spent for studying.
Villareal (1982) conducted a survey of the study habits of college students in Cebu. She showed the relationship between study habits and such factors as age, sex, civil status, educational attainment , and religion. The significant findings on her work were: 1) studying is not a purposeful mental activity among students; 2) daydreaming among students is common; 3) students are affected by the slightest noise; 4) hey read slowly and found difficulty in covering their assignments; 5) students read with lips while reading; 6)they neglect the importance of proper lighting and ventilation while studying ; 7) suitable materials for study are not available; 8)majority of the students cannot concentrate while studying; 9)unfavorable attitudes toward the study are shown by great number of them; 10) the more mature the students are, the more inefficient are their study habits; 11) and the higher the attainment of parents the better are the students’ study habits.
The study mentioned that among the causes of poor study habits were: (1) lack of proper physical and environmental background and psychological prerequisites of good study such as concentration , favorable attitude toward work and study spaced practice , time budget, self-evaluation, and methods and standards of work; (2) poor habits of preparing assignments; (3) improperly developed habits related to the classroom such as taking notes and failure to summarize facts learned; and (4) improper use of library
In…...

Similar Documents

Compare the Models of Government Business Relations in Sweden and the United States

...The Swedish model for resolving the banking crisis of 1991-93. seven reasons why it was successful. European Economy, Retrieved from http://ec.europa.eu/economy_finance/publications/publication14098_en.pdf Nothwehr, E. (2008). Emergency economic stabilization act of 2008. University of Iowa, Retrieved from http://www.uiowa.edu/ifdebook/issues/bailouts/eesa.shtml Phillips, M. (2009). A Swedish model that's not pretty. Newsweek, 153(10) Saltmarsh, M. (2010). Swedish bank fee sets example for america. New York Times The Sveriges Riksbank. (2009, July 01). The Riksbank. Retrieved from http://www.riksbank.com/ U.S. Department of State. (2008). How the U.s. economy work. Retrieved from http://usinfo.state.gov/infousa/government/forpolicy/chap2.html Weiss, M,D, & Larson, M,D. (2009). Proposed $700 billion bailout is too little, too late to end the debt crisis; too much, too soon for the u.s. bond market. Weiss Research INC., Yorulmazer , T. U.S. Federal Reserve Bank of New York3(2009). Lessons from the resolution of the swedish financial crisis. Retrieved from http://www.newyorkfed.org/research/economists/yorulmazer/Lessons-Swedish-Crisis1.pdf...

Words: 2479 - Pages: 10

Business System Analysis Cheat Sheet

...reporting based on other computer systems. A decision support system (DSS): provides information to help make decisions. An expert system: captures the expertise of workers and then simulates that expertise to the benefit of nonexperts. A communications and collaboration system: enables more effective communications between workers, partners, customers, and suppliers to enhance their ability to collaborate.An office automation system: supports the wide range of business office activities that provide for improved work flow between workers. Systems analyst – a specialist who studies the problems and needs of an organization to determine how people, data, processes, and information technology can best accomplish improvements for the business. Chap2 : Information systems architecture - a unifying framework into which various stakeholders with different perspectives can organize and view the fundamental building blocks of information systems. Knowledge (ERD), process (UML) and communication (Interface). Chap3 : Capability Maturity Model (CMM) – a standardized framework for assessing the maturity level of an organization’s information system development and management processes and products. Model-driven development – a system development strategy that emphasizes the drawing of system models to help visualize and analyze problems, define business requirements, and design information systems. Process modeling – a process-centered technique popularized by the structured analysis......

Words: 1409 - Pages: 6

Money, Banking and Financial Markets Glossary

... | | | | Money   | An asset that is generally accepted as payment for goods and services or repayment of debt, acts as a unit of account, and serves as a store of value. | | | | Risk   | A measure of uncertainty about the future payoff to an investment, measured over some time horizon and relative to a benchmark. The basis for the second core principle of money and banking: Risk requires compensation. | | | | Stability   | Steady and lacking in variation. The basis for the fifth core principle of money and banking: Stability improves welfare. | | | | Time   | A measurable period during which something can happen. The basis for the first core principle of money and banking: Time has value. | Chap2 Glossary (See related pages) | | | Automated clearinghouse (ACH) transaction   | The most common form of electronic funds transfers. | | | | Check   | An instruction to the bank to take funds from one account and transfer them to another. | | | | Commodity money   | Precious metals or other items with intrinsic value that are used as money. | | | | Credit card   | A promise by a bank to lend the cardholder money in order to make purchases. | | | | Currency   | Paper money; dollar bills or euro notes. | | | | Currency in the hands of the public   | The quantity of dollar bills held by the nonbank public; part of M1. | | | | Debit card   | A card that......

Words: 8336 - Pages: 34

Tree Value

...Introductory workbook In this workbook, basic concepts of Excel are introduced. An interactive tutorial is used to introduce concepts of formulas and graphs. Filename: intro.xls The descriptions of the tutorials and projects are listed in a table format in the following pages. 5 Summary of Tutorials in Finite Mathematics Using Excel Chapter and corresponding section(s) Tutorial Number Summary Comments File: chap1.xls 1. Linear Equations and Straight Lines Sec. 1.3,1.4 1 Linear equations for a depreciation model graphics and tables Linear equations and Excel's Goal Seek More applications using Goal Seek Least Squares using Excel's built-in functions Intrinsic Excel function and graphics are introduced for least squares File: chap2.xls 2. Matrices Sec. 2.3 1 Entering and adding Matrices Multiplying Matrices This tutorial is necessary for entering and working with arrays Array formulas are somewhat inelegant to enter in Excel. These tutorials help students practice this. Introduces "Goal Seek", a built-in tool for analysis 2 Sec. 1.3 3 Sec. 1.3 4 Sec. 1.5 2 Sec. 2.3 3 Sec. 2.3 Sec. 2.4 Sec. 2.4,2.6 4 5 Applications of Matrix Multiplication Computing Matrix Inverses Solving Linear systems File: chap4.xls 4. Simplex Method Sec. 4.2,4.3 1 Linear Programming Using Excel Solver Solver's Answer Report More Solver Practice Necessary for all subsequent work with Solver 2 3 Sec. 4.2-4.4 4 Sec. 4.2-4.4 Useful for students to connect......

Words: 3176 - Pages: 13

Quality Components

... Customers have diverse types of service expectations: desired service that reveals what the customer wants; adequate service, which is what customers are ready to endure and predicted service, or what customers think that they are most likely to get (McGraw, n.d.). These various levels of service are replicated within the customer’s area of acceptance that creates the flexibility in the service provision that a customer is willing to endure (McGraw, n.d.). The customer expectations and tolerances are inclined by a diversity of aspects such as the type of business, product or services being provided. References Quality. (n.d.). Chapter2:Quality of Health Care. Retrieved from http://www.ahrq.gov/research/findings/nhqrdr/nhdr08/Chap2.html McGraw, H. (n.d.). Customer Expectation of Service. Retrieved from http://highered.mcgraw-hill.com/sites/dl/free/0077107950/577210/04ch03.pdf...

Words: 517 - Pages: 3

Foundations of Financial Markes and Insitutions Book Notes

...information asymmetry between the issuer (management) and the investors, and disclosure regulation mitigates the harm to investors that could result from this informational disadvantage. As a result, there is confidence in the market and the pricing mechanism of the market. 18)what is meant by market failure Answer: a market is said to fail if it cannot, by itself, maintain all the requirements for a competitive situation. Market failure occurs when the market cannot produce its goods or services efficiently. In the context of financial market failure, it occurs when the pricing mechanism fails and thus the supply and demand equilibrium is disrupted. This results in failure to price securities efficiently and reduced liquidity. Chap2 probs 5,6,10-13 5)  A bank issues an obligation to depositors in which it agrees to pay 8% guaranteed for one year. With the funds it obtains, the bank can invest in a wide range of financial assets. What is the risk if the bank uses the funds to invest in common stock? Practically, it is not a valid statement as banks are not allowed to hold stocks. The bank has a funding risk. On the liability side, amount of cash outlay and timing are known with certainty (Type I). However, on the asset side, both factors are unknown. Thus, there is liquidity risk and price risk 6) a.       Car insurance: neither the time nor the amount of payoffs are certain, which is Type IV liability b.      Variable rate certificates of deposit:......

Words: 4168 - Pages: 17

Cissc Chap2

...1. Why is information security a management problem? What can management do that Technology cannot? Management need to perform detailed risk assessments and spend hundreds of thousands of dollars to protect the day to day functioning of the organization. Technology set policy, nor fix social issues. 2. Why is data the most important asset an organization possesses? What other assets in The organization require protection? Data in an organization represents its transaction records and its ability to deliver value to its customers, without this the organization would not be able to carry out day to day workings. Other assets that require protection include the ability of the organization to function and the safe operation of applications, technology assets and people. 3. Which management groups are responsible for implementing information security to? Protect the organization’s ability to function? Both general management and IT management are responsible for implementing information security 4. Has the implementation of networking technology created more or less risk for Businesses that use information technology? Why? The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s network. 5. What is information......

Words: 1160 - Pages: 5

Internet

...Education: Developments and Implications in the Asia and the Pacific Region, UNESCO Forum Occasional Paper, Korea. 7. Moore, G. C., and Benbasat, I. (1991). Development of an Instrument to Measure the Perceptions of Adopting an Information 8. Statistical Yearbook of Latvia (2008) Riga: Statistical Bureau of Republic of Latvia, 499-505. 9. Venkatesh V, Morris M, Davis G, and Davis F. (2003). “User Acceptance of Information Technology: Toward a Unified View”, MIS Quarterly, 27 (3), 425-478 10. Wilson T. D., A General model of information-seeking behaviour http://www. informationr.net/tdw/publ/infbehav/chap2.html (12.10.08.) 11. Wilson, T.D. (1999). Models in information behaviour research. http://www.informationr.net/tdw/publ/papers/1999JDoc.html (10.10.08.) 12. Wilson T.D. Information behaviour, an interdisciplinary perspective. http://www. informationr.net/tdw/publ/infbehav/chap2.html (12.10.08.) 1. 2. 387 ...

Words: 3622 - Pages: 15

Chap2 Ho1 Description Solution.Docx

...Word Processing Learn to type. The ultimate limitation of any word processor is the speed at which you enter data; hence, the ability to type quickly is invaluable. Learning how to type is far from an insurmountable problem, especially with the availability of computer-based typing programs. As little as a half hour a day for a couple of weeks will have you up to speed, and if you do any significant amount of writing at all, the investment will pay off many times. ------------------------------------------------- Write now, but edit later. You write a sentence, then change it, and change it again, and one hour later, you have produced a single paragraph. It happens to the best of writers – you stare at a blank screen and flashing cursor and are unable to write. The best solution is to brainstorm and write down anything that pops into your head, and to keep on writing. Do not worry about typos or spelling errors because you can fix them later. Above all, resist the temptation to edit continually the few words you have written because over-editing will drain the life out of what you are writing. The important thing is to get your ideas on paper. Delete with caution. It’s all too easy to delete a paragraph, and then realize five minutes later that you need it back. Hence, instead of deleting a large block of text, move it to the end of a document or writing it to another file, so that you can restore the text if you change your mind. A related practice is to remain in......

Words: 576 - Pages: 3

Managerial Accounting

...maintenance services that will include lawn mowing services, aeration and fertilization. You and two of your friends have agreed to work for you in this new business endeavor. Which of the following would best describe controlling for your new business? | | | | | Selected Answer: | B. Comparing the actual cash balance with the budgeted cash budget each month | Answers: | A. Assigning workers to perform lawn services for various clients | | B. Preparing monthly billing statements for clients | | C. Preparing a cash budget to estimate your monthly revenues and expenditures | | D. Comparing the actual cash balance with the budgeted cash budget each month | Response Feedback: | LO: LO: 2 Topic: Controlling | | | | | Chap2 Question 1 1 out of 1 points | | | The following data was input into a spreadsheet program to determine the Intercept, Slope and R2 (RSQ) for Patient Days and Maintenance Costs for a local hospital: Month | Patent Days (X) | Maintenance Costs (Y) | January | 5,600 | $7,900 | February | 7,100 | $8,500 | March | 5,000 | $7,400 | April | 6,500 | $8,200 | May | 7,300 | $9,100 | June | 8,000 | $9,800 | July | 6,200 | $7,800 |   |   |   | Intercept | $3,431 |   | Slope | $0.759 |   | RSQ | 0.9 |   | The estimated total maintenance cost for August based on an estimated 6,000 patient days is | | | | | Selected Answer: | A. $7,985. | Answers: | A. $7,529. | | B. $7,186. | | C.......

Words: 13491 - Pages: 54

Operation Management

...Production and Operations Management incorporates several suggestions offered by our colleagues and students all over the country. Untitled Web Page - UMSL http://www.umsl.edu/~campbelljf/252/solutions/chapter1solutions.DOC END-OF-CHAPTER PROBLEMS. 1.2 (a) (c) ... 2 Instructor’s Solutions Manual t/a Operations Management Chapter 1: ... Title: Untitled Web Page Author: Mary Toscano Last ... Operations Management - New Jersey Institute of Technology http://cpe.njit.edu/dlnotes/EM/EM501/EM501_02.pdf Operations Management Operations Strategy for Competitive Advantage Chapter 2 Transparency Masters to accompany Operations ... innovations and solutions Chapter 2 - Project Management - EPA http://www.epa.gov/superfund/cleanup/pdfs/rdrabook/chap2.pdf Chapter 2. Project Management appropriately, and to obtain cost information for invoice approval. ... problems and developing preemptive solutions, Operations Energy Management http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Video/Mediator_DG/mediator_DG/chap7.pdf CHAPTER 7-1 Mediator Design Guide 7 Operations Energy Management Energy Consumption Awareness Reducing energy consumption in buildings can be accomplished in a step ... Related Documents: Zoom Istvan Banyai Zogadi Unarebis Testebi Da Pasuxebi Zimsec Past Exam Papers With Answers Zero And First Conditional Exercises Zentangle Patterns Zane Addicted Yunus Cengel Thermodynamics Your Unix Linux The Ultimate Guide Your Erroneous Zones You......

Words: 852 - Pages: 4

Chap2

...1. Discuss the concept of corporate social responsibility. What role does it play in the relationship between a company and its host country? (Course objective 1) International social responsibility is the expectation that MNCs concern themselves with the social and the economic effects of their decisions regarding activities in other countries. An MNC’s stance on international social responsibility determines how harmonious and productive its long-term relationships with host countries will be. By taking an open-systems perspective on CSR it is more likely that the MNC will be taking the right action relevant to all stakeholders. 2. Discuss the criticisms which have been levied against MNCs in the past regarding their activities in less-developed countries. What counter-arguments are there to those criticisms? (Course objectives 1, 2) MNCs have been criticized for disrupting the social, technological, and political climates in host nations. Governments often have a “love-hate” relationship with MNCs because they want the economic advantages produced by the presence of MNCs, but they regret the negative impacts MNCs often have on the political and social environments. MNCs can defend themselves by pointing out that, without their presence, host nations would not have as many jobs or trade opportunities, as well as opportunities to appropriate technology. MNCs have also been accused of destroying local culture through globalization. Although MNCs have increased the......

Words: 1216 - Pages: 5

A) Based on Marcia’ (1966) and Josselson’s (1971) Psychosocial Perspective, Develop and Present a Set of Questions (an Interview Schedule) as an Instrument to Be Administered to Two Female and Two Male Traditional- Age (

...and environment. Knowledge of these theories and personal data collected from students will help to build an effective student affairs and services operation that puts the student at the centre of all efforts by supporting students in their academic endeavors and enhancing their personal, social, cultural, and cognitive development. Bibliography Ceballos, I. V., (in press). The Application of Psychosocial Theories through Student Interviews. Retrieved November 20, 2009 from http://74.125.93.132/search?q=cache:QLGpyqKShMcJ: Collins, D., (2001). Identity Development- Erikson’s Conceptualization of Identity. Retrieved November 19, 2009 from http://scholar.lib.vt.edu/theses/available/etd-04262001- 194845/unrestricted/chap2.pdf Gatten, J. N., (2004). Student psychosocial and cognitive development: theory to practice in academic libraries. Ref. Services, 32, (2) 157-163. Retrieved November 20, 2009 from http://www.emeraldinsight.com/Insight/viewContentItem.do;jsessionid=0212C5A76705A788CB8C52D18178819F?contentType=Article&hdAction=lnkhtml&contentId=861777 Kellogg, A., (1987). Josselson’s Pathways to Identity in Women. Retrieved October 25, 2009 from http://www.uiowa.edu/~epls/faculty/pascarel/papers/kellogg.pdf Komives, S.R, Woodard D. B., & Associates (2003 Student Services: A Handbook for the Profession (4th ed.) USA: Jossey-Bass. Pringle, J.K, (2003). Re-incarnating life in the careers of women: Career Dev.......

Words: 4597 - Pages: 19

Nursing

...Chap2 * Identify specific ethical codes, including professional codes. What ethical theory is seen in the code? • List virtues you feel are important for nurses to attain, and describe why you feel they are important. • Can different ethical theories be utilized in making an ethical decision? Why or why not Chap3 * What are the ethical principles and implications? • Should the nurse notify security of the potential hazards of patient endangering self and others? • How does the nurse express fidelity, confidentiality, beneficence, nonmaleficence, autonomy, respect for persons, veracity, and justice in this situation? Module 2 discussion When I took a humanity class in college, there were two male students who were friends with each other that sat behind me. They were quietly and actively involved during the class discussion and created a pleasant mood. However, during an exam, their voices were loud enough to be heard by me and other students. One female student, C, who sat next me had strongly adverse feelings about their cheating and she wanted us to go to the professor and talk about them together. However, I didn’t because I felt kind of embarrassed reporting the classmates to the professor and did not mind it since it would not have affected my grade anyway. In addition, their voice was loud enough for the whole class to hear, so I guessed that the professor already knew about them and might punish their behavior later. C reported them after the end......

Words: 2050 - Pages: 9

Leadership

...other types of educational institutions. Correspondence concerning this article should be addressed to Michael D. Thompson, Director of Institutional Research, The College of Wooster, Wooster, OH 44691-2363; mthompson@wooster.edu 349 Research in Brief REFERENCES Allen, K. E., Stelzner, S. P., & Wielkiewicz, R. M. (1998). The ecology of leadership: Adapting to the challenges of a changing world. The Journal of Leadership Studies, 5, 62-82. Bass, B. M. (1990). Bass and Stogdill’s handbook of leadership theory, research, and managerial applications (3rd ed.). New York: The Free Press. Beloit College. (n.d.). Beloit College mission statement. Retrieved February 23, 2005, from http://www.beloit.edu/ %7Eacadaffa/policy/chap2.html#mission Bolman, L. G., & Deal, T. E. (2003). Reframing organizations (3rd ed.). San Francisco: Jossey-Bass. Colgate University. (n.d.). Colgate University mission statement. Retrieved February 23, 2005, from http://www.colgate.edu/ DesktopDefault1.aspx?tabid = 491&pgID = 1000 The College of Wooster. (n.d.). The College of Wooster mission statement. Retrieved February 23, 2005, from http:// www.wooster.edu/about/mission.html Colorado College. (n.d.). Colorado College mission statement. Retrieved February 23, 2005, from http://www .coloradocollege.edu/welcome/mission/ Cress, C. M., Astin, H. S., Zimmerman-Oster, K., & Burkhardt, J. C. (2001). Developmental outcomes of college students’ involvement in leadership......

Words: 4090 - Pages: 17