Specifically, this observation was to observe how the usage of electronics may decrease the social interactions among individuals, hence the decision to observe social behaviors in a computer lab. The overall time that I spent observing was approximately twenty-five minutes since I began at 9:00 a.m. until 9:25 a.m. Upon entering the computer lab, there were already two students utilizing the computers. One of the students was not facing me; instead, he was facing the back wall with his back to the door. The second student that I noticed, also had his back to the front door, yet he did see me sit down since I sat in the seat diagonal from him on the far right end of the opposite table from him. Both of these two students were using the computers, along with having headphones on that were hooked onto their phone or music player. Shortly after I entered, two more students came into the computer lab as well. One sat down i...
... middle of paper ...
...etermining a true relationship. Various factors could have affected the communication levels in this setting. For example, the timing of the observation limited my observation to only four individuals that were utilizing the lab. When I was about to leave, more people entered and brought forth more social interactions with verbal communications. Overall, these individuals who utilized electronic devices in the lab were more focused on their electronics or on their task at hand rather than to engage in a social interaction. However, as there were limitations in this method of research, the general conclusion may not be accurate to make a general conclusion about social behavior to be applied to all human behaviors. Once more, the observation is effective in seeing natural behavior but it is not a valid measure to determine a causal relationship of human behavior.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- A lot of people especially young adults went to school to better themselves. Each student has chosen major of study to fulfill them dream career. In Cincinnati State, a lot of students took Information Technology major to pursue their career in rapidly growing computer world. One of the advantages of being a computer programming is that they can work home-based or an office-based. Some people might ask if they have the same qualifications and work output. They do have the same qualifications. Home-based and office-based programmer have the same work results, it just a matter of how they write the program.... [tags: Computer, Programmer, Computer programming]
890 words (2.5 pages)
- The purpose of a computer programmer is to design and develop applications to perform the needs of a consumer. This occupation is essential to modern day life due to all of the computers that are in use today. Computer programming is a fulfilling career goal because of the ability to be on the cutting edge of technology, design software for computers, and have a wide range of benefits. Computer programming consists of many duties. Duties of a computer programmer include but are not limited to: debugging programs, converting project specifications and procedures to a logical visual map, repairing existing programs, writing documentation about current programs, and many more (Farr 187).... [tags: Computer Science]
1274 words (3.6 pages)
- Computer Science is an extensive field with plenty of options to choose from, whether you want to create a new software that will make the development of a certain task easier to perform, to monitor and modify existing programs to make them work faster and more efficiently, to understand the structure of new technology and having the ability to fix it if something goes wrong, or simply keeping up with the new machines that as years go by, are becoming more necessary for our daily lives, this is the field you will definitely pursue.... [tags: Software engineering, Computer, Computer science]
1195 words (3.4 pages)
- E.O. Wilson once said, “You are capable of more than you know. Choose a goal that seems right for you and strive to be the best, however hard the path. Aim high. Behave honorably. Prepare to be alone at times, and to endure failure. Persist. The world needs all you can give.” Often times, failure is perceived as a notion to give up. However, it should be exactly the opposite. For instance, in the face of adversity in publishing her books, J.K. Rowling was rejected 12 times before publishing the now multi-million dollar franchise, Harry Potter.... [tags: Software engineering, Computer science, Computer]
1408 words (4 pages)
- Computer Forensic Lab Requirements When initially embarking upon the task of defining computer forensic lab requirements, it may seem that the primary focus would reside within the technological portion of the lab simply because the nature of computer forensics is highly technical and complex. However, in reality, it is the structure (physical lab requirements) and the lab policies and processes (many of which are dictated by legal requirements) that actually make a computer forensic lab what it is, rather than simply a building full of high technology equipment and software.... [tags: Computer forensics, Forensic science]
1138 words (3.3 pages)
- Computer Engineer The oldest device invented by humans is thought to be the Abacus. Abacus is a Latin word that has its origins in the Greek word abax or abakon mean “table” or “tablet”. The Abacus dates back to about 3000BC. The Abacus was used when merchants who traded goods needed a way to calculate the cost of the goods (A Brief History of the Abacus 1). Computers since then have evolved dramatically. Computers are a huge part of everyday life, but they need people who can build these computers.... [tags: computer, design, build, test]
768 words (2.2 pages)
- Women in Technology Computer science is, in comparison to most sciences, a relatively new field starting as early as the 1930’s for military based projects and eventually adapting in the early 1980’s to the personal computers we have today. If we were to look into a “brief history of computers starting with the 1950’s we would see huge series of cathode tubes and switches taking up entire rooms. These computers were designed for military intelligence and predominantly comprised of computing long calculations run by paper punch cards and manual switches.” (Ceruzzi pg.... [tags: Computer, Programming language, Computing]
1551 words (4.4 pages)
- Introduction In the OSI model of computer networking, the data link layer is layer two of seven and corresponds to the host-to-network layer of the TCP/IP reference model. Its main aim is to reliably transfer data between two adjacent machines whilst efficiently detecting and correcting errors in transmission. Packets from the network layer are packed into frames and transferred to the network layer on another machine. Data link layer protocols respond to the network layer and issue requests to the physical layer.... [tags: Computer Science]
1317 words (3.8 pages)
- Technology has become increasingly prevalent within our schools in the last decade. Teachers are now using computers and technology-based lessons in the classroom to pull students away from the normal paper-pencil technique. In an article by Linda Starr entitled “Integrating Technology in the Classroom: It Takes More Than Just Having Computers”, she describes how teachers need to be able to operate technology properly and be able to assist children with their technological needs. However, Mark Pullen writes in his article “Pros & Cons: Is Elementary Too Early for 1:1 Technology?”, that although exposing children to this amount of technology can be a good thing, there are qualities that child... [tags: Education, Computer, Learning, Teacher]
1299 words (3.7 pages)
- Definition of virus "Computer viruses" is the term that defines the class of programs which illegally explore resources of systems. It is an executable code able to reproduce itself. Viruses are an area of pure programming, and, unlike other computer programs, carry intellectual functions on protection from being found and destroyed. They have to fight for survival in complex conditions of conflicting computer systems. Computer viruses have pervaded popular culture at least as successfully as they have the world's computer population.... [tags: Computer Virus]
1924 words (5.5 pages)