نتایج جستجو برای: two questionnaires have been used motivation questionnaire cronbach

تعداد نتایج: 6297873  

2012
Dipane Hlalele

The purpose of the study was to explore rural high school learners’ experience of mathematics anxiety in academic settings. Mathematics anxiety has been found to have an adverse effect on confidence, motivation and achievement. This quantitative study is exploratory and descriptive in nature. The participants were 403 learners doing mathematics in 18 rural schools in the Free State province of ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1392

this research has been taken among the students of high school in karaj city during the years 1391 and 1392. this is a survey research and data gathering is through questionnaires. studying the “an analysis of students’ tendency toward non-native reference groups in karaj”. the questionnaire was distributed among 260 of these students who were chosen through multi step cluster sampling. conside...

Journal: :مدیریت دولتی 0
بهرام اصغری اقدم کارشناس ارشد مدیریت دولتی، دانشگاه علامه طباطبایی، تهران، ایران علی محجوب دانشجوی دکتری مدیریت دولتی، دانشگاه علامه طباطبایی، تهران، ایران

the purpose of this study is to evaluate the impact of self-fulfilling prophecy on the motivation and performance of national iranian gas company staffs. in this study, considering the importance of peoples’ perception and its role in motivation and consequently their performance in organization, we have tried to investigate the influence of one of these perceptual factors by using the correlat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1388

some researches made in the field of agency problem issue, deal with the role of control systems regarding owners and managers. in this research the relationship between the two control mechanisms, namely the voluntary disclosure (external control mechanism) and outside directors (internal control mechanism), which are reductive of agency problems, has been studied. for this reason, a sample ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1389

the concepts of similarity and dissimilarity have been the interest of many researchers. basically, in the studies the similarity between two objects or phenomena, has been discussed. in this thesis, we consider the case when the resemblance or similarity among three objects or phenomena of a set, 3-similarity in our terminology, is desired. later we will extend our definitions and propos...

پایان نامه :0 1375

the significance of the study of deixis was then mentioned. the purpose of the present study from the outset was to provide a comprehensive overview of all kinds of deixis in persian, describing and defining each in true while considering them structurally and semantically. chapter two consisted of two main parts. a review of the english studies in this respect, besides presenting persian liter...

ژورنال: ارگونومی 2019

Background and Objectives: Accurate measurement of the employees’ satisfaction with their office chairs can provide valid feedback on the chair design quality for the manufacturers and researchers. This study aims to design a valid and psychometrically evaluated questionnaire for measuring satisfaction with office chairs. Methods: Through studying the two main documents about chair ergonomics ...

2005
Rosanne Quinnell Elizabeth May Mary Peat Charlotte Taylor

As part of a study to assess the impact on tertiary biology students of changes to the NSW HSC biology curriculum, we developed a questionnaire to survey student conceptions of biology. This required the creation of multiple Likert-scale items in two sub-scales: (i) fragmented conception of biology (e.g., Biology is just the study of facts); and (ii) cohesive conception of biology (e.g., Biolog...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید