[b]GENDER AND AGE AS CORRELATES OF COMPUTER SELF –EFFICACY: A STUDY WITH SPECIAL REFERENCE TO INDORE REGION[/b]
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 11
Abstract
This study is aimed to investigate gender differences regarding computer attributes and perceived self-efficacy in the usage of computer. Nowadays, both male and female have equal opportunity to acquire Computer knowledge and learn computer related skills. However, until recently, some people still perceive that female have less ability, compared to male, to perform computer related job. The research focused on finding out how people stereotype difference computer tasks and whether the stereotype of computer tasks moderate the gender difference in the use of computer software and computer self-efficacy. 100 respondents were surveyed and the result revealed that there is a significance difference in age and gender which varies according to their groups.
Authors and Affiliations
Priyanka Ora
Synthesis, Testing of Polymer Carbon Nanocomposite and Structural Analysis of Tennis Racket Frame
The tennis racket frame design had lot of improvements in the past few years. The racket heads have grown larger, on frames that have become lighter. The tennis racket frame and strings are of great importance for the p...
VIRUS GENERATION KITS: A SURVEY
This paper is designed to make the survey of virus generation kits. Their capability of generating the viral files with different behaviour makes each of them distinct. In order to analyze the varying trend in com...
NETWORK INTRUSION DETECTION SYSTEM IN MESH TOPOLOGY
The NIDS is a term which specify about the introduction of the malicious attacks which takes place in the networks. This paper focuses on the types of the attacks which are made on the networks and the prevention techn...
AUTHENTICATION OF GRAPHICAL PASSWORD SYSTEM BASED ON AUDIO SIGNATURE AND IMAGES
Cyber-attacks as amplified at an incredible rate in the preceding decade. Due to this inclined data like Bank financial credit details, login details of the accounts are not protected. Thus to argue against this w...
Implementation of Wheelchair Controller using Eyeball Movement for Paralytic
movement. In this method we use sensor based eyeball tracking system to control powered wheelchair. Eyeball sensor will generate distinct range of values for each position of eyeball (i.e. left, right, straight)....