SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 3121 - 3150

Overview of Digital Video Cameras

of a digital video camera before writing the check for $1,500-$2,500 to purchase the camera. According to Ozer (1998), the ...

Medicine and the Use of Fiber Optics

In six pages the applications of fiber optics in medicine are explored. Seven sources are cited in the bibliography....

Detailed Examination of Serial Killing

This paper consists of fifteen pages and consider 5 criteria including public crime perspective, crime data, crime as treated acad...

Prison Recreation Specialist and Human and Health Performance Research

In twenty pages research conducting, reading, and application of research findings are considered within the context of a Prison R...

A Federal Sentencing Guidelines Overview

In ten pages this paper considers the impact of these guidelines on the court system and offers some history as well as case law a...

Fingerprinting DNA

In six pages DNA fingerprinting is considered in terms of its development and applications with proper analytical and collection t...

Groupware and Electronic Mail Software

In seventy pages groupware server and email software applications are examined with the inclusion of groupware products, Netscape ...

School Field Trips, Tort Liability, and In Loco Parentis

In eight pages school settings are considered in an in loco parentis application that discusses field trips and teacher liability ...

Reggio Emilia and the Zone of Proximal Development of Lev Vygotsky

and educational focus as a whole. II. Vygotsky Vygotsky suggests that learning is based within the zone of proximal developme...

Social Content and Literacy Connection

In six pages cultural literacy in the classroom is examined in terms of social studies course application that can bridge the gaps...

Educational Leadership Effectiveness

In five pages this essay considers what it takes to achieve effectiveness in educational leadership with an application of Scott's...

Effective Study Strategies

In eight pages this report discusses how students can learn more successfully through the application of effective study strategie...

Tort Liability and Teachers

In ten pages this research paper examines the educational system and the application of tort law to administrators and educators. ...

Students with Learning Disabilities and Instructional Strategies

In five pages this essay examines students with LD including ADD in a consideration of different instructional strategy and classr...

Learning Disabilities and Diagnostic Methodologies

In nine pages child behavior is considered in terms of application of various diagnostic methodologies including Wechsler Intellig...

History of the Montessori Educational Method

were not extra-social beings, but were entitled to the benefits of education as much as, if not more than, normal ones (Standing 1...

Criminal Justice and Phrenology

This paper consists of ten pages and discusses the criminal justice applications of phrenology or studying the contours of the sku...

Classrooms and Constructivism

In five pages the classroom application of the learning method known as constructivism is considered in terms of its definition, p...

Children's Reading Motivations and Effective Strategies

In ten pages this research paper discusses children's reading and various classroom motivational strategies with current research ...

Law Enforcement and Public Administration

to accomplish community policing, all of these extend beyond the law enforcement agency and involve members of the community. New ...

Overview of Global Positioning Systems

In eight pages global positioning systems are the focus of an overview that explains what they are, their purpose, how they are op...

Espionage and Game Theory

In ten pages this paper considers espionage through an application of game theory and as it has evolved from the fiction of James ...

Prostitution and Theories of Systematic Deviance

In four pages this paper examines prostitution through an application of systematic deviance sociological theories. Two sources a...

Overview of the Labeling Theory

According to Bartusch, "The delinquent label, in turn, influences the self-image of the youth, who comes to view himself or hersel...

Security Management and Social Theory

has decreased 50 percent overall. The psychology has changed and it is working. Enforcement forces in those cities are no longer t...

Social Learning Theory in '8 Ball Chicks'

there is nothing else "but us" to provide protection, safety and survival for the girls who join gangs. Within those gangs, they ...

Marketing Strategies of Apple Mac Computers

differently if they hope to recapture a greater market share in the PC market. CHAPTER 1: INTRODUCTION Apple Computer Inc. and M...

Elementary and High School Virtual Computer Field Trips

of Blooms taxonomy had the assignment not limited their access to the Internet. These outcomes were not uniform for all ind...

Computer System Security Types

all security problems, encryption and the use of a firewall, as well as other solutions are often utilized. However, when discerni...

Computer System and Development Government Agency Fiasco

Windows environment and needed flexibility so it could support the Authoritys specific and unique requirements (Burdette, 1997). F...