SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 751 - 780

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Political Systems Comparison

coercion is prevalent (British Library, 2003). However, big business has become so big and capital has become so concentrated in f...

Reconstruction Era's Early and Late Stages

of things that are rarely mentioned in classroom history books. Most history books portray the Union troops as kind, benevolent so...

Physics Applications

of any size - whether that particle is subatomic or a "grain" comprising the universe - cannot be known. "The dimensions of the g...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Union and Confederacy Battle Plans During the Civil War

two armies would have simply pivoted around each other and ended up in each others rear, able to march unopposed to Washington or ...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Slavery and the Causes of the U.S. Civil War

Ordinance was one of the earliest reflections of the importance of the issue of slavery in this nation. There were many more refl...

Reasons for the American Civil War by Bruce Levin

saw slavery as absolutely essential to their economy, Levine argues that American workers viewed the institution of slavery as con...

Dental Hygiene and General Psychology Applications

The therapeutic relationship which exists between the dental hygienist and their patient can be quite involved. Most individuals ...

Civil Rights Movement and the Impact of the Cold War

The expression "cold war" was used for the first time by a journalist who wrote a speech for financier Bernard Baruch in 1947 (Saf...

The Divided House of Abraham Lincoln

his background and upbringing. However, at no point are the framers of this exhibit content with merely presenting a recitation of...

PC Industry and the Dominant Threat Posed by Microsoft

among his competitors who cry foul to such underhanded strategy. The antitrust lawsuit slapped on the Microsoft Chairman and Chie...

The Application of California Labor Law in an Understanding of Vacation Pay

not act within the 72-hour time limit (Important Wage Payment Compliance Issue, 2001). Analysis ABC Company. has acted in e...

2 Countries and Human Rights

political opposition, it is doing so by making public examples of dissidents rather than acting covertly....

Case Study Analysis of the Wheatfield School District

connecting the elementary schools to the wide area network (WAN); providing email and Internet capabilities to all teachers and st...

Sodium Isotope - 24 Medical Applications and Background

becomes a solid is 371 Kelvin, 98 degrees Celsius or 208 degrees Fahrenheit (Barbalace, 2003). The atomic mass average is ...

Civil War, Industrialism, and Sectionalism

nation-states of Europe (plus he points out that the U.S. is actually comparable in area to Europe) (Turner, 2002). Because of the...

Civil War Weapons and Military Strategy

a long growing season in very fertile soils. The northern winters were long and did not provide for an adequate growing season to...

U.S. Constitution, Civil Rights, and Slavery

that blacks, even if they were freed blacks, were not due citizenship and could never become citizens of the United States. As suc...

Computer Programmer Recruitment and Retention

he/she can add good changes to his/her job to make it more interesting and less tedious. Again, in this scenario, the employee is ...

Sonic Hand Held Computer Pricing Strategy

where process such as this are often seen. There may be same difficulties in using this type of pricing (Kotler, 2003). Penetrat...

3 Factors Responsible for the Success of the Civil Rights Movement

was able to peacefully initiate change on a massive scale. As a leader, he was able to organize, and thus had the ability to unit...

Computer Hacking's Impact

in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

Crimes on the Internet

Finally, another Internet crimes (which is similar to hacking) is to release a virus on the Internet. Again, viruses can disrupt t...

Kentucky During the Civil War

In ten pages this paper discusses the Civil War in a consideration of the impact of events that took place in Kentucky before and ...

1861 Civil War First Battle of Bull Run

In five pages the first important Civil War battle and its importance are analyzed. Four sources are cited in the bibliography....

Education and Discrimination

In six pages the impact of the civil rights movement is examined in a consideration of what is needed for a unitary minority statu...

King and Thoreau

garnered from the ideals of Thoreau as well (Scholastic). In light of these facts it is clear that King was not only influenced di...

COMPUTER MOTHER BOARD

typically include functional units of a computer including the central processing unit, microprocessor, memory, the basic input/ou...