SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 61 - 90

Business, Internet, and IS

the Internet, trading partners can bypass intermediaries and inefficient multi-layered procedures. Furthermore, Web-sites are avai...

Agenda for American Civil Reform Justice A Response

Civil litigation is considered in this overview of six pages and incorporates examples to reveal civil justice inadequacies includ...

21st Century and Technology

long way in the past few decades. While once a pie in the sky idea, many women have birthed babies that have not belonged to them....

Issues Investigation and Genetic Engineering

1990 the U.S.D.A. had approved almost one-hundred test plantings of genetically altered crops (Nash, 1990). It has been a slow pro...

Information Technology of 'Switches'

In three pages this research paper examines the ATM information technology of 'switches' in terms of their engineering and computa...

Farming and Innovations in Technology

a component of agriculture for centuries. This practice has become even more refined in the last few years, however. The selecti...

Manufacturing and Cutting Edges

materials (Tsai et al, 2003). The resulting cut is similar to an extension of a crack, but is controllable (Tsai et al, 2003). Ho...

The Many Applications of Genetic Engineering

can be amplified. Copies can be made off of the original template to use in biological and medical research and other application...

Arguing Against Genetic Engineering

Even if we ignore the more controversial areas of genetic engineering, areas such as genetic engineering targeting the human...

Sound Engineering and Illumination

as a generative appearance-based method. This is an applicable perspective that is utilized when integrating illumination enginee...

Examining Automating Asymptotes

x --> 3+ f(x) --> 8 x --> 3- f(x) --> 8 The end behavior is:...

Software Quality and Can It Be Measured?

required manner at the required time in a way that is easy for the users to implement and understand. Other qualities that are req...

An Engineering Problem

of the day. Whatever the reason, it is a problem now. When contemplating this subject that is of great importance to those who are...

Software Development and Requirements Engineering

requirement engineering can be seen. By examining this distinctive part of the software development process there is the potential...

Overview of Two Web Articles on Creative Design

- this individual needs physical and creative space - the impressive results make it well worth the extra effort. For example, in...

Business Process Re-engineering - Implementing a New ICT System

how ICT could be introduced with a new system that will change the process in an organization and the way the processes and models...

Law as a Social Engineering Tool

guiding tool, pointing the way to what should be, rather than a reflective tool, reflecting opinion. The way the law is seen to ...

The Pyramid Building of Ancient Egypt and the Beginnings of Engineering, Technology, and Cultural Dynamics

machines constructed of short pieces of wood; from the second tier the stones were raised by a similar machine to the third; and s...

Object Technology and Business Engineering

e-commerce and the Internet, it might be helpful to define e-commerce. Electronic commerce, as it is known as, involves th...

The U.S. Civil War: Causes and Implications

deal of power because their populations were growing so much. At the same time, Southern States were losing power and they began t...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...

HCI Practitioner Overview

In six pages usability testing and a practitioner of human computer interaction are discussed in this overview that includes histo...

Saudi Arabia and the Exportation of Computers

resellers with some direct sales to individuals. Increasingly, direct sales primarily result from Internet exposure. Acme ...

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Civil Rights Act of 1991

charges of intentional discrimination.4 Furthermore, the 1991 Act broadened the language of the 1866 Civil Rights Act and extended...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...