SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1021 - 1050

Film Version of A Civil Action by Jonathan Harr and Expert Witnesses for the Plaintiffs

In five pages this paper examines the expert witnesses by the plaintiffs and how they were used in the film version of A Civil Act...

Private and Public Lives of Lyndon Johnson

In eight pages Lyndon Johnson is examined in a consideration of the texts Lyndon Johnson and the American Dream by Doris Kearns Go...

Events Associated with the July 1863 Battle of Gettysburg

In five pages this important Civil War battle is described in an overview of events. Four sources are cited in the bibliography....

U.S. Voting Rights

is 18 years of age has the right to vote in all general governmental elections. NOTEWORTHY VOTING RIGHTS HISTORY The first notewo...

Types of Computer Viruses

piggybacks on other real programs is known as a virus (Brain, 2005). For example, a virus could attach itself to a spreadsheet pr...

Chapter XI of Bearing the Cross by Garrow

very powerful then and that point comes through loud and clear in the chapter. It is also noted that blacks and whites did not lik...

Abraham Lincoln and His Civil War Involvement

would secede from the Union and thus would indicate they did not care about his demands or his desires (Abraham Lincoln and the Ci...

Utopian Society and Civil Disobedience by Henry David Thoreau

that it was necessary to vote. He felt that it was not the duty of the individual to try to make governments better or to try to...

Trespass, False Pretenses, and Obscenity Laws

light and the case of Howl was essentially thrown out of court because the poem was deemed socially valuable in many respects (Min...

Business and Systems Theory Applications

do-they really react to their environment. A family system for example will involve a mother, father, sister and brother. If the f...

Computer Viruses 'Cyber Ethics' and Personal Responsibility

illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" ...

Limiting Junk Food Intake Through a Self Modification Program Design, Application, and Evaluation

related to the learning capabilities of children - with the point he was most enthusiastic about being "the difference in the natu...

Marketing Strategies Dell vs. Apple Mac

to the overhead luggage compartment and bringing down his G4 iBook, then, Troyer pulls his G4 iBook from under the seat (Lipperts,...

The International Sale of Goods and an Application of The United Nations Convention On Contracts

anyway, unless there is a specific opt out clause. This needs to be very specific and name the convention rather than only state i...

Kuwait's Private Education Industry and an Application of Porter's Model

is attempting to take away some of the market share of the existing companies in that sector. The first thing to consider in this ...

State Statutes and Civil Monetary Penalties

or incentive for operating in a cost effective manner where possible. Medicare and private insurers always look at the case...

Overview of the Merger Between IBM and Lenovo

The sharp decline in sales was expected following the turn of the new century as many businesses rushed to replace aging PCs with ...

Aviation Safety and CAD Uses

level of liability on the part of the airline company and the aircraft builders, there is a great deal of motivation to find ways ...

U.S. History and Manifest Destiny from 1865 to 1939

America would accomplish this destiny "under God" (Manifest destiny). This belief would give America all the justification it nee...

A Feasibility Study for a Computer Orientation Club

basis. There are many areas of computing that are either not covered by the more formal channels or areas where additional help is...

The Slave Abolition Movement Before the U.S. Civil War

of literature, and gave innumerable speeches for their cause" (African American Odyssey, 2005). There were some who argued and foc...

Diversity Mangement and an Application of Hofstede's Model

and those who like to be with other people. Yet, certain cultures are conducive to socializing and others are not. The degree to w...

The 2004 Film Miracle and an Application of Leadership Analysis

subject of Gavin OConnors 2004 film, Miracle. As portrayed by Kurt Russell, Brooks is presented as a no-nonsense disciplinarian w...

Pros and Cons of Mandatory Community Service

Mandatory civil service can result in many positives. One can demonstrate this fact with an examination of many cultures. One of...

Claims Processing Outsourcing

of shifting/delegating/transferring a service/process/function to a third-parties/external service provider which would otherwise ...

Interdisciplinary Enhancement Through XML

concept focus" (Reksten , 2000, p.26). On the other hand, multidisciplinary learning lacks a concept focus but "relate to facts a...

Computer Software and Hardware Purchasing

the DRU-810A Double Layer & Dual Format DVD Burner that is manufactured by Sony and sells for $61.95 ("PCCConnection," 2006). Wh...

German Retail Industry Case and General Application of Business Ethics

to pressure they undertook to dispose the oil rig on land, which they knew and was later proved to be both more costly and more da...

Cesar Chavez, Mohandas K. Gandhi, Martin Luther King Jr., and Henry David Thoreau on Nonviolence

perhaps argue that Thoreau was not a great supporter of government rule, and that anarchy was perhaps the most desirable goal, ass...

U.S. Civil War Partisan Influence and Guerrilla Warfare

defensive stance. This is hardly a recent invention, but actually manifested itself some half-century before the birth of Jesus C...