SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1051 - 1080

E-Mail Security on Laptops

e-mail. However in a wireless environment there are other challenges, such as the collection of the e-mail in the first pl...

Michigan Civil Rights Initiative: Proposal 2

of public employment, public education, or public contracting" (LaBash, 2006). Another author indicates that it essentially refle...

The Ethics of Hacking

be quite costly and we have endured this cost for several decades. Roush (1995), for example, provides insight on the historical ...

Article Critique/Portion v. Serving Size

2006, p. 31). The program also aids the user in learning to make healthy food choices and in understanding the role of good nutrit...

St Vincent Case Study

managed healthcare companies. The hospitals have to provide the healthcare in a manner that meets their core values and standards ...

Title VII - Outlawing Racial Discrimination

understand what constitutes discrimination, but in some cases, what seems wrong may not be wrong in law. Discrimination remains a ...

American Civil War: Just or Unjust?

Orend points out that the mere threat of war, or mutual dislike and disdain, are not necessarily indicators of war. "The conflict ...

Medgar Evers/His Legacy

In most cases, this is the focus and the extent to which African American scholarship mentions the life and work of Medgar Evers. ...

The Application of Kirkpatrick’s Model of Training

will be trained in different jobs, from cooking the hamburgers on the grill, toasting the buns and putting the dressings on the bu...

Importance & Application of Nursing Theory

diabetic education that uses the Neuman Systems Model, which supports and facilitates taking a "holistic view of people with diabe...

Civil Disobedience in the 1960s

had an impact on both the war protestors and the Civil Rights activists. If every person has an inherent worth, then anything that...

Computer System Project

This 10 page paper looks at the way a project to install a computer system in a shop may be planned. The paper focuses ion the pla...

Ayers: "In the Presence of Mine Enemies"

or that Lee wanted to resign after Gettysburg. Ordinary people behave in ordinary ways. The North was shocked and dismayed by the...

ASUS Computers

even impressive, increases in sales; annual reports are more helpful because they contain statements from company officers, and th...

Slave Life in the South before the Civil War

occasion, "his master had the nails of his fingers and toes beaten off" (Blassingame 331). A slave who accidentally bumped a white...

Lincoln and the Second Revolution

the north prior to and during the war, the political shift in power with the south remaining weak in the national forum for decade...

Colombia - Foreign Policy

by the 1970s, mostly left-wing groups (International Crisis Group July). By the 1980s, right-wing groups emerged and by then, the ...

Art and the Civil War Era

they played no role in politics. Middle class and wealthy women, particularly married middle class and wealthy women, however, pl...

Avoiding the Civil War

adjacent to the South would be slave states (Faragher et al, 2000, p. 256). Then in 1819 Missouri, which is adjacent to both Illin...

Florida in the Civil War

"twelve infantry regiments, two cavalry regiments, a handful of artillery batteries, and a variety of smaller organizations" (Cole...

Civil Disobedience and the Vietnam War

act of not being obedient. He contrasted the longevity of nature with the ethereal nature of that manmade contrivance we call gov...

Marijuana Should be Legal in Medical Applications

1993, p. 23). The authors believe that if people see patients using marijuana and "functioning fine," they will question why its i...

Management Functions, Theories And Application

This involves recruiting, hiring, training, employee development, i.e., training, and monitoring performance. The company will onl...

The Unexpected Impacts of 9-11

One of the most concerning of the reactions to 9-11 is the attacks that we have been subjected to in terms of our legal...

Notebook Computers

for mobile use and efficient power consumption" (Laptop, 2006). They usually have liquid crystal displays, a built-in keyboard, an...

Apple Computers

over to Mac systems, the ability of Intel chips to be used in iMacs has also helped the movement as well as the increasing realisa...

Don't Bother Me, Mom, I'm Learning by Marc Prensky

unknown 20 years ago (Exclusive interview, 2001). The world has changed dramatically, but education has not kept up with it; in fa...

Don't Bother Me, Mom, I'm Learning by Marc Prensky

medical procedures, work in a lab-in short, the skills developed by the games translate directly into the "real world" (Prensky, 2...

eBusiness Military Applications

would expect from the private sector. As all of DSCRs direct material suppliers operate in the private sector, DSCR also must mai...

Third Party Computers and Denial of Service Attack

unlikely to be any argument for the case not to go ahead. However it is not always with a relationship, the proximity may be more ...