SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1051 - 1080

Testing and Integration of Computer Systems

network, after all, is to transport and control data, and to connect computers and peripheral drives with one another (Huber and B...

Costs and Benefits of Computer Mediated Communication

There have been some expected benefits that have also proven to be false expectations. It was expected that computer based communi...

Psychosocial Behavioral Theory of Erik Erikson Applied to Rosa Parks

how Parks various crises directly associated with each stage were more easily addressed, inevitably elevating her to the next stag...

Struggle for Black Equality from the Reconstruction to the Present Time

the same way livestock was cared for, consequently they even lacked the experience to care for their most basic of needs (McGuire ...

Angela Davis and Her Impact

prisoners who were apparently being held wrongly. It was this situation that ultimately led her to be on the FBIs most wanted list...

Proposition for a School iBook Upgrade

time while currently gaining the greatest utility from the hardware it has and is about to acquire. The Mac OS X Server v10...

Target Stores and an Application of Tuckman's Stages

groups help to define their operation and behavior, but the groups also take on a dynamic of their own. Tuckman observed sm...

'Computer Professionals and the Next Culture of Democracy' by Shuler

may be agents in the transformation of democracy, but democracy is not something that is inextricable with computer science (2001)...

Computer System Development

data needing a broad bandwidth, but also the need for security as patient files are confidential and security measures are not onl...

Transgendered Community and Civil Rights

themselves. There is a definitive move in fact, to abolish the term from the "Diagnostic and Statistical Manual of Mental Disorde...

Aspects of U.S. History - Vietnam and the Civil Rights Movement

well as the case that finally struck down the concept of "separate but equal" in terms of education, and mandating that all school...

Stating a Business Case for the Linux Operating System

bits maximum processors 2.4.2 Intel/Cyrix/AMD Pentium, 80486, 80386, 80286 (partial port), 8086 (partial port), IBM/Motorola ...

Biometric Security Applications

Cards A single business is an example of a small database where biometrics work well. When there is some malfunction, usin...

Practical Nursing Theory Application

care model is highly useful with the elderly and those recovering from surgery or illness. Self care is not an issue that enters ...

Application of Leadership Theories

executive assistants and mail room employees. Also, lets examine the definition of leader -- in its most basic sense, lead...

Plastics Industry and Computers

industry today makes use of computers, it perhaps could use it even more. Siweck observes: "...American shops need to understand t...

Analyzing the Ferocious and Prolonged Civil War Combat of 1861 Until 1865

the Spanish American War, World War I, World War II, and the Korean War combined."5 It is often inconceivable for the person of t...

Causes Initiating the Civil War

had no voice at all. Jefferson Davis accused the North of wanting "an unjust system of legislation to promote the industry of the...

Dell Inc.

country (Dell Annual Report, 2000). This company has achieved some amazing results, by 2000 the company was selling $50 million a ...

Ideology of Dr. Martin Luther King's Nonviolence and Global Terrorism Applications

its grips on the world? How do black American civil rights leaders feel about that form of violence? How do they feel about the ...

A World War II Submarines History

crushing power of the round balls had no match in the newly designed projectile typesii, the rapid revolution in this area could b...

1820 and 1850 Compromises

states and what free states could join the Union in order to maintain a balance wherein slave states never had the upper hand it s...

eCommerce Application Based on Software Factories

of software development: According to the Standish Group, businesses in the United States spend about $250 billion annually on sof...

Civil Disobedience and Abortion

"That government is best which governs least....For government is an expedient by which men would...

July 1 to July 3 1863 Battle of Gettysburg

Couch defiantly pledged, "In no case must the enemy be allowed to cross the Susquehanna" (Brubaker, 2003, p. 74). Lees Lt. Gen. R...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Kennesaw Mountain Battle During the Civil War

slaves to keep crops coming in. The North was very reliant on the Souths products and it was also more the hub of government, Brit...

DEF Corporation Application Architecture

Though the tactical approach can produce an application architecture that addresses the companys current needs, the strategic appr...

Development of Autonomic Computing

which the design of an autonomic computer system should be designed, helping increase efficiency as well as overcome the shortage ...

Fuzzy Logic Controllers (FLC) In Computer Systems

However even with this there is no any exactness as this does not mean that it is plus or minus 2 or 3 degrees (Rosenstein, 2004)....