SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1141 - 1170

Various Theories, Techniques and Applications of Behavioral Psychology

In a paper consisting of twelve pages worth of essays on the subject of cognitive or behavioral therapy various applicable topics ...

Sociological Theory Application

In a report consisting of four pages a young girl that prefers nontraditional activities such as male sports is considered through...

The Roundhead Rebellion and England's Civil War of 1642 until 1651

In eleven pages England's Civil War is examined in this historical summary. Eight sources are cited in the bibliography....

Actual Experience and the Application of Techniques in the Classroom

This paper consists of five pages and presents a personal essay on a Youth Advocate Center internship and application of social mo...

Film Version of A Civil Action by Jonathan Harr and Expert Witnesses for the Plaintiffs

In five pages this paper examines the expert witnesses by the plaintiffs and how they were used in the film version of A Civil Act...

Dinosaur Behavior Determination

thoroughly studied (DiChristina). Careful field research is critical to understanding dinosaurs but it alone doesnt give us much ...

Book Review of Intellectual Property by Adam Moore

In four pages this book is reviewed within the context of computer crime and considers its international and domestic consequences...

Audit Planning and Evaluation of Internal Controls

In twenty five pages this paper examines various accounting issues related to auditing functions and internal control in a conside...

English Civil War and Oliver Cromwell

In twenty five pages this paper discusses the participation of the Roundheads and Oliver Cromwell in the English Civil War in a co...

Richard Hall's Patriots in Disguise

In three pages this paper discusses women in Civil War combat within the context of Hall's book and examines women's significant r...

Civil War Battle Of Fredericksburg

their way at a fast clip. The first men to arrive at the designated site took two days in their approach to Stafford Heights. Ge...

Development and Marketing of Exterminator Software

A developmental and marketing plan for the software product Exterminator which protects computers against Y2K problems are discuss...

Manufacturing and the Airline Industry

In thirteen pages this paper considers various aerospace and aircraft manufacturing methodologies as well well as the effects of c...

Ordinances and Gay Rights

that ordinances send the wrong message, helping to undermine the "moral values" that they feel communities should embrace. They ar...

Comparison of the Inventions of Computers and Trains

This essay consists of fifteen pages and considers whether the computer or the train was the more significant invention in terms o...

Private and Public Lives of Lyndon Johnson

In eight pages Lyndon Johnson is examined in a consideration of the texts Lyndon Johnson and the American Dream by Doris Kearns Go...

Practical Application of Management Theory

in todays day and age is represented by a slew of models from the loosely structured, state of the art company to the telecommutin...

Continuing Educaiton and the Application of Theory

they are working in the field now indicates that they understand the concepts and were successful in completing the ranges of stud...

Puritanism and the English Civil War

be fired (Crossby, 2002). Upon a discovery that the Scots had been making plans with the French he again decided attack wit...

Prohibiting Laboratory Experiments on Primates, Cats, and Dogs

animals for whatever purpose he deems necessary without a thought for the animals needs. The issues that surround animal rights a...

U.S. Civil War Gen. Joseph Hooker

chose to split the Confederate army into two groups, nonetheless. "Lee left 10,000 men under Jubal Early, while he and Thomas Ston...

John Paul II's The Gospel of Life Evangelium vitae

have been discussed in the past and are relatively well known are based on the worst instincts of human nature which seem to defy ...

Hypothetical Scenario and an Application of the Philosophies of Jean Jacques Rousseau and Immanuel Kant

the old mans money to the poor. While he fears being found out, when he is, the people not only forgive him, but elect him their n...

Post Civil War South Carolina

out buildings and heavy damages to their property. These people, who had formerly just grown food crops, began to attempt to grow...

United Kingdom and Computer Crime

censorship, where there has been increased realisation and commitment to deal with the type of information that is on the internet...

Computer Information Systems Industry Employment

in using it, and why? Seemingly any company wishing to do intense data scanning on consumers will be able to justify to their own...

Solectron Corporation and Dell Computer Corporation

of services provided (Cutcliffe, 1996). At the same time, the brand that is outsourcing to Solectron does not want the buyer to kn...

Computer Systems' Client Servers and Mainframes

one if favoured currently, does not mean that the other will disappear, and as such mainframes are still a very valid choice. Ther...

Significant Events in American History between the late 1950s and 2002

in the world, the nation that had not been directly or severely attacked by a foreign enemy since its founding was attacked (The H...

U.S. Civil War and Maneuver Warfare

would support the opposite, namely, a "slow, feeble, disorganized attack" (Hughes, 2002). He also explains this strategy based on ...