SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1171 - 1200

John Locke's Political Theory

in their business. On the other side are those who want totalitarian rule, where the people have little say in what goes on. Betwe...

Fictitious Case Study on Workplace Sexual Harassment

VII and other pertinent information. MEMORANDUM To: Robert Brown, CEO From: Arthur Taylor, Research Assistant (Legal Departme...

Constitutional Rights v. Internet Privacy

Current Issues & The Conflicts Involved In terms of time, the Internet is basically still in its infancy. Its origin can be trac...

North and South's Strengths and Weaknesses as a Result of the Civil War

In five pages this paper assesses the strengths and weaknesses of the North and South which ultimately determined the outcome of t...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

U.S. Civil War and the Impact of Manifest Destiny

war who resented the Union it for the control it tried to place on issues which they considered to be issues of the state and not ...

Workplace Computer Training and Digital Diplomas

low cost, high speed Internet access, has made virtual reality virtually a reality. The dual office-classroom described above exe...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

'Bleeding Kansas' and Prairie Politics

their expedition passed through it in 1804, and further descriptions of the land had been gained from the expeditions of Zebulon P...

Theoretical Applications on Acquiring a 2nd Language

In ten pages this paper discusses ESL learning and programming development through various theoretical applications with LI and L2...

Reading Instruction and Theoretical Applications

In fourteen pages this paper examines early reading instruction and various phonics and whole language theoretical approaches. Fi...

Real World Parity Theories Application

several purchasing power parity theories; the absolute purchasing power parity and the relative purchasing power parity, and how i...

Political and Economic Reasons Why The South Lost The Civil War

deal to do with the fall of the South as well. The belief was that British debt holders that supported the South ended up taking t...

The Causes of Civil Wars and Solutions

to the end of World War I. This was a war which affected the entire world. It was a war which centered on nationalistic ideolog...

Mobile Printer Product Management Plan

Product Protocol 12 The Marketing Mix 13 SWOT Analysis 14 Strengths 14 Weaknesses 14 Opportunities 14 Threats 14 Development 14 La...

March 9, 1862 Battle of Hampton Roads and its Importance

USS Monitor is heralded as "the most famous of all American warships" largely because of its rotating turret, but in early March o...

Language Cases of Discrimination

by speaking only in Spanish, even while they leered in her direction. Upon investigation, the salesmen proclaimed their innocence,...

US Civil War ans the Northern and Southern 'Home Fronts'

Nor was it uncommon for these "belles" to become involved in politics, which would have been unheard of before the war (Clinton et...

Application of UK Covenants and Easements

as a term in a contract would be enforceable, even without the alternate needs a contract would require (Grevells, 1998). In gener...

Similarities in the Images of September 11, 2001 and the Civil War as Remembered in the Jimmy Carter Museum

had died, wrote letters to the families of other loved ones who died, and essentially came together in a very subtle way that defi...

Information Technology and Current Issues

meaning is larger than this Henderson (2002), describes this as the difference between the information literate and the informatio...

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Criminality of Medical Malpractice

one and it is Negligent mal practice. In this form of malpractice there is considered to be no criminal intent or dishonest behavi...

Study Sample and an Application of Statistical Analysis

30 of the respondents or 32.6% had no history of abuse. 24 respondents equating to 26.08% of the sample had a history of abuse as ...

Civil War Era and Black Emancipation

repugnant. In exploring the time period before the Civil War, Equaino (1998) takes one on a journey through the 1700s slave trad...

Asymmetrical Threat Assessment Through Geospatial Applications

"decision support tool " for those who work in the field of homeland security. It tells an observer where someone is, who he is as...

Roy Adaptation Model, Hospice Care, and Application of Zen Philosophy

In this way, Buddhism became accessible to all, and was able to develop the concept of community which...

Marketing Costs and Application of Activity Based Costing

Swensens, which focused on ice cream in their independent shops. Though the independent shops segment was declining, the im...