SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1201 - 1230

Prototype Model Building and Layer manufacturing

v4.3.2 from IBM and Solaris v2.6.0 from Sun Microsystems, all of these will require OpenGL. Various windows formats are also used...

New Yorkers Walt Whitman, Frederick Law Olmsted and the NYC Military's Contributions

in colonial America and grew impressively after the Revolution, with ship production centering on the East River (NY Maritime Cult...

Security and UNIX and Windows 2000 OS

are neutral regarding Microsoft products. The release of Windows 2000 caused those committed to Microsoft products to claim that ...

Physical Education and Educational Planning Principles Application

(Lumpkin, 1997). Standards. Assuming that a district develops and maintains a vision of focusing on wellness, there must b...

Application of 'AutoSlog' Natural Language Processing

joint ventures and microelectronics (University of Utah). In regards to terrorism, AutoSlog produced a dictionary after only five ...

Computer Games and Gender Prejudice

conspicuous, while at other times remain quite subtle; however, one thing is certain: the formation of these variations originates...

20th Century Race History

Describing Columbus interactions with the Indians in Cuba, Zinn writes: He took more Indian prisoners and put them aboard his two...

Global Market Entry

market is no longer a discretionary decision, any medium to large-size company who wants to retain market share and profit must en...

In Favor of Civil Disobedience

kill. They are trained to do this in order to eliminate their own risk of death. The use of deadly force is justified because offi...

Computers and Usage of Security Blankets

the "intangible traces" of traditional learning, there are now electronic "artifacts" that can be owned, reproduced, and marketed....

WorldCom, Enron, and the Application of Business Failure Prediction Models

known as the going concern concept1. In looking at the viability of the business the potential creditors are seeking to ensure tha...

Crimes Committed by Computers

The Comprehensive Crime Control Act was created as a means by which to provide Secret Service with legal influence over both compu...

Economy During the Civil War and Reconstruction Era

many have recognized, war can be good for the economy and it was at the time. Agricultural industries also saw an increase in pro...

African Americans and the Civil War's Effects

Lincoln, and Northerners in general, are popularly seen as advocates for the black race. However, what is less well-known is that ...

US Civil War's Turning Points

argues that "Common sense, the necessities of the war, to say nothing of the dictation of justice and humanity have at last prevai...

Overview of Extranet Based Applications

working only with trading partners with whom they already have done business" (Brown, 1997, p. PG). The three primary trait...

U.S. Civil War and Abraham Lincoln

Each side was consistently successful in resolving its problems in politics, civil morale, and economics when its military was vic...

Jesus vs. Thoreau, a Comparison

public inconveniencey, it is the will of God... that the established government be obeyed--and no longer" (1755). Christ was also...

Dell's New Strategy Plan

tag, it is hard to know whether or not the future will be just as kind to this firm that has done well so far. After all, the econ...

Investment Banker Jay Cooke

In only three years, Cooke was rewarded for his knowledge and ability by being admitted to membership in E.W. Clark & Company, i.e...

American Attitude Foundations

appointed to non-elected stations. Winthrop was certain that God had made a covenant with the settlers and that the world would b...

Systematics and Practical Applications in Science

for cladistics as well as molecular systematics (2001). Through such methodology, problem solving will be accomplished not only in...

Fortran Computer Programming Historical Overview

Visual program, his brother William went a step further by using the same computer (TX-2) to create a data flow language(Najork). ...

Programming Language Learning and Teaching in a Multimedia Environnment

People can now in fact learn how to program with the use of multimedia. McMaster (2001) explains that if managers want their sal...

Developmental Psychology and a Premier Virtual Computer Generated Symposium

labeled and controlled by drugs, something that alleviates the difficulties for the teachers and parents, but has unknown latent e...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Contemporary World and Adult Self Directed Education

most dynamic approaches to the systematic collection of knowledge in an environment in which that knowledge is collected with the ...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Exploring the Civil War's Causes

determining the direction that this country would ultimately take (McPherson, 1988). There were many individuals in the yea...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...