SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1231 - 1260

'Angel of the Battlefield' Clara Barton

in the 19th and early 20th century, the fact is even more remarkable. "Well and Strong and Young" Updike writes that in 1854 Bar...

U.S. History and American Racism AMERICAN RACISM AND HISTORY

subconscious, if a man has intercourse with a women, he claims ownership of her. Likewise, in a larger world view, if the white ma...

Slammer Sapphire Virus of January 2003

is very efficient," said Greg Shipley, director of consulting for security firm Neohapsis. "So there may be less number of hosts a...

A Pentium 4 and 4M Processors' Overview

(2003). In addition to providing wonderful graphics, 4 and 4M processors are useful in a computer utilized for general purposes. ...

Measurement Inc. Decision for Purchasing a Computer System

than sixty employees, four managers and a senior manager who reports directly to the president of the company. This senior manage...

School Violence Prevention and Profiling Controversy

wrong. If for example a crime was committed by a black gang, it would be wrong to profile blacks for all crime. While that is a ...

Reconstruction Era's Early and Late Stages

of things that are rarely mentioned in classroom history books. Most history books portray the Union troops as kind, benevolent so...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Computer Based Visual Instruction Materials Designing

more than three small images (2000). In computer presentations, it is important to be consistent in regards to such features as ...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Union and Confederacy Battle Plans During the Civil War

two armies would have simply pivoted around each other and ended up in each others rear, able to march unopposed to Washington or ...

Political Systems Comparison

coercion is prevalent (British Library, 2003). However, big business has become so big and capital has become so concentrated in f...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Malcolm X and Martin Luther King on Black Manhood

that fight. Black manhood to Malcolm X and Martin Luther King, Jr. seems to be equivalent to standing up for individual rights. T...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

South Africa and the Impact of Nelson Mandela

is something which has frequently been reiterated by other civil rights activists: in his Letter from Birmingham Jail, for instanc...

An Evaluation of the U.S. Legal System

that the rage that the public feels toward lawyers is generated is not generated by the trial lawyers obligation to defend the gui...

Thailand Marketing and Business

may be seen as similar in complexity to the average OECD with a total of 19 stages being required, against an OECD average of 18, ...

Modern Nursing Evolution in the United States

for caring for the wounded (Holder, 2003). For the first time in American history, women were asked to leave their homes and act...

Public Bureaucracies and Their 5 Subsystems

support from external groups (Halpin and Cox, 2000). The third influence is seen as moving down the hierarch greater levels of spe...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Martin Luther King Jr., Rosa Parks, and the Civil Rights Movement

members in the mainstream population helped them in their efforts. The Civil Rights Act of 1964 was actually the third such Act to...

Industry Report of Internet Computer Marketing in Europe

higher tech products, such as computers it may be argued that the potential market may be more attractive. Simply by the nature of...

The Foundation of Merit Public Service in American Democracy by Patricia Wallace Ingraham

one needs the combination of power and government in order to enact any level of civil service politics; however, it can also be c...

A Review of the Edward Boykin Book Ghost Ship of the Confederacy

record of communication between Semmes and his superiors. Boykin, in his Preface, also thanks the Alderman library at the Universi...

Civil War Fighting and the Need of Manpower

did not engage in combat (Matlof Multimedia U.S. History). However, these statistics are deceiving because most of the northern r...

Civil Rights and Hugo Black

members completely and accept without challenge - has indeed proven to be one of the most powerful standards of our culture and th...