SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1261 - 1290

Daily Routine and an Application of Sociology

of nature, which is satisfied once biological requirements have been reached. Indeed, mankind stands alone in his endless quest f...

The Application of Physical Therapy to Support Transcutaneous Electrical Nerve Stimulation

The Application of Physical Therapy to Support Transcutaneous Electrical Nerve Stimulation. 5 pages. 4 sources cited. This pape...

Digital Era and the Certified Public Accountant's Role

will have to go about it. Largely, these changes are positive and open new doors for those in the field. In focusing in on the ch...

Jonathan Swift, Thomas Jefferson, Henry David Thoreau, and Martin Luther King Jr. on Responsibility and Freedom

In five pages the historical definitions of responsibility and freedom and how they have changed are featured in the works 'A Mode...

Civil Rights Movement and its Long Term Social Impact

In five pages this paper examines the long term social impact of the civil rights movement. Four sources are listed in the biblio...

U.S. Computer Age

In twelve pages this paper examines the U.S. in a consideration of the social impact of computers. Eight sources are listed in th...

Application of Criminal Schools of Thought

In ten pages this paper examines criminology in this theoretical overview that discusses conflict, social process, cultural devian...

Overview of Network Security

included. Other important considerations are Internet connections. They need an end-to-end policy of network security. The IS d...

Montessori and Vygotsky: current applications.

the main query as to how students learn, Vygotsky explored how students construct meaning (Jaramillo, 1996; p. 133). Vygots...

Anthony Marx's Making Race and Nation and Michael Shaara's The Killer Angels

Race and the Civil War are examined in a contrasting and comparison of these novels in six pages. There are no other sources list...

Could the U.S. Civil War Have Been Averted?

In five pages this paper considers whether or not the Civil War could have been somehow avoided. Five sources are cited in the bi...

Civil Rights Quest of African Americans

her peers. By reading her book, one can understand why the quest to achieve civil rights is and was important for African America...

The Impact of the Two World Wars on the U.S. Economy, Race, Gender, and Civil Liberties Issues

Lafore. In this text, Lafore gives his interpretation as to the causes of World War I. In this tome, Lafore gives the reader a v...

RAM and Computer Memory Overview

In six pages computer memory is discussed in terms of virtual memory and other various types. Four sources are listed in the bibl...

Employment Discrimination

In five pages this paper discusses how Title VII of the Civil Rights Act of 1964 has been anything but a legal tool to ensure equa...

Reading Instruction and Theoretical Applications

In fourteen pages this paper examines early reading instruction and various phonics and whole language theoretical approaches. Fi...

'Bleeding Kansas' and Prairie Politics

their expedition passed through it in 1804, and further descriptions of the land had been gained from the expeditions of Zebulon P...

Theoretical Applications on Acquiring a 2nd Language

In ten pages this paper discusses ESL learning and programming development through various theoretical applications with LI and L2...

Business Applications of Distributed Systems

Distributed systems are defined in a research paper consisting of five pages along with the business ramifications that are associ...

John Locke's Political Theory

in their business. On the other side are those who want totalitarian rule, where the people have little say in what goes on. Betwe...

Fictitious Case Study on Workplace Sexual Harassment

VII and other pertinent information. MEMORANDUM To: Robert Brown, CEO From: Arthur Taylor, Research Assistant (Legal Departme...

Constitutional Rights v. Internet Privacy

Current Issues & The Conflicts Involved In terms of time, the Internet is basically still in its infancy. Its origin can be trac...

North and South's Strengths and Weaknesses as a Result of the Civil War

In five pages this paper assesses the strengths and weaknesses of the North and South which ultimately determined the outcome of t...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

U.S. Civil War and the Impact of Manifest Destiny

war who resented the Union it for the control it tried to place on issues which they considered to be issues of the state and not ...

Political Reasons for the UK Riots of the 1980s

In eight pages this paper discusses the 1980s' UK riots and considers the reasons for this violent civil discord in a consideratio...

Workplace Computer Training and Digital Diplomas

low cost, high speed Internet access, has made virtual reality virtually a reality. The dual office-classroom described above exe...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

Let the Trumpet Sound by Stephen B. Oates

In four pages this research paper examines this powerful text on the life of civil rights leader Martin Luther King Jr. Five sour...

Advantages and Applications of Hemp

In five pages this report examines in a consideration of the benefits of hemp in terms of its advantages in health and industrial ...