SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1261 - 1290

Women as Battlers of Change Since the U.S. Civil War

love that was considered scandalous at the time.1 Woodhull boldly declared in a lecture she delivered in 1871, "I have an inalien...

Employment Law and Employer Duties; A Case Study

is also an obligation on the employer to ensure that there are adequate welfare facilities arrangements, which may help counteract...

The Cold War: Causes, Treaties, and Ongoing Tensions

be desired from the Russian perspective. At the Teheran Conference Stalin was indifferent to the division of Germany into separa...

Jesus/Human Relationships Above the Law

contemporary mindset, the word "law" refers to civil law, which is enforced by the police and government officials. As Jesus indic...

Considerations When Carrying Out Market Research

purchase from the firm in the last twelve months, alternatively the definition may be the last six months1. The way that t...

Computer Security Issues

types, event-oriented logs and keystroke logs (Audit trails). Event logs, as the name implies, record system events, while keystro...

Practical Applications Of Simulations In Nursing Education

"low-fidelity, moderate-fidelity, and high-fidelity" (Sportsman et al., 2009, p. 67). Low-fidelity are introductory, moderate-fide...

Beah: “A Long Way Gone”

is exciting-it is New York, after all-and hes happy to be there, living in safety with the woman who adopted him as her son. But l...

The Meaning of The First Black Presidency

whether or not the statement is true. One can easily see that Obama had become president many years after the movement, and also t...

Why Linux is Better Than Windows

additional cost of hundreds of dollars. Linux is an open source file, which means it is completely free for downloading on its we...

Acer

notebooks and net books, specifically the Aspire, with Acer selling 9.67 million units in the third quarter of 2008 alone, this wa...

AN ARGUMENT FOR REPEALING THE U.S. PATRIOT ACT

whim of the FBI or CIA. The ACLU points out, for example, that Section 215 of the Act allows the FBI to...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

How Computers Weaken Language Skills

a poem as well as a human being, the real problem is not skill, but in ideology. That is, many people tend to rely on computers an...

Personal Application of Criminology: The Son’s Friend

as possible, or simply explaining what hes done. Maybe hes bragging and inviting the son to join him in his next robbery. Or perha...

3 Education Research Proposals

policies, implementation and use may occur, impacting different stakeholders. 2. Methodology To assess the way popular media a...

SECURITY OF INFORMATION

2005). Problem is, it also makes any real commerce or anything else impossible too (Miller, 2005). Moving on to other pot...

THE PATRIOT ACT, AN OVERVIEW AND THE 14TH AMENDMENT

"wire, oral, and electronic communications relating to terrorism..." (Ball 51). Along with this, Title II also allows the seizing ...

Stress Theory And Coping With Stress

results (Posen, n.d.). When the rats were examined, they had "swollen and hyperactive adrenal glands, shrunken immune tissue (thym...

The Civil War, Augusta County Virginia, and Franklin County Pennsylvania

square miles and Franklin County Pennsylvania encompasses approximately 772 square miles. Despite their similarity in size, howev...

Social Movements and Their Impact

communities, working alongside men, often doing the same work, and ultimately forging a nation. But, by the Victorian Era women we...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Personal Statement to Support an Application for a Masters Degree Course in Applied Linguistics

2004 after four years of study at the English Department of Riyadh University with Average mark of 80.47%. During this course I st...

The Application of Privacy and Copyright Laws in Australia

sold articles to different publication, they are not under salary or retainer and they carry the risk and the cost of undertaking ...

How Computer Forensics are Used in Police Investigations

2005). Net Threat Analyzer is a software program that is booted from the computer itself and then makes use of filtering tools in ...

Police Psychology And Application

POLICE PSYCHOLOGISTS Police psychologists are bound by an industry code of ethics to ensure their patients receive the leve...

Personal Statement in Support of an Application for the Position of Warrant Officer

I gained an Associates Degree in Criminal Justice awarded by Texas Community Collage. When I joined the Army on the 3rd of...

Firebrand of Liberty

the coast of Georgia and Florida under Colonel Oliver T. Beards command (Kennington, 2009). Their expedition, and raids, proved su...

Kansas and Slavery

that "their Southern brethren" supply "material aid" (An appeal to the south, 1865). Their cause was bolstered by bloody acts like...

The Civil War and Minority People

the narrator offers a different look at women as they stood to inspire the men and give them peace. This is evident when the man i...