SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1441 - 1470

Colombia - Foreign Policy

by the 1970s, mostly left-wing groups (International Crisis Group July). By the 1980s, right-wing groups emerged and by then, the ...

Art and the Civil War Era

they played no role in politics. Middle class and wealthy women, particularly married middle class and wealthy women, however, pl...

Avoiding the Civil War

adjacent to the South would be slave states (Faragher et al, 2000, p. 256). Then in 1819 Missouri, which is adjacent to both Illin...

Article Critique/Portion v. Serving Size

2006, p. 31). The program also aids the user in learning to make healthy food choices and in understanding the role of good nutrit...

St Vincent Case Study

managed healthcare companies. The hospitals have to provide the healthcare in a manner that meets their core values and standards ...

Title VII - Outlawing Racial Discrimination

understand what constitutes discrimination, but in some cases, what seems wrong may not be wrong in law. Discrimination remains a ...

American Civil War: Just or Unjust?

Orend points out that the mere threat of war, or mutual dislike and disdain, are not necessarily indicators of war. "The conflict ...

Medgar Evers/His Legacy

In most cases, this is the focus and the extent to which African American scholarship mentions the life and work of Medgar Evers. ...

The Application of Kirkpatrick’s Model of Training

will be trained in different jobs, from cooking the hamburgers on the grill, toasting the buns and putting the dressings on the bu...

Jefferson Davis: Civil War and Reconstruction

cessation.4 But, when Mississippi chose, outwardly, to secede he removed himself from the Senate.5 He "hoped to receive a prominen...

Computers in the Twenty-First Century

it is the advent of the Internet that really changed things and rendered the computer a necessity. What might the typical computer...

E-Mail Security on Laptops

e-mail. However in a wireless environment there are other challenges, such as the collection of the e-mail in the first pl...

Michigan Civil Rights Initiative: Proposal 2

of public employment, public education, or public contracting" (LaBash, 2006). Another author indicates that it essentially refle...

The Ethics of Hacking

be quite costly and we have endured this cost for several decades. Roush (1995), for example, provides insight on the historical ...

New Software and Computer Purchaes

In eight pages this paper examines the prices and capabilities of antivirus software and computers in a consideration of the Sys P...

Advent of WebTV

This paper considers how little in the way of computer knowledge is needed to use WebTV in eight pages. Seven sources are cited i...

Types of Computer Programming Languages and Basic Information

In five pages computer programming language types such as object oriented, imperative, logic, and functional are discussed. Four ...

Workplace VDUs and Safety Issues

Using computers of course does also warrant care and attention to ergonomics. There are many complaints that stem from sitting in ...

Global Companies and Lotus System and Application Implementation

In fifty pages this paper discusses how a global company would introduce an information technology communications system in this c...

Financial Report Information on Apple Computers, Inc.

Fourth quarter 1999 through third quarter 2001 reports are utilized in this five page financial analysis of Apple Computers which ...

4 Methodologies for Information Systems Development

In nine pages information systems development is examined in a consideration of four methodologies including Information Systems w...

School Children, Internet, and Computer Classes

everywhere - in the workplace, in libraries, and in the home. According to a 1998 commercial survey, some 60 percent of American ...

2001 COBOL

In a paper consisting of ten pages the COBOL computer programming language is considered as of 2001 along with speculation as to w...

US Civil War Battle of Gettysburg and Military Intelligence

In seven pages this paper examines the role military intelligence played in the Civil War with the Gettysburg campaign the primary...

President George W. Bush's National Cathedral Memorial Address and the Application of Aristotle's Rhetoric Theory

In a paper consisting of five pages Aristotle's three points of rhetoric are applied to the President's speech in terms of word pe...

The Handheld Electronic Device

A proposal for a palm computer that contains cellular phone service is discussed in the context of this ten page paper that includ...

The First Modern War in America was the Civil War

limited (Vasile The Union Soldier, His Life and Times: A Modern Interpretation of a 19th Century Experience). However, technologi...

Policy and the Civil War

This research report examines the Civil War and policy issues. Both civilian and military life are noted. This five page paper has...

Computer Use and Learning Principles

In five pages this report discusses how basic learning principles can be applied to using a computer. Five sources are cited in t...

Computer Industry Development and the Invention of Printed Circuit Boards

This paper examines the impact of the printed circuit board invention upon both contemporary society as well as the computer indus...