SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1471 - 1500

FBI Counterintelligence and the Civil Rights Movement

years earlier and prior to the U.S. involvement in World War II. The 1940 Smith Act criminalized any advocacy of "the overthrow o...

New York City Draft Riots of 1863

of the rioters, which was directed at African Americans, possessed the mob with such ferocity that they lost all sense of humanity...

Martin Luther King Jr. and the Civil Rights Movement

the future for the struggles of the African Americans in the United States (Martin Luther King, Jr.: Civil-Rights Leader, 2007). H...

Computer Network Security: Security Devices

visited the most" (Surfing the Internet on-board the Web, 1995). Having this information allows these companies to create a target...

Business Plan for ABC Books

computers at a minimal cost, but as much as possible, keep them similar for the sake of simplicity. Additionally, when purchasing ...

The Evolution of the Rifle

from the spiral grooves inside the barrel: this is called "rifling" and is designed to make the bullet spin; it is believed that t...

Applications of the Classic Tests for a Just War

under the just intention of abating evil and promoting good, 4. whether other means of rectification have been attempted and war ...

Computer Comparison and Evaluation Memo

operating system is important as well, but that can be changed and all of the evaluated computers include Microsoft Windows(r) XP ...

The 54th Massachusetts

based on the regiments history, was a success and may indicate more greater in future. The student is facing a significant amount ...

Bispectral Index (BIS) Monitor and its Application in Eliminating Postoperative Memory of Intraoperative Events

The intent of anesthesia, of course, is to pharmaceutically suppress the perception and thus the memory of the procedure. There h...

Changes in the Personal Computer Industry

radical growth was between 1995 and 2000 (Canter, 2005). The surge in entry occurred much earlier between 1974 and 1984 (Canter, 2...

Designing an E-business Application for Starbucks

crowded market of hundreds, the inability of users of a single ISP would not be of great concern. The difference here is that AOL...

The Civil War in Sudan

Sudanese government can be trusted to look after its own citizens there" ("No Help Needed, Thank You Very Much"). The outlook for ...

Stampp: "The Era of Reconstruction"

analysis and interpretation of the material led him to conclude that the Restoration was a success, particularly in light of the p...

Ida J. Orlando And Hildegard E. Peplau: Theoretical Application To Eating Disorders

the inherent differences between models. Ultimately, an individual chooses a nursing model that is based upon and compatible with...

Why the South Lost the Civil War

have any solid answer. The following paper examines reasons why the South lost, and focuses on the fact that it likely lost due to...

Legal Matters at Bug, Inc.

can be used to help prevent another company from benefiting from Bugs efforts. 2. Industrial Espionage Corporate spying alw...

Thoreau/Civil Disobedience

American people, Thoreau argues that the government "does not settle the West. It does no educate" that it is the American people...

Tobacco Industry

any number of physical ailments, including halitosis and lockjaw throughout Europe (ASH, 2006; Randall, 1999). Sir Frances Drake ...

Civil War Naval History

navy of the Confederate States of America. Roughly one-fifth of US naval officers resigned and joined the Southern rebels. In hi...

Report Compilation in Criminal Investigation

course, depends on the specifics of the crime. Some of the types of observations that might be made are expected and others are s...

The Application of Human Behavior Concepts at Starbucks

broken down into the smallest components which would acquire the issues give or training. This made the employees cheaper t...

Article Analysis/Evidence-Based Practice

study also examined the availability of information resources available to the RN respondents (both at work and at home). Their fi...

The Use of Computers in Online Education

may decide to spend some years traveling in their twenties and work late into their seventies or eighties. Conversely, they may de...

General Insurance Company Case Study

This 11 page paper looks at a case study supplied by the student, describing the current manual information systems that are in pl...

The History and Development of Computer Aided Design

the CAD programs that were designed with engineering application, such as the automotive and aeronautical industries where there w...

Civil Liberties

liberties they believe that the Constitution allows freedom in all areas that the society deems necessary. However, there are cond...

The Land Problem and the Collapse of the Roman Republic

assistance from the government. Another problem involving the land was the fact that aristocrats were buying up large tracts and ...

GIS Case Study

given regarding the way the system work, if we look at the inputs, the transformation process and the outputs we can consider the ...

The Patriot Act

knowledge or consent of the targeted individual". (Robinson, 2003). Wire taps on our phones, monitoring...