SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1471 - 1500

The Sudanese Civil War

However, there are many tribal and ethnic divisions within these and so, it is difficult for all of them to get together and form ...

Application of C# Programming Uses of VB.NET

applications (Win2000.com, 2005). C# basically helps simplify programming, and combined with VN.NET, helps develop Web application...

Testing and Integration of Computer Systems

network, after all, is to transport and control data, and to connect computers and peripheral drives with one another (Huber and B...

Costs and Benefits of Computer Mediated Communication

There have been some expected benefits that have also proven to be false expectations. It was expected that computer based communi...

Civil War Era and Black Emancipation

repugnant. In exploring the time period before the Civil War, Equaino (1998) takes one on a journey through the 1700s slave trad...

Asymmetrical Threat Assessment Through Geospatial Applications

"decision support tool " for those who work in the field of homeland security. It tells an observer where someone is, who he is as...

Roy Adaptation Model, Hospice Care, and Application of Zen Philosophy

In this way, Buddhism became accessible to all, and was able to develop the concept of community which...

Computers or Books in Education

The book is incredibly low-maintenance, never requiring that it be rebooted or upgraded. Books can travel with the individual and...

Application of Theory on Delinquency

that blockage of these goals can result in delinquency that indicates that deviant behavior is an illegitimate method for achievin...

Early 20th Century Niagara African American Civil Rights Movement

owners. Du Bois understood that blacks needed to secure a greater foothold in American labor and industry, but there was far more...

ABC Company Application of Equity Theory

- those who are younger, less experienced or unenlightened - that they are important as well, and to retain them as they become ol...

3D Computer Graphics and Film Special Effects

72). Morrow and the two children were killed instantly. While tighter safety precautions were immediately instituted by the film i...

Email Laws and Relevant Literature

level of infiltration that existed in relation to computers functions - such as email - and individual privacy. The government ha...

Sandia National Laboratories' MentorPal 'Living System' Software

system with boundaries, metabolism, defining code, purpose, complexity and a defined size, that also is self-organizing and operat...

Criminality of Medical Malpractice

one and it is Negligent mal practice. In this form of malpractice there is considered to be no criminal intent or dishonest behavi...

I've Got the Light of Freedom by Charles Payne

did extraordinary things, and were promptly forgotten or left out of the history books. Without Hamers help, hundreds of black vot...

Civil War Letters

Alfonso Heep is an educated Kentucky farmboy who, in agreement with his state government, originally wanted nothing to do with the...

Link Between the Civil Rights Movement and Black Missississippians Service in the Second World War

had been technically ended when the South lost the Civil War, the subsequent Reconstruction did nothing to reconstruct the concept...

Fortran Computer Programming Historical Overview

Visual program, his brother William went a step further by using the same computer (TX-2) to create a data flow language(Najork). ...

Programming Language Learning and Teaching in a Multimedia Environnment

People can now in fact learn how to program with the use of multimedia. McMaster (2001) explains that if managers want their sal...

Developmental Psychology and a Premier Virtual Computer Generated Symposium

labeled and controlled by drugs, something that alleviates the difficulties for the teachers and parents, but has unknown latent e...

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Contemporary World and Adult Self Directed Education

most dynamic approaches to the systematic collection of knowledge in an environment in which that knowledge is collected with the ...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Exploring the Civil War's Causes

determining the direction that this country would ultimately take (McPherson, 1988). There were many individuals in the yea...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...

Eriksson's Personality Model Application

despair (Holme, 1972, p. 427). In order to illustrate Eriksons model, consider these two people: Ashlynn and Kate. Ashlynn is a ...

Strategy and Weapons in the American Civil War

to become obsolete.vi Nevertheless, for a great deal of the war, commanders continued to employ tactics that had been used for a c...

Role of Women During the Civil War

of unpleasant confrontations" (Clinton et al 140). For some of the Confederate women, war was distant, but for others, it ...

African Amercan Soldiers in the U.S. Civil War

highly supportive of abolitionists. In fact, just prior to the bravery shown at Wagner by the 54th regiment, Democratic rioters in...