SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1651 - 1680

1964 Civil Rights Act

(1957), for example, argued that the basis for separation and discrimination was linked to the fact that employees did not want to...

Comparative Consideration and Application of Criminological Theories

through in the study of behaviors by his operand conditioning theory. Basically stated, Skinner demonstrated that positive reinfo...

The Singapore Stock Market and an Application of Warren Buffett's Investment Methods

Warren Buffett. This is one that has been proved successful, due to the riches that have been amassed by Warrant Buffett. For exam...

Personal Computer Problems as a Sample Essay Narrative

would help me become a self-employed entrepreneur, and the tasks that used take me hours complete would now be simply a matter of ...

A Case Study of the Application of California Penal Code

placed wooden horses and other toys around the still to disguise it. These elements contributed to the criminal act, but they als...

Health Care and an Application of Distributive Justice

Where Philosophy and Reality Meet Accessibility to and the cost of health care have been overriding issues...

Computers a Household Necessity

taxpayers produce myriad receipts for purchases and expenses, it generally will blindly accept any self-designed spreadsheet of ho...

ARP Protocol Subversion and Network Security

an Internet browser, some type of an email program, or other kinds of programs that can gather information from a particular Inter...

Civil War and Reconstruction Effects

life, liberty or property without due process of law, (or) deny to any person within its jurisdiction the equal protection of the ...

US Civil War and the Gatling Gun

Benjamin F. Butler of the Union army is generally credited with having been the first company to employ the use of the new technol...

Civil Rights Act of 1964's Title VII

cropped up as a result of Title VII. People with religious beliefs sometimes refuse to wear hats or certain clothing that is a req...

Confederate Black Soldiers

defeats later, which included the devastating defeats at Gettysburg and Vicksburg. The Confederate Congress finally relented in M...

Social Psychology and Application of Aggression Theories

et al, 1990). In the clinical setting, the two most commonly displayed behavior disorders are grouped under the heading of disr...

Overview of the Computer Consulting Industry

as those laid down by the USA Patriot Act and the impact on financial institutions. The weak dollar may also create increased opp...

Computer Software and Hardware Assessment Questions

the collective skills of a workforce; categorize customers purchases during a single visit to a retail store; or other points pert...

Confederate Women During The American Civil War

actual goings-on, but also to the major players of the war including confederacy president Jefferson Davis and others such as John...

Computer Based Visual Instruction Materials Designing

more than three small images (2000). In computer presentations, it is important to be consistent in regards to such features as ...

Moralist and Modernizers by Steven Mintz

medical societies of the power to license doctors. Family patriarchs also saw their legal rights diminished. In reaction to this...

Balancing Intrusion by the Government and Safety

She is right in this evaluation. During the Second World War, the U.S. supported Japanese internment camps. It was something that ...

Were the Confederate States Manipulated into Striking First by President Abraham Lincoln?

the nations history forever. "We have in this nation the element of domestic slavery. The Republican Party think it wrong - we t...

Disaster Recovery Planning

A survey conducted in 1995 by ICR Survey Research Group regarding vulnerability of computers found that sixty six percent of respo...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Reconstruction Era's Early and Late Stages

of things that are rarely mentioned in classroom history books. Most history books portray the Union troops as kind, benevolent so...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Political Systems Comparison

coercion is prevalent (British Library, 2003). However, big business has become so big and capital has become so concentrated in f...

Physics Applications

of any size - whether that particle is subatomic or a "grain" comprising the universe - cannot be known. "The dimensions of the g...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...