SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1681 - 1710

Sodium Isotope - 24 Medical Applications and Background

becomes a solid is 371 Kelvin, 98 degrees Celsius or 208 degrees Fahrenheit (Barbalace, 2003). The atomic mass average is ...

Civil War, Industrialism, and Sectionalism

nation-states of Europe (plus he points out that the U.S. is actually comparable in area to Europe) (Turner, 2002). Because of the...

US Civil War and the Gatling Gun

Benjamin F. Butler of the Union army is generally credited with having been the first company to employ the use of the new technol...

Civil Rights Act of 1964's Title VII

cropped up as a result of Title VII. People with religious beliefs sometimes refuse to wear hats or certain clothing that is a req...

Confederate Black Soldiers

defeats later, which included the devastating defeats at Gettysburg and Vicksburg. The Confederate Congress finally relented in M...

Social Psychology and Application of Aggression Theories

et al, 1990). In the clinical setting, the two most commonly displayed behavior disorders are grouped under the heading of disr...

Overview of the Computer Consulting Industry

as those laid down by the USA Patriot Act and the impact on financial institutions. The weak dollar may also create increased opp...

Computer Software and Hardware Assessment Questions

the collective skills of a workforce; categorize customers purchases during a single visit to a retail store; or other points pert...

Personal Computer Problems as a Sample Essay Narrative

would help me become a self-employed entrepreneur, and the tasks that used take me hours complete would now be simply a matter of ...

A Case Study of the Application of California Penal Code

placed wooden horses and other toys around the still to disguise it. These elements contributed to the criminal act, but they als...

Health Care and an Application of Distributive Justice

Where Philosophy and Reality Meet Accessibility to and the cost of health care have been overriding issues...

Computers a Household Necessity

taxpayers produce myriad receipts for purchases and expenses, it generally will blindly accept any self-designed spreadsheet of ho...

ARP Protocol Subversion and Network Security

an Internet browser, some type of an email program, or other kinds of programs that can gather information from a particular Inter...

Civil War and Reconstruction Effects

life, liberty or property without due process of law, (or) deny to any person within its jurisdiction the equal protection of the ...

Aviation and Aerospace Perception and Sensation

researchers have considered the nature of the Airbus A-320, the most powerful automation suites currently in use and the way in wh...

Brown v. Board of Education Case Decision and its Effects

However, the victory that Brown v. Board of Education of Topeka represented in the Black community did not carry over to the major...

Psychotic Depression Application of Cognitive Behavioral Therapy

emotional reaction to certain situations, and so listening becomes one of the fundamental tools in the learning of new skills (Sta...

1964 Civil Rights Act

(1957), for example, argued that the basis for separation and discrimination was linked to the fact that employees did not want to...

Comparative Consideration and Application of Criminological Theories

through in the study of behaviors by his operand conditioning theory. Basically stated, Skinner demonstrated that positive reinfo...

The Singapore Stock Market and an Application of Warren Buffett's Investment Methods

Warren Buffett. This is one that has been proved successful, due to the riches that have been amassed by Warrant Buffett. For exam...

Reconstruction Era's Early and Late Stages

of things that are rarely mentioned in classroom history books. Most history books portray the Union troops as kind, benevolent so...

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Malcolm X and Martin Luther King on Black Manhood

that fight. Black manhood to Malcolm X and Martin Luther King, Jr. seems to be equivalent to standing up for individual rights. T...

Physics Applications

of any size - whether that particle is subatomic or a "grain" comprising the universe - cannot be known. "The dimensions of the g...