SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1741 - 1770

Proposition for a School iBook Upgrade

time while currently gaining the greatest utility from the hardware it has and is about to acquire. The Mac OS X Server v10...

Target Stores and an Application of Tuckman's Stages

groups help to define their operation and behavior, but the groups also take on a dynamic of their own. Tuckman observed sm...

'Computer Professionals and the Next Culture of Democracy' by Shuler

may be agents in the transformation of democracy, but democracy is not something that is inextricable with computer science (2001)...

Computer System Development

data needing a broad bandwidth, but also the need for security as patient files are confidential and security measures are not onl...

Transgendered Community and Civil Rights

themselves. There is a definitive move in fact, to abolish the term from the "Diagnostic and Statistical Manual of Mental Disorde...

Aspects of U.S. History - Vietnam and the Civil Rights Movement

well as the case that finally struck down the concept of "separate but equal" in terms of education, and mandating that all school...

Stating a Business Case for the Linux Operating System

bits maximum processors 2.4.2 Intel/Cyrix/AMD Pentium, 80486, 80386, 80286 (partial port), 8086 (partial port), IBM/Motorola ...

Biometric Security Applications

Cards A single business is an example of a small database where biometrics work well. When there is some malfunction, usin...

Practical Nursing Theory Application

care model is highly useful with the elderly and those recovering from surgery or illness. Self care is not an issue that enters ...

Application of Leadership Theories

executive assistants and mail room employees. Also, lets examine the definition of leader -- in its most basic sense, lead...

Plastics Industry and Computers

industry today makes use of computers, it perhaps could use it even more. Siweck observes: "...American shops need to understand t...

Analyzing the Ferocious and Prolonged Civil War Combat of 1861 Until 1865

the Spanish American War, World War I, World War II, and the Korean War combined."5 It is often inconceivable for the person of t...

Causes Initiating the Civil War

had no voice at all. Jefferson Davis accused the North of wanting "an unjust system of legislation to promote the industry of the...

Dell Inc.

country (Dell Annual Report, 2000). This company has achieved some amazing results, by 2000 the company was selling $50 million a ...

Ideology of Dr. Martin Luther King's Nonviolence and Global Terrorism Applications

its grips on the world? How do black American civil rights leaders feel about that form of violence? How do they feel about the ...

A World War II Submarines History

crushing power of the round balls had no match in the newly designed projectile typesii, the rapid revolution in this area could b...

1820 and 1850 Compromises

states and what free states could join the Union in order to maintain a balance wherein slave states never had the upper hand it s...

eCommerce Application Based on Software Factories

of software development: According to the Standish Group, businesses in the United States spend about $250 billion annually on sof...

Civil Disobedience and Abortion

"That government is best which governs least....For government is an expedient by which men would...

July 1 to July 3 1863 Battle of Gettysburg

Couch defiantly pledged, "In no case must the enemy be allowed to cross the Susquehanna" (Brubaker, 2003, p. 74). Lees Lt. Gen. R...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Kennesaw Mountain Battle During the Civil War

slaves to keep crops coming in. The North was very reliant on the Souths products and it was also more the hub of government, Brit...

DEF Corporation Application Architecture

Though the tactical approach can produce an application architecture that addresses the companys current needs, the strategic appr...

Development of Autonomic Computing

which the design of an autonomic computer system should be designed, helping increase efficiency as well as overcome the shortage ...

Fuzzy Logic Controllers (FLC) In Computer Systems

However even with this there is no any exactness as this does not mean that it is plus or minus 2 or 3 degrees (Rosenstein, 2004)....

An Analysis of Louis Fischer's, The Essential Gandhi

courts and token governorships were merely means to placate the population without offering "real freedom or power" (Fischer 158)....

Literacy Standards Within Nursing Education Programs

thinks is, to a certain extent, a result of genetic influences; however, this capacity is also highly influenced by the process o...

Overview of Computer Crimes

computer terminals, stolen floppy disks with company information, or direct access to the network by individuals, either criminal ...

Culture and Life Influence by the Computer

used, and how it is created in consideration of utility. Campbell (1996) asserted that technological determinism "reflects a utop...

Application of Criminological Theories

study of behaviors by his operand conditioning theory. Basically stated, Skinner demonstrated that positive reinforcers could dir...