SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1771 - 1800

Multimedia Features in Programming Languages

this is with the use of a WebQuest that had been created by Bernie Dodge (2003). WebQuests have a structured, inquiry-based method...

Contemporary World and Adult Self Directed Education

most dynamic approaches to the systematic collection of knowledge in an environment in which that knowledge is collected with the ...

Overview of Interactive Data Visualization

in decision making (Sullivan, 2002). Data visualization can be used to "analyze information in a data warehouse or it can be used...

Exploring the Civil War's Causes

determining the direction that this country would ultimately take (McPherson, 1988). There were many individuals in the yea...

Computer Hacking History

computer or telecommunications system" (Ward, 2000). That hacking was present in the phone system over one hundred years ago spea...

An Argument and the Application of Reason

to be true may turn out to actually not be true at all (Logic and Fallacies, 2002). Think of Christopher...

A Civil War Personal Account

of Benjamin Franklin Ferris, 2002). In August of 1861 Ferris signed up to join Captain H. Cook who was recruiting soldiers to go ...

Cultural Assimilation in From Out of the Shadows by Vicki L. Ruiz and Unbound Voices by Judy Yung

Ruiz would have been fully capable of portraying the various moods of Mexican-American and Asian-American culture in the facilitat...

Contemporary Application of the Ideal Leadership Theory of Niccolo Machiavelli

Machiavelli had been imprisoned by the opposing Medici and he saw how the conflict between politicians can destroy what issues are...

U.S. Civil Right Movement

African-Americans, women, and men without property, had not always been accorded full citizenship rights in the American Republic ...

Ethnic Groups in the United States

views. Generally, the idea of ethnic or racial tolerance takes two approaches; in the one, acceptance consists of ignoranc...

Tutorial on Maintenance of Civil Liberties

airplanes could dive bomb into more buildings? The purpose of this paper is to lead the student through some arguments reg...

Practical Application of Management Theory

in todays day and age is represented by a slew of models from the loosely structured, state of the art company to the telecommutin...

Continuing Educaiton and the Application of Theory

they are working in the field now indicates that they understand the concepts and were successful in completing the ranges of stud...

Puritanism and the English Civil War

be fired (Crossby, 2002). Upon a discovery that the Scots had been making plans with the French he again decided attack wit...

U.S. Civil War Gen. Joseph Hooker

chose to split the Confederate army into two groups, nonetheless. "Lee left 10,000 men under Jubal Early, while he and Thomas Ston...

Prohibiting Laboratory Experiments on Primates, Cats, and Dogs

animals for whatever purpose he deems necessary without a thought for the animals needs. The issues that surround animal rights a...

Computer Information Systems Industry Employment

in using it, and why? Seemingly any company wishing to do intense data scanning on consumers will be able to justify to their own...

John Paul II's The Gospel of Life Evangelium vitae

have been discussed in the past and are relatively well known are based on the worst instincts of human nature which seem to defy ...

Hypothetical Scenario and an Application of the Philosophies of Jean Jacques Rousseau and Immanuel Kant

the old mans money to the poor. While he fears being found out, when he is, the people not only forgive him, but elect him their n...

Post Civil War South Carolina

out buildings and heavy damages to their property. These people, who had formerly just grown food crops, began to attempt to grow...

Significant Events in American History between the late 1950s and 2002

in the world, the nation that had not been directly or severely attacked by a foreign enemy since its founding was attacked (The H...

U.S. Civil War and Maneuver Warfare

would support the opposite, namely, a "slow, feeble, disorganized attack" (Hughes, 2002). He also explains this strategy based on ...

Government Regulation and Computers

looking into various forms of regulation concerning taxation and prohibition based on pornography laws. Also, pornographic materia...

US South and Reconstruction's Impact

to what should be done in the area of reconstructing after the Civil War. THE POLITICAL SITUATION AFTER THE WAR Needless to say ...

Russian Society and the Effect of Computers

as rapidly as was expected. There isnt enough interest right now. That could be changing, however, as the last few months have s...

Hugo Black

States had boundaries over which he was not permitted to cross. This, however, was not immediately evident when Truman "ordered s...

Personal Computer Industry of the United States

is "no longer a technology business. You dont need a team of engineers to build a PC today" Jerre L. Stead of the largest distrib...

Execution of Computer Software

different operating systems have completely different architecture, then in looking at how the language a programme is written in,...

Current Trends Regarding Network Security Issues

home office or to transfer sensitive documents to the boss. It was found that others would enter the home offices portals - hacker...