SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1801 - 1830

Acer

notebooks and net books, specifically the Aspire, with Acer selling 9.67 million units in the third quarter of 2008 alone, this wa...

AN ARGUMENT FOR REPEALING THE U.S. PATRIOT ACT

whim of the FBI or CIA. The ACLU points out, for example, that Section 215 of the Act allows the FBI to...

Apple and Dell, Supply Chain Management

levels of attention is that of supply chain management (SCM). Supply chain management deals with the movement of goods fro...

How Computers Weaken Language Skills

a poem as well as a human being, the real problem is not skill, but in ideology. That is, many people tend to rely on computers an...

Personal Application of Criminology: The Son’s Friend

as possible, or simply explaining what hes done. Maybe hes bragging and inviting the son to join him in his next robbery. Or perha...

3 Education Research Proposals

policies, implementation and use may occur, impacting different stakeholders. 2. Methodology To assess the way popular media a...

Two Fraud Cases

Fraud continues to be rampant in the corporate world. Prudential Securities were charged with late trading. A manager for Johnson ...

Letter from Birmingham Jail/King

This paper described the impact of "Letter from Birmingham Jail" by Rev. Martin Luther King and its importance to the civil right...

Segregation in the 21 Century

Diversity remains political economic challenge even in this new century. This paper reviews racial housing segregation as it has ...

Chapter Questions, Theory Application

This paper pertains to chapter questions that relate to studies that utilized theory in intervention development that address heal...

Issues Related to Investigations

A case study of a woman cashing her deceased mother's checks is the final part of this essay. Topics discussed in essay include Mi...

Traans parency and other Issues

This essay discusses accountability and transparency in government or other civil service positions. Why is it important? What doe...

Practice Application by NPs, Leininger's Theory

This paper discusses Leininger's theory, which outlines the parameters of transcultural nursing. Five pages in length, six sources...

Reading Text: Electronic Versus Paper

This 5 page paper gives an explanation of reading electronic text versus reading hard copy text. This paper includes studies about...

SEABREEZE'S VIRTUALIZATION PROPOSAL

Discusses how fictitious city Seabreeze can convince both residents and its employees about the benefits of computers virtualizati...

Jean Watson's Theory of Caring: Clinical Application

This research paper concerns Jean Watson's theory of human caring and its use within nursing clinical practice. Eleven pages in le...

Social Movements and Their Impact

communities, working alongside men, often doing the same work, and ultimately forging a nation. But, by the Victorian Era women we...

American Liberty, 1820-1877, Overview of Issues

This research paper/essay discusses various issues in American history pertaining to liberty. This includes the factors that led u...

Post-Reconstruction, African American Leaders

This essay begins by describing the stance of Booker T. Washington, W.E.B. Du Bois, Mary McLeod Bethune, and Marcus Garvey on the...

Example Case, Application of Critical Thinking, EBP

This research paper offers an overview of a case study described by Lunney (2010). The analysis provided by Lunney demonstrates th...

Topics on Computer Security

In a paper of five pages, the writer looks at computer security issues. A number of important topics are examined. Paper uses six ...

The Civil War and Contributions of African American Soldiers

In a paper of four pages, the writer looks at black soldiers in the Civil War. The experiences of inequality endured by such soldi...

The Civil Rights Act - An Overview

In a paper of four pages, the writer looks at the Civil Rights Act. All eleven titles are examined in detail, with emphasis on tit...

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Years Following Civil War

The years between 1865 and 1877 were known as the Reconstruction era because the country was trying to recover and rebuild after t...

Title, Premise, Design for DNP Project

This paper presents an outline for a student's Doctor of Nursing Practice (DNP) project. The paper describes the project title, pr...

Lasers and Their Many Applications in the Modern World

This paper emphasizes the valuable role lasers play in our world. This eight page paper lists seven sources. ...

Application of Strategic Planning

One organization is discussed in this report. The report considers strategic planning, balanced scorecard, benchmarking, standards...

Defending Immigration, the Immorality of Racism

This essay presents an argument based on the idea that fear of immigration, which is promoted by conservatives, is unraveling the ...

Application of Sectoral Determination 14: Hospitality Sector

The writer looks at the working conditions which will be applied under South African law to employees of a small guest house. Iss...