SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1831 - 1860

Women in Computers

This paper consists of six pages and discusses female pioneers in the field of computers in a consideration of Grace Murray Hopper...

Georgia March of General Sherman

In seven pages this research paper examines how these Civil War tactics were a harbinger of the total warfare military concept of ...

Let the Trumpet Sound by Stephen B. Oates

In four pages this research paper examines this powerful text on the life of civil rights leader Martin Luther King Jr. Five sour...

Advantages and Applications of Hemp

In five pages this report examines in a consideration of the benefits of hemp in terms of its advantages in health and industrial ...

Compaq Computer and Supply Chain Management

In six pages this paper examines Compaq Computers in a consideration of the company's supply chain management. Seven sources are ...

Comparative Advantage of Dell Computer

In six pages the personal computer industry and its changes are examined in the responses of corporate giants, Gateway, Compaq, an...

Home Healthcare Nursing Application in Critical Care Nursing

In ten pages a home healthcare case study is employed to examine what nursing approaches would best be used in this scenario and a...

Employment Discrimination

In five pages this paper discusses how Title VII of the Civil Rights Act of 1964 has been anything but a legal tool to ensure equa...

Vietnam and the Stance of Martin Luther King Jr.

In fifteen pages this research paper examines the reasons behind Martin Luther King's opposition to the war in Vietnam in a chrono...

Children, Computer Addiction, and Problems of Social Development

In seven pages this paper discusses the social development problems that are associated with computer addiction in children. Five...

Reconstruction Policies Following the U.S. Civil War

In twelve pages this paper discusses the Reconstruction policies of Presidents Abraham Lincoln and Andrew Johnson for after the Ci...

Government Application and Survival in Joseph Andrews, Brave New World, and The Adventures of Huckleberry Finn

In five pages this paper considers the views of authors Henry Fielding, Aldous Huxley, and Mark Twain regarding a hypothetical sce...

Overview of Computer Viruses

a PC, there are only about 40 known viruses that are specifically designed for Macintosh computers. Yet both platforms are equall...

Contemporary Photographic Theory and Graphic Design

In five pages this paper compares traditional photographic theory with CAD or computer aided graphic design. Three sources are ci...

The Commandant of the Andersonville Confederate Prison Camp Henry Wirz

Henry Wirz, an American Civil War criminal, is evaluated as to the truth of his criminality. Was he a scapegoat? Many details are ...

Times of War, Art, and Music

In eight pages this paper examines the music and art popular during war times in a consideration of Tim O'Brien's Going After Cacc...

South America and Terrorism

In seven pages this research paper examines human and civil rights oppression and terrorism in South America in a consideration of...

Photographic Theory and Graphic Design

In ten pages this paper considers the relationship between photographic theory as it pertains to moving and still photography and ...

Business Applications of Distributed Systems

Distributed systems are defined in a research paper consisting of five pages along with the business ramifications that are associ...

John Locke's Political Theory

in their business. On the other side are those who want totalitarian rule, where the people have little say in what goes on. Betwe...

Fictitious Case Study on Workplace Sexual Harassment

VII and other pertinent information. MEMORANDUM To: Robert Brown, CEO From: Arthur Taylor, Research Assistant (Legal Departme...

Constitutional Rights v. Internet Privacy

Current Issues & The Conflicts Involved In terms of time, the Internet is basically still in its infancy. Its origin can be trac...

North and South's Strengths and Weaknesses as a Result of the Civil War

In five pages this paper assesses the strengths and weaknesses of the North and South which ultimately determined the outcome of t...

Computer Virus Spreading, Hacking, and Ethics

(99). Those in the meeting were happy to know of the possible risks from would be computer hackers (Bloombecker 99). It is recom...

U.S. Civil War and the Impact of Manifest Destiny

war who resented the Union it for the control it tried to place on issues which they considered to be issues of the state and not ...

Workplace Computer Training and Digital Diplomas

low cost, high speed Internet access, has made virtual reality virtually a reality. The dual office-classroom described above exe...

Biography of C. Gordon Bell

In five pages C. Gordon Bell is discussed in a biographical overview, his importance, computer industry contributions, company inf...

'Bleeding Kansas' and Prairie Politics

their expedition passed through it in 1804, and further descriptions of the land had been gained from the expeditions of Zebulon P...

Theoretical Applications on Acquiring a 2nd Language

In ten pages this paper discusses ESL learning and programming development through various theoretical applications with LI and L2...

Reading Instruction and Theoretical Applications

In fourteen pages this paper examines early reading instruction and various phonics and whole language theoretical approaches. Fi...