SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1981 - 2010

Health Care Applications of the Internet

This paper discusses the medical and health care benefits created by the Internet. This five page paper has eight sources listed ...

Civil War Idealizing in Michael Shaara's The Killer Angels

In nine pages this paper discusses how the Civil War was romanticized in this consideration of The Killer Angels by Michael Shaara...

Rap Music's Culture and History

was said about Rock and Roll when it first became popular. However a single factor, whatever the opinion one holds regarding RAP i...

Theorist and Martha Rogers a Science of Unitary Human Beings Application

of this perspective for modern nursing practices. The Theory of Unitary Human Beings Rogers theory described as the "Science of...

Civil Service Employment and the Role of Informal Organizations

In eight pages this paper examines civil service employment in Los Angeles in a consideration of the role played by informal organ...

Applications of Orthopedic Sports Medicine

have only just applied the very tip of what technological mastery they have uncovered. The "rapid advances"1 in bioengineering no...

Ambiguities Throughout the History of Politics

In six pages this paper discusses the political ambiguities represented by the Second World War, the Cold War's rise and fall, and...

Nursing and Computers

of first-year nursing courses for delivery on the Internet has afforded students the opportunity to complete didactic requirements...

Storage Capabilities and the Impact of Quantum Computing

In fifteen pages this paper discusses computer hardware in miniature in a consideration of quantum computing and its storage capab...

Post Civil War Political Corruption

In three pages this paper examines the political corruption that resulted after the U.S. Civil War. Three sources are cited in th...

Gateway and Dell Websites

In seven pages these two computer manufacturers' websites are evaluated with a brief corporate description provided and then an an...

Spanish Civil War Effects Upon Malaga, Spain

In ten pages this paper discusses Malaga with the focus being upon the impact of the Spanish Civil War upon the city. Forty eight...

Apple Computer Inc. and Its Organizational Culture

In twenty pages this paper examines Apple Computer Inc. in a consideration of its organizational culture. There are thirty source...

Canada and Legal Issues Involving Regulation of the Internet and Computer Hacking

In twelve pages Canadian law is examined as it addresses such issues as regulating the Internet and computer hacking and considers...

US Civil War and Weapons

the harsh conditions. This type of bullet was seen in the by Dr. E. I. Howard of the Army of Northern Virginia, for he worked as ...

Sudan's Continuing Civil War

schools. In fact, the name "Sudan" (Arabic for "black") is a reference to the black peoples who historically have inhabited the re...

Maintenance of Computers

cleaned. When computers are exposed to more dust and dirt than a normal computer would be, they should be cleaned more often. In...

Analyzing the Society Division of Labor According to Emile Durkheim

In twelve pages Durkheim's text The Division of Labor in Society is examined within the context to lynchings in the American South...

Y2K Preparation

In seven pages this paper examines how an individual can prepare for the new millennium in terms of computer preparation. Ten sou...

Computer Equipment Confiscation for Crime Investigation and an August 1999 Article in the Cyber Law Journal of the New York Times

clear in the Richtel article(8-27-99), are the simple facts that the federal officials who confiscate computers in cases where som...

Union and Confederate Civil War Spies

and shift the direction of battles at almost every turn. Belle Boyd Boyd was perhaps one of the best known spies of her time....

Civil Rights Legislation Backlash, Liability, and Discrimination

organizations are facing today when they try to hire or replace employees based on qualifications rather than racial, ethnic, or g...

Corporate Spy Catching

In eight pages this paper discusses company espionage and the security benefits offered by computer forensics. Eleven pages are c...

Description of the Battle Of Gettysburg

by more Confederate troop who had joined the fighting. Mass confusion erupted and thousands of Union troops were captured. Union ...

England's Civil Wars and Their Possible Causes

King Charles II, the quashing of remaining rebellions in Ireland and Scotland and the installation of parliamentarian Oliver Cromw...

Dell Computers

is the longest-tenured CEO of any major US computer company. Corporate headquarters are located in Round Rock, Texas, near Austin...

Accomplishments of Computer Designer Seymour Cray

components ( Anonymous 2). He was a truly a "master" of computer architecture, creating computer systems with both skill and elega...

Indian International IT Company Satyam Computer Services, Ltd.

Additionally, Satyam has forged numerous alliances over the years, including with IBM, Siebel and Microsoft. Satyams U.S. subsidia...

Comparative Analysis of Plato's, Hobbes' and Locke's Theories

would Hobbes be accepted in todays world? Would he fit in at all? These and other questions loom large. Still, each in their own w...

Communist 'Menace' and the Creed of America

In five pages this paper discusses how American civil liberties were sacrificed in an effort to offer protection of the American C...