SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 2161 - 2190

Angela Davis and Her Impact

prisoners who were apparently being held wrongly. It was this situation that ultimately led her to be on the FBIs most wanted list...

'Computer Professionals and the Next Culture of Democracy' by Shuler

may be agents in the transformation of democracy, but democracy is not something that is inextricable with computer science (2001)...

Computer System Development

data needing a broad bandwidth, but also the need for security as patient files are confidential and security measures are not onl...

Proposition for a School iBook Upgrade

time while currently gaining the greatest utility from the hardware it has and is about to acquire. The Mac OS X Server v10...

Target Stores and an Application of Tuckman's Stages

groups help to define their operation and behavior, but the groups also take on a dynamic of their own. Tuckman observed sm...

Aspects of U.S. History - Vietnam and the Civil Rights Movement

well as the case that finally struck down the concept of "separate but equal" in terms of education, and mandating that all school...

Stating a Business Case for the Linux Operating System

bits maximum processors 2.4.2 Intel/Cyrix/AMD Pentium, 80486, 80386, 80286 (partial port), 8086 (partial port), IBM/Motorola ...

Section 215 of the U.S. Patriot Act

the "things" searched go beyond the business records as the Department of Justice notes, and means that it can search "any tangibl...

Transgendered Community and Civil Rights

themselves. There is a definitive move in fact, to abolish the term from the "Diagnostic and Statistical Manual of Mental Disorde...

Application of Leadership Theory II

I replied that I could develop a program with her supervision, that nurses were more interested in furthering their training than ...

Application of Leadership Theory

about the same thing for some time and several weeks before began keeping a time log categorized according to project number. Wha...

Workplace Computer Training

somehow to computers and the internet" (Survival Skills for the High School Graduate, 2005). They stress that any and every indivi...

2 Questions on Great Literature and Its Practical Applications

guiding light for Gilgamesh. It is also important to note that Gilgamesh himself seeks immortality as this is important to the sto...

Mac Computer Marketing

B, 2004). The ad was strange, to say the least. It was drab, it was in black and white until the woman burst on to the screen and...

Microsoft Trial and Arguments

monopoly" (Brinkley, 2000). (This isnt unknown business practice; Detroit routinely buys up inventions that might lead to more fu...

Importance of Access to Antivirus Computer Software

network to accomplish that goal. Still others may transfer files between the companys network and their home computers, work on t...

Dell Computers 2003 A SWOT Analysis

both computer components and actual PC computers. He did so by buying retailers surplus stocks at cost, powered them up with graph...

Civil War Life of Robert E. Lee

Lee resigned his U.S. Army commission to defend Virginia and fight for the Confederacy, on the side of slavery."3 He was something...

European Union Competition Law Application

scale, there will also be an increase in market share. However, if the market share is too great then the company may be in a domi...

Computers and China

particular market, partly because of culture, and partly because the demand, until recently, simply hasnt been there. Dell Compute...

Globalization Training at Dell Computers

employees and managers to think globally, through the realm of technology. We chose Dell because it is one of the few companies in...

Issues of the Lebanese Civil War

in their policies, partly because other Arab nations pressured them into leaving the Palestinians free to pursue their attacks aga...

Different Cultural Applications of American Management Concepts

If we want to examine this we can use Hofstedes model of cultural diversity to show areas of difference. Hofstede, looking at cult...

A Learning Activity and 3 Theoretical Applications

warm-blooded mammals that bear life young and most are insect-eaters (Krantz and Barrow, 2003). Considering the many misconception...

Surgical Applications of MEMS Electrostatic Tweezers

improving health care and in surgical applications [2]. The diversification of MEMS technology has resulted from advancement in ...

DEF Corporation Application Architecture

Though the tactical approach can produce an application architecture that addresses the companys current needs, the strategic appr...

An Analysis of Louis Fischer's, The Essential Gandhi

courts and token governorships were merely means to placate the population without offering "real freedom or power" (Fischer 158)....

Literacy Standards Within Nursing Education Programs

thinks is, to a certain extent, a result of genetic influences; however, this capacity is also highly influenced by the process o...

Development of Autonomic Computing

which the design of an autonomic computer system should be designed, helping increase efficiency as well as overcome the shortage ...

Fuzzy Logic Controllers (FLC) In Computer Systems

However even with this there is no any exactness as this does not mean that it is plus or minus 2 or 3 degrees (Rosenstein, 2004)....