SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 2731 - 2760

Prison Recreation Specialist and Human and Health Performance Research

In twenty pages research conducting, reading, and application of research findings are considered within the context of a Prison R...

A Federal Sentencing Guidelines Overview

In ten pages this paper considers the impact of these guidelines on the court system and offers some history as well as case law a...

Fingerprinting DNA

In six pages DNA fingerprinting is considered in terms of its development and applications with proper analytical and collection t...

Overview of Global Positioning Systems

In eight pages global positioning systems are the focus of an overview that explains what they are, their purpose, how they are op...

Espionage and Game Theory

In ten pages this paper considers espionage through an application of game theory and as it has evolved from the fiction of James ...

Prostitution and Theories of Systematic Deviance

In four pages this paper examines prostitution through an application of systematic deviance sociological theories. Two sources a...

Overview of the Labeling Theory

According to Bartusch, "The delinquent label, in turn, influences the self-image of the youth, who comes to view himself or hersel...

Security Management and Social Theory

has decreased 50 percent overall. The psychology has changed and it is working. Enforcement forces in those cities are no longer t...

Social Learning Theory in '8 Ball Chicks'

there is nothing else "but us" to provide protection, safety and survival for the girls who join gangs. Within those gangs, they ...

Charting the Stages of an Insurance Claim Adjudication

The paper is made up of a flowchart created based on information is applied by the student, demonstrating the different stages tha...

Marketing Orientation and SME’s

is one that seeks not only to provide for customer needs, but to exceed those expectations so the customer wishes to repeat the pu...

History of the General System Theory

or groups which led to a universal law of harmony (BCSSS, 2010). Likewise, Ernst Heinrich Haeckel took the views of Goethe and bu...

Title VII of the Civil Rights Act

committed by anyone in the organization, including suppliers, vendors and any other group with whom there is interaction (Bohlande...

Ethics Issues of the Caltex Plant in South Africa

become complex, as the firm has a duty to the shareholders to undertake business to create profit, potential losses and lost oppor...

Intermediate Sanctions - A Grant Proposal

resources represents a major problem in many areas of the United States. As legislation becomes more complicated, more prisoners a...

Does the Human Rights Act Protect Civil Liberties?

in law. Article 8 may be seen as balanced with Article 29 which is the right of expression. Article 8 states that "Everyone has th...

Post War Propaganda Posters and the Spanish Civil War

1297 The Spanish Civil War marked a...

Crime Scene Investigation and Forensic Serology

forensic serology and biological evidence are used in crime scene investigation. This paragraph helps the student give a brief ov...

Case Studies: Information Systems

Life provides value for businesses in that it can serve as a low-cost venue in which to host events such as meetings, teleconferen...

WTO Regulations - Anti Dumping and Countervailing Measures

The writer explains when and how country may introduce anti dumping measures such as duties, and countervailing measures, looking ...

Exegetical Examination of Acts 2:42-47

(Net Bible). This choice is due to the interpretation that, in this context, these statements describe the beginning of various pr...

Assessing the Value of an Information Technology Risk Assessment

value would then be assessed as a result of the savings that were created less the costs of putting those savings in place. Increa...

Probability Distribution

the figure above the line is a one, and there are two possible outcomes, this means the number below the line is 2, giving us 1/2....

Four Nursing Theorists Described

as described by Hans Selye, among other philosophies and theories, such as Perls Gestalt theory (Tourville and Ingalls, 2003). Fiv...

Kuhn's theory of the paradigm shift

which contradicts the paradigm, and which cannot be explained within the terms of the paradigm. This gives rise to further researc...

Effective Listening

essential skill. The following examination of active listening will, first of all, review the components of active listening and t...

OVERVIEW OF MATHEMATICS HISTORY

however, early mathematics came right along with that. Richardson notes that Hieroglyphic numbers were introduced around 3,000 BCE...

Business Decisions for Will Bury

in that market, taking some of the custom away from Will However, if they do not have the technology to scan the books and reprodu...

THE RIGHT HUMAN RESOURCES SYSTEM

Discusses and recommends the right applications and software for a human resources information system for a restaurant chain in De...

From the Revolution to the Civil War: The Long Sleep of Carleton Wankybucket

at that and he turned and ran, only to fall flat on his face. The jolt startled him and woke him up completely. He heaved a sigh ...