SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 2821 - 2850

Post War Propaganda Posters and the Spanish Civil War

1297 The Spanish Civil War marked a...

Crime Scene Investigation and Forensic Serology

forensic serology and biological evidence are used in crime scene investigation. This paragraph helps the student give a brief ov...

Case Studies: Information Systems

Life provides value for businesses in that it can serve as a low-cost venue in which to host events such as meetings, teleconferen...

WTO Regulations - Anti Dumping and Countervailing Measures

The writer explains when and how country may introduce anti dumping measures such as duties, and countervailing measures, looking ...

Exegetical Examination of Acts 2:42-47

(Net Bible). This choice is due to the interpretation that, in this context, these statements describe the beginning of various pr...

Ethics Issues of the Caltex Plant in South Africa

become complex, as the firm has a duty to the shareholders to undertake business to create profit, potential losses and lost oppor...

Intermediate Sanctions - A Grant Proposal

resources represents a major problem in many areas of the United States. As legislation becomes more complicated, more prisoners a...

Reception Theory vs. Dominant Ideology of Art

In five pages this paper discusses the artistic conflict between the dominant ideology and reception theories during the Middle Ag...

Applying the Electoral College to the U.S. and Elsewhere

In twenty pages this paper discusses the U.S. electoral college in a consideration of its application there and elsewhere and also...

Advanced Nursing and the Theory of Rosemarie Parse

In eight pages this paper examines advanced nursing practices through an application of the theory by Rosemarie Parse. Five sourc...

The Issue of Censorship and Applying it to Modern Literature

5 pages and 6 sources. This paper provides an overview of the application of censorship principles to the books of J.K. Rowling. ...

Howard Zinn and the Civil Rights Movement

This research report looks at this era but focuses on one book called A People's History of the United States. This five page pape...

UK National Power, Principle Agent Theory, and Corporate Governance

In eleven pages corporate governance is defined with two models presented and then an examination of principle agent theory is pre...

Gesell's Maturational Theory

In five pages this paper examines the maturational theory of Gesell in an overview that considers its purpose, application, and im...

Criminal Profiles and Psychology

In sixty pages this paper discusses psychological profiling of criminals in an application of various principles to Jack the Rippe...

Assessing the Value of an Information Technology Risk Assessment

value would then be assessed as a result of the savings that were created less the costs of putting those savings in place. Increa...

Software Programs for Qualitative Research

2010). It can also be used for obtaining public opinions, evaluating programs in healthcare and for a number of other projects. ...

Human Rights and Civil Liberties in Canada

fractionation which is based not only on ethnic and racial differences but also on other socioeconomic factors (Clement, 2009). ...

All About Web 2.0

stated that the WWW had moved from Web 1.0 to Web 2.0, but ever since there has been a struggle to define exactly what Web 2.0 rea...

Admission Statement

me to experience a Parisian lifestyle, increasing my perceptions and knowledge of other cultures while achieving my long-term acad...

Leadership and Communication

opens up opportunities and challenges for commerce requires the input and support from a number of different professionals that ca...

Ethical Decisions in the Public Sector

with religion or law. But thinking of ethics in connection with any other subject makes it very unclear. This paper discusses what...

One Cargo Barge and its Role in the Civil War

was envisioning. One of the more obvious was the fact that supplying an army of this size with all of its operational requirement...

Does Intel Have an Optimal Capital Structure?

This is a theory that forms the basis of capital structure theories, and comes on two versions, with and without taxes. The origin...

Risk and Security Considerations for the IT System of Huffman Trucking

that they will not use it may be considered in terms of the way implementation takes place, this also needs to be considered in te...

Information Technology for a Shopping Center

duel purpose, to provide a system, of observations and as a deterrent. The tying of the system with an IT system, will allow for a...

The Concept and Use of Web 2.0

platform players, which sees the ideas developed from the second layer and move to the first or top layer where they are widely us...

The Biological Theory of Crime: The Social Implications

to criminal behavior are not so far-fetched. This paragraph stresses the risks of being too aggressive in intervention of "crimi...

Personal Ethics and Their Importance in Psychology

code of ethics that the true professionals in that line of work will do their best to follow. Lawyers, for instance, have client c...

Philosophy and Business Ethics

In five pages business ethics are examined through applications of theories by philosophers David Hume, Immanuel Kant, and John St...