SEARCH RESULTS

YOU WERE LOOKING FOR :The Juvenile Justice System

Education and Social Change

In ten pages this paper discusses how social programs are being included in the U.S. educational system while pop culture continue...

Latino Students of California and Changes in Population

is passed down from generation to generation, invariably perpetuating the academic discord that exists within Californias educatio...

Jonathan Kozol's Amazing Grace

In this analysis consisting of five pages the way in which the nation is treating its children as represented in Kozol's text is d...

Paulo Freire's The 'Banking' Concept of Education

In five pages this essay by Paulo Freire is analyzed with educational systems in the U.S. and Hong Kong also examined. There are ...

An Analysis of Rose's Book, Lives on the Boundary

This paper focuses on the information found in Mike Rose's work, Lives on the Boundary to discuss the current American educational...

Ancient Greece and Education

In five pages this research paper discusses education in ancient Greece with a consideration of the systems in Sparta and Athens a...

Elementary School and DISTAR Reading Program

DISTAR reading program is being used more widely all the time" (Hone, 1994, p. PG). First introduced in the 1960s, DISTAR -- whic...

U.S. State of Georgia and Public Education

In eleven page this paper discusses Georgia's state public education in an outline of school systems with Georgia High School Grad...

Georgia Education Demographic Analysis

In this paper consisting of six pages Georgia demographic data based on 1990 census information is applied to the educational syst...

U.S. Public Education Inequality

In six pages this essay argues that the ailing current U.S. public education system can only be cured by state and federal governm...

U.S. Education, Private Schools and Public Schools

In thirty pages this essay discusses public school system problems, private school alternatives, and charter school issues as they...

Youthful Computer Hackers

In five pages this paper examines the growing practice of young people hacking into computer systems in a consideration of whether...

A Federal Sentencing Guidelines Overview

In ten pages this paper considers the impact of these guidelines on the court system and offers some history as well as case law a...

Overview of the Events in the Criminal Trial Process

This paper consists of six pages and examines the process from arrest until trial in a consideration of the events that unfold in ...

Corrections and Strategic Planning

In ten pages this paper discusses the importance of strategic planning in the prison system with criminology theories also examine...

Probation's Failures and Successes

In five pages this paper examines the U.S. corrections system in a consideration of its history, failures, and successes with stat...

Corrections Officer's Job Description

In ten pages this paper presents an overview of a corrections officer position in a discussion of the prison system, use of firear...

Gideon's Trumpet by Anthony Lewis

In a paper consisting of seven pages Lewis explores the wrongful accusation and imprisonment of a man for a crime he did not commi...

'Characteristics of Total Institutions' by Erving Goffman

This paper consists of four pages and considers Goffman's article in a micro and macro comparison of cultural themes, adaptation a...

Novell NetWare 4.11 and Microsoft Windows NT 4 Integration Tools Compared

In eight pages this report compares the two primary network operating systems. Ten sources are cited in the bibliography....

Overview of Windows 95 by Microsoft

through with everything its makers promised it would do and more. From informational software he can introduce to customers to bus...

MS DOS, UNIX, and Windows NT Compared

In ten pages these three types of operationg systems are compared in terms of their advantages and differences. Ten sources are c...

Analysis of Oracle 8

In five pages the database management system Oracle 8 is examined in an overview of its performance and cost effectiveness. Four ...

CPU Properties and the Performance of Computers

In five pages this paper considers Pentium processors and their differences in a discussion of how computer performance is influen...

Psychological Views of the Insanity Legal Defense

In eight pages the legal system is discussed in an overview of how the insanity defense is used from a psychological point of view...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Microsoft NT 4.0 and Hackers

In seven pages this paper offers a technical consideration of how Microsoft Proxy 2.0 and Microsoft NT 4.0 can be attributed to th...

Workplace and IT

In fifteen pages 3 sections designed to answer student posed questions regarding information technology and the workplace includes...

Discussion of Data Warehousing

computer has expanded our ability to access information to a global level from the comfort of our own home. The quantity and velo...

Halting the Practice of Computer Hacking

In five pages this paper discusses how to stop hackers from gaining access into computer systems. Five sources are cited in the b...