SEARCH RESULTS

YOU WERE LOOKING FOR :Women in Computers

Essays 1081 - 1110

Medieval Women's Role in The Romance of Tristan and Beowulf

In five pages this paper examines the role of women in Medieval society in a literary analysis of The Romance of Tristan and Beowu...

Women's Subservience in F. Scott Fitzgerald's The Great Gatsby, Henrik Ibsen's A Doll's House, and William Shakespeare's Othello

In six pages this report compares women's subservient status in each of these literary works. Eight sources are cited in the bibl...

Former Yugoslavia and Globalisation's Political Influence

In sixteen pages this paper discusses how globalisation has influenced the former Yugoslavia with changing women's roles the prima...

Growing a Women's National Basketball League Brand

womens basketball shows real promise of arriving at WNBA president Ackermans goals for the league. The promise is not resident on...

Book Review of Joan D. Chittister's Heart of Flesh

In ten pages this paper reviews this text in its consideration of women's ostracism from Western theology and public policy with s...

Contemporary Women and Women in the Plays of William Shakespeare

In three pages this paper discusses contemporary women in comparison to how women were presented in the plays of William Shakespea...

Women's Issues and Racism

In 6 pages this paper considers the Reconstruction era until the 1930s in a discussion of how changes affected women's issues and ...

The Bible and Women's Roles

In fifteen pages this paper examines women's roles in the Bible. Thirteen sources are cited in the bibliography....

Gone with the Wind, Patriarchy, and Gender Roles of the Antebellum South

also of the survivors of the overall destruction of this exclusive caste system. Shortly after the initial publication of Gon...

Post 1970's Roles of Women

Resnick Sandler, while examining a presidential footnote on a Civil Rights amendment from 1968, discovered that President Johnson ...

Customs and Culture Associated with the Creek Indians

In twelve pages this paper discusses the detrimental cultural impact on the Creek Indians following European contact in a consider...

Medieval Marriage and Women's Roles in 'The Clerk's Tale' by Geoffrey Chaucer

In eight pages this character analysis of Griselda in 'The Clerk's Tale' by Geoffrey Chaucer discusses how she reflects Medieval p...

Victorian Age Hypocrisy and Advice

In five pages the hypocrisy of advice and attitudes in America during the Victorian era pertaining to women's sexuality is discuss...

Women's Fashions and the Impact of the Forties

In five pages this research paper discusses how politics and events of the 1940s influenced and changed fashion for women with the...

Literature and Women's Social Status

close to his sister, one has to contemplate the possibility of incest which adds to the seductiveness that many authors attribute ...

Women's Socialization and Aggression

In a paper consisting of eight pages the myth that females are less aggressive is considered through socialization that reveals ho...

The Obvious Choice of Al Gore for President in 2000

In five pages this paper supports Al Gore's presidential candidacy over Republican opponent George W. Bush by contrasting politica...

The Meaning of the Oppression of Women

This 6 page paper examines two articles by Marilyn Frye and Elizabeth Spelman, who write about the oppression of women and what it...

Maternally Assessing a Pregnant Woman

This paper consisting of five pages considers such relevant pregnancy issues as breastfeeding, expectations, medications, physical...

Women's Role and the Concept of Marriage

In eight pages this paper examines writings of St. Jerome, St. Augustine, and others in a consideration of the marriage concept an...

Thai Women in the Global Labor Force by Mary Beth Mills

In five pages this paper summarizes and analyzes M.B. Mills' text on rural Bangkok women that examines similarities between them a...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...

High-Tech Crime: How The Criminal Justice System Has Had To Change Its Approach

equipped to penetrate any computer system with the intent to take, destroy or manipulate the information found upon that system; i...

System Development Life Cycle: Compare/Contrast

a specific definition and set of goals for the project" (Ntuen, 1991, p. 33). II. SYSTEM DEVELOPMENT LIFE CYCLE MODELS Ever sinc...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

Internet Usage by Two Companies - Gateway 2000 and DLJ Direct

taking itself too seriously and has collectively remembered to have fun in business as well as build profitability. All com...

Active Directory Plan

and groups within the Active Directory are based on the types of information being stored and retrieved (Hewlitt Packard, 2007). ...

Recruitment in the Airline Industry

need to have a great deal of specific knowledge (Bureau of Labor Statistics, 2007). Some pilots are recruited from the military fo...

Malicious Codes

an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the...

Memory, Cognition & Media Questions

it seems reasonable to predict that scientists will soon understand much more about the causes of these diseases and also how to p...