SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 91 - 120

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

The U.S. Civil War: Causes and Implications

deal of power because their populations were growing so much. At the same time, Southern States were losing power and they began t...

Class Struggles, and the Value Labor Theory of Karl Marx

workers, meaning wages begin to decline. Also inherent in such a scenario involves promotion of cheap-wage goods (imports) to furt...

Computers Need More Than Just Virus Scanning Protection

a five month period. Over 823 new viruses and worms appeared in just the Third Quarter of 2003. The speed at which...

Publius Case Study

retrieve the document, hed go to a directory kept on "a Publius-affiliated Web site" and then the "network itself would do the wor...

Selection of Management Information Systems

However, it may be more beneficial to use a stand-alone application which is designed specifically for e-mail. These stand-alone ...

Market Demand Forecasting and Marketing Simulation I

worth everything theyve directly paid for it. That was the leading reason for keeping the price lower than it could have be...

ARTICLE REVIEW: MINORITY THREAT AND POLICE BRUTALITY

the Department of Justices Police Brutality Study 1985-1990; Uniform Crime Reports during the same period and the 1990 U.S. Census...

Overview of the 3rd and 4th Generation of Computer Languages

and error prone to program computers, leading to the first "programming crisis", in which the amount of work that might be assigne...

EU and UK Law Applied to Case Study Involving Faulty Goods' Sale and Pregnancy Discrimination

In a paper consisting of twelve pages and three parts EU and UK law applications are examined in terms of territorial arrangements...

Civil War Issues

as part of equally bad legislation; and finally, it led directly to violence such as that which earned "Bleeding Kansas" its dread...

The Civil Rights Act of 1991

it limited the amount of damages a jury could award to an individual (Wikipedia, 2006). It is interesting to note that...

English Civil War and Blaming James I and Charles I

In five pages this essay considers what blame should James and Charles assume for the Civil War in England....

Kenneth Stammp's The Era of Reconstruction 1865-1877

In five pages this paper examines this author's attempts to emphasizes the similarities between the Civil War and the Reconstructi...

Small Business and the Marketing of Computer Services

In seven pages this paper examines small business in an assessment of end to end computer systems services marketing with marketin...

Cold War Civil Rights

work essentially takes the reader through many eras as it relates to what was going on in the nation (lynchings etc.) and in polit...

Civil War in Sierra Leone

had been in power for 10 months and reinstated President Kabbah ("Background Notes"). On July 7, 1999, President Kabbah and RUF ...

Slavery and the Civil War

at the time of the Civil War, as suggested by the fact that it only had one slave by 1840 (MacLeod, 2008). It is perhaps also impo...

MCBRIDE MEMO - A RESPONSE

be accessed from almost any computer. These are run through a web browser or equivalent type of program. Probably the two best-kno...

Anne Moody's Coming of Age in Mississippi

The civil rights movement occupies the primary focus of this book review which consists of two and a half pages....

NonProfessionals, Health Education, and Computers

In five pages the applications of computers in community and academic settings are evaluated as they relate to the health educatio...

Medicine and Computers

In fifteen pages this research paper considers the medical profession's applications of computers in terms of history and various ...

Business World, Computability, and Machine Languages

the work, or the game, or the information beyond the commands and the toolbars. He or she knows the limits of what the computer c...

1950s McCarthyism and 1960s' Civil Rights Movement

In four pages this essay discusses the McCarthyism period and the emergence of the civil rights movement thereafter....

Computer System Life Cycle Development and Testing

are overwhelming (pp. 8). Fournier explains that key steps in a testing process generally include GUI testing, unit testing, int...

Computers and Ordered Message Delivery

adds to the overhead of the messaging system. "The primary cause for message loss is input buffer overflow, which can be avoided ...

Character Development in The Killer Angels by Michael Shaara

It is true that he offers a detailed and thorough account of strategy, weaponry and...

Killer Angels by Michael Shaara'

In five pages the Civil War Battle of Gettysburg as seen through the eyes of author Michael Shaara is examined in this text review...

Across Five Aprils by Irene Hunt

This paper consists of five pages and examines this novel about the Civil War in terms of its subject matter and characterizations...

Aristotle's Perspectives on Genetic Engineering's Ethics

In four pages Aristotle's Nicomachean Ethics are applied to an examination of genetic engineering. Two sources are cited in the b...