Chief engineer in a phosphate fertilizer plant

Assignment Help Basic Computer Science
Reference no: EM13951260

Problem Solving Theory's

Lab 1.

Using Evaluation Techniques

Assessment Preparation Checklist:
• Complete assigned readings from Fogler & LeBlanc, Chapter 9, page 209.
• Complete review of lesson presentation prior to attempting assignment.
Refer to the exercise 9.1, Chapter 9, page 205 of the textbook.

GS1140: Week 11 Using Evaluation Techniques

Page 1

See Exercise 9.1, Chapter 9, page 205 of your textbook.

Nick is chief engineer in a phosphate fertilizer plant that generates more than 1 million tons per year of gypsum, a waste collected in a nearby pile. Over many years, the pile has grown into a mountain containing 40 million tons of waste. There is little room at the present site for any more waste, so a new gypsum pile is planned. Current environmental regulations call for the elimination of acidic water seepage and groundwater contamination by phosphates and fluorides. Nick's design for the new pile, which has been approved, incorporates the latest technology and complies with U.S. Environmental Protection Agency (EPA) and state regulations. However, he also knows that the old pile-although exempt from the current regulations-presents a major public hazard. When it rains, acidic water seeps through the pile, carrying phosphates into the groundwater. In a confidential report to management, Nick recommends measures that will prevent the seepage from happening. His company turns down his proposal, stating that, at present, no law or regulation demands such remedy. Use the four virtues, four-component model, evaluation checklist, ethics checklist, and five P's to help you analyze the situation. (Problem adapted from Chemical Engineering, p. 40, March 2, 1987.)

Use the four classical virtues, the evaluation checklist, the ethics checklist, and the five Ps to analyze the situation. (Note: There is no need to use the four-component model.

Evaluation Criteria:

Click here to download the grading rubric that will be used to evaluate this assessment.
In addition to the rubric, your submission will be evaluated against the following criteria:

Did you clearly evaluate the scenario using the four classical virtues, the evaluation checklist, the ethics checklist, and the five Ps?
GS1140: Week 11 Using Evaluation Techniques

Page 2

  • Did you submit the response in 150-250 words in a Microsoft Word file?
  • Did you adhere to proper English, grammar, spelling, and punctuation?

Lab 2.
Mistakes are Encouraged

Sometimes, students think that their job is to report the "right" answers to the "experts" - i.e. their instructors. However, learning is more than just reporting the right responses. The adage "Live and learn" implies that there is value in learning from mistakes.

• Before reading the article referenced below, think about a time you made a mistake. Write a paragraph of at least 150 words briefly describing the mistake.
Click here to view the complete lab.
Lab 2.

Mistakes are Encouraged

Sometimes, students think that their job is to report the "right" answers to the "experts" - i.e. their instructors. However, learning is more than just reporting the right responses. The adage "Live and learn" implies that there is value in learning from mistakes.

1. Before reading the article referenced below, think about a time you made a mistake. Write a paragraph of at least 150 words briefly describing the mistake.

2. Read the article Embrace Mistakes So Your Organization Can Thrive. Lindquist, Marsha. American Salesman (0003-0902) 20070501. Vol.52,Iss.5;p.24-29. You can access this article through the ITT Tech Virtual Library> Basic Search> Search for Embrace Mistakes So Your Organization Can Thrive.

3. While the article is geared towards businesses, the tips provided are useful to individuals. Pick at least two of the seven tips given in the article and explain how these tips would help you learn from mistakes. Be sure to include the name of the tip in a sentence before you discuss how the tip would help you learn from mistakes.

4. The following questions are adapted from page three of the article. In a paragraph, answer these questions using the mistake you wrote about initially.
a. Why didn't you get the result you wanted?
b. If you encountered the same situation or problem again, what could you do to achieve the result you want?
c. What lessons did you learn from your mistake?
d. How can you apply these lessons to future situations? In other words, what steps could you take to avoid making this same mistake in the future?
e. Finally, in a paragraph, discuss how making mistakes can enhance creative thinking in problem solving. Why is it important to think creatively? The root word of creative is create, which means to evolve from thought or imagination. In other words, the idea here is to look at problems from different perspectives. What technique have you learned in this course that helps you think creatively? How will you use this technique in the future?

GS1140: Week 11 Evaluation of Solution Lab 11.2 Mistakes are Encourage

From Book Strategies for Creative Problem Solving (Custom 1st ed)

APA Format and you titles that are given from lab

Computer structure and Logic

Participation and Discussion Form

Security Basics
What steps can be taken to overcome security issues in a computer, such as a virus threat or malicious e-mail attachments? In your response, address the following questions:

• Why should users be concerned about the security of their data and computer systems?
• What are the typical ways of user authentication while accessing a computer?
• How can you secure your wireless network?

1 paragraph or 2 that's all

Assessment Preparation Checklist:
To prepare for this assessment:

• Read Chapter 7, pp. 237-271, from your textbook Computer Structure and Logic.
This chapter discusses the purpose of the basic input/output system (BIOS) and how it relates to power-on self-test (POST) as the computer attempts to start.

• Access Ebrary via the ITT Tech Virtual Library > Browse > Browse by Format > Books and read Chapter 12, pp. 147-155, from the textbook Computer Hardware Course.

This chapter explains how a computer starts with the help of the BIOS and how the POST portion of the BIOS enables the BIOS to find and report errors in the computer hardware.

Go through this module's lesson that discusses the BIOS, POST, and error messages and codes that may appear during start-up of a computer.

1. Understanding the BIOS and POST
Research your textbook, ITT Tech Virtual Library, and the Internet to answer the following questions:

• Why is it necessary to use ROM for the BIOS and not RAM?
• How do the POST beep codes make troubleshooting a computer start-up problem easier?
• Why is the hard disk busy when performing a cold boot?
• How can you recover your system from a failed BIOS update?

Submission Requirements:
• Submit your response in a one- to two-page Microsoft Word document.
• Use font: Arial, 12-point, and double spacing.

Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting.

Assessment Preparation Checklist:

To prepare for this assessment:
• Read Chapter 7, pp. 237-271, and Chapter 9, pp. 331-360, from your textbook Computer Structure and Logic.
In Chapter 7, you will learn how the POST portion of the BIOS enables the BIOS to find and report errors in the computer's hardware. Chapter 9 discusses how computers can be protected by against security breaches, identity theft, and lost hardware.

• Access Ebrary via the ITT Tech Virtual Library > Browse > Browse by Format > Books and read Chapter 10, pp. 99-107 and 120-127, from the textbook Computer Hardware Course.

Go through this module's lesson that covers the BIOS, POST, and the basic security practices for your computer

Lab 1

Understanding BIOS, POST, and Security Basics

In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans.

NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics

In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans.
Required Setup and Tools
A computer with access to the Internet
Recommended Procedures
Task 1: Understanding BIOS and POST

A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence?

Task 2: Basic Security
Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.

Submission Requirements:
Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting.

Your report should be two- to four-page long. Include a header containing your name and the date on each page. Name the document NT1110_StudentName_Module5_Lab.doc, replacing StudentName with your name. Use Arial 12-point font and double-line spacing.

In addition to the rubric, your submission will be evaluated against the following criteria:
• Did you answer all questions?
• Did you clearly explain the importance to think creatively?
• Did you submit the response in 400-500 words in a Microsoft Word document?
• Did you adhere to standard English grammar, spelling, and punctuation?

Reference no: EM13951260

Questions Cloud

Implications of a strategy of heavy : Discuss the implications of a strategy of heavy use of overtime in retailing, as well as in other fields such as manufacturing hospitals and airlines. How does this U.S. approach compare to that in other countries
Identify differences and similarities of the business models : What are they offering to their buyers or consumers via the Web (e.g., product, service, information, recreation)?
Give a critical evaluation of each of the following passages : The preferred food of red-tailed boas consists of small mammals. Coyolxauhqui is a red-tailed boa, so she must eat mice.
Find the numerical value of the interpolation factor : Find the numerical value of the following factors by (a) interpolation and (b) using the appropriate formula. Determine the amount of cash flow in year 8 and  determine the value of n for the gradient.
Chief engineer in a phosphate fertilizer plant : Nick is chief engineer in a phosphate fertilizer plant that generates more than 1 million tons per year of gypsum, a waste collected in a nearby pile. Over many years, the pile has grown into a mountain containing 40 million tons of waste. There i..
Calculate the actual feed rate : Calculate the feed rate F and the product rate - Evaporation in Double-Effect Reverse-Feed Evaporators.
Utc ace program improvesits employees : In what ways do you think UTC's ACE program improvesits employees' ability to adapt to changing contingencies?How easy would it be for other companies to implement achange program similar to UTC's?
What can you say about the results of the hypothesis test : What can you say about the results of the hypothesis test: H0: mean = 5 vs. H1: mean not equal to 5 tested using the same sample at the same level of significance? reject H0 in the second test and do not reject H0 in the second test
Weighted-average unit contribution margin : Model B22 sells for $100 and has variable costs of $70. Model C124 sells for $400 and has variable costs of $300. The sales mix of the three models is: A12, 60%; B22, 25%; and C124, 15%. What is the weighted-average unit contribution margin?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Distinguish between data and information

Distinguish between data and information

  Implement a program to count the frequencyofwords

Implement a program to count the frequencyofwords in a text file. Thetext file is partitioned intoNsegments. Each segment is processed by a separate thread that outputs the intermediate frequencycount for its segment. The main process waits un..

  Advantages and disadvantages of using software as a service

Discuss the fundamental advantages and disadvantages of using software as a service (SaaS) within organizations. Next, give your opinion as to why SaaS has become a common delivery model for many business applications.

  Why visualization technologies are becoming an important

Determine the main reasons why visualization technologies are becoming an important part of organizational success. Select two (2) such technologies related to information systems and analyze the manner in which the utilization of the selected tec..

  Review the car-caravan analogy

Review the car-caravan analogy

  Bob''s encryption company

Suppose Bob's encryption company produces two machines, A and B, both of this are supposed to be implemen- tations of RSA using the same modulus n = pq for some unknown primes p and q

  One function is use to calculate inflation rate for current

1.One function is use to asks the user to enter the current price of an item and it's one year. 2.One function is use to calculate inflation rate for current year.

  Mick''s wicks makes candles in various sizes

Mick's Wicks makes candles in various sizes. Create a class for the business named Candle that contains data fields for color, height, and price. Create get methods for all three fields

  Key factors limiting use of personalization

Two key factors limiting the use of personalization to more precisely target marketing efforts to individual customers are?

  Data warehouse vs data mining

Please write a  paper for me on Data warehouse vs Data mining (8pages APA format)

  Describe an algorithm for a turing machine

Describe an algorithm for a Turing machine which receives the integer n as input and proceeds to write the description of the n-th Turing machine from the standard enumeration on its tape.

  Define the diffie-hellman key exchange

Define the Diffie-Hellman key exchange? How is this information relevant to you?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd