Reference no: EM131238328
Project
Hazard Analysis and Risk Assessment Project
Be sure to read all of the instructions. There are two documents to be prepared and submitted.
1. Following steps 1-11 of the Hazard Analysis and Risk Assessment Guide in the course textbook (pp. 171-174), develop a risk assessment for a serious workplace hazard with which you are familiar, or use Addendum D to Chapter 11 (pp. 202-206) to help you select a hazard. Evaluate the hazard and its associated risks, and then complete the Hazard Analysis and Risk Analysis Project form (click here to access this form). To complete the Initial Risk Assessment and Post Control Risk Assessment sections, use the following codes based on the Risk Assessment Matrix in Table 11.10 (p.180) of the textbook:
SEVERITY:
1 - Catastrophic
2 - Critical
3 - Marginal
4 - Negligible
PROBABILITY (Likelihood of Occurrence):
A - Frequent
B - Probable
C - Occasional
D - Remote
E - Improbable
RISK CODE:
H - High
S - Serious
M - Medium
L - Low
All sections of the form must be completed. Note that the "Post Control Risk Assessment Measures" section reflects the risk assessment AFTER applying the additional control measures.
2. In a separate document of at least 500 words, explain the reasoning behind how you filled out each section of the form. Use references as needed to support the discussion. Also need references.
Attachment:- Attachments.rar
What are the main applications of rom
: To store 10 bit of information how many transistors are required in case of Static MOS RAM and Dynamic MOS RAM? What control signals are used in the memory device? What are the main applications of ROM?
|
Examine the critical role of commercial insurance companies
: Examine the critical role of commercial insurance companies in the financing of long-term services. Take a position as to whether or not insurance companies' variations in the cost of premiums are justifiable. If justifiable, give at least one (1)..
|
What are the advantages of cdrom
: How many pins are required to design 8-KB bit organized memory? How many pins are required to design 8-KB byte organized memory? What are the advantages of CDROM?
|
Who were the leading personalities in labor relations
: Who were the leading personalities in labor relations? Which ones contributed to the definition of labor relations in the United States? Who were the most effective union leaders during the 1930s and 1940s? What are your criteria for effectivenes..
|
Complete the initial risk assessment and post control risk
: To complete the Initial Risk Assessment and Post Control Risk Assessment sections, use the following codes based on the Risk Assessment Matrix in Table 11.10 (p.180) of the textbook:
|
What do you mean by cyclic redundancy checking
: Which error detection method consists of just one redundant bit per data unit? In cyclic redundancy checking, what is CRC? In cyclic redundancy checking, the divisor is the CRC.
|
Can personality be assessed
: The Performance Consultant's Fieldbook provides important details for effectively measuring results after an intervention. Imagine that you are coaching a new I-O consultant on the importance of measuring results. Provide three specific tips to en..
|
To guarantee the detection of up to 5 errors in all cases
: To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block code must be. In a linear block code, the of any two valid code words creates another valid codeword.
|
What is the role of the variable resistor and capacitor
: What is the role of the variable resistor and capacitor? The 555 timer has a DIL layout. What does DIL mean? How many types of multi vibrator circuits are there? Define Monostable Multivibrator.
|