Chief engineer in a phosphate fertilizer plant

Assignment Help Basic Computer Science
Reference no: EM13951260

Problem Solving Theory's

Lab 1.

Using Evaluation Techniques

Assessment Preparation Checklist:
• Complete assigned readings from Fogler & LeBlanc, Chapter 9, page 209.
• Complete review of lesson presentation prior to attempting assignment.
Refer to the exercise 9.1, Chapter 9, page 205 of the textbook.

GS1140: Week 11 Using Evaluation Techniques

Page 1

See Exercise 9.1, Chapter 9, page 205 of your textbook.

Nick is chief engineer in a phosphate fertilizer plant that generates more than 1 million tons per year of gypsum, a waste collected in a nearby pile. Over many years, the pile has grown into a mountain containing 40 million tons of waste. There is little room at the present site for any more waste, so a new gypsum pile is planned. Current environmental regulations call for the elimination of acidic water seepage and groundwater contamination by phosphates and fluorides. Nick's design for the new pile, which has been approved, incorporates the latest technology and complies with U.S. Environmental Protection Agency (EPA) and state regulations. However, he also knows that the old pile-although exempt from the current regulations-presents a major public hazard. When it rains, acidic water seeps through the pile, carrying phosphates into the groundwater. In a confidential report to management, Nick recommends measures that will prevent the seepage from happening. His company turns down his proposal, stating that, at present, no law or regulation demands such remedy. Use the four virtues, four-component model, evaluation checklist, ethics checklist, and five P's to help you analyze the situation. (Problem adapted from Chemical Engineering, p. 40, March 2, 1987.)

Use the four classical virtues, the evaluation checklist, the ethics checklist, and the five Ps to analyze the situation. (Note: There is no need to use the four-component model.

Evaluation Criteria:

Click here to download the grading rubric that will be used to evaluate this assessment.
In addition to the rubric, your submission will be evaluated against the following criteria:

Did you clearly evaluate the scenario using the four classical virtues, the evaluation checklist, the ethics checklist, and the five Ps?
GS1140: Week 11 Using Evaluation Techniques

Page 2

  • Did you submit the response in 150-250 words in a Microsoft Word file?
  • Did you adhere to proper English, grammar, spelling, and punctuation?

Lab 2.
Mistakes are Encouraged

Sometimes, students think that their job is to report the "right" answers to the "experts" - i.e. their instructors. However, learning is more than just reporting the right responses. The adage "Live and learn" implies that there is value in learning from mistakes.

• Before reading the article referenced below, think about a time you made a mistake. Write a paragraph of at least 150 words briefly describing the mistake.
Click here to view the complete lab.
Lab 2.

Mistakes are Encouraged

Sometimes, students think that their job is to report the "right" answers to the "experts" - i.e. their instructors. However, learning is more than just reporting the right responses. The adage "Live and learn" implies that there is value in learning from mistakes.

1. Before reading the article referenced below, think about a time you made a mistake. Write a paragraph of at least 150 words briefly describing the mistake.

2. Read the article Embrace Mistakes So Your Organization Can Thrive. Lindquist, Marsha. American Salesman (0003-0902) 20070501. Vol.52,Iss.5;p.24-29. You can access this article through the ITT Tech Virtual Library> Basic Search> Search for Embrace Mistakes So Your Organization Can Thrive.

3. While the article is geared towards businesses, the tips provided are useful to individuals. Pick at least two of the seven tips given in the article and explain how these tips would help you learn from mistakes. Be sure to include the name of the tip in a sentence before you discuss how the tip would help you learn from mistakes.

4. The following questions are adapted from page three of the article. In a paragraph, answer these questions using the mistake you wrote about initially.
a. Why didn't you get the result you wanted?
b. If you encountered the same situation or problem again, what could you do to achieve the result you want?
c. What lessons did you learn from your mistake?
d. How can you apply these lessons to future situations? In other words, what steps could you take to avoid making this same mistake in the future?
e. Finally, in a paragraph, discuss how making mistakes can enhance creative thinking in problem solving. Why is it important to think creatively? The root word of creative is create, which means to evolve from thought or imagination. In other words, the idea here is to look at problems from different perspectives. What technique have you learned in this course that helps you think creatively? How will you use this technique in the future?

GS1140: Week 11 Evaluation of Solution Lab 11.2 Mistakes are Encourage

From Book Strategies for Creative Problem Solving (Custom 1st ed)

APA Format and you titles that are given from lab

Computer structure and Logic

Participation and Discussion Form

Security Basics
What steps can be taken to overcome security issues in a computer, such as a virus threat or malicious e-mail attachments? In your response, address the following questions:

• Why should users be concerned about the security of their data and computer systems?
• What are the typical ways of user authentication while accessing a computer?
• How can you secure your wireless network?

1 paragraph or 2 that's all

Assessment Preparation Checklist:
To prepare for this assessment:

• Read Chapter 7, pp. 237-271, from your textbook Computer Structure and Logic.
This chapter discusses the purpose of the basic input/output system (BIOS) and how it relates to power-on self-test (POST) as the computer attempts to start.

• Access Ebrary via the ITT Tech Virtual Library > Browse > Browse by Format > Books and read Chapter 12, pp. 147-155, from the textbook Computer Hardware Course.

This chapter explains how a computer starts with the help of the BIOS and how the POST portion of the BIOS enables the BIOS to find and report errors in the computer hardware.

Go through this module's lesson that discusses the BIOS, POST, and error messages and codes that may appear during start-up of a computer.

1. Understanding the BIOS and POST
Research your textbook, ITT Tech Virtual Library, and the Internet to answer the following questions:

• Why is it necessary to use ROM for the BIOS and not RAM?
• How do the POST beep codes make troubleshooting a computer start-up problem easier?
• Why is the hard disk busy when performing a cold boot?
• How can you recover your system from a failed BIOS update?

Submission Requirements:
• Submit your response in a one- to two-page Microsoft Word document.
• Use font: Arial, 12-point, and double spacing.

Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting.

Assessment Preparation Checklist:

To prepare for this assessment:
• Read Chapter 7, pp. 237-271, and Chapter 9, pp. 331-360, from your textbook Computer Structure and Logic.
In Chapter 7, you will learn how the POST portion of the BIOS enables the BIOS to find and report errors in the computer's hardware. Chapter 9 discusses how computers can be protected by against security breaches, identity theft, and lost hardware.

• Access Ebrary via the ITT Tech Virtual Library > Browse > Browse by Format > Books and read Chapter 10, pp. 99-107 and 120-127, from the textbook Computer Hardware Course.

Go through this module's lesson that covers the BIOS, POST, and the basic security practices for your computer

Lab 1

Understanding BIOS, POST, and Security Basics

In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans.

NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics

In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans.
Required Setup and Tools
A computer with access to the Internet
Recommended Procedures
Task 1: Understanding BIOS and POST

A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence?

Task 2: Basic Security
Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.

Submission Requirements:
Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting.

Your report should be two- to four-page long. Include a header containing your name and the date on each page. Name the document NT1110_StudentName_Module5_Lab.doc, replacing StudentName with your name. Use Arial 12-point font and double-line spacing.

In addition to the rubric, your submission will be evaluated against the following criteria:
• Did you answer all questions?
• Did you clearly explain the importance to think creatively?
• Did you submit the response in 400-500 words in a Microsoft Word document?
• Did you adhere to standard English grammar, spelling, and punctuation?

Reference no: EM13951260

Questions Cloud

Implications of a strategy of heavy : Discuss the implications of a strategy of heavy use of overtime in retailing, as well as in other fields such as manufacturing hospitals and airlines. How does this U.S. approach compare to that in other countries
Identify differences and similarities of the business models : What are they offering to their buyers or consumers via the Web (e.g., product, service, information, recreation)?
Give a critical evaluation of each of the following passages : The preferred food of red-tailed boas consists of small mammals. Coyolxauhqui is a red-tailed boa, so she must eat mice.
Find the numerical value of the interpolation factor : Find the numerical value of the following factors by (a) interpolation and (b) using the appropriate formula. Determine the amount of cash flow in year 8 and  determine the value of n for the gradient.
Chief engineer in a phosphate fertilizer plant : Nick is chief engineer in a phosphate fertilizer plant that generates more than 1 million tons per year of gypsum, a waste collected in a nearby pile. Over many years, the pile has grown into a mountain containing 40 million tons of waste. There i..
Calculate the actual feed rate : Calculate the feed rate F and the product rate - Evaporation in Double-Effect Reverse-Feed Evaporators.
Utc ace program improvesits employees : In what ways do you think UTC's ACE program improvesits employees' ability to adapt to changing contingencies?How easy would it be for other companies to implement achange program similar to UTC's?
What can you say about the results of the hypothesis test : What can you say about the results of the hypothesis test: H0: mean = 5 vs. H1: mean not equal to 5 tested using the same sample at the same level of significance? reject H0 in the second test and do not reject H0 in the second test
Weighted-average unit contribution margin : Model B22 sells for $100 and has variable costs of $70. Model C124 sells for $400 and has variable costs of $300. The sales mix of the three models is: A12, 60%; B22, 25%; and C124, 15%. What is the weighted-average unit contribution margin?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Investigate project management body of knowledge

Investigate Project Management Body of Knowledge (PMBoK). Write a report on one of knowledge areas. Describe the task of understanding potential threats

  Operator overloading

Operator Overloading

  Provide permission to get financial amounts

System to have employees register and provide permission to get financial amounts from dental insurance and retirement companies.

  Flowchart, psuedocode and desk check

Flowchart, psuedocode and desk check

  What is the purpose of modular design

what's the purpose of modular design ?? why do we break dows circuits into modules and design them independently ?? good answer please

  What events need to be added to the event table

What events need to be added to the event table? Complete the event table entries for these additional events. What activities or use cases for existing events might be changed because of a charge account and payment plan? Explain.

  Demand-paged environment

Which of the following programming techniques and data structures (in a user-level program) are good for a demand-paged environment, and which are bad? Explain your answer.

  What does the sql query

What does the following SQL query do? sqlStr = "SELECT* FROM computers WHERE Speed >2 AND Memory > 4 ORDER BY OS-Type"

  All the aggregation relationships

Give an example of aggregation. Your example should include at least one aggregate object and three component objects. Specify the multiplicities at each end of all the aggregation relationships

  Simplify the functional expressions using boolean algebra

The Apostrophes represent a line over the letter that it is after. The last set of parenthesis has a line over it as well as the x and y in them.

  Finding vertices of polygon stored in array-clockwise order

Assume that n ≥ 3 and the n vertices of P are stored in an array in clockwise order around P. Describe how to determine efficiently whether exactly one of the points q and r falls within P. Analyze the time for your algorithm.

  Systems administrator of radius implementation

Suppose you are a Systems Administrator, and you have been tasked with implementing RADIUS to support authentication, authorization, and accounting in your organizations Windows network environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd