Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Problem Solving Theory's

Lab 1.

Using Evaluation Techniques

Assessment Preparation Checklist:
• Complete assigned readings from Fogler & LeBlanc, Chapter 9, page 209.
• Complete review of lesson presentation prior to attempting assignment.
Refer to the exercise 9.1, Chapter 9, page 205 of the textbook.

GS1140: Week 11 Using Evaluation Techniques

Page 1

See Exercise 9.1, Chapter 9, page 205 of your textbook.

Nick is chief engineer in a phosphate fertilizer plant that generates more than 1 million tons per year of gypsum, a waste collected in a nearby pile. Over many years, the pile has grown into a mountain containing 40 million tons of waste. There is little room at the present site for any more waste, so a new gypsum pile is planned. Current environmental regulations call for the elimination of acidic water seepage and groundwater contamination by phosphates and fluorides. Nick's design for the new pile, which has been approved, incorporates the latest technology and complies with U.S. Environmental Protection Agency (EPA) and state regulations. However, he also knows that the old pile-although exempt from the current regulations-presents a major public hazard. When it rains, acidic water seeps through the pile, carrying phosphates into the groundwater. In a confidential report to management, Nick recommends measures that will prevent the seepage from happening. His company turns down his proposal, stating that, at present, no law or regulation demands such remedy. Use the four virtues, four-component model, evaluation checklist, ethics checklist, and five P's to help you analyze the situation. (Problem adapted from Chemical Engineering, p. 40, March 2, 1987.)

Use the four classical virtues, the evaluation checklist, the ethics checklist, and the five Ps to analyze the situation. (Note: There is no need to use the four-component model.

Evaluation Criteria:

Click here to download the grading rubric that will be used to evaluate this assessment.
In addition to the rubric, your submission will be evaluated against the following criteria:

Did you clearly evaluate the scenario using the four classical virtues, the evaluation checklist, the ethics checklist, and the five Ps?
GS1140: Week 11 Using Evaluation Techniques

Page 2

  • Did you submit the response in 150-250 words in a Microsoft Word file?
  • Did you adhere to proper English, grammar, spelling, and punctuation?

Lab 2.
Mistakes are Encouraged

Sometimes, students think that their job is to report the "right" answers to the "experts" - i.e. their instructors. However, learning is more than just reporting the right responses. The adage "Live and learn" implies that there is value in learning from mistakes.

• Before reading the article referenced below, think about a time you made a mistake. Write a paragraph of at least 150 words briefly describing the mistake.
Click here to view the complete lab.
Lab 2.

Mistakes are Encouraged

Sometimes, students think that their job is to report the "right" answers to the "experts" - i.e. their instructors. However, learning is more than just reporting the right responses. The adage "Live and learn" implies that there is value in learning from mistakes.

1. Before reading the article referenced below, think about a time you made a mistake. Write a paragraph of at least 150 words briefly describing the mistake.

2. Read the article Embrace Mistakes So Your Organization Can Thrive. Lindquist, Marsha. American Salesman (0003-0902) 20070501. Vol.52,Iss.5;p.24-29. You can access this article through the ITT Tech Virtual Library> Basic Search> Search for Embrace Mistakes So Your Organization Can Thrive.

3. While the article is geared towards businesses, the tips provided are useful to individuals. Pick at least two of the seven tips given in the article and explain how these tips would help you learn from mistakes. Be sure to include the name of the tip in a sentence before you discuss how the tip would help you learn from mistakes.

4. The following questions are adapted from page three of the article. In a paragraph, answer these questions using the mistake you wrote about initially.
a. Why didn't you get the result you wanted?
b. If you encountered the same situation or problem again, what could you do to achieve the result you want?
c. What lessons did you learn from your mistake?
d. How can you apply these lessons to future situations? In other words, what steps could you take to avoid making this same mistake in the future?
e. Finally, in a paragraph, discuss how making mistakes can enhance creative thinking in problem solving. Why is it important to think creatively? The root word of creative is create, which means to evolve from thought or imagination. In other words, the idea here is to look at problems from different perspectives. What technique have you learned in this course that helps you think creatively? How will you use this technique in the future?

GS1140: Week 11 Evaluation of Solution Lab 11.2 Mistakes are Encourage

From Book Strategies for Creative Problem Solving (Custom 1st ed)

APA Format and you titles that are given from lab

Computer structure and Logic

Participation and Discussion Form

Security Basics
What steps can be taken to overcome security issues in a computer, such as a virus threat or malicious e-mail attachments? In your response, address the following questions:

• Why should users be concerned about the security of their data and computer systems?
• What are the typical ways of user authentication while accessing a computer?
• How can you secure your wireless network?

1 paragraph or 2 that's all

Assessment Preparation Checklist:
To prepare for this assessment:

• Read Chapter 7, pp. 237-271, from your textbook Computer Structure and Logic.
This chapter discusses the purpose of the basic input/output system (BIOS) and how it relates to power-on self-test (POST) as the computer attempts to start.

• Access Ebrary via the ITT Tech Virtual Library > Browse > Browse by Format > Books and read Chapter 12, pp. 147-155, from the textbook Computer Hardware Course.

This chapter explains how a computer starts with the help of the BIOS and how the POST portion of the BIOS enables the BIOS to find and report errors in the computer hardware.

Go through this module's lesson that discusses the BIOS, POST, and error messages and codes that may appear during start-up of a computer.

1. Understanding the BIOS and POST
Research your textbook, ITT Tech Virtual Library, and the Internet to answer the following questions:

• Why is it necessary to use ROM for the BIOS and not RAM?
• How do the POST beep codes make troubleshooting a computer start-up problem easier?
• Why is the hard disk busy when performing a cold boot?
• How can you recover your system from a failed BIOS update?

Submission Requirements:
• Submit your response in a one- to two-page Microsoft Word document.
• Use font: Arial, 12-point, and double spacing.

Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting.

Assessment Preparation Checklist:

To prepare for this assessment:
• Read Chapter 7, pp. 237-271, and Chapter 9, pp. 331-360, from your textbook Computer Structure and Logic.
In Chapter 7, you will learn how the POST portion of the BIOS enables the BIOS to find and report errors in the computer's hardware. Chapter 9 discusses how computers can be protected by against security breaches, identity theft, and lost hardware.

• Access Ebrary via the ITT Tech Virtual Library > Browse > Browse by Format > Books and read Chapter 10, pp. 99-107 and 120-127, from the textbook Computer Hardware Course.

Go through this module's lesson that covers the BIOS, POST, and the basic security practices for your computer

Lab 1

Understanding BIOS, POST, and Security Basics

In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans.

NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics

In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans.
Required Setup and Tools
A computer with access to the Internet
Recommended Procedures
Task 1: Understanding BIOS and POST

A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence?

Task 2: Basic Security
Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.

Submission Requirements:
Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting.

Your report should be two- to four-page long. Include a header containing your name and the date on each page. Name the document NT1110_StudentName_Module5_Lab.doc, replacing StudentName with your name. Use Arial 12-point font and double-line spacing.

In addition to the rubric, your submission will be evaluated against the following criteria:
• Did you answer all questions?
• Did you clearly explain the importance to think creatively?
• Did you submit the response in 400-500 words in a Microsoft Word document?
• Did you adhere to standard English grammar, spelling, and punctuation?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91622099
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Please explain to me the concept of policing with emphasis

Please explain to me the concept of policing with emphasis on the "leaky bucket" mechanism.

Stepscreate a java project in eclipse called lab 2 next

Steps: Create a Java project in Eclipse, called Lab 2. Next create a java class called Dashboard. It should extend javafx.application.Application. This will be the main GUI for your lab, and it should use a VBox as the r ...

You run a small pizza shop named pizza hat initially you

You run a small pizza shop named Pizza Hat. Initially you sold pizzas for $8 and every week you sold around 3000 pizzas. Each pizza costs you $3 to make. One day you decided to over discounts to customers to see if you c ...

A cartel is branch of an oligopoly there are still a

A cartel is branch of an oligopoly. There are still a handful of large firms and many smaller firms. For instance, the diamond industry and the petroleum industries are examples are oligopolies. However, the main differe ...

You really need help with this assignment with step by step

You really need help with this assignment with step by step instructions on how to complete it. Using SQL Developer and SQL Plus 1. Create role customer_entry 2. Grant role customer_entry permission to update OE.CUSTOMER ...

Assume a normal distribution for n 300 how many cases

Assume a normal distribution for N = 300. How many cases would one expect to find between +1 and -1 standard deviations around the mean?

The systems development lifecycle sdlc provides a

The systems development lifecycle (SDLC) provides a standardized process for all phases of any system development. What are the different phases involved in SDLC give a brief note on all its phases in your own words. (no ...

Question suppose that in responding to interrupts from an

Question : Suppose that in responding to interrupts from an I/O device the processor consumes 1000 cycles in performing the context switch required to transfer control to the interrupt handler. Servicing the device reque ...

Why regulated industries should be required to follow

Why regulated industries should be required to follow security standards. Provide 2 examples of industries that would fall under this category.

Explain why some organizations may not place enough

Explain why some organizations may not place enough importance on disaster recovery. What might happen to these organizations in the event of an actual disaster?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As