Nick is chief engineer in a phosphate fertilizer plant that


Problem Solving Theory's

Lab 1.

Using Evaluation Techniques

Assessment Preparation Checklist:
• Complete assigned readings from Fogler & LeBlanc, Chapter 9, page 209.
• Complete review of lesson presentation prior to attempting assignment.
Refer to the exercise 9.1, Chapter 9, page 205 of the textbook.

GS1140: Week 11 Using Evaluation Techniques

Page 1

See Exercise 9.1, Chapter 9, page 205 of your textbook.

Nick is chief engineer in a phosphate fertilizer plant that generates more than 1 million tons per year of gypsum, a waste collected in a nearby pile. Over many years, the pile has grown into a mountain containing 40 million tons of waste. There is little room at the present site for any more waste, so a new gypsum pile is planned. Current environmental regulations call for the elimination of acidic water seepage and groundwater contamination by phosphates and fluorides. Nick's design for the new pile, which has been approved, incorporates the latest technology and complies with U.S. Environmental Protection Agency (EPA) and state regulations. However, he also knows that the old pile-although exempt from the current regulations-presents a major public hazard. When it rains, acidic water seeps through the pile, carrying phosphates into the groundwater. In a confidential report to management, Nick recommends measures that will prevent the seepage from happening. His company turns down his proposal, stating that, at present, no law or regulation demands such remedy. Use the four virtues, four-component model, evaluation checklist, ethics checklist, and five P's to help you analyze the situation. (Problem adapted from Chemical Engineering, p. 40, March 2, 1987.)

Use the four classical virtues, the evaluation checklist, the ethics checklist, and the five Ps to analyze the situation. (Note: There is no need to use the four-component model.

Evaluation Criteria:

Click here to download the grading rubric that will be used to evaluate this assessment.
In addition to the rubric, your submission will be evaluated against the following criteria:

Did you clearly evaluate the scenario using the four classical virtues, the evaluation checklist, the ethics checklist, and the five Ps?
GS1140: Week 11 Using Evaluation Techniques

Page 2

  • Did you submit the response in 150-250 words in a Microsoft Word file?
  • Did you adhere to proper English, grammar, spelling, and punctuation?

Lab 2.
Mistakes are Encouraged

Sometimes, students think that their job is to report the "right" answers to the "experts" - i.e. their instructors. However, learning is more than just reporting the right responses. The adage "Live and learn" implies that there is value in learning from mistakes.

• Before reading the article referenced below, think about a time you made a mistake. Write a paragraph of at least 150 words briefly describing the mistake.
Click here to view the complete lab.
Lab 2.

Mistakes are Encouraged

Sometimes, students think that their job is to report the "right" answers to the "experts" - i.e. their instructors. However, learning is more than just reporting the right responses. The adage "Live and learn" implies that there is value in learning from mistakes.

1. Before reading the article referenced below, think about a time you made a mistake. Write a paragraph of at least 150 words briefly describing the mistake.

2. Read the article Embrace Mistakes So Your Organization Can Thrive. Lindquist, Marsha. American Salesman (0003-0902) 20070501. Vol.52,Iss.5;p.24-29. You can access this article through the ITT Tech Virtual Library> Basic Search> Search for Embrace Mistakes So Your Organization Can Thrive.

3. While the article is geared towards businesses, the tips provided are useful to individuals. Pick at least two of the seven tips given in the article and explain how these tips would help you learn from mistakes. Be sure to include the name of the tip in a sentence before you discuss how the tip would help you learn from mistakes.

4. The following questions are adapted from page three of the article. In a paragraph, answer these questions using the mistake you wrote about initially.
a. Why didn't you get the result you wanted?
b. If you encountered the same situation or problem again, what could you do to achieve the result you want?
c. What lessons did you learn from your mistake?
d. How can you apply these lessons to future situations? In other words, what steps could you take to avoid making this same mistake in the future?
e. Finally, in a paragraph, discuss how making mistakes can enhance creative thinking in problem solving. Why is it important to think creatively? The root word of creative is create, which means to evolve from thought or imagination. In other words, the idea here is to look at problems from different perspectives. What technique have you learned in this course that helps you think creatively? How will you use this technique in the future?

GS1140: Week 11 Evaluation of Solution Lab 11.2 Mistakes are Encourage

From Book Strategies for Creative Problem Solving (Custom 1st ed)

APA Format and you titles that are given from lab

Computer structure and Logic

Participation and Discussion Form

Security Basics
What steps can be taken to overcome security issues in a computer, such as a virus threat or malicious e-mail attachments? In your response, address the following questions:

• Why should users be concerned about the security of their data and computer systems?
• What are the typical ways of user authentication while accessing a computer?
• How can you secure your wireless network?

1 paragraph or 2 that's all

Assessment Preparation Checklist:
To prepare for this assessment:

• Read Chapter 7, pp. 237-271, from your textbook Computer Structure and Logic.
This chapter discusses the purpose of the basic input/output system (BIOS) and how it relates to power-on self-test (POST) as the computer attempts to start.

• Access Ebrary via the ITT Tech Virtual Library > Browse > Browse by Format > Books and read Chapter 12, pp. 147-155, from the textbook Computer Hardware Course.

This chapter explains how a computer starts with the help of the BIOS and how the POST portion of the BIOS enables the BIOS to find and report errors in the computer hardware.

Go through this module's lesson that discusses the BIOS, POST, and error messages and codes that may appear during start-up of a computer.

1. Understanding the BIOS and POST
Research your textbook, ITT Tech Virtual Library, and the Internet to answer the following questions:

• Why is it necessary to use ROM for the BIOS and not RAM?
• How do the POST beep codes make troubleshooting a computer start-up problem easier?
• Why is the hard disk busy when performing a cold boot?
• How can you recover your system from a failed BIOS update?

Submission Requirements:
• Submit your response in a one- to two-page Microsoft Word document.
• Use font: Arial, 12-point, and double spacing.

Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting.

Assessment Preparation Checklist:

To prepare for this assessment:
• Read Chapter 7, pp. 237-271, and Chapter 9, pp. 331-360, from your textbook Computer Structure and Logic.
In Chapter 7, you will learn how the POST portion of the BIOS enables the BIOS to find and report errors in the computer's hardware. Chapter 9 discusses how computers can be protected by against security breaches, identity theft, and lost hardware.

• Access Ebrary via the ITT Tech Virtual Library > Browse > Browse by Format > Books and read Chapter 10, pp. 99-107 and 120-127, from the textbook Computer Hardware Course.

Go through this module's lesson that covers the BIOS, POST, and the basic security practices for your computer

Lab 1

Understanding BIOS, POST, and Security Basics

In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans.

NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics

In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans.
Required Setup and Tools
A computer with access to the Internet
Recommended Procedures
Task 1: Understanding BIOS and POST

A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence?

Task 2: Basic Security
Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.

Submission Requirements:
Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting.

Your report should be two- to four-page long. Include a header containing your name and the date on each page. Name the document NT1110_StudentName_Module5_Lab.doc, replacing StudentName with your name. Use Arial 12-point font and double-line spacing.

In addition to the rubric, your submission will be evaluated against the following criteria:
• Did you answer all questions?
• Did you clearly explain the importance to think creatively?
• Did you submit the response in 400-500 words in a Microsoft Word document?
• Did you adhere to standard English grammar, spelling, and punctuation?

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Nick is chief engineer in a phosphate fertilizer plant that
Reference No:- TGS01260537

Now Priced at $50 (50% Discount)

Recommended (95%)

Rated (4.7/5)