Preview

405 Segment 1 Collaboration AssignmentDirections If

Powerful Essays
Open Document
Open Document
1484 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
405 Segment 1 Collaboration AssignmentDirections If
4.05 Segment 1 Collaboration Assignment

Directions: If you are unable to attend a live collaboration session, this activity will allow you to get credit for the Segment 1 Collaboration Project. Fill out the RED sections of this activity sheet.

1. Detalied explanation of how smoke detectors and carbon monoxide detectors work.
How do smoke detectors work?
* The battery applies a voltage to the plates, charging one plate positive and the other plate negative. Alpha particles constantly released by the americium knock electrons off of the atoms in the air, ionizing the oxygen and nitrogen atoms in the chamber. The positively-charged oxygen and nitrogen atoms are attracted to the negative plate and the electrons are attracted to the positive plate, generating a small, continuous electric current.

Where should smoke detectors be placed?
* Kitchen away from stoves
* Bedrooms
* Base of stairwells

How do carbon monoxide detectors work?
* Carbon monoxide detectors sound an alarm when they sense a certain amount of carbon monoxide in the air over time.

Where should carbon monoxide detectors be placed?
*Near a sleeping area
* Living/Dining Rooms
*Kitchen

Reliable resource(s) in MLA or APA format (use Easybib.com to generate citations):
"Carbon Monoxide." Carbon Monoxide. N.p., n.d. Web. 30 Nov. 2014. <http://www.nfpa.org/safety-information/for-consumers/fire-and-safety-equipment/carbon-monoxide>.

2. Choose 3 types of fire extinguishers
Water (APW)
Carbon Dioxide (CO2)
Dry Chemical (ABC,BC,DC)

Use reliable sources such as: www.nfpa.org or www.usfa.fema.gov. You may use other sources, but be sure they are reliable (NOT Wikipedia).

Fire extinguisher facts:
Fire extinguisher #1-How does it work? Please explain in 2-3 sentences:
APW stands for "air-pressurized water." APWs are large, silver extinguishers that are filled about two-thirds of the way with ordinary tap water, then pressurized with normal air.

Advantages of fire extinguisher #1:
* They essentially

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In my current job, I market an aftermarket automotive part supplier to repair facilities in southwest Michigan & northern Indiana. My current employer not only supplies to repair facilities, but “Do-It-Yourself” customers well. We have team members inside of each store that have to provide the service our customers need & want. I have to also help train, coach, & develop these team members on the services we have available for repair facilities.…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According, to the Body Mass Index (BMI) this s an indicator that will help people determine a possible change for a longer life span than the average person, which mean they are most lightly to be overweight ,and not at all over weight, even a possibility to be obesity. The intervals come from each of the following numbers 17 to 22, 23 to 24,999, 25to 29.9 and 30. Now you can see 17 and 22 is in between. This is a compound inequality statement but rather than inclusive which mean that the 17< BMI is 30 can also be written as (30, +00). Although, I will calculate my BMI and explain the formula I used to back these number up with as my results. Many times other BMI can be very misleading, this reason I will prove. Now, I come to my final evaluation and the reasons why they “probably are not overweight” now to use the set and interval notations of numbers along with the simple graph chart of…

    • 783 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    1) Using the FASB Accounting Standards Codification (http://aaahq.org/ascLogin.cfm User ID: AAA51167 Password: HcP5b3G) Answer the following question: How should Casino comps be recognized (I do not want the definition of a comp)? State 1) The codification number in the format XXX-XXX-XX-X or Topic-Subtopic-Section-Paragraph…

    • 1593 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    This is our first individual assignment for Programming unit this semester. This assignment was given in December 2013, and submission date is on 10th February 2014.…

    • 1859 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Nowadays, smartphone become comme to everyone ,it become a needs even elderly may have one.Everyday you may see a situation that all people are using thire phone on chating with whatsapp, watching movie or playing some apps busily.I am going to introduce a product which being the trend and it may even transcend Iphone---Samsung galaxy S2 LTE version.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    How comfortable would you be with a government having access to your personal information and data on your phone? A recent incident involving a terrorist attack in San Bernardino, sparked a controversy between Apple and the Federal Bureau of investigation. Following the attack by two individuals committed an act of terror, killing 14 people, the iPhone belonging to one of the terrorists was found. As you may know, your organization is requesting the court for Apple's forced assistance in weakening the encryption on an IPhone related to the San Bernardino terrorist attacks and supposedly has vital information on it. These terrorist attacks were performed by ISIS's lone wolves, named Syed Rizwan Farook, who owns the phone and Tashfeen Malik, his wife. In my opinion, the phone shouldn't be cracked for three reasons. First of all because it undermines America's founding principles and it…

    • 642 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 401 Assignment

    • 865 Words
    • 4 Pages

    INCLUSION: Inclusion is essential and it is important that I take individual students’ needs into account. For example some of my students are disabled so I have to plan lessons accordingly so that they are inclusive of everyone, whilst working towards the required…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NVQ Assignment Unit 401

    • 3030 Words
    • 11 Pages

    The purpose of communication is to achieve common understanding or to create new or better awareness, effective communication demands that you convey your message successfully throughout the organisation. It is essential for the sender to understand the scope, and for the recipient who must understand the purpose, it is the responsibility of the communicator to ensure that the purpose is clearly identified.…

    • 3030 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Contact your instructor to learn about synchronous opportunities that will allow you to interact with your classmates online, in real-time, using Web 2.0 tools. If you choose to participate in the synchronous assignment opportunity, your instructor will explain what you need to submit for grading.…

    • 1201 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

     Online Campus students: Post a 1-paragraph summary in the Main forum that explains how you would lead the class in your cooperative learning activity. Attach your team’s lesson plan to the post.…

    • 525 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Good Essays

    A.) Submit this attachment in A Collaboration Process. Then copy and paste the below information in the student comment area of A Collaboration Product and Betrayal 01, 04, and 05:…

    • 430 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nurses and Labor Unions

    • 3187 Words
    • 13 Pages

    Ashack, Elizabeth A. U. S. Bureau of Labor and Statistics. 23 February 2011. 17 April 2011 <http://www.bls.gov/opub/cwc/pr>.…

    • 3187 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    To do so, the ions are extracted through a number of apertures. Besides ions, photons are produced in the plasma. Photons (minute energy packet of electromagnetic radiation) also pass through the apertures. They are not removed by vacuum and produce high background signal when they reach the detector. To minimize this background, a so-called photon-stop is present. This is a small metal plate placed in the centre of the ion beam, which reflects the photons away from the detector. The positive ions are not stopped by the photon-stop because a positively charged cylinder lens guides them around it.…

    • 1600 Words
    • 7 Pages
    Powerful Essays