Premium Essay

Nt1330 Unit 3 Lab Report

Submitted By
Words 619
Pages 3
A mouse factory produces seven parts for computers’ mouse using an injection-molding machine; the purpose of this report is to maximize the density of the parts made, as well as to described using statistical tools the results obtained with the initial settings of the machines.. In the injection molding department there are a total of six machines that produce parts on a daily basis, some of these machines can produce up to eight or 16 part at a time and others can produce two different parts in the same machine.

The initial settings of the machines are the following:

Mold Temperature Injection Velocity Mold Pressure Back Pressure Cooling Time
135.0 2.95 657.5 85.0 42.65

Graphical Analysis:

The plot of the density shows that the data is not symmetric since the more of the data lies above 2.4 lb./ft2. The first quartile is above 2.3 lb./ft2.and the third quartile is below 2.5 lb./ft2.with a median of 2.4 lb./ft2. …show more content…
Figure 2 Histogram of Density
Using Minitab the data can be graph to check for the distribution, it was obtained that the data with a sample of 35 results is normally distributed since all of its results lies inside the bounds. The graph shows that it has a 95% confidence and a p value of .944.

Figure 3 Probability plot of Density

Descriptive statistics:

Using Minitab it was possible to obtained a descriptive statistics of the sample with 35 results. The results of Minitab shows that using a sample of 35 gives a mean of 2.4 lb./ft2, and a standard deviation of .08393, which it means that it will deviated less than .084 from the mean. The first quartile of the data is at 2.33 and the third quartile is at

Similar Documents

Premium Essay

Nt1330 Unit 3 Lab Report

...Lab Report 1 Learn some foundational computer skills, shortcuts, and basic terminology. 1. What are Keyboard shortcuts? Why would we use them? What is the Windows AutoHotkey? What do the following shortcuts do? Keyboard shortcuts are simpler ways to command your computer. We use shortcuts to get around the computer in a much faster way. Windows AutoHotkeys are custom shortcuts that comes for Windows Microsoft. Control + C - Copy Control + V - Paste Control + X - Cut Control + A - Bold Alt + Tab - Switch Between running programs Control + Esc - Start Menu Windows + F - Find files & Folders Windows - Start menu 2. Print Screen is a shortcut that takes a screen shot of what is being displayed. We use when we are going to print what ever is...

Words: 857 - Pages: 4

Premium Essay

Nt1330 Unit 3 Lab Report Sample

...of years, scientist have introduced new technologies and assessed an extensive variety of salivary biomarkers that will soon make the utilization of saliva possible in everyday clinical practice. These current advances extended the salivary diagnostic approach from the oral diseases to the whole physiological system. There are several currently available or recently rising technologies based on salivary diagnostics and development of microfluidics or micro (MEMS) and nanoelectromechanical (NEMS) systems. These devices are made of mechanical, electrical, and functional components such as sensors, actuators, and microelectronics that are arranged using the techniques of microfabrication. This new approach of point-of-care diagnostics for ‘‘lab-on a-chip’’ provides a new possibility of point-of-care diagnostics, because it simultaneously enables the detection of multiple biomarkers, and immediate diagnosis of many diseases. It tries to incorporate and automate all the complexities of a laboratory procedure into a device of the size of a computer chip. There is a need for further studies regarding the value of information and consistency of results obtained from saliva, both of which are crucial steps before any of the saliva sensors can be used clinically and commercially as a sole diagnostic tool, especially in specimens of noninvasive nature are encouraged and will be highly valuable in the development of minimally invasive biosensors for health application Discrepancy in the results...

Words: 1030 - Pages: 5

Premium Essay

Nt1330 Unit 3 Lab Report Essay

...Taskhost-exe file is used as a host by Windows for all the DLL based services which are run. The process concerning the aforementioned file is looked upon as a generic one used for the sole purpose of loading other entities. In case, of Taskhost.exe $(arg0) specific issues, its sheer ability to open multiple instances of itself gets affected in a great way. Remember, a slight infection to the aforementioned version of dossier might cause issues specific to CPU and excessive memory usage. Identical processes running Taskhost.exe 2 running processes system error is quite common and in all such cases you shall find that there are two identical executable file versions running. The bothering aspect with a similar type of fault is that, in spite, of scanning the flash drive and movies with MSE nothing could really be detected. The thought as to whether it is normal to have more than a single executable file version is the aspect which bothers the gamut of all system users. Further, most seem to be confused if the particular version of the dossier enjoys a normal command line. Upload related issues Issues specific to Taskhost.exe bsod in windows 8 are common and initially when this happens you might face trouble with some of the internet pages being unable to load properly. It is after the last blue screen that explorer.exe faces a fault, starts all over again, and displays the identical message. If such a situation happens, the only available option is to manually stop the same...

Words: 509 - Pages: 3

Premium Essay

Test

...Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure...

Words: 2305 - Pages: 10

Premium Essay

Unknown

...Student Name: | Tiffany Walker | Student Name: | Tiffany Walker | Week 1 – Unit 1 NT1330 – Client-Server Networking II Windows Server 2008 Network Services PUBLISHED: June, 2014 Instructor: Scott McCombs | Phone: 440-376-8836 | Email: smccombs.itt.tech@gmail.com | Office Hours: By appointment only | Student Name: ____________________________ PUBLISHED: June, 2014 Instructor: Scott McCombs | Phone: 440-376-8836 | Email: smccombs.itt.tech@gmail.com | Office Hours: By appointment only | Student Name: ____________________________ Build the OSI Model by providing the following information: Layer # | Layer Name | Function | | | | | | | | | | | | | | | | | | | | | | Internet Protocol The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses contained in the packet. IP defines packet structures that encapsulate the data to be delivered and defines the addressing used to identify the source and destination information. IP is a service in the connection-oriented Transmission Control Protocol (TCP) – thus it is often referred to as the TCP/IP Suite. Two versions of IP: IP Version...

Words: 1730 - Pages: 7