Premium Essay

Pm3110 Final Project

Submitted By
Words 770
Pages 4
Part 1: Why were you initially interested in this “element?”

I was initially interested in a pond because I thought it could be not only be an aesthetically pleasing addition to the site, but also provide educational and environmental advantages to the Falmouth schools community. A pond, for example could be used in science classes to help students learn about the PH of water, or about the life cycle of a frog. After the pond was established I also thought that it could be utilized to grow aquatic vegetation such as water mint, rainbow parsley, etc. Overall, I thought the pond could be a fantastic addition to the site, as it provides immense opportunities for food, education, and the environment.

Part 2: Summarize your research. Cite sources.

For my research for the construction of a pond, I found that it’s …show more content…
A pond must be located downhill, where it would be able to collect water. To build a pond, there are two options. The first option is a dammed pond, which is best suited in wet hollow locations between two banks. The second option is a dug-out pond, which is best suited for flat terrain, with a nearby stream. However, like Tim Matson, I believe we should construct a pond that combines both a dug -out and dammed pond. As of now that I know of, the soil type in the site is unknown. A pond must be sited in an area where the soil is rich, not sandy and full of gravel. However, this can be fixed with several different options such as the addition of clay sheets, bentonite sealers, or chemical dispersing agents. “The water-holding capacity of less-than-perfect soil can easily be increased by compacting the soil with heavy equipment, adding clay blankets, using sealers such as bentonite (a fine-textured colloidal clay) or using chemical dispersing agents that include sodium chloride (table salt) and soda ash.

Similar Documents

Premium Essay

Test

...the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10