Premium Essay

Sc300 Unit 4 Assignment

In: Science

Submitted By tkelly1072
Words 888
Pages 4
Tammy Kelly
Kaplan University
SC300: Big Ideas in Science: From Methods to Mutation
Unit 4 Assignment
Professor Joshua Ford
May 22, 2012

Unit 4 Assignment: Dangerous and Natural Energy
1) What patterns do you see in the distribution of earthquakes across the continental United States?
The west coast of the US consists of the highest levels of risk by a wide margin, particularly in the south-west (on the pacific tectonic plate fault line). Central Eastern regions bear areas of moderate risk. Northern and South/south-easterly regions bear no significant risk.
2) Locate your home on this map and make a note of the relative risk to you by indicating the color where you live. The USGS also reports on earthquakes around the world. Visit this interactive map to find the latest global earthquake data from the past seven days: http://earthquake.usgs.gov/eqcenter/recenteqsww/
Bridgeport Connecticut - very low probability of occurrence here. This region bears no significant risk to such an event over the next 50 years.
3) What patterns do you see in the distribution of earthquakes around the world?
The majority of earthquakes occur on the left hand side of the pacific plate (the fault line between the pacific/Eurasian and pacific/Australasian plates) the right hand side of this plate relates to the fault line where the majority of earthquakes in the US occur. The westerly coast of the South America also has an abundance of earthquakes on the right hand side of the Nazca tectonic plate. There are other fault lines where a number occur, but the majority is in those areas described above. Mainland Europe, Eurasia (Russia etc.) and Africa are areas of low occurrence.
4) Click on one of the earthquakes on the map and make a note of its magnitude and region.
Magnitude 7.3 - OFFSHORE HONDURAS
5) Would you be willing to live in one of the red areas on the map? Explain.…...

Similar Documents

Premium Essay

Sc300 Unit 4

...Unit 4 Project: The Future of Energy in Illinois Raymond Kupczyk Kaplan University SC300-11: Big Ideas in Science: From Methods to Mutation Professor Smith November 13, 2012 The Future of Energy in Illinois Renewable energy technologies are becoming increasingly important in the world today. With the increase of fossil fuel prices, climate fluctuations, and energy security, renewable energy can be the key factor in eliminating the need for the decreasing resources that we use now that can be damaging the earth. Energy comes from a variety of sources and has many forms. The two main forms of energy are potential and kinetic. Energy that is stored within an object is potential energy, and the energy that does the work is kinetic energy. Primary energy sources can be categorized as nonrenewable or renewable. A nonrenewable energy source comes from the ground and has a limited abundance. Examples of nonrenewable energy sources would be oil, natural gas, coal, and uranium. Renewable energy sources examples would include the sun and wind; they can be renewed naturally in a short time frame. Secondary energy sources are converted from primary sources. Examples of secondary sources include electricity and hydrogen (Energy4me.org). The state of Illinois plays an important role in the transportation of crude oil and natural gas throughout North America. It has three natural gas market centers, a dozen interstate natural gas pipelines, an oil port, and several petroleum and......

Words: 1165 - Pages: 5

Free Essay

Unit 4 Assignment 1

...UNIT 4. Assignment 1. Copper vs Fiber As the name suggests, fibre optic technology uses pulses of light to carry data along strands of glass or plastic. It's the technology of choice for the government's National Broadband Network (NBN), which promises to deliver speeds of at least 100Mbps. When we're talking about 'speed' were actually talking about throughput (or capacity) — the amount of data you can transfer per unit time. And fiber optics can definitely transfer more data at higher throughput over longer distances than copper wire. For example, a local area network using modern copper lines can carry 3000 telephone calls all at once, while a similar system using fiber optics can carry over 31,000. So what gives it the technical edge over copper wires? Traditional copper wires transmit electrical currents, while fiber optic technology sends pulses of light generated by a light emitting diode or laser along optical fibers. In both cases you're detecting changes in energy, and that's how you encode data. With copper wires you're looking at changes in the electromagnetic field, the intensity of that field and perhaps the phase of the wave being sent down a wire. With fiber optics, a transmitter converts electronic information into pulses of light — a pulse equates to a one, while no pulse is zero. When the signal reaches the other end, an optical receiver converts the light signal back into electronic information, the throughput of the data is determined by the frequency......

Words: 396 - Pages: 2

Premium Essay

Unit 4 Assignment

...Assignment Unit 4 Candace House CJ140 March 26, 2013 Assignment Unit 4 There are two legal terms “search” and “seizure”. The legal term search means to examine another's premises to look for evidence of criminal activity. Under the 4th and 14th Amendments it is unconstitutional for law enforcement officers to conduct a search without a "search warrant" issued by a judge or without facts which give the officer "probable cause" to believe evidence of a specific crime is on the premises if there is not enough time to obtain a search warrant. The legal term seizure means the taking by law enforcement officers of potential evidence in a criminal case. The constitutional limitations on seizure are the same as for search. Thus, evidence seized without a search warrant or without "probable cause" to believe a crime has been committed and without time to get a search warrant, cannot be admitted in court, nor can evidence traced through the illegal seizure. Basically what all this means is that when evidence is being collected in a search and seizure it has to be done by protocol otherwise the criminal may walk free. An element that is needed with both the terms search and seizure is probable cause. Without the probable cause then we cannot legally search a person or their property and take any evidence. Search warrants may also be needed, provided that there is enough time to obtain a search warrant. A third element between the two terms is where there is the ability of......

Words: 622 - Pages: 3

Premium Essay

Unit 4 Assignment

...William Clark January 8, 2013 Unit 4 Assignment GB519 Measurement and Decision Making Prof. Stanley Self Special Order Earth Baby Inc. (EBI) recently celebrated its tenth anniversary. The company produces organic baby products for health-conscious parents. These products include food, clothing, and toys. Earth Baby has recently introduced a new line of premium organic baby foods. Extensive research and scientific testing indicate that babies raised on the new line of foods will have substantial health benefits. EBI is able to sell its products at prices higher than competitors’ because of its excellent reputation for superior products. EBI distributes its products through high-end grocery stores, pharmacies, and specialty retail baby stores. Joan Alvarez, the founder and CEO of EBI recently received a proposal from an old business school classmate, Robert Bradley, the vice president of Great Deal Inc (GDI), a large discount retailer. Mr. Bradley proposes a joint venture between his company and EBI, citing the growing demand for organic products and the superior distribution channels of his organization. Under this venture EBI would make some minor modifications to the manufacturing process of some of its best-selling baby foods and the foods would then be packaged and sold by GDI. Under the agreement, EBI would receive $3.10 per jar of baby food and would provide GDI a limited right to advertise......

Words: 792 - Pages: 4

Premium Essay

Sc300 Unit 4

...UNIT 4 Assignment Name Kaplan University SC300 UNIT 4 Assignments What is nonrenewable and renewable resource energy we are using today? Why are we so relying on it? Nonrenewable energies are petroleum products, coals, natural gas and uranium ("Nonrenewableresource.org", 2013). Renewable energies are wind, solar, hydroelectric power, bioenergy, hydrogen and ocean energy ("Renewableenerggyworld.com", 2013). Nonrenewable energy source we used for home and for our vehicle soon it will run out. This kind of every will not going to last forever and it eventually will be gone for the later generation. Nonrenewable energy cause harmful effect to our atmosphere, but there are alternative to use renewable energy source replace the nonrenewable energy to reduce the opposite of what nonrenewable energy caused. The Northwest has several renewable energy options that we are using in this region. One is wind power the west coast; we have plenty of wind patterns coming from the west of the Pacific Ocean ("Wind Map", 2013). The second renewable energy source is solar power on top of the house and producing part of the electricity. Columbia River is producing hydroelectric power for the most part of the Northwest which is the top producer for the Northwest area and Bio energy in process of growing ("Northwest Power and Conservation Council", 2013). Provided with many options to pick from the Northwest offers for both type of energy. I will continue with my current electric......

Words: 542 - Pages: 3

Premium Essay

Unit 4 Assignment 1

...IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?. MBSA command line interface 2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? Security Configuration and Analysis (SCA) 3. Your organization wants to encourage its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? Secunia Security Analyzers 4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer’s settings to its corresponding template to see if......

Words: 271 - Pages: 2

Premium Essay

Unit 4 Assignment 2

...Unit 4 Assignment 2: Acceptable Use Policy Definition NT2580 The following acceptable use policy has been designed for Richman Investments and grants the right for users to gain access to the network of Richman Investments and also requires the user to follow the terms of use set forth for network access. Policy Guidelines * The use of peer to peer file sharing is strictly prohibited. This includes FTP. * Downloading executable programs or software from any websites, known or unknown, is forbidden. * Users are not allowed to redistribute licensed or copyrighted material without receiving consent from the company. * Introduction of malicious programs into networks or onto systems will not be tolerated. * Attempts to gain access to unauthorized company resources or information from internal or external sources will not be tolerated. * Port scanning and data interception on the network is strictly forbidden. * Authorized users shall not have a denial of service or authentication. * Using programs, scripts, commands, or anything else that could interfere with other network users is prohibited. * Sending junk mail to company recipients is prohibited. * Accessing adult content from company resources is forbidden. * Remote connections from systems failing to meet minimum security requirements will not be allowed. * Social media will not be accessible on company resources. *......

Words: 263 - Pages: 2

Premium Essay

Pt1420 Unit 4 Assignment

...Unit 4 Assignment Short Answers 1. Modules allow the programmer to write an operation once, and then be able to execute it any time needed later in the code. 2. Header – The starting point of the module Body- The list of statements that belong to the module 3. The program returns to the memory address just after from where the module was called, and continues to execute 4. A local variable is a variable that is declared from within the module. Only statements in that module can access it. 5. A local variable’s scope begins at the variable’s declaration and ends at the end of the module in which it is declared. 6. Passing an argument by value is a one-way communication from the main program to the module. Changes to the parameter variable inside the module do not affect the argument in the calling part of the program. Passing an argument by reference is a two-way communication from the main program to the module and it allows modification of the variable in the calling program 7. Global variables make a program difficult to debug because any statement in a program file can change the value of a global variable. If you find that the wrong value is being stored in the global variable, you have to track down every statement that accesses it to determine where the bad value is coming from. 1. Module timesTen (integer originalNumber by value) Set a = originalNumber * 10 Input a Display “The answer is “, a 5. Module getNumber (integer......

Words: 483 - Pages: 2

Premium Essay

It 590 Unit 4 Assignment

...Veronica McNutt IT590 Unit 4 Assignment Professor DePriest September 2, 2014 Unit 4 Assignment Essay Questions Scenario 1: You are working as a designer for a university that offers a program in Computer Science. One of the tracts is computer security. One of your colleagues has recommended adding a course addressing network security. In this course, students learn about the history of networks and study network attacks that have caused significant damage to the network that was the subject of the attack. During the second term of this two semester course, the students are taught how to hack into a system, how to create malware (including Trojan horses, viruses, and worms), and how to perpetrate a DOS attack. Choose one or more of the ethical theories discussed in Chapter 2 and combine that with research to determine whether this course should be taught. Be sure to discuss both sides of the issue before taking a specific side. Would it make a difference if this were a graduate or PhD level course instead of an undergraduate level course? Explain. Disadvantages According to research, there are many concerns for offering hands-on training to students in a computer network class. According to Trabelsi & Ibrahim (2013), UAE conducted a survey of the students who used the skills learned in the hands-on DOS attack class. Eighty five percent of students used the skills learned outside the isolated network university lab. These concerns would be the following: that......

Words: 1270 - Pages: 6

Free Essay

Unit 4 Assignment

...Java Unit 4 Assignment This is the class needed for questions 1-11. import java.awt.geom.Rectangle2D; public class MyRectangleContainer { private Rectangle2D.Double containedRectangle; private String nameOfRectangle; public MyRectangleContainer() { containedRectangle = null; } public MyRectangleContainer(Rectangle2D.Double rectanglein, String namein) { containedRectangle = rectanglein; nameOfRectangle = namein; } public void setName(String namein) { nameOfRectangle = namein; } public void setRectangle(Rectangle2D.Double rectanglein) { containedRectangle = rectanglein; } public String getName() { return nameOfRectangle; } public Rectangle2D.Double getRectangle() { return containedRectangle; } } This is the beginning of the program needed for questions 1-11. import java.awt.geom.Rectangle2D; public class Assignment4RectangleProg { public static void main(String[] args) { MyTerminalIO myterminal = new MyTerminalIO(); int x, y, w, h; myterminal.print("Enter an x value: "); x = myterminal.getInt(); myterminal.print("Enter a y value: "); y = myterminal.getInt(); myterminal.print("Enter a w value: "); w = myterminal.getInt(); myterminal.print("Enter an h value: "); h = myterminal.getInt(); /* Your code would go here. */ } } The first 11 questions refer to the code for the MyRectangleContainer class, which......

Words: 1345 - Pages: 6

Free Essay

Unit 4 Assignment Brief

...Assignment Title | Unit 4: Communication in Business | Assessor | Peter Green | Date Issued | 13th January 2015 | Hand in Date | 20th March 2015 | Duration (approx.) | 11 weeks | Qualification suite covered | Level 3: BTEC Diploma in Business | Units covered | Unit 4 | Learning aims and objectives | The aim of this unit is to inform you that the collection and management of business information, and the successful communication of that information throughout a business, is critical for the future prosperity of the organisation.Learning outcomes:1. Understand different types of business information2. Be able to present business information effectively3. Understand the issues and constraints in relation to the use of business information in organisations4. Know how to communicate business information using appropriate methods | Durations (approx) | 60 hours | BackgroundCase studiesScenario | Proper collection of data creates an environment where informed decisions can be taken for the benefit of the business. In order to manage information effectively, there must be good communication systems within the organisation, and staff must possess good verbal and written skills in order to communicate and share information. Throughout this unit, you will be researching how one organisation obtains and provides information verbally, via written context, and with the use of multi-media.You have been given the choice of the following organisations to research in......

Words: 1171 - Pages: 5

Premium Essay

Unit 4 Assignment 1

...1 Running head: UNIT 4 ASSIGNMENT 1 Fundamentals of Finance BUS 3062 Rodtrice Johnson 3/7/16 Unit 4 Assignment 1 Dennis Hart 1. Q: Proficient-level: "How do Cornett, Adair, and Nofsinger define risk in the M: Finance textbook and how is it measured?" (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Describe the risk relationship between stocks, bonds, and T-bills, using the standard deviation of returns as the measure of risk. Answer Proficient-level: Risk is defined as the volatility of an asset’s returns over time. Specifically, the standard deviation of returns is used to measure risk. This computation measures the deviation from the average return. The idea is to use standard deviation, a measure of volatility of past returns to proxy for how variable returns are expected to be in the future. Answer Distinguished-level: Stocks and bonds have very different risk-return characteristics. In general, while stocks are more volatile than bonds, over the long run, stocks are expected to yield higher returns than bonds. By varying the mix of stocks and bonds in a portfolio, an investor can achieve her desired level of risk exposure. However, the level of risk in a portfolio depends not only on the risks of individual assets, but also on the movements of the individual assets in the portfolio. 2. Q: Proficient-level: "What is the source of firm-specific risk? What is the source of market risk?" (Cornett, Adair, & Nofsinger, 2016,......

Words: 1067 - Pages: 5

Premium Essay

Unit 4 Assignment 4

...Unit 4 Assignment 4 Non- electronic communication involves the distribution of a message usually in the form of: Reports, Letters, Flow Charts, Invoices and even Verbal Communication amongst employees. This form of communicating is not as popular as it once was, but it provides businesses with other avenues to communicate instead of electronic communication. Furthermore, different types of communication suit contrasting businesses in addition to, the preference of people involved within a business. What Is Non- Electronic Communication? Electronic and Non- Electronic Sources of Business Information Sources of business information can come in a variety of different forms which include: Newspapers, Websites, Books, Posters, Directories, Databases, Government Statistics and so forth. Business information is basically information gathered of relevance to a business and its environment. Businesses use different sources of information as a way of understanding the markets they entering into, their competitors and how the company can grow. Moreover, different sources of business information serve contrasting purposes. Firstly, electronic communication involves the use of technology to distribute a particular message across. Examples of electronic communication include: the use of Mobile Devices, Video conferencing, Twitter, Facebook and other Social Media Websites, as well as, Electronic Mail. This is an effective way of communicating in a business environment as it is cost......

Words: 665 - Pages: 3

Premium Essay

Sc300 Unit 6 Assignment

...trade.” The potential problems with global marketing are not limited to developing nations. Some workers in advanced economies, particularly those in unskilled jobs and belonging to labor unions, feel that they are being increasingly displaced by low-wage competition in developing countries. Some of these workers are unable to make the transition to skilled jobs and service-oriented industries. The phrase “think globally, act locally” means that we should think about the health of our planet and to take actions in our own communities and cities. We should protect our communities and cities by supporting our local consumers and businesses instead of buying globally, which causes harm to our planet overall. Before conducting this assignment, I never put any thought into the global market and I think that my research on global market will kind of change now on the way I choose and purchase my goods from stores. Most of the goods I choose can be consumed locally in my community and in the city I live in. I am not more informed and will be mindful of the harm that importing these goods can have on the environment as a whole. I believe more people should protect our communities and habitats that we live in and think more locally than globally. References http://www.madehow.com/Volume-5/Chicken.html http://www.ultimatecitrus.com/Story/oj_story.html http://www.infed.org/biblio/globalization.htm http://www.afn.org/~poultry/egghen.htm...

Words: 859 - Pages: 4

Premium Essay

Danger Below Unit 4 Project Sc300

...Running head: Danger Below Danger Below 1 Danger Below: Earthquake Sheleana Hornback August 26, 2012 Kaplan University SC300 Danger Below 2 One of the most frightening and dangerous natural disasters known to man are earthquakes. Why is the threat of an earthquake so frightening? When dealing with other natural disasters like tornados, hurricanes, and flooding man is able to predict and track them: therefore, providing ample warning to people in the affected area. Earthquakes on the other hand are nearly impossible to predict because of how they occur. To understand how an earthquake occurs we must first look at how the earth is made. The earth is composed of four major layers: the inner core, outer core, mantle, and crust. The crust and the top of the mantle make a thin skin covering the surface of the earth. This skin is multiple pieces and is constantly moving, sliding past each other, and bumping into each other. These pieces are called tectonic plates and the edges of these plates are called the plate boundaries. Most earthquakes occur on these faults. The edges of the tectonic plates are rough and they become stuck on the one another while the rest of the plate keeps moving. When the tectonic plate moves far enough the edges unstick and the stored energy is released. The energy radiates outward from the fault in all directions in the form of seismic waves. The seismic waves......

Words: 755 - Pages: 4