Deepwater horizon drilling platform exploded

Assignment Help Basic Computer Science
Reference no: EM132914877

Question

Research how BP initially handled the Gulf oil spill when the Deepwater Horizon drilling platform exploded in April 2010. Specifically, note how the company dealt with the clean-up process, those directly impacted by the spill (individuals, businesses, local and state governments), the federal government, and its own shareholders and employees. Compare BP's response to BusinessWeek's five-step model for handling a crisis. Based on this comparison, evaluate BP's crisis response. What did the company do right? What should it have done differently? What ongoing obligations does BP have to the environment as a stakeholder?

Reference no: EM132914877

Questions Cloud

Introduces blockchain advantages in artistic : Introduces blockchain advantages in the artistic content creation and delivery business. Do you create or acquire artistic content?
Web page layout : Explain two reasons why CSS is the preferred method for creating a web page layout. What are ways to improve search engine optimization.
Describe the atomicity-consistency-isolation : Describe the atomicity, consistency, isolation, and durability (ACID) test, including the meaning of each of the four components.
Discuss some of the software engineering : Discuss some of the "Software Engineering " constraints that must be overcome in order build a successful system.
Deepwater horizon drilling platform exploded : Research how BP initially handled the Gulf oil spill when the Deepwater Horizon drilling platform exploded in April 2010.
Walt disney paper : Who is your target audience? What is their age demographic? What is their average socioeconomic status?
Privileged accounts : Privileged accounts, such as Administrator or root, have more privileges than an ordinary user account.
Different types of mental health clientele payer sources : What are two different types of mental health clientele payer sources?" private pay, traditional health insurance, Medicare/Medicaid, managed care, grants" What
Delivering good performance and intended competitive edge : The textbook notes that "For a company's competitive strategy to succeed in delivering good performance and the intended competitive edge over rivals,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Threat indicators and level of network activity

Given the vast amount of known threat indicators and level of network activity today, automation has become a necessity.

  Strengths and weaknesses of carnival lines

1. What are the strengths and weaknesses of Carnival Lines? 2. What are the opportunities and threats facing Carnival Lines?

  Create incident response policy covers development-response

Policy to reduce network down-time if future incidents happen. Create incident response policy which covers development of incident response team, disaster recovery process and business continuity planning.

  Design gui-for-address-book

It also creates and displays a graphical user interface for an address book with a choice menu that lets users choose to which address book they want to add an entry and in which address book the program should search for a number.

  Provide avenue for hackers to abuse the machines

How does this affect the outcome to the novice game player, and how does this provide an avenue for hackers to abuse the machines?

  Politically charged environment

How can an individual be negatively affected by a politically charged environment in which they felt that they literally had no power? Why? Explain, example

  IT resources from disaster

Describe some ways that organization can recover it's IT resources from disaster. What controls should have been in place in order to be able to retrieve data.

  Privacy and the fourth amendment

The United States legal system places the burden of proof on the prosecution. In other words, individuals are presumed innocent until proven guilty in a court of law. This burden of proof requires that law enforcement agencies do not violate a per..

  Power point on mobile security for mobile devices

A power point on Mobile security for mobile devices and how they work. At least 20 slides of information. Include sources and pictures.

  Ethical computer use policy

Identify and discuss three principles that you believe should be included in an ethical computer use policy.

  Print the elements of the array on the screen

2. Write a C program using a pointer for keying six integers by the user. The six values are stored in an array using a pointer. Then print the elements of the array on the screen.

  Define a waveform and name its four characteristics

Define current flow and name its unit. What are the differences between the two types of current?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd