How much time would be required for a setup

Assignment Help Computer Engineering
Reference no: EM132121115

Reduce Setup Time

Hammond Inc. has analyzed the setup time on its computer-controlled lathe. The setup requires changing the type of fixture that holds a part. The average setup time has been 135 minutes, consisting of the following steps:

Turn off machine and remove fixture from lathe 10 minutes

Go to tool room with fixture 15

Record replacement of fixture to tool room 18

Return to lathe 20

Clean lathe 15

Return to tool room 20

Record withdrawal of new fixture from tool room 12

Return to lathe 15

Install new fixture and turn on machine 10

Total setup time 135 minutes .

B- Which of the following are the ways to improve Hammond Inc.'s setup time?

a.limit the trips to the tool room to one round trip, rather than two.

b.change the location of the fixtures to reduce lathe setup time.

c.eliminate the tool room and instead locate the tools in a visible location near the lathe.

d.change the entire lathe room layout, so that fewer steps are required to turn the lathe on and off, as well as clean the lathe and change fixtures for the lathe.

e.All of these are ways to improve setup time.

E (chosen and correct)

How much time would be required for a setup, using your suggestion in (b)?

Reference no: EM132121115

Questions Cloud

Identify organisational information requirements : MN405 - Data model development and implementation - Model organisational information requirements using conceptual data modelling techniques
Explain how you expect this phase to impact : Discuss any "ah-hah" or breakthrough moments you experienced during this phase of the project.
Why sometime there are two recursion trees shown : Why sometime there are 2 recursion trees shown. why sometimes the work per level decreases from level to level, and it is constant in each level.
Write a solution to the red or blue computation : In the first half step of an iteration, any red color can move right one cell if the cell to the right is unoccupied (white);
How much time would be required for a setup : Hammond Inc. has analyzed the setup time on its computer-controlled lathe. The setup requires changing the type of fixture that holds a part.
What sorts of information would you expect to obtain : What sorts of information would you expect to obtain using each source? What might you use the information obtained from these sources for?
Is the can-spam law working : What actions, if any, have you taken to limit the permissions of the sender? Why or why not?
Determine the length that maximizes the volume : A rectangular box without a top has surface area 2500 cm2 . The length x of its base is 18 cm longer that its width.
Detailed docstring specification for the function : We will also give you a detailed docstring specification for the function. You should copy-and-paste the specification into the function body, indented

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain the steps you would take to mold a group

Explain the steps you would take, and the techniques you would use, to mold a group of individuals into a team. Justify your response.

  Design a class that holds the following personal data

Design a class that holds the following personal data: name, address, age, and phone num-ber. Write appropriate accessor and mutator methods.

  Write program which will generate Fibonacci sequence numbers

CS 3280 LAB Assignment. You are to design, write, assemble, and simulate an assembly language program which will generate Fibonacci sequence numbers

  What methods could be applied to secure the communications

When might having a VPN solution actually introduce additional threats and attacks to a private internal network? What methods could be applied to secure the communications?

  What is the word length required for unambiguous encoding

What is the word length required for unambiguous encoding?- Find the binary code for the sequence abacabb.- Decode the code you obtained to verify that your encoding was correct.

  Protecting the computing environment

Does protecting a computing environment merely mean protecting those five components? Explain why?

  Explain activity that are require in physical design process

Suggest at least three activities that are required in the physical design process of a database to ensure adequate physical storage and data access.

  For the three common methods of system interaction

for the three common methods of system interaction --command language menus and objects-- recall a software package

  Read and follow the directions in creating an archive

How do the algorithm techniques of fragmentation affect the end result of sorting by larger amounts.

  What is relationship between size and complexity and testing

What is the relationship between Size and Complexity and Testing? Do you agree: Better Code Coverage means better quality?  Based on the article what are the techniques that can be used to test large software?

  Prepare a maintenance plan to install windows updates

The hospital needs to display a HIPPA warning reminding employees of patient confidentiality requirements to all employees when they log on - Several teams need access to local printers which will be shared among the group.

  What are the two major uses of unconstrained array types

Differentiate between the length of an array and the size of a list. What are the two major uses of unconstrained array types?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd