How to dispose of old computer equipment properly

Assignment Help Management Information Sys
Reference no: EM131559822

PowerPoint Presentation

For this assignment, you will start with "Lab Exercise : Integrating Safety into the Workplace" of your lab manual.

1. Complete Step 1.

Step 1- Research ESD, material safety data sheets (MSDSs), and how to dispose of old computer equipment properly, while typing results. You can use the Internet, magazines, tech articles, manuals, and so forth, but make sure properly document where you find your information.

2. In Step 2, do #1 and #2.

Step 2- Compile the data into a presentation. Include the following:

1- Pages that describe and define ESD, MSDs, and proper disposal

2- Pictures of the following:

a. Various anti-static devices

b. Sample of MSDs

c. Disposing of old, outdated computer devices

3- A short video clip of either:

a. A student wearing an anti-static wrist strap and installing components into a PC

b. How to fill out an MSDS

c. How to properly dispose of computer components

4- A bibliography page listing the sources used for your research

3- Add the following to your presentation:

Include slides that provide images of a person wearing an anti-static wrist strap and installing components into a PC.

Include slides that illustrate how to fill out an MSDS.

Include slides that illustrate how to properly dispose of computer components.

Your PowerPoint presentation must address all of the following:

1. Illustrate the results of your research in a minimum of seven slides.

2. The first slide must be a title slide that includes the title of the presentation, date, your name, and course name and number.

3. The last slide must be a reference slide using APA formatting. You are required to use at least one resource from an Online Library.

4. Use the speaker notes section to discuss your slides so that the reader may follow along.

5. Be sure to include in-text citations and reference(s) in APA format to properly cite your sources

Reference no: EM131559822

Questions Cloud

Pay in social security taxes : Dr. Franklin is an Assistant Professor at Northern University. If his salary is $75,000, how much he pay in Social Security taxes?
Estimate the rate at which the wood grown is change : FORESTRY The following graph shows the volume of wood produced in a single-species forest. Here f(t) is measured in cubic meters/hectare and t is measured.
In what ways does failure affect success : What can be learned by failing? In what ways does failure affect success? What do you think is the value of failure? What can be learned by failing?
Overall cost of debt : The overall cost of debt is the weighted average implied by the following two outstanding debt issues:
How to dispose of old computer equipment properly : How to properly dispose of computer components. A bibliography page listing the sources used for your research.
What would the portfolio new beta be : Now suppose he decided to sell one of his stocks that has a beta of 1.20 and to use the proceeds to buy a replacement stock with a beta of 1.50.
Find average rate of change in the average infant weight : AVERAGE WEIGHT OF AN INFANT The following graph shows the weight measurements of the average infant from the time of birth (t = 0) through age 2 (t = 24).
Determine an equation of the tangent line : Find the slope of the tangent line to the graph of each function at the given point.
How the financial results of a business would be reported : Explain how financial results of a business would be reported differently if costs were not properly categorized. Include citations and references in APA style.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Methods to reduce the frustrations among disabled population

Suggest at least three (3) methods to reduce the frustrations among the disabled population and how this population can be better served

  Provide a statistical analysis of medical enquiries

HS2061 Information Systems Project Management - The Medical Affairs Department currently process medical enquiries manually. A Medical Enquiries Database is required to assist the staff in their daily work and allow them to efficiently and rapidly ..

  Specific attacks that can be targeted

Revision is required including a more comprehensive analysis of techniques that can be used to acquire information, specific attacks that can be targeted, countermeasures and threats to the organization's web environment

  Price of products after implementing new technology

Price of Products After Implementing New Technology - Should you recommend the current price for the modules be maintained after implementing the new technology in the hopes of earning a substantial profit, or will it be wiser to lower the price fo..

  The program management office

Are limited in that they only measure the difference between projected and actual costs incurred during software development.

  Develop security policies all company personnel trained

BIS/221- Students will research risks and threats to digital data and develop security policies all company personnel must be trained on and be held accountable to protect company data.

  Who are btfcs best and worst customers by total sales

What are BTFC's best and worst value-added services by total profit? Use an appropriate table and graph/chart to summarise these observations.

  Show what is the value of contractual flexibility

What is the value of contractual flexibility in managing outsourced supply chains and How does contractual flexibility factor in when a company changes an order in response to new demand information for the company's product?

  What is a troubleshooting model

What is a troubleshooting model? Describe how you would use a troubleshooting model to resolve a user's inability to connect to the Internet from a physically connected networked laptop in an office

  What is the maximum message bandwidth

What is the maximum message bandwidth for which the system operates satisfactorily?- Determine the output signal-to-(quantization) noise when a full-load sinusoidal modulating wave of frequency 1 MHz is applied to the input.

  Explain in your words necessity of a hacker concealing

Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process. Determine what you believe to be, if any, the repercussions that exist for a hacker who doesn't appropriately cover his / her tracks.

  Provide a written summary of the swot results

You have now received information from several vendors. You have selected the two top vendors, and a summary of their information is provided at the end of these instructions. First, create a matrix to compare the vendors aligned with your organiz..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd