Risking the destruction of space shuttle

Assignment Help Basic Computer Science
Reference no: EM133233016

Discussion:

1. Should the Morton-Thiokol engineers have blown the whistle and announced to the press that NASA management was endangering the lives of the crew members and risking the destruction of the space shuttle?

2. No launch is completely safe; space travel is inherently risky. The astronauts accepted the risk when they volunteered for the job. Should they have been informed that the risks were higher for this particular launch?

3. Christa MacAuliffe (the high school teacher) was selected for this program and given a few week of training compared to several months of training the other astronauts had to go through. Some say she was selected as a PR (public relation) stunt by NASA as the "first teacher" in space. Should she have been selected for this mission?

4. Is it unfair to place the blame on NASA engineers? After all, every launch has risks and someone has to make the decisions to launch. Should the engineers be faulted for developing an inferior design?

5. Should an escape mechanism be installed on space shuttle even though it imposes a severe weight penalty and reduces the shuttle payload capacity?

6. What do you see as a priority in your engineering professional responsibility in relation to both being loyal to management and protecting the publicw elfare?

Reference no: EM133233016

Questions Cloud

Briefly describe the therapeutic actions of drugs : Briefly describe the therapeutic actions of drugs affecting blood pressure (diuretics, ACE inhibitors, ARBs, CCB, sympathetic nervous system drugs)
How would you advise about sebs situation : Imagine that you work for Global Compact Network Australia, and are presenting to small to medium size businesses in Perth
Forensically sound data collection and storage techniques : Compare differences in the tools used for data collection and analysis. Describe forensically sound data collection and storage techniques
Identify the three types of rulemaking procedures : LAW 206 Post University, Describe the three powers Congress has given to the Federal Trade Commission (FTC) that are typically associated
Risking the destruction of space shuttle : Announced to the press that NASA management was endangering the lives of the crew members and risking the destruction of the space shuttle?
Explain your belief of what business progress means : University of Santo Tomas What areas in business could be studied using descriptive method and How can business research help the consumer and business man?
Why poverty is considered to be deviant : How would the theory explain why poverty is considered to be deviant? Provide real-life examples of how the theory might apply
Advise robert on whether or not a contract exists : Advise Robert on whether or not a Contract exists. Focus on Contract Law relating to Offer and Acceptance as well as the principles of Equity
Create cellphone-flipphone and smartphone : Create three classes CellPhone, FlipPhone, and SmartPhone. FlipPhone and SmartPhone should be subclasses of CellPhone.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discusses the concept of correlation

Discusses the concept of correlation. Assume that An agency has focused its system development and critical infrastructure data collection efforts

  Innovation opportunities and challenges as defined by hamel

How does the approach taken by Maria Pretorius in managing the Danimal line factor in management innovation opportunities and challenges as defined by Hamel?

  Making the data work for you

Excel is either the most terrifying and mystifying program, or one of the easiest and useful programs, on the face of the lanet...depending upon who you ask

  Examine how well each model estimates the number of 0 counts

Estimate the zero-inflated Poisson regression model to predict the number of physician office visits. Use all of the explanatory variables in a linear form without any transformations for the log(µi) part of the model and no explanatory variables ..

  Is security mechanisms and practices

Organizations around the world often assess their IS security mechanisms and practices by using the Trusted Computer System Evaluation Criteria (TCSEC) or Information Technology Security Evaluation Criteria (ITSEC). The two standards are similar, tho..

  It security policy enforcement and monitoring

"IT Security Policy Enforcement and Monitoring" Please respond to the following:

  Percent-reserve banking nor fractional-reserve banking

A bank's assets equal its liabilities under a. both 100-percent-reserve banking and fractional-reserve banking. b. 100-percent-reserve banking

  Collection of patient demographic data like gender

A key requirement of the meaningful use program is the collection of patient demographic data like gender, race, ethnicity, and preferred language.

  Discuss the usage of big data in RADICAL platforms

Discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities.

  What knowledge of computer system software is necessary

What knowledge of computer hardware and system software is necessary to perform activities in the UP business modeling and requirements disciplines?

  Briefly discuss a government policy

Briefly discuss a government policy that affects the decision making within an organization

  Design and implement a class that allows a teacher to track

Design and implement a class that allows a teacher to track the grades in a single course. Include methods that calculate the average grade, the highest grade, and the lowest grade. I use C# and visual studio 2012

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd