IT-Infrasrtucture, Computer Engineering

Assignment Help:
Blue Sky events is an organisation that devices and runs large outdoor events. They have been commissioned to organise and run an event for four months over the summer period in a Welsh slate quarry. The event is an outdoor adventure experience where groups can book a week at a time to experience the wilds of central Wales. A local development agency, a couple of charities working with underprivileged youngsters and some European regeneration money has been made available for the venture.

The administrative offices make us of the original quarry building. This is a two storey building that also accommodates a shop, a restaurant, entertainment facilities and a 20 seat IT workshop. Twenty cabins are to be built here to accommodate visitors with mobility issues. These are known as the Home cabins and are in two groups either side of the main complex. Each of the Home cabins has two bedrooms Small kitchen, wet room and lounge.

The remaining accommodation will be grouped in six ‘islands’ arranged around the quarry floor. Each of the island cabins has three twin bed bedrooms, shower room, lounge and kitchen/diner.

The proposed plans are reproduced below. Note that as part of the Local Council conditions for using the site they have stipulated that considering the temporary nature of the venture, the geology and ecological considerations, no external cable can be run more than 30 meters so each cabin ‘island’ will be provided with its own solar, wind and backup diesel generators. (Note that the gap between adjacent Home cabins and those on each island is less than 30 metres)

Related Discussions:- IT-Infrasrtucture

Describe the instruction set architecture, Q. Describe the instruction set ...

Q. Describe the instruction set architecture? The significant role of the Central Processing Unit (CPU) is to perform calculations, to coordinate all other hardware components,

Trace the pseudo-code, Consider the following pseudo-code segment. 1.  i...

Consider the following pseudo-code segment. 1.  input y {y is a three-digit hexadecimal number} 2.  d ← 0 3. for i = 1 to 3      3.1. char ← i th character from y readin

Data, Data, information and knowledge - Information System The nature ...

Data, information and knowledge - Information System The nature of information can most easily be defined in the context of its relationship to data and knowledge. Bohn (1994)

Define peripheral, Define peripheral. Devices that are under the direct...

Define peripheral. Devices that are under the direct control of computer are said to be linked online. These devices are intended to read information into or out of the memory

Internet programming, Futoshiki is a game played on an N by N (usually 5 by...

Futoshiki is a game played on an N by N (usually 5 by 5) grid and uses the symbols 1 .. N. The objective of the game is to place each symbol on the grid so that it only occurs once

Illustrate design of combinational circuits, The digital circuits that we u...

The digital circuits that we use now-a-days are constructed with NOR or NAND gates in place of AND-OR-NOT gates. NOR & NAND gates are known as Universal Gates as we can realize any

The function code currently active, The Function code currently active is a...

The Function code currently active is ascertained by what Variable? The function code at present active in  a Program can be ascertained from the SY-UCOMM  Variable.

Show the features of a typical floating-point representation, Q. Show the F...

Q. Show the Features of a typical floating-point representation? The features of a typical floating-point representation of 32 bits in above figure are: Left-most bit is

Describe the uses of credit cards and smart cards, Credit cards and smart c...

Credit cards and smart cards Credit cards comprise a magnetic stripe on the back made up of iron-based particles in a plastic film. Stripe is split up into 3 tracks which a

Determine about the logical shift, Logical shift A logical shift operat...

Logical shift A logical shift operation transfers 0 through serial input. We apply symbols shl and shr for logical shift left and shift right microoperations, examples:. R1

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd