Computer Program And Description Term Paper

PAGES
2
WORDS
483
Cite
Related Topics:

Maritime Business Pride Of American - Ncla Passenger Cruise Ship

Section 7 Find a MEBA Union contract and answer #a - g.

What are the major responsibilities for a third mate and a third assistant engineer respectively?

What approximately percentage does fuel cost represent in the total voyage operating expenses? Discuss the various factors that affect fuel consumption.

Select a major maintenance project (either deck or engine) and compile a list of the parts or inventory items needed, describe the following:

the function of those items;

the consumption rates for those items (how often they are used) how to keep track of inventory of those items; and the acquisition process of those inventory items.

What computer program does the vessel use for inventory management?...

...

ent? Please describe its functionality and demonstrate an example.
For deck majors please answer the following questions regarding voyage planning.

In preparation for a voyage, how does the deck department plan the following:

vessel supplies (food, fresh water, spare parts, paint, twist locks, wires, etc.) and maintenance

Fuel replenishment;

Physical inventory check

Crew change;

Cargo operations.

Who is responsible for route plnning? What computer program does the vessel use? How does it work? Pleasea give an example including print-outs from the program.

If the vessel has to go through waters known to have terrorist or pirate activities, what precautionary measures have to be taken?

What documents does the vessel have to prepare for port entry and clearance? Please provide a description of the functions of each document?

What port fees does the vessel have to pay? How

Cite this Document:

"Computer Program And Description" (2008, January 23) Retrieved May 3, 2024, from
https://www.paperdue.com/essay/computer-program-and-description-32718

"Computer Program And Description" 23 January 2008. Web.3 May. 2024. <
https://www.paperdue.com/essay/computer-program-and-description-32718>

"Computer Program And Description", 23 January 2008, Accessed.3 May. 2024,
https://www.paperdue.com/essay/computer-program-and-description-32718

Related Documents

In a study of sewing machine operators, showed that operators with a history of carpal tunnel syndrome used pinch grips more frequently and that the force used during these pinch grip exertions was greater than that employed by the control group (women performing the same jobs at the time that the case group members reported their symptoms). The effects of pinch grip exertions on the intrinsic muscles of the

C. Evaluation question(s) and aims. The primary question that will be addressed is to identify whether HCBS program is able to provide service to the target population. The evaluation questions will also be directed to the cost effectiveness of the program. The following evaluation questions are identified: 1. Is the program meet the budget requirements of the 1915 (b)? 2. Has the program generates cost saving? 3. Has the program has been able to

computers and culture, using the book "Technopoly: The Surrender of Culture to Technology," by Neil Postman, and other resources. Specifically, it will answer the questions: How have computers and computer networks changed human thinking, behavior, and lifestyle? What has been gained? What has been lost? What are the advantages of computers in communication? In education? In entertainment? In the economy? What are the disadvantages in these areas? Is computer

Computers Are an Underutilized Resource for High School Physical Education Teachers Computers have become an integral part of the high school learning environment, beginning in the early 1990s. They provide a vast variety of resources to help enhance student education through presentation of material in a variety of media and act as an enhancement to teacher lessons. They can sometimes free teachers from routine tasks, allowing them to bring greater depth

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain