×
Log in to StudySoup
Get Full Access to Materials Science And Engineering: An Introduction - 9 Edition - Chapter 7 - Problem 7.38
Join StudySoup for FREE
Get Full Access to Materials Science And Engineering: An Introduction - 9 Edition - Chapter 7 - Problem 7.38

Already have an account? Login here
×
Reset your password

(a) From Figure 7.25, compute the length of time required

Materials Science and Engineering: An Introduction | 9th Edition | ISBN: 9781118324578 | Authors: William Callister ISBN: 9781118324578 140

Solution for problem 7.38 Chapter 7

Materials Science and Engineering: An Introduction | 9th Edition

  • Textbook Solutions
  • 2901 Step-by-step solutions solved by professors and subject experts
  • Get 24/7 help from StudySoup virtual teaching assistants
Materials Science and Engineering: An Introduction | 9th Edition | ISBN: 9781118324578 | Authors: William Callister

Materials Science and Engineering: An Introduction | 9th Edition

4 5 1 344 Reviews
29
2
Problem 7.38

(a) From Figure 7.25, compute the length of time required for the average grain diameter to increase from 0.03 to 0.3 mm at 600C for this brass material. (b) Repeat the calculation, this time using 700C.

Step-by-Step Solution:
Step 1 of 3

NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Student: THIS FORM MUST BE COMPLETELY FILLED IN Follow these procedures: If requested by your instructor, please include an assignment cover sheet. This will become the first page of your assignment. In addition, your assignment header should include your last name, first initial, course code, dash, and assignment number. This should be left justified, with the page number right justified. For example: MGT7019­8­5 Save a copy of your assignments: You may need to re­submit an assignment at your instructor’s request. Make sure you save your files in accessible location. Academic integrity: All work submitted in each course must be your own original work. This includes all assignments, exams, term papers, and other projects required by your instructor. Knowingly submitting another person’s work as your own, without properly citing the source of the work, is considered plagiarism. This will result in an unsatisfactory grade for the work submitted or for the entire course. It may also result in academic dismissal from the University. MGT7019­8­5 Thomas Schaefer, DBA Ethics Assignment 5 Faculty Use Only 2 Introduction The purpose of this week’s paper is to review discuss ethical issues in regards to information technology. The use of information technology allows an almost instantaneous distribution of information. At the rapid rate that information is being exchanged, one has to wonder how accurate the information actually is as well as the how the information is being used. Many years ago the saying was along the lines of; a man’s word is his bond. These days, it may be difficult to find anyone that actually lives by this philosophy. By adding the element of technology where the person behind the scenes is a ghost, unethical practices are becoming more and more common. Brooks (2010) article discusses a number of areas which involve ethics and information technology. His article will be reviewed and evaluated in the following areas: 1) Societal ethical changes caused by information technology, 2) The ethical usage of information technology, 3) The development of a code of ethics associative with these ethical issues, 4) Enforcement issues related to a code of ethics for information technology, 5) Interpret how a code of ethics would be established within an academic setting, especially with the advancement of the online educational environment Societal ethical changes caused by information technology Brooks (2010) article discusses a number of ethical considerations when referring to technology and it’s uses. By taking a look at and and discussing these areas, we can not only identify potential areas of concern but strategize on how to best incorporate the use of IT within an educational environment. To begin to understand this concept, we must first understand that society is changing at faster pace than ever due to the speed of information exchange. The 3 technology that is available at no more than the distance of a fingertip is remarkable compared to even ten years ago. In addition, the way that society learns and conducts business is effected by how technology is used and implemented. Brooks (2010) discusses this point on how stealing, lying, and cheating in America’s youth is on the rise each year. The individuals that participated in a survey of these areas also reported a viewpoint that they held very high ethical and moral standards. The survey showed that the perception that individuals had of themselves did not reflect in their actions. This discrepancy in viewpoint is then transferred into the business world as adults. If these individuals feel they have high ethics and high moral values and are committing the simplest of ethical and moral crimes at a young age, they will bring these characteristics with them into the working world. If a young man has no problem with cheating on a test, what is to stop him from acquiring insider trading information as an adult. The ethical usage of information technology Brooks (2010) discussed a poll that was conducted by the Ponemon Institute in 2007 that surveyed 16,000 practitioners. This survey showed that 62% of IT employees accessed someone else’s computer without their knowledge, 50% had read confidential information that they shouldn’t have, 42% had blatantly violated company privacy or security policy. This also is based upon people that were willing to actually admit their wrongdoing. The next question that has to be asked is, why Do people just like to break the rules for no reason or is it that they just aren’t in agreement with the rules put in place It comes back to, he who has the gold rules the kingdom. 4 Hamiti, Reka , and Baloghová (2015) discuss how students interpret the use of social media and whether or not it has a place in higher education. When asked, some felt the use of social media is ethical and moral and some did not. This goes back to the discussion of ethics is a function of philosophy and an attempt to understanding the right or wrongness of something. Yet again, it is but of someone’s opinion. The question goes to determining in which circumstances would social media in the electronic classroom be appropriate Would it be appropriate in a setting of connecting a classroom or inappropriate Would a professional account such as LinkedIn be more appropriate to connect students over a MySpace account when resumes or choosing people to interview on a certain topic The answer would likely be yes, but would it be questioned as much when determining if a Snapchat or an Instagram account would be more appropriate in a course on photography So, does social media have its place in education It certainly could. The ethical factor would certainly be focused on the type of information shared over the medium. The development of a code of ethics associative with these ethical issues The biggest issue that lies within the development of a code of ethics starts off with who is given the responsibility of making the rules. In so many cases it starts with who has the most 5 gold. He who has the most gold rules the kingdom. How often have you hear the term, “Do as I say, not as I do” The first problem with ethics is that everyone’s interpretation of ethics and moral standards are different. By nature, people are different, and by placing a certain set of rules on a society that may or may not believe in the same set of values as the rule makers creates a significant discrepancy. Dika and Hamiti (2011) discuss the use of Facebook by students and professors and the potential ethical violations involved. By sharing content that is personal and potentially inappropriate, it could violate so many standards. Now, while Facebook is against the ethical standard, what would be the unethical standard of sharing LinkedIn profiles A student could potentially develop a network in the field they are focused upon. Does networking not outweigh the ethical implication Whose decisions and whose rulebook is being followed in this instance Enforcement issues related to a code of ethics for information technology There are so many issues with enforcing a code of ethics for information technology it is hard to choose where to start. First off, there would need to be a set code of ethics that incorporated tangible evidence of compliance or non­compliance. Without proof of concept, the code would not be enforceable. An example of an unenforceable ethics code for information technology is discussed by Niederman, Taylor, Dick, & Land, (2011). They discuss the ethical concept of the appropriateness for a student to upload educational software to their work PC or can the only upload it to their own personal PC If a work PC was the only option for an individual to complete homework, would this outweigh the ethical dilemma If the boss authorized use of on a work PC, does that make it less of an ethical dilemma There are so may variations of the 6 question that it could make your head spin. It all goes back to who has created the rules and what their standard was at the time of making the rules. Now the individual has to determine if getting an education outweighs the dilemma of uploading software to a computer that they don’t personally own. To enforce this type of issue, one would have to find a way to detect the owner of the computer. It doesn’t seem as if it would be possible to be able to enforce a code of ethics on this issue. Interpret how a code of ethics would be established within an academic setting, especially with the advancement of the online educational environment Establishing and implementing a code of ethics in an online academic setting is an extremely difficult thing to even attempt. It takes the kid from the actual physical classroom that shifts his eyes to the person next door’s paper to an entirely new level. An institution can not rely on the fact that people will “do the right thing” just because they should. In an online setting, a school can only do so much. The Turnitin software is a great start and a very useful tool. It can be utilized as proof for the blatant cheaters that submit copied work or someone else’s paper entirely. While this is a step in the right direction, it would be extremely difficult to catch people that pay others to write a paper or have the work done for them. An instructor has no real way to tell if the person on the other end is who signed up for the course and there’s only one true way to implement policy. This would be to have weekly online face­to­face testing sessions to ensure the student understood the information being taught. Only in a discussion can an instructor tell if that person is doing the work and turning in their own material. Cheating these days takes on an entirely new form with websites such as www.Chegg.com and www.CourseHero.com. One has to only input a homework question and out pops up the answer. Schools are creating problems that are exactly the same as other schools 7 and students are posting their answers. Students may attempt to be helpful for free while others are being paid for their assignments. The way that information technology is now structured, it allows for easy access to given questions. In addition, Mayville (2011) discusses this exact issue and how easy it is to come across a paper on the Internet and turn it in as their own. The lack of face­to­face interaction is cited as one of the significant factors in why more people online cheat over those that take a course in the classroom. One way to combat this would be to have the instructors change their questions each semester to help deter individuals from the function of copy and paste. That’s when one has to wonder when institutions do not require this of their instructors. While instructors shouldn’t be held accountable for cheating students, they should also be aware of this fact and do what they can to circumvent this situation. Conclusion In conclusion, the purpose of this week’s paper is to review discuss ethical issues in regards to information technology. The use of information technology allows an almost instantaneous distribution of information. At the rapid rate that information is being exchanged, one has to wonder how accurate the information actually is as well as the how the information is being used. By adding the element of technology where the person behind the scenes is a ghost, unethical practices are becoming more and more common. In this paper a discussion of Brook’s (2010) article and the effect of ethics on information technology. This article discussed the following concepts: 1) Societal ethical changes caused by information technology, 2) The ethical usage of information technology, 3) The development of a code of ethics associative with these ethical issues, 4) Enforcement issues related to a code of ethics for information technology, 5) Interpret how a code of ethics would be established within an academic setting, especially with the advancement of the online educational environment 8 References Brooks, R. (2010). The development of A code of ethics: An online classroom approach to making connections between ethical foundations and the challenges presented by information technology. American Journal of Business Education, 3(10), 1­ 13. Retrieved from http://search.proquest.com.proxy1.ncu.edu/docview/757070798 accountid =28180 Chegg, 2015. Web. 23 Sept. 2015. Course Hero Inc, 2015. Web. 23 Sept. 2015. Dika, A., & Hamiti, M. (2011). Challenges of implementing the ethics through the use of information technologies in the university. Procedia ­ Social and Behavioral Sciences, 15(3rd World Conference on Educational Sciences ­ 2011), 1110­1114. doi:10.1016/j.sbspro.2011.03.247 Mayville, K. L. (2011). Technology, cheating, ethics, and strategies for creating a culture of honesty. Chart, 109(3), 6­10. Niederman, F., Taylor, S., Dick, G. N., & Land, L. W. (2011). Teaching is ethics: applying a research technique for classroom use. Journal of Information Systems Education, 22(3), 239­251 Turnitin, 2015. Web. 24 Sept. 2015. Hamiti, M., Reka, B., & Baloghová, A. (2014). Ethical use of information technology in high education. Procedia ­ Social and Behavioral Sciences, 116(5th World Conference on Educational Sciences), 4411­4415. doi:10.1016/j.sbspro.2014.01.957 NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Student: THIS FORM MUST BE COMPLETELY FILLED IN Follow these procedures: If requested by your instructor, please include an assignment cover sheet. This will become the first page of your assignment. In addition, your assignment header should include your last name, first initial, course code, dash, and assignment number. This should be left justified, with the page number right justified. For example: MGT7019­8­5 Save a copy of your assignments: You may need to re­submit an assignment at your instructor’s request. Make sure you save your files in accessible location. Academic integrity: All work submitted in each course must be your own original work. This includes all assignments, exams, term papers, and other projects required by your instructor. Knowingly submitting another person’s work as your own, without properly citing the source of the work, is considered plagiarism. This will result in an unsatisfactory grade for the work submitted or for the entire course. It may also result in academic dismissal from the University. MGT7019­8­5 Thomas Schaefer, DBA Ethics Assignment 5 Faculty Use Only 2 Introduction The purpose of this week’s paper is to review discuss ethical issues in regards to information technology. The use of information technology allows an almost instantaneous distribution of information. At the rapid rate that information is being exchanged, one has to wonder how accurate the information actually is as well as the how the information is being used. Many years ago the saying was along the lines of; a man’s word is his bond. These days, it may be difficult to find anyone that actually lives by this philosophy. By adding the element of technology where the person behind the scenes is a ghost, unethical practices are becoming more and more common. Brooks (2010) article discusses a number of areas which involve ethics and information technology. His article will be reviewed and evaluated in the following areas: 1) Societal ethical changes caused by information technology, 2) The ethical usage of information technology, 3) The development of a code of ethics associative with these ethical issues, 4) Enforcement issues related to a code of ethics for information technology, 5) Interpret how a code of ethics would be established within an academic setting, especially with the advancement of the online educational environment Societal ethical changes caused by information technology Brooks (2010) article discusses a number of ethical considerations when referring to technology and it’s uses. By taking a look at and and discussing these areas, we can not only identify potential areas of concern but strategize on how to best incorporate the use of IT within an educational environment. To begin to understand this concept, we must first understand that society is changing at faster pace than ever due to the speed of information exchange. The 3 technology that is available at no more than the distance of a fingertip is remarkable compared to even ten years ago. In addition, the way that society learns and conducts business is effected by how technology is used and implemented. Brooks (2010) discusses this point on how stealing, lying, and cheating in America’s youth is on the rise each year. The individuals that participated in a survey of these areas also reported a viewpoint that they held very high ethical and moral standards. The survey showed that the perception that individuals had of themselves did not reflect in their actions. This discrepancy in viewpoint is then transferred into the business world as adults. If these individuals feel they have high ethics and high moral values and are committing the simplest of ethical and moral crimes at a young age, they will bring these characteristics with them into the working world. If a young man has no problem with cheating on a test, what is to stop him from acquiring insider trading information as an adult. The ethical usage of information technology Brooks (2010) discussed a poll that was conducted by the Ponemon Institute in 2007 that surveyed 16,000 practitioners. This survey showed that 62% of IT employees accessed someone else’s computer without their knowledge, 50% had read confidential information that they shouldn’t have, 42% had blatantly violated company privacy or security policy. This also is based upon people that were willing to actually admit their wrongdoing. The next question that has to be asked is, why Do people just like to break the rules for no reason or is it that they just aren’t in agreement with the rules put in place It comes back to, he who has the gold rules the kingdom. 4 Hamiti, Reka , and Baloghová (2015) discuss how students interpret the use of social media and whether or not it has a place in higher education. When asked, some felt the use of social media is ethical and moral and some did not. This goes back to the discussion of ethics is a function of philosophy and an attempt to understanding the right or wrongness of something. Yet again, it is but of someone’s opinion. The question goes to determining in which circumstances would social media in the electronic classroom be appropriate Would it be appropriate in a setting of connecting a classroom or inappropriate Would a professional account such as LinkedIn be more appropriate to connect students over a MySpace account when resumes or choosing people to interview on a certain topic The answer would likely be yes, but would it be questioned as much when determining if a Snapchat or an Instagram account would be more appropriate in a course on photography So, does social media have its place in education It certainly could. The ethical factor would certainly be focused on the type of information shared over the medium. The development of a code of ethics associative with these ethical issues The biggest issue that lies within the development of a code of ethics starts off with who is given the responsibility of making the rules. In so many cases it starts with who has the most 5 gold. He who has the most gold rules the kingdom. How often have you hear the term, “Do as I say, not as I do” The first problem with ethics is that everyone’s interpretation of ethics and moral standards are different. By nature, people are different, and by placing a certain set of rules on a society that may or may not believe in the same set of values as the rule makers creates a significant discrepancy. Dika and Hamiti (2011) discuss the use of Facebook by students and professors and the potential ethical violations involved. By sharing content that is personal and potentially inappropriate, it could violate so many standards. Now, while Facebook is against the ethical standard, what would be the unethical standard of sharing LinkedIn profiles A student could potentially develop a network in the field they are focused upon. Does networking not outweigh the ethical implication Whose decisions and whose rulebook is being followed in this instance Enforcement issues related to a code of ethics for information technology There are so many issues with enforcing a code of ethics for information technology it is hard to choose where to start. First off, there would need to be a set code of ethics that incorporated tangible evidence of compliance or non­compliance. Without proof of concept, the code would not be enforceable. An example of an unenforceable ethics code for information technology is discussed by Niederman, Taylor, Dick, & Land, (2011). They discuss the ethical concept of the appropriateness for a student to upload educational software to their work PC or can the only upload it to their own personal PC If a work PC was the only option for an individual to complete homework, would this outweigh the ethical dilemma If the boss authorized use of on a work PC, does that make it less of an ethical dilemma There are so may variations of the 6 question that it could make your head spin. It all goes back to who has created the rules and what their standard was at the time of making the rules. Now the individual has to determine if getting an education outweighs the dilemma of uploading software to a computer that they don’t personally own. To enforce this type of issue, one would have to find a way to detect the owner of the computer. It doesn’t seem as if it would be possible to be able to enforce a code of ethics on this issue. Interpret how a code of ethics would be established within an academic setting, especially with the advancement of the online educational environment Establishing and implementing a code of ethics in an online academic setting is an extremely difficult thing to even attempt. It takes the kid from the actual physical classroom that shifts his eyes to the person next door’s paper to an entirely new level. An institution can not rely on the fact that people will “do the right thing” just because they should. In an online setting, a school can only do so much. The Turnitin software is a great start and a very useful tool. It can be utilized as proof for the blatant cheaters that submit copied work or someone else’s paper entirely. While this is a step in the right direction, it would be extremely difficult to catch people that pay others to write a paper or have the work done for them. An instructor has no real way to tell if the person on the other end is who signed up for the course and there’s only one true way to implement policy. This would be to have weekly online face­to­face testing sessions to ensure the student understood the information being taught. Only in a discussion can an instructor tell if that person is doing the work and turning in their own material. Cheating these days takes on an entirely new form with websites such as www.Chegg.com and www.CourseHero.com. One has to only input a homework question and out pops up the answer. Schools are creating problems that are exactly the same as other schools 7 and students are posting their answers. Students may attempt to be helpful for free while others are being paid for their assignments. The way that information technology is now structured, it allows for easy access to given questions. In addition, Mayville (2011) discusses this exact issue and how easy it is to come across a paper on the Internet and turn it in as their own. The lack of face­to­face interaction is cited as one of the significant factors in why more people online cheat over those that take a course in the classroom. One way to combat this would be to have the instructors change their questions each semester to help deter individuals from the function of copy and paste. That’s when one has to wonder when institutions do not require this of their instructors. While instructors shouldn’t be held accountable for cheating students, they should also be aware of this fact and do what they can to circumvent this situation. Conclusion In conclusion, the purpose of this week’s paper is to review discuss ethical issues in regards to information technology. The use of information technology allows an almost instantaneous distribution of information. At the rapid rate that information is being exchanged, one has to wonder how accurate the information actually is as well as the how the information is being used. By adding the element of technology where the person behind the scenes is a ghost, unethical practices are becoming more and more common. In this paper a discussion of Brook’s (2010) article and the effect of ethics on information technology. This article discussed the following concepts: 1) Societal ethical changes caused by information technology, 2) The ethical usage of information technology, 3) The development of a code of ethics associative with these ethical issues, 4) Enforcement issues related to a code of ethics for information technology, 5) Interpret how a code of ethics would be established within an academic setting, especially with the advancement of the online educational environment 8 References Brooks, R. (2010). The development of A code of ethics: An online classroom approach to making connections between ethical foundations and the challenges presented by information technology. American Journal of Business Education, 3(10), 1­ 13. Retrieved from http://search.proquest.com.proxy1.ncu.edu/docview/757070798 accountid =28180 Chegg, 2015. Web. 23 Sept. 2015. Course Hero Inc, 2015. Web. 23 Sept. 2015. Dika, A., & Hamiti, M. (2011). Challenges of implementing the ethics through the use of information technologies in the university. Procedia ­ Social and Behavioral Sciences, 15(3rd World Conference on Educational Sciences ­ 2011), 1110­1114. doi:10.1016/j.sbspro.2011.03.247 Mayville, K. L. (2011). Technology, cheating, ethics, and strategies for creating a culture of honesty. Chart, 109(3), 6­10. Niederman, F., Taylor, S., Dick, G. N., & Land, L. W. (2011). Teaching is ethics: applying a research technique for classroom use. Journal of Information Systems Education, 22(3), 239­251 Turnitin, 2015. Web. 24 Sept. 2015. Hamiti, M., Reka, B., & Baloghová, A. (2014). Ethical use of information technology in high education. Procedia ­ Social and Behavioral Sciences, 116(5th World Conference on Educational Sciences), 4411­4415. doi:10.1016/j.sbspro.2014.01.957

Step 2 of 3

Chapter 7, Problem 7.38 is Solved
Step 3 of 3

Textbook: Materials Science and Engineering: An Introduction
Edition: 9
Author: William Callister
ISBN: 9781118324578

Since the solution to 7.38 from 7 chapter was answered, more than 390 students have viewed the full step-by-step answer. The answer to “(a) From Figure 7.25, compute the length of time required for the average grain diameter to increase from 0.03 to 0.3 mm at 600C for this brass material. (b) Repeat the calculation, this time using 700C.” is broken down into a number of easy to follow steps, and 36 words. This full solution covers the following key subjects: average, Brass, calculation, compute, diameter. This expansive textbook survival guide covers 22 chapters, and 1041 solutions. This textbook survival guide was created for the textbook: Materials Science and Engineering: An Introduction, edition: 9. The full step-by-step solution to problem: 7.38 from chapter: 7 was answered by , our top Engineering and Tech solution expert on 11/14/17, 08:41PM. Materials Science and Engineering: An Introduction was written by and is associated to the ISBN: 9781118324578.

Other solutions

People also purchased

Related chapters

Unlock Textbook Solution

Enter your email below to unlock your verified solution to:

(a) From Figure 7.25, compute the length of time required