Free Essay

Unit 7

In:

Submitted By stephaniedawn76
Words 611
Pages 3
Unit 7 Assignment: Federal Regulations & Letter
Stephanie Royer
PA 201-02 Introduction to Legal Research
Professor Cynthia Middleton
July 2, 2013

Stephanie Royer
9104 Doane Ave
Las Vegas NV, 89143
702-472-3193
Stephaniedawn76@hotmail.com
July 2, 2013
Mike Jones
Town Manager
2250 Las Vegas Boulevard North
North Las Vegas, Nevada 89030
Dear Mike Jones:
I am a long-time resident of our city, and I am writing to express my concern about the recent discussion with others in our community regarding the possibility of high levels of lead in our drinking water. While, I am hoping that the town takes the required actions to make sure our drinking water is safe, I would like to remind you of the long history of drinking water protection.
In 1974 Congress passed an act called The Safe Drinking Water Act (SDWA) 42 U.S.C. §300f et seq. (1974), it is the main federal law that ensures the quality of Americans' drinking water. In 1986 the law was amended to include rivers, lakes, reservoirs, springs, and ground water wells. SDWA rules and regulations apply to every public water system in the United States, but allows individual states the opportunity to set and enforce their own drinking water standards as long as the standards are at least as equal or exceeding EPA’s national standards. Most states oversee their own water systems within their borders.
In Nevada, The U.S. EPA has granted the NDEP (Nevada Department Environmental Protection) primary enforcement responsibility for the NPDWR (National Primary Drinking Water Regulations). Nevada follows the same if not stricter rules and regulations set forth by the Safe Drinking Water Act. The NPDWR are legally enforceable standards that apply to public water systems. It is considered a public water system is classified at least 15 service connections or serves at least 25 people per day for 60 days of the year. With at least 20000 residents, we fall under the rules of the SDWA.
Lead in our drinking water can cause long-term health problems, ranging from stomach issues to brain damage. SDWA authorizes the United States Environmental Protection Agency (US EPA) to set national health-based standards for drinking water to protect against both naturally-occurring and man-made contaminants that may be found in drinking water. On June 7, 1991, EPA (Environmental Protection Agency) published a regulation to control lead and copper in drinking water. This regulation is known as the Lead and Copper Rule. 40 C.F.R § 141 (1991). This rule states that lead concentrations cannot exceed a level of 15 ppb or copper concentrations exceed an action level of 1.3 ppm in more than 10% of customer’s taps. If the level for lead is exceeded, the water authorities must correct the problem and must also inform the public about steps they should take to protect their health and may have to replace lead service lines under their control.
On January 4, 2011, President Obama signed legislation revising the definition for “lead free” within the Safe Drinking Water Act (SDWA) section 1417, as it pertains to “pipe, pipe fittings, plumbing fittings, and fixtures”. This law will make it illegal for any plumbing fixtures to be used if they contain lead. This law takes effect in January 2014, so I hope that you take this in account and make sure that any changes to our towns plumbing be replaced accordingly.
I am hoping that you as our town manager take the concerns of the residents seriously. All we are asking is that our town follow the regulations regarding the safety of our drinking water if not exceed those requirements.
Sincerely,
Stephanie Royer

Similar Documents

Premium Essay

Nt1310 Unit 7 P3 Windows 7

...Windows 7 has a new customisation system from the last one, which can help you make your computer the way you want it to.One of the features that help you customise is Snap. Snap allows you to do more than one application on your computer. This is a good feature because this allows you to do two things at once. Another feature is improved gadgets. This feature makes your computer more fun. They have an application called mini-gadgets like puzzles MAC OS X also has some rather clever customisations. One of the features it has is mission control. This feature allows you to put all the applications together on one large screen so that you can see everything happening on your computer. This is a good feature because you don’t always have to use your taskbar to pick your applications. Another good feature is Resume. When you close an application, all your valuable work will still be there when you reopen it. This is a good feature because if you accidently close you work, you can be sure that your work will be safe. Windows 7 has some rather handy features to protect your computer. One of the features is BitLocker. This feature allows you to protect all your documents, passwords and important details. Once a file is saved, BitLocker automatically keeps it safe. This is a good...

Words: 889 - Pages: 4

Free Essay

Unit 7 Homework Assignment Cmos

...Unit 1 Lab 1: Computer Model Understanding Activity Eric Presnall 11/10/2014 When computer scientist John von Neumann designed his computer model in the 1940s, it was based on two main components: a central processing unit (CPU) and a storage structure (memory). This is the basis of most computers in use today. The purpose of this architecture was to show how a computer would access and run stored programs that contain programmed instructions and data. These are stored in random access memory (RAM), which can be read from and written to, similar to today’s computer RAM. Originally, the CPU was broken down into two components: the control unit and the arithmetic unit. Each component had its own purpose. The control unit reads and interprets a program’s instructions, which are converted into electrical signals that activate other components of the computer. The arithmetic and logic operations. The memory, which can be randomly accessed by the processor, stores data in cells. The data stored in each cell is a number between 0 and 255. Each one of these numbers is a byte of information. The numbers are actually stored in binary form instead of decimal form. RAM has many, many cells with which to store these bytes of information. Data files, programs, graphics, and everything else you work with that is stored on the computer are based on bytes, which are simply any number between 0 and 255. Different values account for different data. A simple example of this is the capitol...

Words: 769 - Pages: 4

Premium Essay

Btec Level 3 Unit 7 P1

...Hardware: CPU- The processor allows programs on the computer to run, every programs has a set of instructions that the processor decodes to make them work. The quicker the processor runs the instructions, the quicker the program responds to the user. The power of the CPU is dependent on how fast the circuits are driven. Many graphics work require a lot of processing, for example rescaling images or applying complex effects to graphics. Graphics Card- Graphics cards take digital data from the operating system and translates it into a signal that the display video understands. The signal travels along a video cable and into the monitor to display the image. Modern graphics cards are capable of displaying images without slowing the PC down. Professional graphics designers use a DVI (digital visual interface) between the graphics card and monitor for a better quality image. They also often use 32bit colour depth, which means 32 bits are used for each pixel (24 bits for the colour and 8 bits for the transparency) RAM- RAM is primarily used to hold programs or documents the user has opened. The flow of data between the Ram and the processor is constant. When a user opens a program, the program is first copied from the hard disk to the RAM then to the processor at a very high speed where the program can be run. RAM works at the speed of electricity which is much faster than a hard disk which runs at disk speed. Memory Storage- Graphics files need to be stored so that they can be modified...

Words: 912 - Pages: 4

Premium Essay

Unit 7

...PS 300 Research Methods Kaplan University Unit 7 Research question My research question is “Are children who play video games more likely to be violent?” My hypothesis is “Kids who violent video games increases aggressive thoughts, angry feelings, and physiological arousal, and those who play non-violent will lead a happy life. Prior research has found common trends among children's video game play as related to gender, age, interest, creativity, and other descriptors. This study re-examined the previously reported trend by utilizing principal components analysis with variables such as creativity, general characteristics, and problem-solving methods to determine factors that predict greater time spent playing video games among children. Fourth and fifth grade students reported their video game play habits and took a creativity assessment. Principal components analysis revealed factors that predict a child will play video games for greater amounts of time. While previous results showed that video game play does not lower a children creativity, results of this analysis build on these results to show that the most creative children do not tend to play video games as often; other characteristics associated with greater video game play include familiarity with gaming, greater practical but less creative problem-solving strategies, and being less likely to be learning academic content. Implications of these findings are discussed. Another perspective, one less entrenched...

Words: 571 - Pages: 3

Premium Essay

Unit 7

...Unit 7 Assignment 2: Design an Encryption Strategy One security option that should be used is the Privacy option for confidentiality. This will help keep information from prying eyes unless the user is authorized. Sensitive information such as SSN (social security numbers), personal home addresses and phone numbers, or other personal information will be kept from employees that do not have the permissions to see this. This should be implemented on all of the managed networks/domains. Richman Investments should use the Access control feature. Using access control will restrict access to network resources and would require the user to have rights/privileges to the information. Used alongside the first feature, this gives the users proper permissions to information and this will help keep users out that don’t need or have access to those sections. Finally, would be to use the Receipt feature. This will help ensure the user that the item they are emailing is getting to the proper user and destination. The user sending the email will receive a receipt stating that the person has received the email. This helps the sender knows that the user got their email and not someone else. It should also be set up once the email is opened, depending on the content of the email; a second conformation receipt is sent stating a time stamp of exactly when the email was read. All emails should include a digital signature so that users know that it came from someone in the company. Many...

Words: 285 - Pages: 2

Free Essay

Unit 7

...communication that occurs in one direction only. 5) A half-duplex (HDX) system provides communication in both directions, but only one direction at a time (not simultaneously). 6) A full-duplex (FDX), or sometimes double-duplex system, allows communication in both directions, and, unlike half-duplex, allows this to happen simultaneously. 7) Photodiode is a type of photo detector capable of converting light into either current or voltage, depending upon the mode of operation. 8) Amplitude modulation (AM) is a technique used in electronic communication, most commonly for transmitting information via a radio carrier wave. 9) Analog (or analogue) transmission is a transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable. 10) Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-multipoint communication channel. 11) Sample rate defines the number of samples per unit of time (usually...

Words: 721 - Pages: 3

Free Essay

Unit 7

...Unit 7 Activity 1 P1 Sociological perspectives Intro – In this booklet I am going to be giving information explaining the principle sociological perspectives and the different sociological approaches to health and ill health. Functionalism – The theory that all aspects of a society serve a function and are necessary for the survival of that society. This links to This links to health as you are responsible for your own health and wellbeing and it is your responsibility to get better This links to ill health as they often fail to recognise a mental health problem, because of this it could get progressively worse and they could become very unwell and have a low self-esteem. Marxism – Society structure that is based on economic power and how wealthy you are. This has two social classes, the rich and the poor. This links to This links to health as rich people get cared for quicker. This is because they have the money to be able to get private health care. For example a poor person would have to go to a standard hospital and will have to wait hours to be seen to where as a rich person with private health care will be seen to straight away as there are less people waiting. This links to ill health as the believe that if the doctors do not find an illness then there is not one there, this means that they could have a serious health problem which a doctor may not have spotted and because they believe that there is not one there they could develop a serious illness and...

Words: 1755 - Pages: 8

Premium Essay

Unit 7

...Assignment Title:- How can we apply sociological perspectives in HSC? |STUDENT DECLARATION | |I understand the rules of plagiarism and I declare that the work produced for this assignment is my own. | | | |Student Signature ____________________________________Date_____________ | |Assignment Launch Date |Tuesday 3rd November 2011 | |Assignment Hand in Dates |Assignment 1 |2011 | | |Assignment 2 |2011 | | | | | | | |GRADING CRITERIA | |To achieve a pass grade you must show that you |To achieve a merit you must show that you are |To achieve a distinction you must show | |are able to: |able to: ...

Words: 1176 - Pages: 5

Premium Essay

Unit 7

...Unit 7: Sociological perspectives for health and social care Contents No. | Title | Page no. | 1 | P1: Explain the principal sociological perspectives | 3 | 2 | P2: Explain different sociological approaches to health and ill health | 4 | 3 | P3: Explain patterns and trends in health and illness among different social groupings | 5-7 | | Bibliography | 8 | P1: Explain the principal sociological perspectives Functionalism- The functionalism perspective is the main rule in society and sees society in different ways. Functionalism sees society as a system of highly interrelated parts that work together harmoniously. The main role of an intuition was to socialise with individuals and to ensure that they understood the underlying values of their society and behaved in acceptable ways. This ensured that was order in society. An example of the functionalist approach is that they view society as a body and each part has a function for society to work harmoniously. Marxism- Marxism perspective is a structuralism model. This approach was produced by Karl Marx. He also thought that individual behaviour was shaped by society, but then he realised the economic system was the definition of society and people’s place within it. He then identified that in the industrial society of his time there were two social classes. The bourgeoisies/capitalists– the small powerful group who owned factories and the employments and the proletariat– a much larger poorer group of “worker”...

Words: 2555 - Pages: 11

Premium Essay

Unit 7

...Self-Managed Teams Jadira Maldonado Kaplan University MT140-01 Professor Whitley Self-Managed Team Using self-managed teams within the Sandwich Blitz company would help the company grow. This will also allow Dalman to have more time to concentrate on the expansion as well. Self-managed teams empower employees most often in manufacturing, workers are trained to do all most of the jobs in the unit, they have no immediate supervisor, and they make decisions previously made by the first-line supervisors (Bateman & Snell, 2012). Self-managed teams can offer several possible advantages that could be used at Sandwich Blitz; including stronger commitment, employee and customer fulfilment, improved quality, improved productivity, and faster product and service development. On the other hand there will be some drawbacks. Self-managed teams are tough to execute, and failure is a risk when used in an unsuitable situations, or lacking appropriate leadership. A number of organizations have been dissatisfied with the results from self-managing teams. In the case of Sandwich Blitz, self-management teams may work to a sure extent, for example, having the team members cross-trained to do various jobs. This will enhance the flexibility of the team in dealing with staff shortages and in addition to help out with Dalman having to help fix every problem managers have. Thus applying Dalman and Lei’s knowledge of work procedures with the teams would help the team members to find a solution...

Words: 450 - Pages: 2

Premium Essay

Unit 7

...Dalman and Lei are pleased with the progress the Sandwich Blitz has achieved and are looking to expand the business in the near future. However, they are both spending an excessive amount of time helping the location managers with minor problems at each location. Dalman wants to explore a different type of management at the locations so he can devote more time to the growth of Sandwich Blitz Inc. In a traditional work environment, the manager plans the work and each job is narrowly defined. Cross-training is unproductive and information is not disbursed to to hourly employees. Risk-taking is highly discouraged and employees work alone. In contrast, working in a team environment has numerous advantages. The main benefit is that the manager and team members determine the work and plan it together. The jobs necessitate broad skills and knowledge and cross-training is encouraged. The team members work together and information is generously given so all team members can continuously learn. Teams can contribute to an organization’s effectiveness in multiple ways. They can help increase productivity, improve quality and reduce costs. Teams are employees that complement and trust each other and are dedicated to common goals. They hold each other accountable to the goals and performance at each business. An effective team is built by through three stages of development. The first phase is forming in which the group members attempt to lay the ground rules for what styles of behavior...

Words: 571 - Pages: 3

Premium Essay

Unit 7

...A decentralized approach to training managers and hourly employees of Dunkin Donuts and Domino Pizza has various strengths and weaknesses. Some of the strengths of decentralized training to training managers are that decentralized training program provide the managers with both theoretical and important practical skills. The managers are able to put into practice what is required by corporate through on the job training. They are also bale to develop interpersonal skills by working effectively with others during their training and evaluating are things are done and run and how decisions are made. Similarly as they are often trained by experienced store managers or franchise owners they get to have an ongoing experience of how a store operates and how to deal with employees they will be managing (Ivancevich, 2010). For Dunkin Donuts, a decentralized approach to training proved efficient and less costly by dropping training costs from $418,000 to $172,000 (Case study, n.d.). It also creates realistic job expectations by putting in view what the role of the manger trainee will be in the business. Drawbacks to a decentralized approach to training of managers include: Inconsistency, costly, quality of instructor and important regulatory component in training. Decentralization of training often result to inconsistency in training as different regions though use the same materials may employ different approaches of passing across the knowledge to management trainees. This implies...

Words: 1204 - Pages: 5

Premium Essay

Accounting Unit 7

...Fran Mackenzie | Management Accounting | Unit 7 | | Zahra Ali | 10/30/2014 | | Assessor's comments | Qualification | BTEC Level 3 Extended Diploma in Business | Assessor name | Fran Mackenzie | Unit number and title | Unit 7 Management Accounting ( J/502/5419) | Learner name | Zahra Ali | Assignment title | Tasks 1, 2 and 3 Regional Business Support Agency. Costs and Break Even | | Grading criteria | Achieved? | Comments | P1 | | | P2 | | | M1 | | | D1 | | | | General comments | | Action plan | | Assessor signature | Fran MacKenzie | Date | | Issue date: 6th October 2014 Final hand in date SUBMISSION 1: 3rd November 2014 Student Name: Zahra Ali Learner’s Declaration: I certify that the work submitted for this assignment is my own Signed: Zahra Ali Date: 30/10/14 Issue date: 6th October 2014 Final hand in date SUBMISSION 1: 3rd November 2014 Student Name: Zahra Ali Learner’s Declaration: I certify that the work submitted for this assignment is my own Signed: Zahra Ali Date: 30/10/14 Contents Introduction 3 Task 1 3 P1 3 ‘’1.Describe the main cost elements that a business needs to consider, explaining what category the costs fall into.’’- Blackboard 3 Revenue expenditure – 3 Capital expenditure – 3 ‘’2. Describe variable costs and give an example’’ – Blackboard 4 ‘’3. Describe fixed costs and give an example’’ - Blackboard 4 ‘’4. Describe semi-fixed or semi-variable costs...

Words: 3696 - Pages: 15

Premium Essay

Quiz Unit 7

...UNIT 7 Quiz 3: ------------------------------------------------- 1. What is a question answered by a Claim of Fact? a. True or False? b. Did it happen? Does it exist? (Correct answer) c. What should we do about it? d. How? 2. What is a question answered by a Claim of Cause? a. Why? b. Why not? c. What caused it? What are its effects? (Correct answer) d. Is it good or bad? 3. What is a question answered by a Claim of Definition? a. What if? b. What is it? How should we define it? (Correct answer) c. Did it happen? d. Does it exist? 4. Would an essay on gun control be a _________________? a. Claim of fact? b. Claim of cause? c. Claim of value? (Correct answer) d. Claim of policy? (Could be) 5. Would the sharing of U.S. information (Wikileaks) be a __________________? a. Claim of fact? b. Claim of cause? c. Claim of policy? (Correct answer) d. Claim of value? (Could be) 6. What are the (3) parts present in any argument? a. How, what and where? b. To be or not to be? c. Claim, Support and Warrants (Correct answer) d. Ideas, facts 7. The Greek words used to refer to the “proofs” are: a. Roman Empire b. Toga Party c. Logos (logic) Ethos (credibility) Pathos (emotion) d. Aristotle, Atheros 8. What is Argument from Cause? a. Blames the author or writer b. Strips down the actual thesis ...

Words: 362 - Pages: 2

Premium Essay

Unit 7 Video

...Unit 7 Video Summary 5 One of the most common uses of Flash memory is for the basic input/out put system of you computer, commonly known as the BIOS. The BIOS makes sure all other chips, hard drives, ports and CPU function together. BIOS is the first program that is activated during the boot, running on ROM, ready only memory. Startup BIOS activates the POST bootstrap loader which runs POST. POST checks the basic system hardware testing memory and assigning system resources. Startup BIOS also check the CMOS, comparing them to the hardware found during POST. CMOS setting are stored in the RAM ( Random Access Memory) and are not permanent as BIOS setting are and can be changed by the user. BOIS and CMOS are different they are stored on different chips. BIOS are stored in ROM and CMOS are stored in RAM. BIOS are permanent, while CMOS are volatile, it can be erased if the power goes off. BIOS cannot be edited by users. CMOS can be edited by users, configuration can be saved. CMOS setting are not lost because of the CMOS battery, providing power during shutdown. Preserves CMOS configuration stored in RAM. If the battery dies the symptoms would be low battery= slow clock, dead battery which means checksum error during boot. The system will reboot once you clear the checksum error. After POST is complete and the CMOS are checked, the BIOS check the MBR (Master Boot Record), which is located on the first sector on the hard drive. MBR finds the activate partition and loads the 1st operating...

Words: 303 - Pages: 2