Question

In: Civil Engineering

Write your plan for the investigation as described below and save it as a Word document.

 

Fire Suppression Investigation Plan

Write your plan for the investigation as described below and save it as a Word document.

  • Detailed one page summary of your plans, including sketches if necessary. (Note: If you cannot submit your sketches, describe them in words.)
  • Itemized list of materials, with total costs.
  • Stoichiometric calculations of the amount of reactants required to produce enough gas to extinguish the fires. Remember that some gas may be lost prior to its use as a fire extinguisher.

Solutions

Expert Solution

Suppression involves a wide range of possible tactics from the initial attack to final control. All wildland fires will be suppressed. Suppression actions will be conducted in a safe, aggressive, efficient and cost-effective

manner to quickly control the fire with minimal resource damage and limited smoke impacts to local communities. The Incident Commander is responsible for directing suppression actions to be carried out through orders from the Fire Management Officer. The Incident Commander will keep the Project Leader informed of suppression actions. In addition to consulting with the Project Leader or their representative, a Resource Advisor should be assigned to the incident from the beginning to document rehabilitation needs and assist with on-the-ground tactical decisions. Typical initial attacks initiated by the refuge will include a two person fire crew supplied with hand tools. The objective of initial attack is to prevent the escape of wildland fires and contain the fire’s spread. Adjustments to these dispatch levels may be made at the discretion of the duty officer based on local conditions or initial reports. In some refuge locations, attempts to suppress a wildland fire could potentially have greater ecological impacts than effects of the fire itself. Actions that could have significant negative effects to resources in certain areas of the refuge are restricted and the decision to use them is governed by key fire personnel. Table 6 identifies restricted suppression actions within the FMUs on the refuge and authorization personnel required for each action. Suppression actions requiring Resource Advisor (RA) approval will not be conducted without RA approval, unless they are ordered by the Incident Commander (IC) to protect human life and/or structures on government or private land from the threat of wildland fire.

Suppression Conditions:-

A full suppression alternative was selected for this refuge which requires containment and control of all wildland fires. Guidelines discussed under Suppression Tactics have been developed to assist with this strategy while protecting the refuge from unnecessary resource damage. The use of heavy equipment and fire chemicals is restricted due to cultural, habitat, and wildlife concerns and requires consultation with the RA prior to their use. At the Annual Operating Plan Review, issues pertaining to restrictions should be discussed with cooperators. Changes in restrictions and areas of concerns should be documented. The refuge has primary responsibility for all pre-suppression and prevention activities on refuge lands. Refuge personnel will make immediate initial attack on all fires occurring on the refuge until assistance arrives. All wildland fires will be actively suppressed, but safety will be the first concern in suppression actions. Fire threatening occupied residences, administrative buildings, shop/storage buildings, and adjacent privately owned structures are to be protected first and controlled at all cost. Structural fire suppression by Service personnel will only be conducted when there is a threat to human life. Service personnel may assist in protecting wild lands around structures, when such actions can be accomplished safely. Second priority suppression areas are recreation facilities, including bathrooms and signs. Protection of permittee cattle, equipment, and habitat is third priority for suppression.


Related Solutions

Use the confusion matrixes to answer the questions below. Record your answers in a word document....
Use the confusion matrixes to answer the questions below. Record your answers in a word document. Explain your responses and include screen shots where requested. A 5000 row dataset was used to build a model to predict if a person would accept a marketing offer for a personal loan (Personal Loan = Yes). It was partitioned into Training, Validation, and Test with the model results above. If you were to decrease the cutoff to 0.3 how would that impact your...
Please write your answer on a word document, with no less than 500 words. Please note...
Please write your answer on a word document, with no less than 500 words. Please note that your answer will be checked automatically for the plagiarism 1- Discuss the impact of promotion on demand within a supply chain ?
Copy the below and put into an MSWord document (and save it :). Next enter paragraph...
Copy the below and put into an MSWord document (and save it :). Next enter paragraph breaks where you think they should go. You do NOT need rewrite or edit anything. Simply focus on putting paragraph breaks where you think they should go. Then save that document and attach for submission. Snoring is caused when the airway at the back of the nose and throat becomes partially obstructed. This is usually due to the loosening of the surrounding oropharyngeal muscles,...
In a one page Word Document, plan interventions with rationale which will promote an environment of...
In a one page Word Document, plan interventions with rationale which will promote an environment of safety for the described client below. Consider the client’s medical history and medications. Mr. Joe Smith, a 75-year old man, recently suffered a left cerebrovascular accident. He has the right visual field deficits and residual weakness in this right arm and leg. He uses a walker for mobility. He takes Metoprolol for his blood pressure and the physician started him on Coumadin because he...
research the Caesar Cipher, and document your research in 2-3 pages in a Word document with...
research the Caesar Cipher, and document your research in 2-3 pages in a Word document with illustrations in your document and provide an example of how the Caesar Cipher works while encrypting and decrypting a sample message. Also, add its history and its internal workings. Summary of the areas to complete: - Research the Caesar Cipher. - Show its Encryption Method in details. - Show its Decryption Method in details. - Describe its History and what it was used for....
Create a Word document that outlines how your ETL Process works. This document should be written...
Create a Word document that outlines how your ETL Process works. This document should be written as a technical support document that new hire can read to understand what the process does and technicians might use to troubleshoot the process. Include screen shots,
Assignment Requirements Please complete all parts in a Microsoft Word document. The body of your document...
Assignment Requirements Please complete all parts in a Microsoft Word document. The body of your document should be at least 900 words in length. Quoting should be less than 10% of the entire paper. Paraphrasing is necessary. Students must cite and reference at least 4 credible sources from the Library. Instructions Imagine that you are an administrator for a large hospital. As part of your role within healthcare leadership, you are involved in several committees for the organization. For this...
In each part below, a task is described. Your job is to write one or more...
In each part below, a task is described. Your job is to write one or more JAVA statements which will accomplish this task. Assume that all variables have data type int. If you need other variables you may declare them and use them. a. 6 pts Assume that variables x, y, and z have values. Print all the values from x to y that are evenly divisible by z. For example, if x is 6, y is 18, and z...
Using a spreadsheet (such as Excel) or a calculator, perform the operations described below. Document results...
Using a spreadsheet (such as Excel) or a calculator, perform the operations described below. Document results of all intermediate modular multiplications. Determine a number of modular multiplications per each major transformation (such as encryption, decryption, primality testing, etc.). a. Test all odd numbers in the range from 223 to 229 for primality using the Miller-Rabin test with base 2. b. Encrypt the message block M= 7 using RSA with the following parameters: e = 17 and n = 223 *229....
In a Word document, write an essay (3 page minimum, and citing references) that compares the...
In a Word document, write an essay (3 page minimum, and citing references) that compares the various kinds of data integrity and business rules at the relationship, table, and field levels, and explains why each one is important. Additionally, your essay should provide specific examples of how data integrity can be compromised, and how the lack of appropriate business rules can have a negative impact on the operations of an organization.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT