# Register now to access 7 million high quality study materials (What's Course Hero?) Course Hero is the premier provider of high quality online educational resources. With millions of study documents, online tutors, digital flashcards and free courseware, Course Hero is helping students learn more efficiently and effectively. Whether you're interested in exploring new subjects or mastering key topics for your next exam, Course Hero has the tools you need to achieve your goals.

1 Page

### SW-HW3_W09

Course: MER 101, Fall 2009
School: Union College
Rating:

Word Count: 113

#### Document Preview

Engineering MER101: Graphics/ AT SolidWorks Assignment # 3: Problem 1: Finish, the Metal Gasket, exercise 1.1 of the SolidWworks textbook, started in class. Problem 2: Create the following plate (Units: inches). a) Use boss extrude to create the base plate. b) Use extruded Cut to create the central hole (1.25). c) Use extruded Cut and mirror to create the holes 2 (0.5). Hints: Start with two centerlines and sketch...

Register Now

#### Unformatted Document Excerpt

Coursehero >> Nebraska >> Union College >> MER 101

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.
Engineering MER101: Graphics/ AT SolidWorks Assignment # 3: Problem 1: Finish, the Metal Gasket, exercise 1.1 of the SolidWworks textbook, started in class. Problem 2: Create the following plate (Units: inches). a) Use boss extrude to create the base plate. b) Use extruded Cut to create the central hole (1.25). c) Use extruded Cut and mirror to create the holes 2 (0.5). Hints: Start with two centerlines and sketch the base plate such that the origin is located at the center point of the central hole (1.25). Problem 3: Create the following guide using a single featur...

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Michigan - PERSONAL - 340
Econ 340Lecture 8 US Trade Policies and InstitutionsOutline: US Trade Policies and Institutions Parts of the US Government that Handle Trade We do NOT have a Ministry of Trade What We DO Have Main Features of US Trade Policies Tariffs,
Michigan - PERSONAL - 340
Econ 340 Winter Term 2009 Study QuestionsAlan Deardorff Tariffs Page 1 of 5Study Questions Lecture 5 TariffsPart 1: Multiple ChoiceSelect the best answer of those given. 1. A specific tariff is a. b. c. Any tax on a particular imported good (a
Michigan - PERSONAL - 340
Econ 340 Fall Term 2007 Study Questions (with Answers)Alan Deardorff Tariffs Page 1 of 5(6)Study Questions (with Answers) Lecture 5 TariffsPart 1: Multiple ChoiceSelect the best answer of those given.1.A specific tariff is a. b. c. Any tax
Michigan - PERSONAL - 340
Outline: US Trade Policies and InstitutionsEcon 340Lecture 8 US Trade Policies and Institutions Parts of the US Government that Handle Trade We do NOT have a Ministry of Trade What We DO Have Main Features of US Trade Policies Tariffs,
Michigan - PERSONAL - 340
Econ 340Lecture 6 Nontariff BarriersAnnouncements Honors students: Topic due by next Monday, Feb 2, for honors conversionLecture 7: Reasons2Outline: Nontariff Barriers What Are NTBs? Quotas Effects Equivalent to Tariffs Who Gets the Ren
Michigan - PERSONAL - 340
Econ 340 Fall Term 2007 Study QuestionsAlan Deardorff WTO Page 1 of 4Study Questions Lecture 9 World Trade Arrangements and the WTO Part 1: Multiple ChoiceSelect the best answer of those given.1.The OECD a. b. c. d. e. Gathers and publishes
Michigan - PERSONAL - 340
Econ 340Lecture 5 TariffsOutline: Tariffs What Are They? Who Uses Them? Effects of Tariffs Small Country Case Effects on quantities and prices Effects on economic welfare Large Country Case Effect on world price Effect on welfare Size
Michigan - LEC - 360
Power and Politics I: Power in relationships(coffee hour today)Power and politics Power defined Ability to influence another Getting someone to do something they wouldn't otherwise do Ability to get things done Not necessarily status Politi
Washington - MATH - 480
Susan MasseyMath 480 BApril 9, 2007 (assignment due April 6)Homework#2: p.23 #11 a,b p.142 #1, 3, 4This file includes the problems needing matlab to go with the homework that I did by hand and submitted in class this morning.%Prob
Union College - MER - 101
MER 101: Engineering Graphics HAND DRAWING HW 1
UCCS - CS - 591
Rule:-Sid:6411-Summary:This event is generated when an attempt is made to exploit a known vulnerability in a web server running Microsoft FrontPage Server Extensions.-Impact:Information gathering and system integrity compromise. Possible
UCCS - CS - 591
Rule:-Sid:1043-Summary:This event is generated when an attempt is made to access the file 'viewcode.asp' on a web server.-Impact:If successful, this attack will display the contents of any file on the server. In addition, it has been rep
UCCS - CS - 591
Rule:-Sid:388-Summary:This event is generated when an ICMP Address Mask Request message is found on the network. ICMP Address Mask Requests are used for automatically determining the 32-bit subnet mask for the network.-Impact:Attacks
USC - CS - 546
CS 546: Intelligent Embedded SystemsGaurav S. SukhatmeRobotic Embedded Systems Lab Center for Robotics and Embedded Systems Computer Science Department University of Southern California gaurav@usc.edu http:/robotics.usc.edu/~gaurav/CS546 Last ti
NMT - CS - 331
Computer Design&quot;The definition of a single number to quantify the performance of a parallel computer has been the Holy Grail of parallel computing, the unsuccessful search for which has been a distraction from the understanding of parallel performan
NMT - CS - 331
Memory HierarchyEleven Advanced Optimizations Memory Technology &amp; DRAM Optimizations Protection: Virtual Memory and Virtual Machines Design of Memory Hierarchies AMD Opteron Memory Hierarchy Pitfalls &amp; FallaciesWhy not just forget it?Why do we
RIT - CXF - 4244
Conner M. FinlaySchool Address 256 Colony Manor Drive Rochester, NY 14623 (774) 276-1145 Email: cfinlay@gmail.com OBJECTIVE EDUCATION Permanent Address 58 Highland View Drive Sutton, MA 01590 (774) 276-1145To obtain a position in the information t
RIT - KEO - 9540
KyLE O'NEILL716 Kimball Drive, Rochester, NY 14623 . koneill305@gmail.com . Cell # (609) 408 3420OBJECTIVE To obtain a challenging cooperative education position in the field of Marketing or Advertising in Spring/Summer 2009. EDUCATION Rochester I
USC - CS - 578
Architectural AdaptationSoftware ArchitectureCopyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved.Software ArchitectureFoundations, Theory, and PracticeAdaptationChange is endemic to software x percei
USC - CSCI - 546
CATCH: Context Awareness Through Classification HierarchiesLeyla Kazemi Ali Khodaei Jeff Khoshgozaran Android G1CS546 - Spring 2009Project Description Multi-levelactivity classification based on sensor data acquired from G1 mobile phones is t
RIT - P - 09007
Stand/Enclosure Assembly DesignMatt Sennett P09007Stand Assembly Review Schedule Expectations Project Planning elements Customer needs Engineering Specifications BOM Visualizations 3D models, Mock-up Design gap discussion Review of othe
UCCS - CS - 591
Rule:-Sid:287-Summary:This event is generated when a remote attacker attempts to exploit a QUALCOMM Qpopper POP3 buffer overflow vulnerability in BSD operating systems.-Impact:Remote execution of arbitrary code leading to remote root comp
USC - CSCI - 577
Project #8: AAA Petal Pushers Remote R&amp;D Client Meeting Note #6 Date Venue Start time Attendee: Name Chatupoln Taparugssanagorn Ampatcha Satornsantikul Chatchai Sinthop Sattawat Suppalertporn Saranya Iranoppaiboon John Lindsey Apology: Name Ryan Lee
USC - CSCI - 577
Date Venue Start time Attendee: Project #8: AAA Petal Pushers Remote R&amp;D Client Meeting Note #11 November, 21 2008 Leavy 202H 4:00 PM Position Project Manager Requirement Engineer Software Architect Feasibility Engineer Operati
USC - CSCI - 577
Project #8: AAA Petal Pushers Remote R&amp;D Client Meeting Note #10 Date Venue Start time Attendee: Name Chatupoln Taparugssanagorn Ampatcha Satornsantikul Chatchai Sinthop Sattawat Suppalertporn Saranya Iranoppaiboon John Lindsey Apology: Name Ryan Lee
USC - CSCI - 577
Project #8: AAA Petal Pushers Remote R&amp;D Client Meeting Note #3 Date Venue Start time Attendee: Name Chatupoln Taparugssanagorn Ampatcha Satornsantikul Kantipa Lumyai Chatchai Sinthop Sattawat Suppalertporn Saranya Iranoppaiboon Ryan Lee Hoover Ibrah
UCCS - CS - 591
Rule:-Sid:13775-Summary:This event is generated when activity relating to the spyware application &quot;Trickler trojan ecodec&quot; is detected.-Impact:Unkown. Possible information disclosure, violation of privacy, possible violation of policy.-
UCCS - CS - 591
Rule:-Sid:14082-Summary:This event is generated when activity relating to the &quot;trojan agent.aarm&quot; Trojan Horse program is detected.-Impact:Possible theft of data and control of the targeted machine leading to a compromise of all resources
Simmons - SHS - 0405
Nutrition Faculty and StaffTeresa T. Fung, S.D., R.D., Assistant Professor of Nutrition B.S. and M.S., Cornell University, S.D. Harvard University School of Public health Dr. Fung's recently completed doctoral dissertation investigated the dietary f
Washington University in St. Louis - MEXMRS - 0576
=Upfront Notes= This &quot;aareadme.txt&quot; file contains the description of the naming convention that will be used for all MEX kernels. One part of them will be directly produced by an automated system located at ESTEC,PST. Consequently, we c
Washington University in St. Louis - MEXMRS - 0576
=MEX CK Files= Last update: 22 NOV 2005 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/CK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX CK files, and it provide
Washington University in St. Louis - MEXMRS - 0576
=MEX FK Files= Last Update: 12 MAY 2006 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/FK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX FK kernels, and it provides id
Washington University in St. Louis - MEXMRS - 0576
=MEX LSK Files= Last update: 08 AUG 2005 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/LSK directory. It also provides the file naming conventions used for the MEX LSK kernels, and it provides identification of t
Washington University in St. Louis - MEXMRS - 0576
=MEX PCK Files= Last Update: 12 MAY 2006 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/PCK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX PCK kernels, and it provides
Washington University in St. Louis - MEXMRS - 0576
=MEX SPK Files= Last update: 30 MAY 2006 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/SPK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX SPK kernels, and it pr
Washington University in St. Louis - MEXMRS - 0576
=MEX SCLK Files= Last update: 22 MAR 2004 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/SCLK directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX SCLK kernels, and it
Washington University in St. Louis - MEXMRS - 0576
=MEX Orbit Number Files= Last update: 11 MAY 2006 This &quot;aareadme.txt&quot; file describes the contents of the KERNELS/ORBNUM directory of the MEX SPICE data server. It also provides the file naming conventions used for the MEX Orbit Numbe
Michigan - PERSONAL - 340
Outline: Nontariff BarriersEcon 340Lecture 6 Nontariff Barriers What Are NTBs? Quotas Effects Equivalent to Tariffs Who Gets the Rents Other NTBs Tariff-Rate Quotas Voluntary Export Restraints (VERs) Variable Levies Government Procu
Union College - MATH - 235
USC - AME - 525
USC - AME - 204
Temple - BA - 323
Purdue - ECET - 210
/*Use of while loop and delay insertion into the code;Program counts down from user-input number with desired delay betweeneach count, and then fires the rocket.by Dwight Sturrock */#include &lt;iostream&gt;#include &lt;windows.h&gt; /required to use t
Texas A&M - STAT - 303
STAT303 Sec 508-510 Fall 2008 Exam #3 Form AInstructor: Julie Hagen Carroll Name:1. Dont even open this until you are told to do so. 2. There are 20 multiple-choice questions on this exam, each worth 5 points. There is partial credit. Please mark y
Texas A&M - STAT - 303
STAT302: 508-510Final Exam, Form AFall 19971. In reference to simple linear regression, how do we test the assumption that the variance about the true regression line is constant? A. Bartlett's test for equal variances which is provided in the
Oregon State - BA - 350
&quot;For Want of a Metaphor&quot; in The Flamingo's Smile, by Stephen Jay Gould We would say today that Maupertuis's basic insight was correct: complexity cannot arise from formless potential; something must exist in the egg and sperm. But we now hold a radic
UC Davis - ATT - 0905
DTU Transport seeks .Researcher/Senior Researcher in Welfare EconomicsYour central field of research is applied socioeconomic methods, and one of the challenges will be the assessment of different tax instruments within transport and estimation of
UNLV - MATH - 124
UCCS - CS - 591
Rule-Sid14773-Summary:This event is generated when an attempt is made to exploit a known vulnerability in arcserve_backup_for_laptops_and_desktops.-Impact:Denial of Service. Information disclosure. Loss of integrity. Complete admin access
UCCS - CS - 591
Rule:-Sid:2000-Summary:This event is generated when a remote user attempts to access readmsg.php on a web server. This may indicate an attempt to exploit a directory traversal vulnerability in the WebMail application on Sun Microsystems' Coba
UCCS - CS - 591
Rule:-Sid:1607-Summary:This event is generated when an attempt is made to access hsx.cgi on a web server. This may indicate an attempt to exploit a vulnerability in the Hyperseek 2000 search engine that allows read-access to directory listing
UCCS - CS - 591
Rule:-Sid:2324-Summary:This event is generated when an attempt is made to exploit a known vulnerability in Virtual Programming VP-ASP web application running on a server.-Impact:Information gathering and system integrity compromise. Poss
UCCS - CS - 591
Rule:-Sid:4150-Summary:This event is generated when an attempt is made to return to a web client a file with a Class ID (CLSID) embedded in the file.-Impact:A successful attack may result in the execution of code of the attackers choosing
UCCS - CS - 591
Rule:-Sid:1029-Summary:This event is generated when an attempt is made to exploit a potential weakness on a host running Microsoft Internet Information Server (IIS). -Impact:Information gathering possible administrator access.-Detailed
UCCS - CS - 591
Rule:-Sid:2461-Summary:This event is generated when a user on a host in your network that is running Yahoo Instant Messenger is viewing a webcam or listening to an audio message of another Yahoo IM user.-Impact:Possible policy violation
UCCS - CS - 591
Rule:-Sid:803-Summary:This event is generated when an attempt is made to access hsx.cgi and then utilize a directory traversal technique to read files outside the root directory of the web server. This indicates an attempt to exploit a vulner
UCCS - CS - 591
Rule:-Sid:2459-Summary:This event is generated when a host in your network that has Yahoo Instant Messenger running starts a webcam or sends an invitation to view a webcam to another Yahoo IM user. -Impact:Possible policy violation. Inst
UCCS - CS - 591
Rule:-Sid:8031-Summary:This event is generated when an attempt is made to return to a web client a file with a Class ID (CLSID) embedded in the file.-Impact:A successful attack may result in the execution of code of the attackers choosing
UCCS - CS - 591
Rule:-Sid:3058-Summary:This event is generated when a remote user sends an overly long string to an IMAP server via the command COPY. This may indicate an attempt to exploit a buffer overflow condition.-Impact:Serious. Possible remote e
UCCS - CS - 591
Rule:-Sid:2105-Summary:This event is generated when a remote user uses the IMAP AUTHENTICATEcommand to send a suspiciously long string to port 143 on an internalserver. This may indicate an attempt to exploit a buffer overflowvulnerability