Introduction 2 3.0 Aims 3 4.0 Theory 3 5.0 Apparatus 5 6.0 Procedure 5 7.0 Result 7 8.0 Calculation 10 9.0 Discussion 11 10.0 Conclusion 13 11.0 Recommendation 13 12.0 References 13 13.0 Appendix 14 1.0 Abstract In this experiment‚ Escherichia coli is used as a sample to study the growth kinetic of microorganism in shake flask. A different volume of E.coli was transferred into 250ml Erlenmeyer/shake flask containing media for the nutrient of microorganism. The different volume
Premium Bacterial growth Bacteria Agar plate
BIMM 101: Recombinant DNA Lab Lab 7 & 8 Assignment Part B 1. A genomic library is a “collection of recombinant vectors or clones‚ among which is representative of the entire genome of the organism” (BIMM 101 Lab Manual‚ 47). In order to create a genomic library‚ genomic DNA from Vibrio fischeri was first isolated then treated with Sal I restriction enzyme to generate inserts (smaller fragments of DNA). Sal I restriction enzyme was also used to treat the vector plasmid in order to digest
Premium DNA Plasmid Escherichia coli
It would be nearly impossible to have the transportation of vesicles without kinesin to guide it. And without the transportation of these synaptic vesicles to release their neurotransmitters‚ there would be no movement in the cell at all. This experiment is so important because vesicle transport in neurons helps to identify many neurological disorders. One such example is a research on Drosophila. Since there is only one kinesin light gene in the subject‚ the mutants in that one chain gene exhibit
Premium Nervous system Neuron Protein
Lab #1 Submission 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop‚ and identify whether that application starts as a service on the system or must be run manually. Wireshark – manual Nessus Client – manual Nessus Server Manager – can be set up to run at Startup Filezilla Server Interface – starts as a service Zenmap GUI - manual 2. What was the allocated source IP host address for the TargetWindows01 server‚ TargetUbuntu01 server‚ and the
Free Linux Subnetwork Internet Protocol
Keith Brown IS 4670 Lab 1 Perform a Byte-Level Computer Audit 1. What is the main purpose of a software tool like WinAudit in computer forensics? Answer: WinAudit is a great free tool that will give you a comprehensive view of the components that make up your system‚ including hardware‚ software and BIOS. 2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation? Answer: Computer Name‚ OS‚ Security Settings for Windows
Free Computer forensics Forensic science Computer program
are and what precautions should be taken. Exercise 1: Structures of the Skin Observations Before beginning‚ set up a data table similar to this Data Table 1. Fill in the names of the numbered structures. Skin Diagram (National Library of Medicine at http://nih.nlm.gov) Data Table 1: Structures of Skin Item Name 1. Hair 2. Piloerector Muscle 3. Sebaceous Gland
Premium Skin Epidermis
Concentration Gradients Experiment 1. For each of the bags‚ identify whether the solution inside was hypertonic‚ hypotonic or isotonic in comparison to the beaker solution it was placed in. Bag #1’s solution was hypotonic compared to the solution of beaker #2. Bag #2’s solution was also hypotonic compared to the solution of beaker #2. Bag #3’s solution was isotonic compared to the solution of beaker #2 and Bag #4’s solution was hypertonic compared to the solution of beaker #1. 2. Which bag
Premium Osmosis Water Chemistry
this company? - Will the employees be aware of this test? Authorization Letter – From John Smith‚ CEO of E-Commerce Sales stating that I have permission to do this test. Lab Assessment Questions and Answers 1. Provide a brief summary of the activities in each of the hacking steps listed below: 1. Reconnaissance—The initial stage of collecting information on your target network 2. Enumeration—The process of querying active systems to grab information on network shares‚ users
Premium Computer security Hacker World Wide Web
Lab #1 1. List the five (5) steps of the Hacking process. Reconnaissance‚ Scanning‚ Gaining Access‚ Maintaining Access‚ Covering Tracks 2. In order to exploit or attack the targeted systems‚ what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan? The first step would be the reconnaissance or footprinting step of the hacking process. 3. What applications and tools can be used to perform
Premium Computer security
Cervisiae<br><br><b>Description</b> - Yeast is a unicellular organism that lacks chloroplasts. They are so small that it can ’t be seen by the naked eye and they are so small that it would take 4000 of them lined up side by side to measure an inch. <br><br><b>Habitat</b> - Yeast lives on and is nourished by dead or living plant or animal matter. The ideal conditions of yeast is high humidity and temperature‚ plus lots of food. In bad conditions though the yeast produces a second cell wall for protection and the yeast contents
Premium Yeast Organism Fungus