Lab 2 – Water Quality and Contamination Experiment 1: Effects of Groundwater Contamination Table 1: Water Observations (Smell‚ Color‚ Etc.) Beaker Observations 1 This beaker has water only‚ clear with no smell 2 I mixed oil in the water‚ the oil then started to settle at the top of the water. (oil is not a soluble) 3 Beaker contained vinegar and water‚ the water got a little cloudy and the vinegar smell is very strong. 4 The water and laundry detergent mix had a soapy look to it‚ water also
Premium Drinking water Water pollution Water
Week 2 Complete Lab 1. Solve the exponential equation by expressing each side as a power of the same base and then equating exponents. 6 x = 216 x = 3 2. Solve the exponential equation. Express the solution in terms of natural logarithms. Then use a calculator to obtain a decimal approximation for the solution. ex = 22.8 x= ~3.12676 3. Solve the following logarithmic equation. Be sure to reject any value of x that is not in the domain of the original logarithmic expression. Give
Premium Natural logarithm Radioactive decay Exponential function
1.) From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5‚ High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities) a. Fire destroys primary data center b. User downloads an unknown e-mail attachment c. Hacker penetrates your IT infrastructure and gains access to your internal network d. Workstation OS has known software vulnerability 2.) For the above identified threats and vulnerabilities‚ which of the following COBIT P09 Risk Management control
Premium Risk Risk management Management
Statistics – Lab Week 2 Name: Math221 Creating Graphs 1. Create a Pie Chart for the variable Car - 2. Create a histogram for the variable Height – 3. Create a stem and leaf chart for the variable Money – Stem-and-Leaf Display: Money Stem-and-leaf of Money N = 20 Leaf Unit = 1.0 9 0 124456667 (3) 1 249 8 2 128 5 3 03 3 4 27 1 5 2 Calculating Descriptive Statistics 4. Calculate descriptive
Premium Standard deviation Arithmetic mean Gender
1. What are the five steps of a hacking attack? Reconnaissance ‚ Scanning‚ Gaining Access‚ Maintaining Access ‚ Covering Tracks 2. During the reconnaissance step of the attack‚ describe what task Zenmap GUI performs to do passive OS fingerprinting. Nmap uses the –O option to perform OS fingerprinting. The process monitors and captures network traffic. The traffic is then analyzed for patterns that would suggest which operating systems are in use. 3. What step in the hacking attack process
Premium Windows 2000 Microsoft Operating system
Lab 2 – Water Quality and Contamination Experiment 1: Effects of Groundwater Contamination Table 1: Water Observations (Smell‚ Color‚ Etc.) Beaker Observations 1 The water is clear with no distinct smell. 2 The vegetable oil does not mix with the water. Oil on top‚ separated from the water. Oil has a slight yellow look to it. No odor. 3 Vinegar mixes with the water and retains clarity. Has a slight smell of vinegar to it. 4 Laundry detergent changes the water’s clarity to a blue-green color. It has
Premium Water pollution Drinking water Water quality
Lab Report 1. What are the business goals? (10 points) Business Goals for this project include addressing the growth of on-campus and online students. To accomplish these goals a centralized server located in new IT wing of the administration building providing online backup of all data. Replacing the PBX-based telephone system with a VoIP based system and connecting all buildings providing high-speed wired network connection for all facility offices will be implemented along with controlled
Premium Wireless access point Google Wireless network
This archive file of SCI 207 Week 2 Answer to Lab Question 2 shows the solutions to the following problems: In the lab questions below‚ report your answers in the format of a scientific report: introduction‚ methods‚ results‚ discussion‚ conclusions and management recommendations. Introduction 1. What is the question that this study aimed to answer? State the hypothesis that you tested. 2. Briefly describe the methods of data collection and analysis you used to test your hypothesis
Free Question Answer Water supply
Lab 3 Exercise 3.1: Installing the DHCP Server Role‚ Questions 1-3. Question 1: What is the name of the computer you are working from? The Name of the computer is W2K8xx Question 2: What is the Default lease duration of a wired subnet type? Wired less duration will be 8 days Question 3: What are 3 recommendations listed in Server Manager for managing the DHCP Server role? 1. Increase fault tolerance by splitting DHCP scopes 2. Eliminate manual updates of DNS records by configuring dynamic
Premium IP address Dynamic Host Configuration Protocol Subnetwork
Week 2 Lab #2 Assessment Questions 1. Privacy is where a person has control their own personal data Privacy is the individual’s right to control‚ the person has the opportunity to assess a situation and determine how’s it’s used. Just because information is secure it doesn’t mean it is secure. 2. In 2002 he received permission to obtain a laptop and hard drive not to acquire the data. 3. Possible consequences might be that personal information being used against the people in the VA system
Premium Virtual private network Evaluation