This lab will allows the comparison between elimination reactions under acidic and basic conditions through an analysis of two separate reactions: an acid-catalyzed dehydration of 1-butanol and 2-butanol using sulfuric acid and a dehydrobromination under basic conditions using potassium tert-butoxide of 1-bromobutane and 2-bromobutane. The products of all four reactions will be analyzed with gas chromatography‚ which separates organic compounds to see how each reaction’s product are formed under
Premium Chemistry Chemical reaction Acetic acid
successfully complete the project a five phased approach based on the PMBOK will be taken. Phase 1 – Initiation 1. Define the project SOW. 2. Requirements gathering. 3. What are the “project goals‚ budget‚ timelines‚ resources‚ etc?” (Reynolds‚ 2010) Phase 2 – Planning/Designing 1. Define the project team. Identify all key roles and responsibilities within the team 2. Complete a “WBS of all the work that must be done to complete the project” (Wysocki‚ 2009). 3. Design Review meetings 4. Task duration
Premium Manufacturing Marketing Statements
Take productivity to the next level and still look sophisticated doing it – the HP ProBook 455 G1 SmartBuy Notebook PC provides reliable system and data processing that helps you get your work done and ready for the next stage. Protected inside and out Designed to complement its incredible capacity and efficiency‚ the ProBook 455 G1 features a sturdy and elegant design that protects your data from inside and out. A spill-resistant keyboard protects the internal system. Meanwhile‚ the thin yet incredibly
Premium Computer Personal computer Operating system
I believe that the importance of correct programming and setting up of part is very important in today’s CNC manufacturing world as you are producing very precise components that need to be produced first time‚ every time or this is bad news for the company because of loss profits‚ scrap material and expensive repair costs. So ensuring correct programming and setting up of CNC machines is critical. The main reason for needing to produce accurate programing codes to the right specifications is to
Premium Management Manufacturing Project management
Unit 1 Assignment 1: Developments in Hacking‚ Cybercrime‚ and Malware ITT Technical Institute The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacks--attempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation‚ 2009)
Premium Internet Malware Computer virus
Name Entity (NE) is an expression that refers to proper names such as persons‚ locations‚ and organizations. For example: Arafat Awajan is a full professor at Princess Sumaya University for Technology in Jordan‚ then Arafat Awajan‚ Princess Sumaya University for Technology‚ and Jordan would be identified as reference to person‚ an organization‚ and location‚ respectively. The task that attempts to locate‚ extract‚ and automatically classify named entities into predefined classes or types in open-domain
Premium Entity-relationship model Concepts in metaphysics Object
Enzyme assay lab report Health and safety: 4-nitrophenol is harmful. Introduction: Enzymes are quaternary structured proteins that are specific biological catalysts that speed up a reaction without being used up. They contain an active site that allows substrate to bind to a specific area on the enzyme which is of a complimentary shape of the substrate. There are two models of enzyme action‚ the Lock and Key model and the Induced Fit model. The Lock and Key model states that the enzyme has a specific
Premium Enzyme
2. You must provide a Ghost Solution Suite 2.5 Symantec License File (SLF) to register the Ghost Console. You will NOT be able to use the older method of serial number and activation key or the SLF from version 2.0 to register the 2.5 Console. For more
Premium Microsoft Windows Windows Server 2008 Windows NT
Unit 1 Assignment Instructions: Download this document to your computer before filling it out. Each of the responses below should be appropriately filled in and the document saved again before submitting to the Unit 1 Dropbox. Be certain to answer each question completely. Unit 1 Assignment Outcomes practiced in the assignment • Describe some of the technological challenges created by computers and technology • Explain the digital divide • Define the term “computer literate”
Premium Education Completeness Learning
1) Describe what you did and how you did it. This week we have started with the normal reading which was quite extensive to get an overview of Dynamic Programming‚ The Knapsack problem‚ and randomized algorithms. As you can see there were quite impressive topics‚ but this time besides the videos provided with the unit I decided to get a little more information so I searched online for some material to help my understanding. The discussion forum as usual provided great input; you can really tell
Premium