Amanda Jornd Experiment 7- Synthesis and Reactivity of tert-Butyl Chloride Via an SN1 Reaction Introduction/Background: Alkyl halides are compounds in which a halogen atom replaces a hydrogen atom of an alkane. Alkyl halides are classified as primary‚ secondary or tertiary depending on the number of alkyl substituents directly attached to the carbon attached to the halogen atom. The purpose of this lab was to properly prepare t-butyl chloride from t-butyl-alcohol in a concentrated hydrochloric
Premium Solvent Hydrochloric acid
6. Compare how does earth’s orbit compare to a circle? * the earth’s orbit is in the shape of an ellipse‚ which is pretty much like an oval‚ however its really close to a circle‚ in the earth’s case‚ just a little bit squished 7. Observe which of the orbits truly looks
Premium Planet Sun Earth
Unit 7 Lab: Business Impact analysis 1. What is the goal and purpose of a BIA? 2. Why is a business impact (BIA) an important first step in defining a business continuity plan (BCP)? 3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure? 4. What is the definition of recovery time Objective (RTO) Why is this important to define n an IT Security Policy Definition as part of the Business Impact Analysis (BIA) or business Continuity
Premium Business continuity planning Risk management Management
Lab 7 1- The overall objective of the BIA is to identify the impact of outages. More specifically‚ the goal is to identify the critical functions that can affect the organization. After these you can identify the critical resources that support these functions. Each resource has a MAO and impact if it fails. The ultimate goal is to identify the recovery requirements. An indirect objective of the BIA is to justify funding. 2- The first step towards creating a serious BCP is to identify the potential
Premium Business continuity planning Risk management
Anthony Jones NT1210 Lab 7.1-7.2 2/1/2015 7.1.1There are no limitations on WANs so they can be custom built for the size of the organization. For the purpose of organizational expansion. Exercise 7.1. The longer the distance the more chances that you have for signal loss and lack of signal strength. Exercise 7.1.3 Media Infrastructure SummaryUTP Phone Lines Used in telephone cables and computer networkingCoaxial Television Cable Include feedlines connecting radio transmitters and receivers with
Premium Coaxial cable Cable television Computer network
Conor Westerman LAB 7 1. List whether the student was positive or negative for each characteristic and include whether the characteristic is dominant or recessive. (6 points) a. Blood type A+ b. Widow’s peak yes‚ + c. Free ear lobes yes‚ + d. Tongue rolling yes‚ + e. Hitchhiker’s thumb yes‚ + f. Left thumb dominance yes‚ + g. Little finger bend No‚- h. PTC taster yes‚ + i. Mid-digit hair no‚ - j. Facial dimples yes‚ + k. Freckles no‚ - l. Cleft chin no‚ - (+)=dominant (-)=recessive 2. Can the student
Free Allele Genetics Zygosity
Margaret E. Vorndam‚ M.S. Version 42-0038-00-01 Lab Report Assistant This document is not meant to be a substitute for a formal laboratory report. The Lab Report Assistant is simply a summary of the experiment’s questions‚ diagrams if needed‚ and data tables that should be addressed in a formal lab report. The intent is to facilitate students’ writing of lab reports by providing this information in an editable
Premium Buffer solution Cell wall PH
on the job of the user. Rule based- variation of DAC. Rules are created and access is based on the rules created. Week of 4/17/13 Starts on pg 146 Project- search SSCP CBK on the library under 24/7 Each of the 7 domains‚ vulnerabilities in each‚ security used in each to control‚ For lab 5--- Make 4 types of connections. 2 secure 2 not secure. telnet‚ securenet‚ ssh‚ and ftp. Will need 3 machines. Student‚ Target‚ ubuntu 1 Wireshark setting to capture a file in promiscuous mode on
Premium Business continuity planning
Vectors‚ Sections 3.1-3.2 Chapter 5 Two Dimensional Kinematics‚ Sections 5.1-5.2 Chapter 6 Circular Motion‚ Sections 6.1-6.3 Tuesday Sept 10 Problem Set 1 Due 9 pm Sept 11/12 W02D02 Applications of Newton’s Second Law Reading Assignment: Chapter 7 Newton’s Laws of Motion‚ Sections 7.1-7.4 Chapter 8 Applications of Newton’s Second Law‚ Sections 8.1-8.4.1 Sept 13 W02D3 Problem Solving 01: Applications of Newton’s Laws Reading Assignment: Chapter 8 Applications of Newton’s Second Law‚ Section
Premium Classical mechanics 1979 Physics
access a network‚ the server logs the attempt. In this lab‚ you first used the Windows Event Viewer utility to search for failed logon attempts‚ which could indicate a possible intrusion by an unauthorized user. You also generated your own errors by attacking the Windows 2008 server and then reviewed the Internet Information Services (IIS) logs to find those errors. Finally‚ you documented your findings and recommended remediation steps. Lab Assessment Questions & Answers: 1. What services were
Premium Attack Attack!