ENGINEERING CHEMISTRY LABORATORY (CHE 485) GROUP : GROUP 1 EXPERIMENT : 1 - DETERMINATION OF THE CONCENTRATION OF ACETIC ACID IN VINEGAR DATE PERFORMED : 26TH OF SEPTEMBER 2013 SEMESTER : 1 PROGRAMME/CODE : EH220 - BACHELOR OF CHEMICAL ENGINEERING (HONS.) Table of content NO Title Allocated Marks (%) Marks 1 Abstract / Summary 5 2 Introduction 5 3 Aims 5 4 Theory 5 5 Apparatus 5 6 Methodology / Procedure 10 7 Results 10 8 Calculations
Premium Sodium hydroxide PH Base
environment for my experiment. I record the boiling point of the Isopropyl Alcohol and the melting point of powdered Acetamide with lab equipment such as the thermometer‚ capillary tube‚ beaker‚ test tube‚ and burner fuel. Data Tables/Observations: Boiling Point of Isopropyl Alcohol | | | | Trial # | Boiling Point(°C) | Percent Error % | Observations | Trial 1 | 82.5°C | 0.12% | The Isopropyl Alcohol bubbled close to the opening of the capillary tube‚ so a small amount was poured out.
Premium Liquid Temperature Solid
Attack and Penetration Plan Table of contents 1 Scope 2 Goals and Objectives 2 Tasks 2 Reporting 2 Schedule 2 Unanswered Questions 2 Authorized Letter 2 SCOPE Located on ASA_Instructor‚ the e-commerce Web Application server is acting as an external point-of-entry into the network: Ubuntu Linux 10.04 LTS Server (TargetUbuntu01) Apache Web Server running the e-commerce Web application server Credit card transaction
Premium Computer security Web server Security
LAB 1: Footprinting a Network One of the most astounding side-effects of the Internet is how readily accessible information is about individuals‚ organizations‚ and computer systems. This assignment is designed to give you some experience in obtaining this information. Materials Needed: Computer Internet connection with “Ping” command available Activity Use “Ping” command to determine the IP address of www.google.com and www.uhv.edu e.g. launch the command prompt and type in “ping www
Premium Internet IP address Web server
1. In the Wombat 1 machine: 1. mar and mbr are connected directly to 2. A value from memory is placed in this register by the FETCH sequence and DECODED as an instruction. 3. Data going to or from memory always goes via this register 4. This register is often used to hold a program address but does not usually contain the address of the instruction being executed. 5. When the "RAM Main" is being read from or written to‚ the address used will be the one held
Premium Assembly language
Ale_____ Ram___ 30 de noviembre de 2012 _______________ BIOL 3503 Ecología Laboratory #1: Communities and Biomes 1. List the fish and invertebrates you selected after the nitrogen cycling process. I personally selected a maroon clownfish with two anemones. I also chose 5 sergeant majors‚ 2 bleenies and a yellow tang. 2. What changes did you make to your reef tank during the 12 weeks and why did you make them? After I selected my fish‚ I noticed that the tank
Premium Buffer solution Ammonia PH
up the process. Results Injection Port Temperature 200 Column Temperature ( 55 He flow rate 2.75 Attenuation setting 1 Current Setting (mA) 80 Injection Volume) 2.0 Table 1. Gas Chromatography parameters Peak Name of Compound Peak Retention Time Peak Height Peak Area Relative ratio of product 1 3-methylcyclohexene 1.316 0.418 3.2010 1 2 1-methylcyclohexene 1.666 2.464 25.0125 7.81 Table 2. Results and data collected Volume of product (mL) 1.9 Moles of
Premium Distillation Oxygen Ethanol
1. What are the differences between ZenMap GUI and Nessus? NMAP is run most of the time on a host and port discovery‚ Nessus is usually installed on servers and takes it to the next level. It analyzes the ports and looks for potential security issues 2. Which scanning application is better for performing a network discovery Reconnaissance probing of an IP Network infrastructure? NMap 3. Which scanning application is better for performing a software vulnerability assessment with suggested
Premium IP address Internet Protocol Web server
Question 1 Points: 10 out of 10 This level of organization is the defining level of biology. As far as we know‚ life is an emergent property that exists at this level. Below this level‚ no single entity is truly alive. population cell CELL CELL CELL molecule organism Question 2 Points: 10 out of 10 Your aquarium contains three goldfish‚ one turtle‚ some plants‚ and millions of bacteria and algae. All those organisms together form a(n): Population Ecosystem
Premium Organism Bacteria DNA
1- What are three risk and threats of the user domain? Top risks are users and social engineering 2- Why do the organizations have acceptable use policies (AUPs)? The AUPs is very important to any organization. The organizations should have AUPs to a- Protect the organizations from any attack weather from inside or outside. The organization can do that by preventing the employees from downloading any services not needed that may be come with threat such as virus or any kind of malware.
Premium Security Policy Privacy