Amanda Jornd Experiment 7- Synthesis and Reactivity of tert-Butyl Chloride Via an SN1 Reaction Introduction/Background: Alkyl halides are compounds in which a halogen atom replaces a hydrogen atom of an alkane. Alkyl halides are classified as primary‚ secondary or tertiary depending on the number of alkyl substituents directly attached to the carbon attached to the halogen atom. The purpose of this lab was to properly prepare t-butyl chloride from t-butyl-alcohol in a concentrated hydrochloric
Premium Solvent Hydrochloric acid
Week 4 Lab Part 1: Design a Multi-factor Authentication Process Assessment Worksheet Design a Multi-factor Authentication Process Lab Assessment Questions & Answers 1. In an Internet Banking Financial Institution is Single Factor Authentication acceptable? Why or why not? Yes it can be acceptable because you can buff up security elsewhere. 2. Explain the difference between Positive Verification and Negative Verification? Negative verification is the opposite of positive verification
Premium Transport Layer Security Public key infrastructure Certificate authority
IT220 Lab 7 Lab 7.1 Exercise 7.1.1 Its impractical for whole organization to own a whole WAN because it could be great distances or overseas or across the country. It would be better to own the LAN to be able to control the cost of the set up Exercise 7.1.2 Increasing the distance would help due to making easier to see both a strong and weak signal Exercise 7.1.3 Media Infrastructure summary UTP Phone Lines Has 4 pair of 22-24 gauged
Premium Coaxial cable
Individual Exercise 3 (10 points) 1. A shoe manufacturer’s data show that the distribution of shoe size is normal with a mean of 11inches and SD 1.5 inches. * A manger of the company claims that 70% of the times shoe size will be between 8 and 12 inches. What do you think? In your deliverables‚ write a few lines about what you think of the manager’s claim and what would you advise him to do. (1 point) * How would you modify the manager’s claim if the distribution of shoe size was not
Premium Normal distribution Median Standard deviation
Lab 7 IS3445 Security Strategies for Web Applications and Social Networking Lab 7 Assessment 1. How does Skipfish categorize findings in the scan report? As high risk flaws‚ medium risk flaws‚ and low issue scans 2. Which tool used in the lab is considered a static analysis tool? Explain what is referred to by static code analysis. RATS‚ because the running of static code analysis tools that attempt to highlight possible vulnerabilities within ‘static’ (non-running) source code. 3. What possible
Premium Software testing Source code Internet
Lab 3: Enable Windows Active Directory and User Access Controls 1. What are the three fundamental elements of an effective access control solution for information systems? Identification‚ Authentication and Authorization 2. What two access controls can be set up for Windows Server 2003 folder and authentication? Authentication and Access Control 3. If you can browse a file on a Windows network share‚ but are not able to copy it or modify it‚ what type of access controls and permissions are
Free Windows Server 2008 Authentication Access control
Exercise 1: Cell Transport Mechanisms and Permeability: Activity 5: Simulating Active Transport Lab Report Pre-lab Quiz Results You have not completed the Pre-lab Quiz. 01/31/13 page 1 Experiment Results Predict Question: Predict Question 1: What do you think will result from these experimental conditions? Your answer : a. Na+ will be maximally transported. Predict Question 2: Do you think the addition of glucose carriers will affect the transport of sodium or potassium? Your answer : a
Free Ion Sodium chloride Sodium
Unit 7 Chapter Exersises NT 1430 Tyrel Cain (19103625) Tyrel Cain NT1430 4/30/2015 Unit 7 Chapter Exercises Chapter 22 1. What are three reasons to use NFS? a. NFS reduces storage needs. b. NFS simplifies system administration. c. NFS makes backing up data simpler. d. NFS improves data consistency and reliability. 2. Which command would you give to mount on the local system the /home? Directory hierarchy that resides on the file server named plum? Assume the mounted directory hierarchy will
Free File system Network address translation The Mount
Lab 7 1- The overall objective of the BIA is to identify the impact of outages. More specifically‚ the goal is to identify the critical functions that can affect the organization. After these you can identify the critical resources that support these functions. Each resource has a MAO and impact if it fails. The ultimate goal is to identify the recovery requirements. An indirect objective of the BIA is to justify funding. 2- The first step towards creating a serious BCP is to identify the potential
Premium Business continuity planning Risk management
Lab 6 1. Why is it important to prioritize your IT infrastructure risks‚ threats‚ and vulnerabilities? It is important to prioritize because you must be aware of what the risks‚ threats‚ and vulnerabilities there are to your infrastructure. You need this so that you know where the most attention needs to be focused on. 2. Based on your executive summary produced in Lab #4 Perform a Qualitative Risk Assessment for an IT infrastructure‚ what was the primary focus of your message to executive
Premium Risk management Risk Security