Premium Essay

Bio Report

In:

Submitted By chehoe
Words 1476
Pages 6
[pic]

FHSB 1214
BIOLOGY 1
FOUNDATION IN SCIENCE

[pic]

|Name |Chai Che Hoe |
|Group member |Lim Chen Ye |
| |Liow Yi Sheng |
| |Foo Yong Hao |
|Practical Group |P13 |
|Date of lab class |13/7/2015 |
|Program |Foundation in Science |
|Unit code |FHSB1214 |
|Unit description |Biology I |
|Year and trimester of study |2015, Trimester 1 |
|Title of lab report |Investigation of the effects of different catalytic conditions on hydrogen peroxide |
| |decomposition |
|Lecturer’s name |Ms.Ting Jen Ching

Similar Documents

Premium Essay

Bio Report

...How the temperature, dissolved oxygen, and pH differ from the wetland vs. the stream ABSTRACT: This study examined the temperature, dissolved oxygen level, and pH level in wetland water and stream water. It was predicted that the dissolved oxygen would be higher in the stream because of its moving water. The temperature in the wetland will be higher because the sun is directly on it. Testing six tubes from both the wetland and the stream, findings show the temperature did indeed prove to be higher in the wetland. However, the dissolved oxygen level was higher in the wetland as opposed to the stream. INTRODUCTION: pH is the level of concentration from Hydrogen ions within a substance. It is usually measured to determine how much aquatic life can be supported within an environment (Metro 1990). Along with having the correct amount to Hydrogen ions, both the stream and the wetland have a level on dissolved oxygen level. This level is measured to the amount of oxygen gas bubbles within the water that the aquatic life uses to sustain itself. This oxygen is also used to decompose of organic matter (Metro 1990). The purpose of this experiment is to test to determine to what levels of both pH and dissolved oxygen are processed by the stream and wetlands. . It was predicted that the dissolved oxygen would be higher in the stream because of its moving water. The temperature in the wetland will be higher because the sun is directly on it. METHODS/MATERIALS: Thirty-six test tubes were...

Words: 398 - Pages: 2

Free Essay

Exploring Reverse Engineering

...products that are new and cheaper than the ones that came before. This way a company is able to take a product that is already out on the market and take it apart piece by piece and see how it works so they can rebuild it cheaper and more efficiently. One famous example of reverse engineering is in the mid-1980s Phoenix Technologies Ltd wanted to produce a BIOS for PCs that would be compatible with the IBM PCs proprietary BIOS. To protect themselves from any charges of illegally copying their BIOS they used what is called a clean room. With the clean room approach there are two teams; one that studies the BIOS that they are trying to recreate and they come up with a detailed report of what it is exactly the BIOS does without using any of the code or anything that will link their description to that particular BIOS. Then this description is given to another team that has not looked at the code of the BIOS they are recreating and they build whole new BIOS off those instructions. This way even if some of the code is the same it will not be a copy right infringement since the second team who actually wrote the code and built the BIOS...

Words: 792 - Pages: 4

Free Essay

Computer & Logic Lab

...Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting. Your report should be two- to four-page...

Words: 296 - Pages: 2

Premium Essay

Bio Lab Report

...Tuong Nguyen Professor Eneigho Bio 42 11 March 2014 Bio Lab Report #3 For Lab on Thursday Feb 28 Procedure 24.1 Question 2: What is the shape and size of each bacteria colony? * Shape: circular, irregular, filamentous, rhizoid * Size: The size of the colony can be a useful characteristic for identification. The diameter of a representative colony may be measured. Tiny colonies are referred to as punctiform. Procedure 24.8 Question 6: Do all cells of a trichome of Cillatoria appear similar? Yes Question 7: a. Do adjacent cells share a common sheath? Yes b. What do you suppose is the function of the sheath? To protect and to keep the colony together c. Do clusters of Gloeocapsa represent multicellular organism? Why or why not. No, because you can break down the cells without killing them d. What is the best stain for Gloeocapsa, India ink or methylene blue? Methylene blue Question 8: a. How is the shape of Merismopedia different from other cyanobacteria you studied in this exercise? Merismopedia is a flat, square colony one cell thick b. How would a colony attain this shape? Equal divisions in two planes Procedure 24.6 Question 4: a. Where are the bacteria? Are they between cells or inside cells? Inside the cells b. Why is this relationship between a plant and bacterium called a mutualism? Mutualism is any relationship between individuals of different species where both individuals benefit. For some plants their relationship...

Words: 339 - Pages: 2

Free Essay

Week5 Lab

...and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting. Your report should be two- to four-page long...

Words: 296 - Pages: 2

Free Essay

Basic Security

...Introduction The BIOS performs a power-on self-test when the system is turned on. This test is used to ensure that the system is functioning properly and to gather information about what the system contains. When a problem is identified with the system during the POST, the BIOS will normally produce an error message. However, in some cases the problem is detected so early in the test that the BIOS cannot access the video card to print the message. In this case the BIOS will produce a beeping pattern on the speaker to tell you what the problem is. The exact meaning of the beep codes depends on the type and version of BIOS that you have. The most popular types of BIOS are those made by Award American Megatrends (AMI) and Phoenix. AMI 6 Beeps: Keyboard controller / gate A20 failure The keyboard controller is a chip on the motherboard that communicates with your keyboard. It also controls the A20 gate that provides access to the high memory area (HMA). This component is indicating a failure. This is a problem with either the keyboard or the motherboard. Phoenix 1-3-4-1 Test 512 base address lines. Sometimes a memory stick can become loose causing the computer to be unable to read the memory or get errors as it's reading it. Try fixing this issue by opening the computer removing each of the memory sticks you have in the computer and then placing them back into the slots, reset the memory and restart the computer. If this doesn’t work replace the memory. Basic Security Hardware ...

Words: 962 - Pages: 4

Premium Essay

Nt1110: Computer Structure and Logic Module 5 Short Answer

...Understanding the BIOS and POST Abdus-Salaam Sabir NT1110: Computer Structure and Logic_ Module 5_Short Answer August 22, 2015 Darius Banks Understanding the BIOS and POST Why is it necessary to use ROM for the BIOS and not RAM? The basic input/output system (BIOS) is an essential component of the mother- board. This boot firmware, also known as System BIOS, is the first code run by a computer when it is booted. It prepares the machine by testing it during boot- up and paves the way for the operating system to start. It tests and initializes components such as the processor, RAM, video card, magnetic disks, and optical disks. If any errors occur, the BIOS reports them as part of the testing stage, known as the power-on self-test (POST). The BIOS resides on a ROM chip and stores a setup program that you can access when the computer first boots up. From this program, a user can change settings in the BIOS and upgrade the BIOS as well. It is necessary to use ROM for the BIOS because the data in the RAM is cleared when the computer shuts down, but the data in the ROM is always there for the BIOS to use.   The BIOS is typically placed in a ROM (Read-only memory) chip that comes with the computer.   This ensures that the BIOS will always be available and will not be damaged by disk failures. It also makes it possible for a computer to boot itself.   Read-only memory is computer memory on which data has been prerecorded. Once data has been written onto a ROM chip,...

Words: 555 - Pages: 3

Free Essay

Dell 1435c

...Dell™ PowerEdge™ SC1435 Systems Hardware Owner’s Manual w w w. d e l l . c o m | s u p p o r t . d e l l . c o m Downloaded from www.Manualslib.com manuals search engine Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2006 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerConnect, PowerEdge, PowerVault, PowerApp, Dell OpenManage, and Dell XPS are trademarks of Dell Inc.; Microsoft, Windows, MS-DOS, and Windows Server are registered trademarks of Microsoft Corporation; AMD and AMD PowerNow! are trademarks of Advanced Micro Devices, Inc.; EMC is a registered trademark of EMC Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Model SVUA August 2006 P/N HJ362 Rev. A00 Downloaded from www.Manualslib...

Words: 32860 - Pages: 132

Free Essay

Bio Report Guide

...Marks will be deducted if instructions in the lab manual and below are not adhered to.  By submitting via this link, you acknowledge that you will adhere to all the  instructions herein. * Reports are to be submitted in pairs (2 persons per group, both have to submit the SAME report). * Font: Arial, Size: 11, single-spaced. Step 1: Create a WORD file as, ‘Name_Partner's name_Practical group_No.of  practical_Title.doc' e.g: Shalini_Prem_PG1_P3_Investigation of Action of Saliva and 3M HCl in Two Carbohydrates Solutions. The following MUST appear on the first page of Word: • Name: • Partner’s name: • Class: P.... • Date of lab class: (Day), (date)..... • Program: Foundation in Science • Unit code: FHSB 1214 • Unit description: Biology I • Year and trimester of study: 2013, trimester 1 • Title of lab report: Practical 3: Investigation of Action of Saliva and 3M HCl in Two Carbohydrates Solutions. • Lecturer’s name: Step 2: On the 2nd page of your Word file present your tables.  Report must include: (1) title (2) objective - NO need to write the procedure and materials. (3) Result - Table 1 & 2, based on ACTUAL observation obtained in class. You may read manual page 7, 8 & 27 on how to write the observation. No need to include expected results in your report.  (4) Discussion-answer all question (Question 1-9) in the lab manual (based on EXPECTED results). Write down question number on discussion. Please ignore Question 3. Title, objective &...

Words: 337 - Pages: 2

Premium Essay

Saved

...IT320 Unit 5 HW 1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM. 2. Routers use the following logic, in order, to attempt to load an IOS: 1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1. 2. Load an IOS based on the configuration of boot system commands in the startup-configuration file. 3. Load the first file in flash as the IOS. 4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server. 5. Load a limited-function IOS from ROM. In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads...

Words: 448 - Pages: 2

Free Essay

Knowledge Assemsment Text Book

...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...

Words: 746 - Pages: 3

Free Essay

Bitlocker

...BitLocker Drive Encryption Overview 73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification...

Words: 1463 - Pages: 6

Free Essay

Bios

...Introduction To sum of the differences between ROM RAM BIOS and Post I will simply define the basis of each component while defining what they do. ROM is short for (Read-only Memory) Memory which data is prerecorded on a computer. ROM is simply data that cannot be eliminated even when the computer is off. When working in ROM it is difficult or nearly impossible to change. BIOS is short for the acronym (Basic Input Output System) it is a program which stores detailed information and enable the computer to boot. In addition a ROM chip located on the motherboard, it lets you access the basic setup and ensures that the BIOS will readily be available and will not de damaged by disk failures. RAM is (Random Access Memory) Memory that can be access randomly memory that can be access without touching preceding bytes. RAM is the typical memory found in most computers or printers. In addition, RAM is a volatile memory that requires power to keep information accessible. If power is lost, then memory can be lost. Lastly Post is the self-test which is activated by Bios. The post is designed to run checks on the motherboard. It necessary to use ROM for the BIOS because the ROM retains information on the computer even while shut down whereas RAM does not. Whenever a computer is being use the information is being stored on the RAM if the is ever a power shortage or the computer lose power the information is lost. RAM does not store memory when there is no power. POST beep codes make...

Words: 356 - Pages: 2

Free Essay

Motherboard

...Motherboard Answer the following questions 5 April 2015 Tanweer Haroon DeJong May The major components of the motherboard are as follows: memory and their slots which is the computer’s memory (RAM) and is one of the most important parts of the system board. The number of chips depends on the type of computer and its capacity. Expansion cards are a typical component of non-integrated system boards a graphic card is a perfect example, but this can be integrated into the motherboard. CPU and slots is the central processing unit and it’s a highly prolific part of the computer and is located on the right of a motherboard and can be identified as a result of the heat sink or cooling fan directly on it. BIOS chip directs the CPU with respect to how it relates with other parts of the computer. Its basic input and output system chip or integrated circuit is fixed on the board and is easily identifiable. CMOS battery, the complementary metal oxide semiconductor is a small battery on the system board that powers the CMOS memory. Power supply and connectors is the electrical unit of the system and if it’s bad the system will not work. Keyboard connector are located on the motherboard and there are two main types. The AT has a round connecting interface into the motherboard and the PS/2 connector is rectangular in shape and smaller. Modern motherboards come with both. Mouse connector its connecting port is located on the motherboard and its interface is usually round. Floppy...

Words: 431 - Pages: 2

Premium Essay

Future

...Fall BIOS – Instructor: Mrs. Nicholas – NT1110 – 1 May 2014 Lavon Hawkins BIOS SUMMARY Lavon Hawkins BIOS SUMMARY BIOS BIOS: The BIOS is software which is stored on the motherboard. It tells the computer how to perform a number of basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer such as hard drive, floppy drive, optical drive, CPU, memory and so on. CMOS: The complementary metal oxide semiconductor is the type of semiconductor chip on the motherboard which stores the system information and computer settings such as date, time, hard drive settings, boot sequence, parallel part settings, on-base audio and video etc. Firmware: Firmware is a combination of software and hardware. Computer chips that have data or programs recorded on them are firmware. POST: The POST or power on self-test is a test the computer does when it first boots up. It’s to verify all the hardware is working. If all checks out it usually gives a single beep. If not a beep code could come up. Beep Code: A beep code is an audible code which is generated during the POST (Power On Self Test) when the BIOS has an issue but has not made it all the way up the boot sequence that it can give you the error as a message on the monitor BIOS update: Updating the BIOS can fix or enhance aspects of a computers performance. Or it may provide support for newly installed hardware. 1 Flash BIOS update: A BIOS chip...

Words: 353 - Pages: 2