...Introduction 3 Requirements and Preparation 3 Supplemental Materials 4 Submission and Distribution of Self-Study Report 4 Confidentiality 5 Template 5 BACKGROUND INFORMATION 7 GENERAL CRITERIA 9 CRITERION 1. STUDENTS 9 CRITERION 2. PROGRAM EDUCATIONAL OBJECTIVES 11 CRITERION 3. STUDENT OUTCOMES 12 CRITERION 4. CONTINUOUS IMPROVEMENT 13 CRITERION 5. CURRICULUM 15 CRITERION 6. FACULTY 17 CRITERION 7. FACILITIES 20 CRITERION 8. INSTITUTIONAL SUPPORT 22 PROGRAM CRITERIA 23 Appendix A – Course Syllabi 24 Appendix B – Faculty Vitae 25 Appendix C – Equipment 26 Appendix D – Institutional Summary 27 Signature...
Words: 10169 - Pages: 41
...measuring current, voltage, and resistance. For this lab in particular, we used the Digital Multimeter, Function Generator, and a Oscilloscope to measure the variations of the components we made on the given breadboard. So essentially, after we made the circuit as instructed, we tested the in’s and out’s to calculate the resistance, and currents across the board. Before the board was made, we had to measure the resistors that were giving to us to verify its resistance. After all calculations were done, we took note on actual and theoretical values implemented by the circuit. Most of the lab consisted of measuring specific values with the various machines in the lab. After we calculated the resistance and currents that passed through the circuit we built, we moved forward with the lab, inevitably, giving us the chance to see how sinusoids can be formed, altered, and measured on the Oscilloscope. While completing the lab, we realized the Oscilloscope was quite useful in verifying sinusoids and their measurements while playing with the voltage and etc. Honestly, all the equipment in the lab was quite useful when used correctly. After documenting the information, it was quite apparent the actual data is slightly different from the theoretical values. This is ideally so because there is human error in calculating current, resistances, and power delivered. Results/Discussion For the start of the lab, we played with the DC supply to get a better understanding...
Words: 1112 - Pages: 5
...Unit 3 Labs Lab 9: Setting Router Passwords Step 4. Configure the router to require a password of ciscopress when connecting through the console. To do so, start by issuing the line con 0 configuration command, which moves you to console line configuration mode. What does the command prompt look like after using this command? The command line now says: Router(config-line)# Step 11. Press Enter. Does the router prompt you for a password? Does the password ciscopress work? Yes and yes Step 12. Use the enable command to move from user mode to enable mode. Which of the two passwords (fred or barney) works? Which configuration command did you use to con- figure that password? Barney was the password that worked, and enable secret barney Lab 10: Configuring Router IP Settings Step 4. Use the show ip interface brief command to view all interfaces. Which interfaces have an IP address configured? What are the addresses and the corresponding masks? None of the interfaces have an IP address configured Step 10. Use the show ip interface brief command to view all interfaces. Is the router’s Fa0/0 IP address now listed? What is the IP address? Yes the IP address is now listed. The IP address is 10.1.1.4 Step 11. Confirm that R1’s Fa0/0 interface is working by pinging PC1 (10.1.1.1). Did the command output imply that R1 can send packets to and from PC1? Yes it implies that R1 can send packets Lab 22: Terminal History Step 5. Press Up Arrow again to bring up...
Words: 898 - Pages: 4
...Name: _____________________________________Date: ____/_____/_____ Course/Session: ___________ PreLab Composition and Resolution of Forces: Force Table Instructions: Prepare for this lab activity by answering the questions below. Note that this is a PreLab. It must be turned in at the start of the lab period. Time cannot be given in lab to perform PreLab activities. After the start of lab activities, PreLabs cannot be accepted. Q1. What is the basic difference between scalars and vectors? Q2. Do the plus and minus signs that signify positive and negative temperatures imply that temperature is a vector quantity? Explain. Q3. Which of the following statements, if any, involves a vector? (a) My bank account shows a negative balance of –15 dollars. (b) I walked two miles due north along the beach. (c) I walked two miles along the beach. (d) I jumped off a cliff and hit the water traveling straight down at 17 miles per hour. (e) I jumped of a cliff and hit the water traveling at 17 miles per hour. Q4. Two vectors, A and B, are added by means of vector addition to give a resultant vector R: R = A + B. The magnitudes of A and B are 2 m and 7 m, respectively, and they can have any orientation. What are the maximum and minimum possible values for the magnitude of R? Q5. Top of Form Q5. During a relay race, runner A runs a certain distance and then hands off the baton to runner B, who runs a certain distance and hands off the baton...
Words: 1445 - Pages: 6
...Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.685 Electric Machines Class Notes 1: Electromagnetic Forces c 2003 James L. Kirtley Jr. September 5, 2005 1 Introduction Bearings Stator Stator Conductors Rotor Air Gap Rotor Conductors Shaft End Windings Figure 1: Form of Electric Machine This section of notes discusses some of the fundamental processes involved in electric machinery. In the section on energy conversion processes we examine the two major ways of estimating electromagnetic forces: those involving thermodynamic arguments (conservation of energy) and field methods (Maxwell’s Stress Tensor). But first it is appropriate to introduce the topic by describing a notional rotating electric machine. Electric machinery comes in many different types and a strikingly broad range of sizes, from those little machines that cause cell ’phones and pagers to vibrate (yes, those are rotating electric machines) to turbine generators with ratings upwards of a Gigawatt. Most of the machines with which we are familiar are rotating, but linear electric motors are widely used, from shuttle drives in weaving machines to equipment handling and amusement park rides. Currently under development are large linear induction machines to be used to launch aircraft. It is our purpose in this subject to develop an analytical basis for understanding how all of these different machines work. We start, however, with a picture of perhaps...
Words: 5431 - Pages: 22
...software vendors were struggling to cover the development costs for new versions of HP-UX operating systems because HP’s commitment to IA-64 was another challenge for the company. By 1997, HP’s sales were recorded as $10 billion and the total market share was approximately worth more than $60 billion. HP was the leading the category of UNIX server vendor in comparison with revenue from 1993 to 1997. By summer 1998, Sun was leading the UNIX server vendor category. Sun converted the small independent competitors into Solaris UNIX operating systems. The installed base business of these vendors was about 40% of the total market in 1997. Sun had gained the market share with the help of independent vendors by creating a dominant position in Internet market space and taking and advantage of their focus on UNIX. ESG was formed by HP when the company refocused its efforts and resources on enterprise computing. HP innovated ESG, in a unique way of combining both RISC and UNIX which resulted in better performance for the computer systems in comparison with the standard product supplied by third-party suppliers. ESG systems were capable of running complex, mission critical applications used by their customers. After HP turned the focus from UNIX to ESG, there was a decrease in sales and revenue by mid-1998. Q.2: Why did HP get involved in developing the IA-64 architecture? Analyze the strategy. Ans: By early 1990s, RISC chips had progressed monotonously and the performance limits had...
Words: 821 - Pages: 4
...Histology Laszlo Vass, Ed.D. Version 42-0013-00-01 Lab RepoRt assistant This document is not meant to be a substitute for a formal laboratory report. The Lab Report Assistant is simply a summary of the experiment’s questions, diagrams if needed, and data tables that should be addressed in a formal lab report. The intent is to facilitate students’ writing of lab reports by providing this information in an editable file which can be sent to an instructor. Purpose What is the purpose of this exercise? Are there any safety concerns associated with this exercise? If so, list what they are and what precautions should be taken. Exercise 1: Epithelial Tissue Data Table 1: Epithelial Tissue Observations | TISSUE TYPE | OBSERVATIONS | Simple Squamous | Flat, scale-like cells, and very close together. | Simple Cuboidal | Single layer of cube/oval like cells, cells are not packed together | Simple Columnar (stomach) | Single layer of different sized tall, narrow cells, connective tissue | Simple Columnar (duodenum) | | Stratified Squamous (keratinized) | | Stratified Squamous (non-keratinized) | | Pseudostratified Ciliated Columnar | | Transitional | | Stratified Cuboidal (online) | | Stratified Columnar (online) | | Questions A. Why is the study of histology important in the overall understanding of anatomy and physiology? B. How...
Words: 530 - Pages: 3
...LAB 4-1 BASIC SECURITY CONFIGURATION MAY 29TH, 2013 DEVRY LAB 4-1: BASIC SECURITY CONFIGURATION TASK 2: PERFORM BASIC ROUTER CONFIGURATIONS STEP 1: CONFIGURE ROUTERS Router(config)#hostname R1R1(config)#no ip domain lookupR1(config)#banner motd #Keep Out.#R1(config)#int fa0/1R1(config-if)#ip address 192.168.10.1 255.255.255.0R1(config-if)#no shutdownR1(config-if)#int s0/0/0R1(config-if)#ip address 10.1.1.1 255.255.255.252R1(config-if)#clock rate 64000R1(config-if)#no shutdownR1(config-if)#exitR1(config)#router ripR1(config-router)#version 2R1(config-router)#network 192.168.10.0R1(config-router)#network 10.0.0.0 | Router(config)#hostname R2R2(config)#no ip domain-lookupR2(config)#banner motd #keep out!!#R2(config)#line con 0R2(config-line)#password ciscoR2(config-line)#loginR2(config-line)#line vty 0 4R2(config-line)#password ciscoR2(config)#int fa 0/1R2(config-if)#ip add 192.168.20.1 255.255.255.0 R2(config-if)#no shutR2(config-if)#int s0/0/0R2(config-if)#ip address 10.1.1.2 255.255.255.252R2(config-if)#no shutR2(config-if)#int s0/0/1R2(config-if)#ip address 10.2.2.1 255.255.255.252R2(config-if)#clock rate 64000R2(config-if)#no shutR2(config)#router ripR2(config-router)#version 2R2(config-router)#network 192.168.20.0R2(config-router)#network 10.1.1.0R2(config-router)#network 10.2.2.0R2(config-router)#network 209.165.200.224R2(config-router)#endR2(config)#int loopback 0R2(config-if)#ip add 209.165.200.225 255.255.255.224R2(config-if)#no shut | Router(config)#hostname...
Words: 2587 - Pages: 11
...CCNP ROUTE 6.0 Instructor Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNP TSHOOT course as part of an official Cisco Networking Academy Program. CCNPv6 ROUTE Chapter 1 Lab 1-1, Tcl Script Reference and Demonstration Instructor Version Topology Objectives • • Use Tcl scripts to verify full connectivity. Identify causes of failures. Background The Cisco IOS Scripting feature provides the ability to run Tool Command Language (Tcl) commands from the Cisco IOS command-line interface (CLI). Tcl scripts can be created to accomplish routine and repetitive functions with Cisco IOS-based networking devices. In this lab, you create and execute a Tcl script that sends pings to multiple IP addresses in the network to test overall network connectivity. Note: Cisco IOS Release 12.3(2)T and later supports Tcl scripting. Required Resources • • 2 routers (Cisco 1841 with Cisco IOS Release 12.4(24)T1 Advanced IP Service or comparable) Serial and console cables Note: This lab uses Cisco 1841 routers with Cisco IOS Release 12.4(24)T1 and the advanced IP image c1841-advipservicesk9-mz.124-24.T1.bin. Other routers (such as a 2801 or 2811) and Cisco IOS Software versions can be used if they have comparable capabilities and features. Depending on the router model and Cisco IOS Software version, the commands available and output...
Words: 171031 - Pages: 685
...CNIT 345 | Enterprise Internetwork Design & Implementation | Lab IV | | Contents OSPF 4 BASIC COMMANDS 4 Backup link Configuration 4 QOS 8 Testing 10 Trouble Shooting 11 Implications/How it works 11 SNMP & NetFlow 12 In Global Configuration Mode on each Cisco Router: 12 In Interface Configuration Mode on each Cisco Router: 12 Install Cacti on the HQ Server 12 Installing NfSen on the HQ Server: 13 Troubleshooting: 14 Verification/Testing: 14 Explanation: 15 What was not accomplished: 15 Formatting Cisco IOS on 2600 series routers 15 Testing 16 Trouble Shooting 16 General IPv6 commands: 17 Rip6 commands: 17 Implications/How it works 18 Testing 19 Troubleshooting 20 IP 21 Delegation: 21 VLAN information: 22 VLAN IP Addresses: 23 HQ Subnetting: 23 Store Subnetting: 24 Procedures: 25 Troubleshooting: 27 Traffic generation/Services 29 Installing Ubuntu 10.04.2 LTS 29 Installing and Configuring NTP on Ubuntu 31 Installing BackTrack 4 R2 32 Installing and Configuring Nping 35 Verification and Troubleshooting for Nping 35 Reflection 36 Troubleshooting 36 Adtran 37 Commands for set-up 37 How does Adtran differ from Cisco? 38 How do you verify/what were the results 38 Bibliography 39 Appendix A 40 OSPF BASIC COMMANDS The following commands are entered into global configuration mode. router ospf 10 network <the ip network of the network you wish to add> <the inverse...
Words: 7461 - Pages: 30
...University of North Carolina at Charlotte Department of Electrical and Computer Engineering Laboratory Experimentation Report Name: Langston Tucker Date: September 28, 2014 Course Number: ECGR 2155 Section: L05 Experiment Titles: Experiment Number: 2, 3, & 4 Lab 2: Basic Circuit Elements Lab 3: DC Voltage and Current Sources Lab 4: Series Circuit Characteristics Lab Partners: James Henderson and Joshua Sayles Equipment List: Objective: Experiment 2 The purpose of this lab was to familiarize ourselves with basic circuit elements. Those being, resistors, capacitors, inductors. Furthermore using basic calculations we determined the dissipated power in our elements. Experiment 3 The purpose of this...
Words: 2987 - Pages: 12
...48550 Electrical Energy Technology Chapter 6. Synchronous Machines Topics to cover: 1) Introduction 2) Synchronous machine structures 3) Rotating magnetic field 4) Equivalent circuit model 5) Performance as a generator 6) Performance as a motor Introduction A synchronous machine is an ac rotating machine whose speed under steady state condition is proportional to the frequency of the current in its armature. The magnetic field created by the armature currents rotates at the same speed as that created by the field current on the rotor, which is rotating at the synchronous speed, and a steady torque results. Synchronous machines are commonly used as generators especially for large power systems, such as turbine generators and hydroelectric generators in the grid power supply. Because the rotor speed is proportional to the frequency of excitation, synchronous motors can be used in situations where constant speed drive is required. Since the reactive power generated by a synchronous machine can be adjusted by controlling the magnitude of the rotor field current, unloaded synchronous machines are also often installed in power systems solely for power factor correction or for control of reactive kVA flow. Such machines, known as synchronous condensers, may be more economical in the large sizes than static capacitors. With power electronic variable voltage variable frequency (VVVF) power supplies, synchronous motors, especially those with permanent magnet rotors, are widely used...
Words: 6536 - Pages: 27
...Toussaint Chivars IS3110/Lab2 8/16/2014 Align Risks, Threats & Vulnerabilities to COBIT Lab 2 1. List indentified threats & vulnerabilities Risk Factors from Lab1 a. Unauthorized access from public Internet High risk b. User destroys data in application and deletes files High risk c. Hacker penetrates your IT infrastructure and Medium risk gains access to your internal network d. Intra-office employee romance gone bad High risk e. Fire destroys primary data center Low 2. PO9.2 IT Establishment of Risk Context; PO9.3 Event Identification; PO9.4 Risk Assessment. 3. a. Unauthorized access from public Internet Integrity b. User destroys data in application and deletes files Availability c. Hacker penetrates your IT infrastructure and Confidentiality gains access to your internal network 4. The risks potential, the current protection level and the mitigation steps needed to prepare or reduce the risks/damages. 5. a. Threat vulnerability 1: unauthorized from public internet Information---firewall and encryption. Applications---only from recommended sources (applications with encryption, antivirus protection will be used. Infrastructure—Firewalls People---IT awareness training for all employees, monitoring from IT manager b. Threat or...
Words: 719 - Pages: 3
...DIGITAL IND IA Presentation-I Digital India A programme to transform India into a digitally empowered society and knowledge economy DIGITAL IND IA What is Digital India? Digital India is a Programme to prepare India for a knowledge future. The focus is on being transformative – to realize IT + IT = IT The focus is on making technology central to enabling change. It is an Umbrella Programme – covering many departments. It weaves together a large number of ideas and thoughts into a single, comprehensive vision so that each of them is seen as part of a larger goal. Each individual element stands on its own. But is also part of the larger picture. It is coordinated by DeitY, implemented by the entire government – both at the Centre and State. The weaving together makes the Mission transformative in totality The Programme: Pulls together many existing schemes. These schemes will be restructured and re-focused. They will be implemented in a synchronized manner. Many elements are only process improvements with minimal cost. The common branding of programmes as Digital India highlights their transformative impact. DIGITAL IND IA Vision of Digital India Centered on 3 Key Areas • Digital Infrastructure as a Utility to Every Citizen • Governance & Services on Demand • Digital Empowerment of Citizens DIGITAL IND IA Vision Area 1: Infrastructure as a Utility to Every Citizen • High...
Words: 13064 - Pages: 53
...Polytechnic University of Puerto Rico Electrical and Computer Engineering and Computer Science Department COE 5331 - Computer Network Lab Lab 1: OS Installation Prof. Nelson Reyes Due: April 13th, 2012 Introduction In this laboratory we will be installing an operating system. We The chosen OS is Windows2008R2. Following installation the machine will have an administrator account created. Also we will learn and understand Hypervisor technologies (Windows Hyper-V). Objective Provide the student with the knowledge of installing Operating System and virtualization technologies. This is essential information for decision making of which OS and implementation is the correct choice in different situations. Configure the OS for duplication/replication process and or deployment. Procedure Procedure for preparing Windows Vista/Windows 2008/R2 : 1. Install Windows Vista /Windows 2008/R2 on a master computer. 2. Log on to the computer as an administrator. 3. Run Sysprep 4. Select OOBE and Generalize. 5. Shutdown the computer 6. Create link machines (VMWare) or Disk difference (VirtualPC Hyper-V). Final Results • Successfully installed Windows2008R2 in Hyper-V. • Created a virtual hard disk Size 20GB. • Cloned Windows2008R2 twice. Questions 1. Describe the purpose of each operating system. • Windows...
Words: 903 - Pages: 4