...Name: Date: Instructor’s Name: Assignment: SCI103 Phase 1 Lab Report Title: Measuring pH Levels Instructions: Enter the Virtual Lab, and conduct the experiments provided before going out into the virtual field for additional research. Please type your answers on this form. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Answer the following questions while in the Phase 1 lab environment. Section 1: You will be testing 4 known solutions for pH levels using a standard wide-range indicator. Based off of the results obtained in the lab room, fill in the following table: |Solution Number |pH from Lab |Acid, Base or Neutral? |Solution Name (what was in the test tube?) | |Solution 1 |6 |Acid |Pure Water | |Solution 2 |1 |Acid |Lemon Juice | |Solution 3 |12 |Base |Bleach | |Solution 4 |5 |Acid |Coffee | 1. How many drops of wide range indicator will you use for each test, based on industry standards such...
Words: 696 - Pages: 3
...Lab 5.1 The Condition | True or False | attAverage >= verizonAverage | True | tmobileAverage == 868 | True | verizonAverage < sprintAverage | False | sprintAverage != attAverage | True | Lab 5.2 The Condition | Expected Output | If tmobileAverage > 800 AND verizonAverage> 800 ThenDisplay “Both have average downloadrates over 800”ElseDisplay “One or both of the averagesare less”End If | Both average download Rates over 800 | If sprintAverage == 800 ThenDisplay “Sprints download rate is 800”End If | No display | If attAverage >= 1300 OR tmobileAverage>=900Display “Select either carrier”End If | Select either carrier | Lab 5.3 Main Module() //Declare variables on the next 3 lines Declare Integer testScore = 0 Declare String category = “ “ Declare String interview = “ “ //Make Module calls and pass necessary variables on the next 4 lines Call getScore(testScore) Call employCat(testScore, category) Call interviewPoss(testScore, interview) Call displayInfo(testScore, category, interview) End Main Module getScore(Integer Ref testScore) //Ask user to test score Display “Please enter test score” Input testScore End Module Module employCat(Integer testScore, String ref category) //Determine what employment category they are in based on their test score //Similar to if the score is less than 60, then category is “No” //Otherwise, if score is less than 70, then category is “Maybe” //…and so on if testScore => 85 then Set...
Words: 288 - Pages: 2
...it will give you more information that all of the scans. It includes every port UDP and TCP. Plus you can enable different switches like operating system detection. This is an intrusive scan, so I guess if you where enumerating and trying to find out information about the network, you would use this. • Intense Scan – This is like the comprehensive scan. The intense scan is slow but not as slow as comprehensive. You can still run switches like operating system detection and version detection. 4. How many different tests (i.e., scripts) did your "Intense Scan" definition perform? List them all after reviewing the scan report. • It loaded 36 scripts, but I only saw a few performed. APR scan, SYN Stealth Scan, Service Scan, OS detection 5. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report. • ARP Ping Scan scanned to look for the machine...
Words: 424 - Pages: 2
...Lab #5 – Assessment Worksheet Performing Packet Capture and Traffic Analysis CDS344 - Information Security Course Name and Number: _____________________________________________________ Christian Tiell Student Name: ________________________________________________________________ Scott Blough Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used common applications to generate traffic and transfer files between the machines in this lab. You captured data using Wireshark and reviewed the captured traffic at the packet level, and then you used NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing a complete packet capture, to review the same traffic at a consolidated level. Lab Assessment Questions & Answers 1. Why would a network administrator use Wireshark and NetWitness Investigator together? Wireshark - it is better at performing analysis NetWitness - it is better at performing captures 2. What was the IP address for LanSwitch1? 172.16.8.5 3. When the 172.16.8.5 IP host responded to the ICMP echo-requests, how many ICMP echo-reply packets were sent back to the vWorkstation? 23 4. What was the terminal password for LanSwitch 1 and LanSwitch 2? Cisco 5. When using SSH to remotely access a Cisco router, can you see the terminal password? Why or why not? No, one could not view the...
Words: 294 - Pages: 2
...Wireless Spectrum Introduction This lab is going to be very interesting and challenging. We are being introduced to what, for some, is going to be the first time ever using a program that captures and records signals. We must then analyze them and use this as a tool to better be prepared to install and even troubleshoot our networks. My goal for this lab would be to gain a better understanding of this program and be able to recognize how it could be useful for me in my future endeavors. 1. Are any channels being used that overlap other channels? (10 points) It would appear that channels 1, 8 and 11 have the most use going on and that 8 and 11 overlap each other. 2. If you had to install a new wireless LAN, what channel would you use? (10 points) I would use something in the 3-6 range as it would provide the least amount of overlap with other channels. 3. What channels are being used? (10 points) It appears to me that channels 1, 5, and 11 are currently in use. 4. What channel is being used the most? (10 points) Channel 11 appears to have the most use going on on currently. 5. What type of signal is being shown? (10 points) The signal appears to match that of a HyperX RFID Reader. 6. What frequency, not channel, is being used? (5 points) The frequency in use is 2450 mhz. 7. What type of signal is being shown? (10 points) The signal being displayed is 802.11g. 8. How strong in dBms is this signal? (5 points) The signal strength appears...
Words: 461 - Pages: 2
...56 Define the following terms: Cellular respiration (aerobic respiration) (2 points) Cellular respiration is the process by which cells get their energy in the form of ATP. There are two types of cellular respiration, aerobic and anaerobic. Aerobic respiration is more efficient and can be used in the presence of oxygen. Aerobic respiration, or cell respiration using oxygen, uses the end product of glycolysis in the TCA cycle to produce more energy currency in the form of ATP than can be obtained from an anaerobic pathway. Fermentation (anaerobic respiration) (2 points) Fermentation is a metabolic process converting sugar to acids, gases or alcohol. It occurs in yeast and bacteria, but also in oxygen-starved human muscle cells. Fermentation is used by humans to make beer and food, like kimchi. Fermentation is a form of anaerobic digestion that generates ATP by the process of substrate-level phosphorylation. Summarize what occurs during the three steps of cellular respiration and indicate where each process takes place in the cell. (6 points) Glycolysis: It is a process that occurs in the cytoplasm. It converts each molecule of glucose to two molecules of pyruvic acid. It refers to an anaerobic process that proceeds whether or not oxygen is present or not. The pyruvic acid diffuses into the inner compartment of the mitochondrion where a transition reaction occurs that starts to prepare pyruvic acid for the next stage of respiration. Krebs cycle-This is...
Words: 964 - Pages: 4
...results: Maalox Mass of one dose antacid mL NaOH used in backtitration 20.0 g Tums 21.0 g Mylanta 18.0 g CVS brand 18.3 g Rennies 17.5 g 24.1 mL 22.4 mL 20.0 mL 19.9 mL 24.4 mL 1. Which is the strongest antacid, on a single-dose basis? Which is the weakest? Explain and show your calculations. 2. Which are the strongest and weakest, on a by-weight (mass) basis? 3. When people do back titrations, they usually watch the solution for a color change when the solution becomes neutral. What might you have used in the above experiment to get this color change to happen in the solution? At what pH would the solution have been neutral? 4. If you had walked into the lab, only to discover that you only had 0.1 M sulfuric acid available to run your tests, how might this have affected your calculations? Why? 5. In...
Words: 1292 - Pages: 6
...Lab Assignment 4: Types of Force Instructor’s Overview In many physics problems involving Newton’s laws of motion, you’ll see statements like, “assume a frictionless surface” or “neglecting air resistance…” In this lab we will be exploring both friction and air resistance, two resistive forces that are critical in the design of real-world products and systems. Understanding the effects of these types of forces is essential in the design of such things as aircraft, automobiles, braking systems, and countless other objects. This activity is based on Lab 4 of the eScience Lab kit. Although you should read all of the content in Lab 4, we will be performing a targeted subset of the eScience experiments. Our lab consists of two main components. These components are described in detail in the eScience manual. Here is a quick overview: * In the first part of the lab, you will measure the force it takes to pull objects of different mass. This experiment focuses on the effects of frictional forces. (eScience Experiment 1) * In the second part of the lab, you will investigate the effects of air resistance by performing controlled drops of coffee filters. Notes: * Please follow the instructions in this document for the air resistance experiment. * Record all of your data in the tables that are provided in this document. Take detailed notes as you perform the experiment and fill out the sections below. This document serves as your lab report. Please...
Words: 1726 - Pages: 7
...Hands-on lab week 5 March 25, 2016 20 integers change code to average 20 integers In order to change the number of integers it was only necessary to change the number of times the loop would run. This is because for each iteration of the loop it takes into account one integer. So I changed the condition to reflect 20 instead of 10 rounds. Test table Prepare 3 distinct cases 20 Integer Test Table Run Input Expected Output 1 Value 10 Value 20 Value 30 Value 40 Value 50 Value 60 Value 70 Value 80 Value 90 Value 5 Value 15 Value 25 Value 35 Value 45 Value 55 Value 65 Value 75 Value 85 Value 95 Value 100 52.5 2 Value 23 Value 6 Value 9 Value 12 Value 5 Value 10 Value 15 Value 20 Value 25 Value 2 Value 4 Value 6 Value 8 Value 10 Value 4 Value 8 Value 12 Value 165 Value 275 Value 2421 152 3 Value 1 Value 2 Value 3 Value 4 Value 5 Value 6 Value 7 Value 8 Value 9 Value 1 Value 2 Value 3 Value 4 Value 5 Value 6 Value 7 Value 8 Value 9 Value 1 Value 2 4.65 Changing Values try entering values other than an integer Here I tried entering the letters a-t and it returned a negative number. Next I tried using strings and finally floats. My results are in the screen shots below: Unspecified integers change code to average an unspecified number of integers This portion presented quite a bit of difficulty for me. I did not save all my variations of code as I assumed I would figure it out in time to turn...
Words: 500 - Pages: 2
...LAB 5 IT220 Exercise 5.1.1 * The 802.1 standard defines the 802 family of standards, describes the local area network, and defines the LAN address format. Exercise 5.1.2 * The 802.3af standard originally defined PoE functionality. The standard was enhanced in the year 2009, the name of it is 802.3at. Exercise 5.1.3 * 500 meters * 185 meters * 100 meters * Fiber Optic * UTP, 100 Meters * UTP, 100 Meters * Multi-Mode-Fiber Optic, 550 Meters * Single Mode- Fiber Optic * UTP 4 Pairs, 100 Meters Exercise 5.1.4 * The numeric prefix before BASE means the speed in Mbps. The inclusion of a postfix of -T means that the cable is a twisted pair standard. Lab 5.1 Review 1. The maximum speed of traffic would be between 10Mbps, and 100Mbps because they would have to negotiate the amount of bandwidth to send the node in between the two different network standards. 2. It is possible by also using a negotiation to uphold the maximum speed of the lesser UTP wire for example if Cat3 and Cat5e had to negotiate the Cat5e would have to meet Cat3’s standard maximum speed. Exercise 5.2.1 * A MAC address must be unique for every NIC card produced because they are being compared to all other unicast MAC addresses in the same LAN. The effect would be that the MAC address would be duplicated. Exercise 5.2.2 * It gives information on the connection its physical address and DHCP status. Exercise 5.2.3 * The physical...
Words: 845 - Pages: 4
...Lab 5 The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150-300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. The primary parts of a wired network are the cables, network adapters, and routers. Wired LANs offer superior performance. The tools needed would be a Crimping tool, Punch Down tool, Cable cutters, Cable strippers...
Words: 294 - Pages: 2
...LAB 5 NT1230 5.1 5.2 Question 2 The result was “ this page can not displayed” Question 3 Intranet explorer could not open the page. Question 4 Page still could not be open. Question 5 •Make sure the web address http://ip_address is correct. •Look for the page with your search engine. •Refresh the page in a few minutes Question 6 It is important to clean caches before retesting the web server so it does not open the same cache if there was an error Question 7 The firewall was not letting it open till firewall was turned off Question 8 By testing on other sites with the firewall also turned off and on Question 9 You should not leave your firewall off because it protects your pc 5.3 Question 10 We allowed to open port 80 on HTTP Question 11 Port 4444 is not open 5.4 Question 12 (1) Use good anti virus softwares - To prevent computer from Viruses & other attacks. (2) Be aware of Phising & other social engineering tricks Question 13 The action are what differ from social to security Question 14 The rule we applied in exercise 13.3 applies only to Domain type network by default. So this rule allow connection to intranet inside your network only and will block all incoming connections from outside Public, Private. Question 15 The list was sorted by Domain profile rules. Question 16 On Profile page. Unchecking the Domain and Private checkboxes will prevent client access to the intranet website Question 17 The connection...
Words: 293 - Pages: 2
...LAB 5 WORKSHEET WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) Exercise 5.1 Installing Internet Information Server Overview Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time 10 minutes 19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. Exercise 5.2 Testing IIS Connectivity Overview In Exercise 5.2, you test the functionality of the web server you just installed. Completion time 20 minutes Question 1 What is the result, and what does the result indicate? The result displays IIS7 welcome page it indicates the the web browser connects to the IIS page created earlier Question 2 What is the result, and what does it indicate? Same result as previous question it indicates that this is a local intranet page and not an internet page Question 3 What is the result? Screen stating web page not found Question 4 What is the result? Same result as before Question 5 List three possible reasons why...
Words: 1208 - Pages: 5
...Lab Five Executive Summary A security test is a method of evaluating the security of a computer system or network by methodically validating and verifying the effectiveness of application security controls. A web application security test focuses only on evaluating the security of a web application. The process involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities. Any security issues that are found will be presented to the system owner, together with an assessment of the impact, a proposal for mitigation or a technical solution (Open Web Application Security Project [OWASP], 2014a). Vulnerability is a flaw or weakness in a system's design, implementation, operation or management that could be exploited to compromise the system's security objectives. A threat is anything such as a malicious external attacker, an internal user, or a system instability that can harm the owner’s assets by an application or resource of value, such as data in a database or in the file system by exploiting vulnerabilities. A test is an action to demonstrate that an application meets the security requirements of its stakeholders (OWASP, 2014a). Test to Be Performed The first phase in security assessment is focused on collecting as much information as possible about a target application. Information Gathering is the most critical step of an application security test. The security test should endeavor to test as much of the code base as possible...
Words: 5541 - Pages: 23
...This assignment was designed put us, the student in a situation where we are placed in the supervisor position. In this assignment put the supervisor in a position of having to pick and choose what tasks to do themselves and what tasks should be delegated out after coming in and finding their basket full of tasks that need to be dealt with. When you obtain the position of supervisor, there is usually far too much for just you to do, therefore it is important to learn what to delegate and who to delegate it to. The most important tasks should be done by the supervisor but as far as things such as someone’s vacation hours and stocking merchandise for the store, those tasks should be delegated out to the assistant manager and to the store clerks. Being a supervisor means being in a role of leadership, logic, common sense, and decision making for yourself, the employees, and for the company. The “in Basket” debate and discussion gives us and our fellow classmates the opportunity to see if we can successfully delegate out certain tasks as a supervisor at a fictitious company. The discussion between me and fellow classmates was a great one and it appeared as though everyone agreed on everything accept for different incidents. The only two incidents where I came across disagreement were in regards to task number 3, and task number 4. These are the examples in which I will be using in this paper as far as disagreeing is concerned. Task number 3 is in regards to the mall hours changing...
Words: 848 - Pages: 4