Premium Essay

Lab Basics

In:

Submitted By calnat03
Words 890
Pages 4
OHM'S LAW
EQUIPMENT: • • • • • • Ammeter (0-0.5 A) Voltmeter (0-10 V dc) Decade resistance box (0.1 to 100 Ω) Rheostat (200 Ω) Unknown resistance Battery (6 V)

THEORY: The basic idea of an electrical CIRCUIT is that the power supply "pushes" electrical charges around the circuit similar to the way a pump pushes water in a fountain. The resulting flow of charges is called the CURRENT (I ≡ Δq/Δt). The power supply supplies potential energy to each of the charges that flow through it. We can measure this energy per charge with a voltmeter where we define VOLTAGE as the electrical potential energy per charge (V ≡ PE/q). Note in particular that the power supply (sometimes called the voltage supply) does NOT supply the current, it only supplies the energy to move the current, just as the water pump does not supply the flowing water, only the pressure to make the water flow. Just as in the water in a water fountain, the current must be allowed to leave the power supply and then eventually return to the power supply. Hence an electrical circuit starts at the (positive terminal of the) power supply and must eventually end at the (negative terminal of the) power supply - hence the name circuit. The individual circuit elements are connected in such a way that the current flows through them, usually giving up energy in the process. As the charges give up energy, the potential energy of the charges (and hence the voltage) will decrease as they traverse the circuit. OHM'S LAW states that for most common conductors the potential difference (ΔV) across the conductor is proportional to the current (I) that flows through the conductor:

V = IR
The RESISTANCE is then simply the constant of proportionality and is a measure of how hard it is to force the current through the conductor: the bigger the resistance, the more voltage is needed to force a certain amount of current; or

Similar Documents

Free Essay

Lab 7 Security Basics

...Lab 7: Security Basics Task 1: Procedure 1. An example of hardware firewall is Belkin, and an example of software is Norton 360. Task 2: Procedure 1. Almost all anti-virus programs offer some sort of trial period for first-time users. McAfee is the only one that I know for sure offers free protection. 2. A Trojan Horse is an email virus usually released by an email attachment. If opened, it will scour your hard drive for any personal and financial information such as your social security, account, and PIN numbers. Once it has collected your info, it is sent to a thief’s database. A malicious email message is one which had been deliberately crafted to cause problems on the server or on the client. Drive- by downloads are downloads which a person authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet). .Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crime ware. Task 3: Procedure 1. Full backup is a complete backup of everything you want to backup. Differential backup software looks at which files have changed since you last did a full backup. Then creates copies of all the files that are different from the ones in the full backup. Incremental backup software creates copies of all the files, or parts of files that have changed since previous backups of any type (full, differential or incremental)...

Words: 432 - Pages: 2

Free Essay

Table

...Wed Thu Fri Sat AHCC1103 (L) HAR DK AB1 AELE0343 (L) SUK H207 AHCC1113 (P) V207 AHCC1113 (P) M102 (L) FAI DKB AELE0343 (P) SUK CC205 JS AHCC1163 (P) FAI M003 AELE0343 (T) SUK H207 JS AHCC1163 AHCC1153 (L) WYL DKB AHCC1153 (P) WYL LAB 2 AHCC1163 (P) FAI V207 AHCC1153 (P) WYL LAB 3 AELE0343 READING AND WRITING AHCC1153 BASIC SOFTWARE APPLICATION I AEPD1013 STUDY SKILLS AHCC1163 DRAWING BASIC AHCC1103 ART APPRECIATION AHCC1113 GRAPHIC DESIGN BASICS School of Social Science and Humanities Certificate in Graphic Design - Year 1 1st semester 2013/2014 8 9 10 AHCC1103 (T) HAR V102 11 AHCC1113 (L) JS DK 6 Tutorial Group: M1CGD2 12 1 2 3 4 AEPD1013 (L) PRA H209 5 6 7 8 9 Mon Tue Wed Thu Fri Sat AHCC1103 (L) HAR DK AB1 AELE0343 (L) SUK H207 AEPD1013 (T) PRA H207 AHCC1163 (L) FAI DKB AELE0343 (P) SUK CC205 AHCC1153 (L) WYL DKB AHCC1113 (P) V304 AHCC1113 (P) V207 AELE0343 (T) SUK H207 JS JS AHCC1163 (P) FAI V208 AHCC1153 (P) WYL LAB 2 AHCC1153 (P) WYL LAB 2 AHCC1163 (P) FAI V202 AELE0343 READING AND WRITING AHCC1153 BASIC SOFTWARE APPLICATION I AEPD1013 STUDY SKILLS AHCC1163 DRAWING BASIC AHCC1103 ART APPRECIATION AHCC1113 GRAPHIC DESIGN BASICS School of Social Science and Humanities Certificate in Graphic Design - Year 1 1st semester 2013/2014 8 9 AEPD1013 (L) PRA H209 10 11 AHCC1113 (L) JS DK 6 Tutorial Group: M1CGD3 12 1 2 3 AHCC1103 (T) HAR V104 AELE0343 (L) SUK H207 4 5 6 7...

Words: 517 - Pages: 3

Premium Essay

Lab 6

...Unit 6 Lab 6.1: Pseudocode Learning Objectives and Outcomes Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.1: Pseudocode from the lab manual. Deliverables Submit the following at the end of this lab activity: The completed inputOptions() module in pseudocode in Step 1 The completed displayProvider() module with a case structure in pseudocode in Step 2 The completed and workable algorithm with nested If-Else statements using logical operators in Step 3 Unit 6 Lab 6.2: Flowcharts Learning Objectives and Outcomes Use flowcharts and pseudocode to represent Boolean conditions. Use if-then, if-then-else, and case structures in a computer program. Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.2: Flowcharts from the lab manual. Deliverables Submit the following at the end of this lab activity: Corrected variable declarations and initializations using Visio in Step 2 Corrected module calls using Visio in Step 3 Corrected inputOptions() module using Visio in Step 4 Corrected displayProvider() module with case labels and flow lines using Visio in Step 5 Corrected displayChoices() module with logical...

Words: 355 - Pages: 2

Free Essay

Nt1110 Lab 7 Security Basics

...Lab 7: Security Basics Lab 7: Security Basics Task 1: Software: We offer solutions to fit all of your security needs. | Free Antivirus + Firewall | Internet Security Suite | Extreme Security | Antivirus/Anti-Spyware EngineDetects and blocks viruses, spyware, Trojan horses, worms, bots, and rootkits. | | | | Two-Way FirewallMakes your PC invisible to hackers and stops spyware from sending your data out to the Internet. | | | | Advanced FirewallMonitors programs for suspicious behavior spotting and stopping new attacks that bypass traditional anti-virus protection. | | | | Privacy & Security ToolbarProvides site check, do not track, Facebook privacy scan, private browsing and more. | | | | Identity ProtectionMonitors your credit and alerts you of changes in your credit files. | | | | Advanced Real-Time AntivirusChecks files against an always-up-to-date cloud database of antivirus signatures. | | | | Enhanced Browser ProtectionProtects your computer by blocking web threats before they reach your browser. | | | | SupportCustomer service and technical support available 24/7 via live chat. | | | | Parental ControlsFilters and blocks inappropriate websites and limits time spent online. | | | | Threat EmulationAnalyzes downloads and warns you if a download is malicious--stopping it from infecting your PC. | | | | Find My LaptopLocates your lost or stolen laptop on a map, locks it down and recovers important files...

Words: 1060 - Pages: 5

Free Essay

Unit 9 Lab Security Basics

...Unit 9 Lab Security Basics Task 1: Features of Hardware and Software Firewalls * Hardware Firewall – Cisco ASA 5505 Firewall 1) Usually purchased as a stand-alone product typically found in routers or other networking equipment. 2) Usually a minimum of 4 network ports (the Cisco unit has 8) 3) Usually used in businesses or large networking systems 4) Intended for network security * Software Firewall – 2014 Trend Micro Instant Security and Antivirus 1) Usually purchased by individual users 2) Usually an installable form of software 3) Protects from outside attempts to control or gain access to your computer 4) Protects against Trojan programs or email worms 5) Only protects individual computer, not a network Task 2: Part 1: Which anti-virus program is free and which provide trial versions * Panda – No free trial or free version; yearly prices : $31.99, $49.99, $35.00 * Norton – No free product ,free trial version for 30 days; yearly prices : $49.99, $79.99, $49.99 * McAfee – No free or trial versions; yearly prices : $79.99, $49.99, $44.99 * AVG – No freeware, trial for 30 days; yearly prices : $39.99, $54.99 * Kaspersky – Offers a free anti-virus software and 30 trial; yearly prices : $69.95, $64.95, $59.95, $59.95 Part 2: Define malicious code terms Term – Trojan horse Program Definition – generally non-self-replicating type of malware program containing malicious code that, when executed...

Words: 1359 - Pages: 6

Free Essay

Mortgage

...Leah Dolce ECO 103 Mortgage Project While doing this project, I kept finding myself to be very indecisive as to what I wanted in a home and what things would be important to me if I were to purchase one. This project helped me understand the basics of buying a home such as: where I would want my kids to go to school, how many bedrooms, how many bathrooms, property, neighborhood reputation, and much more. I had very little knowledge about most of the surrounding area so now I know what kind of research I would have to do to make sure I know exatcly what I want when purchasing a home. I did know I wanted it to be at least 3 bedrooms, 2 bathrooms, and have an updated kitchen. I was able to find those things in the home I selected but what I didn't realize was what the cost would be. There is a huge financial difference between a 15 year fix and a 30 year fix mortgage. For the home I selected it was a $522.76 difference in the monthly payment and a $91,271.79 difference in the amount of interest I would be paying for the life of the loan. If I was abel to afford such a hefty, monthly payment I would choose the 15 year mortgage because in the long run it would be cheaper. The lesson learned here, though, is find a more affordable house and make updates as you go along. All -in-all I had fun doing this project and it helped me understand the process into buying a home and gave me great internet resources to do...

Words: 282 - Pages: 2

Premium Essay

Hostel Management Synopsis

...SYNOPSIS TITLE OF THE PROJECT HOSTEL MANAGEMENT SYSTEM PROBLEM STATEMENT This project needs to create the Hostel Management System (HMS) to organize the rooms, mess, student’s record and the other information about the students. All hostels without HMS are managed manually by the hostel office. And hence there is a lot of strain on the person who are running the hostel. This particular project deals with the problems on managing a hostel and avoids the problem which occur when carried manually. INTRODUCTION In hostels without a HMS all the things have to be done manually. The Registration form verification to the different data processing are done manually. Thus there are a lot of repetitions which can be easily avoided. Identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible to the existing system with the system which is more user friendly and more GUI oriented. We can improve the efficiency of the system, thus overcome the drawbacks of the existing system. Hostel management gives on idea about how the students details, room allocation, mess expenditure are maintained in the particular concern. The hostel management system also includes some special features like How many students can live in a room, and the students of the hostel can be recognized from their ID number. The administration has the unique identity for each members as well as students details. The stock management...

Words: 903 - Pages: 4

Free Essay

How to Present to Investors

...nonstop work. Startups are a counterexample to the rule that haste makes waste. (Too much money seems to be as bad for startups as too much time, so we don't give them much money either.) A week before Demo Day, we have a dress rehearsal called Rehearsal Day. At other Y Combinator events we allow outside guests, but not at Rehearsal Day. No one except the other founders gets to see the rehearsals. The presentations on Rehearsal Day are often pretty rough. But this is to be expected. We try to pick founders who are good at building things, not ones who are slick presenters. Some of the founders are just out of college, or even still in it, and have never spoken to a group of people they didn't already know. So we concentrate on the basics. On Demo Day each startup will only get ten minutes, so we encourage them to focus on just two goals: (a) explain what you're doing, and (b) explain why users will want it. That might sound easy, but it's not when the speakers have no experience presenting, and they're explaining technical matters to an audience that's mostly...

Words: 303 - Pages: 2

Free Essay

Bell and Tech

...Alcatel-Lucent is a global telecommunications corporation located in Paris, France. It has, under its wing, Bell Laboratories aka Bell Labs. They were previously known as AT&T Bell Laboratories and Bell Telephone Laboratories is now the research and development subsidiary of the French-owned Alcatel-Lucent. Over the past eight decades, Bell Labs R&D gave birth to new technologies and seminal scientific discoveries. (Alcatel Lucent, para 1) Elisha Grey and Enos N. Barton formed Western Electric Company in 1869. Both of them started a small manufacturing firm based in Cleveland, Ohio which was to become the largest electrical manufacturing company in America. In 1881, Alexander Graham Bell, an extraordinary leader of American Telephone & Telegraph (AT&T), purchased a controlling interest in Western Electric and made it the exclusive developer and manufacturer of all equipments for the Bell telephone companies. Now, the Bell system has provided much telephone services and support to America and Canada in the 1877 to 1984. It was then led by AT&T. In 1898, Compagnie Générale d'Electricité (CGE) was born, founded by a French engineer named Pierre Azaria. It was involved in business with several industries in Germany. Mainly it dabbled in electricity, transportation, electronics and telecommunications. CGE then rose up the ranks and became a leader in digital communications and would be known as well to produce train à grande vitesse – high speed trains in France. In...

Words: 2450 - Pages: 10

Premium Essay

Course Descriptions

...GE117 Composition I | A 4 credit hour Composition course This course covers phases of the writing process, with special emphasis on the structure of writing and techniques for writing clearly, precisely and persuasively. Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE127 College Mathematics I | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: quadratic, polynomial and radical equations, linear functions and their graphs, systems of linear equations, functions and their properties and triangles and trigonometric functions. Activities will include solving problems and using appropriate technological tools. Prerequisite: GE184 Problem Solving or TB184 Problem Solving or GE150 Survey of the Sciences or equivalent; Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE184 Problem Solving | A 4 credit hour Science course This course introduces students to problem solving techniques and helps them apply the tools of critical reading, analytical thinking and mathematics to help solve problems in practical applications. GE192 College Mathematics II | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: exponential and logarithmic equations and functions, graphs of trigonometric functions, trigonometric equations, polar coordinates, oblique triangles, vectors and sequences. Prerequisite:...

Words: 1186 - Pages: 5

Premium Essay

Kickflip Research Paper

...How to perform a kickflip with skateboard You are a novice skater and you want to learn the techniques to do the trick? This guide will explain how to make one of the tricks the best known and the basic art of skateboarding: the kickflip! The kickflip commonly called flip is one of the basic tricks of skateboarding . This number was invented by the famous American skater Rodney Mullen in the mid -eighties. This development will add to the other maneuvers, such as the grind or manual, thus creating trick combos very stylish! Make sure you have at hand: *skateboard *helmet *knee 1.This lesson will teach you how to close a kickflip . Many skater , to learn, trying several times to perform the kickflip standing still, so you can learn the correct...

Words: 417 - Pages: 2

Premium Essay

Unit 3

...Lab 3: Input, Processing, and Output This lab accompanies Chapter 2 (pp. 56-68) of Starting Out with Programming Logic & Design. Chris Garcia Name: ___________________________ Lab 3.1 – Pseudocode This lab requires you to think about the steps that take place in a program by writing pseudocode. Read the following program prior to completing the lab. Write a program that will take in basic information from a student, including their name and how many credits they have taken in Network Systems Administration program. The program will then calculate how many credits are needed to graduate. Display should include the student name and the number of credits left to graduate. This should be based off a 90 credit program, where some courses are half credits. Step 1: This program is most easily solved using just a few variables. Identify potential problems with the following variables declared in the pseudocode. Assume that the college has the ability to offer half credits. (Reference: Variable Names, page 39-40). |Variable Name |Problem (Yes or No) |If Yes, what’s wrong? | |Declare Real creditsTaken |n | | |Declare Int creditsLeft |y | | |Declare Real studentName ...

Words: 1394 - Pages: 6

Free Essay

Abacus Aat Pricing & Tktg Quick Ref 073109.Pdf

...Display Basic Entry FT1 Tax Details from List RB2 Specific Tax Code RB2MNLLAX–PR/LAXMIA–AA Passenger Facility Charge Basic Entry Optional Qualifiers Travel Date Multiple Carriers Display All Types of Fares Return Travel Date Fare Display from Segment Continuation Entries Redisplay Fare Tax Breakdown Display Display RBD Conditions Display RBD by Carrier FQHELP FQBKKMNL–PR/USD FQMNLBKK–TG¥QYEE6M FQMNLBWN–BR¥BY FQMNLTPE–PR¥PINF FQMNLTPE–PR¥PSEA/LBR TXN∗BKK TXN∗1 TXN∗∗XA PXC∗SFO Basic Entry Fare Rule by Line Number Redisplay Rule Information Routing Map FARE RULE DISPLAY RDMNLLAX11SEPLEE6M–PR RD2 Quick Reference Page RDHELP RD∗ Rule Menu of Categories RD2∗M RD2∗RTG Specific Categories RD2∗5/15/22 NON-ITINERARY PRICING WQMNLHKGLAX–ACX/VCX Quick Reference Page Basic Entry Optional Qualifiers Currency Code Passenger Type Code Operating Carrier Date & Booking Class Surface Segment Connection City Continuation Entries Fare Details from List Fare Rule Display Rule Display of First Fare Rule Display from Fare List Fare Basis Code WQHELP WQMNLHKG–ACX/VCX/MUSD WQMNLKULMNL–AMH/VMH/PCNN/PINF WQMNL/ASQSIN/APRMNL–VSQ WQMNL29MAR/CYBKK13APR/CSMNL–ATG/VTG WQMNL14APR/APRHKG/–BKK19APR/ATGMNL–VPR WQMNL24APR/XHKG24APRSFO29MAY/XHKG31MAYMNL–ACX/VCX WQ¥1 WQRD∗ WQRD∗L3 WQRD∗QYOX Fare Calculation WQ¥DF2 Rule Menu of Categories WQRD∗L2¥M Specific Categories WQRD∗L2¥C6/7 Quick Reference Page WQRDHELP FAREX PRICING NET FARE LIST Basic Entry Multiple Carriers NET FARE DISPLAY Basic Entry...

Words: 1491 - Pages: 6

Premium Essay

Pt1420

...Lab 4.1 – Pseudocode and Modules (“UTP Installed”) Critical ReviewA Module is a group of statements that exists within a program for the purpose of performing a specific task.Modules are commonly called procedures, subroutines, subprogram, methods, and functions.The code for a module is known as a module definition. To execute the module, you write a statement that calls it.The format for a module definition is as follows:Module name()StatementStatementEtc.End ModuleCalling a module is normally done from the Main() module such as:Call name()Generally, local variables should be used and arguments should be passed by reference when the value of the variable is changed in the module and needs to be retained. For example:Module main()Real Integer numberCall inputData(number)Call printData(number)End Module// Accepts number as a reference so that changed value// will be retainedModule inputData(Real Ref number)number = 20End Module// number does not need to be sent as reference because// number is not going to be modifiedModule printData(Real number)Display “The number is “, numberEnd Module | This lab requires you to think about the steps that take place in a program by writing pseudocode. Read the following program prior to completing the lab. Data Communications Corp wants a small program that will calculate the cost of UTP it installs for their clients. Write a program that will ask the user to input the name of the client, the number of feet of cable installed. The program...

Words: 1808 - Pages: 8

Free Essay

Tb143 Lab 7 Security Basic

...Task 1: Firewall is software or hardware based network security system to protect between your computer network and the internet. Hardware firewalls are best suited to business and large networks, whereas Software firewalls are best suited for home use. Hardware firewalls is a small metal box so one could hook up to a computer network just like if you were to add a printer etc. Software firewalls gives you a level of protections from hackers and unwanted intrusions. Software firewalls packages has anti spam, antivirus, even anti-popup ads. There are also parental controls to manage what or certain websites your minor can visit. Barracuda Firewall is the newest Hardware. It has email, web, and network security. Barracuda provides intrusion prevention, virus scanning, content filtering, and reporting. Barracuda Firewall is perfect fit for small and medium sized businesses. Zone Alarm protect your PC from viruses and spyware, also has internet firewall, internet browser security and theft prevention, and email virus scan. This is example of a software firewall, great for home use. Task 2: Avg, and Panda offer Free anti-virus programs to protect your computer. Norton and Kaspersky offer trial run versions for a number of months then thereafter one could purchase the anti-virus program. Trojan horse programs is a type of file converters, but also it could install harmful programs such as spyware and rootkits. Malicious email attachments are a way for a sender to transmit files...

Words: 687 - Pages: 3