Premium Essay

Lab Questions

In:

Submitted By arqueeta
Words 705
Pages 3
Lab Questions
What, specifically, about the company’s products or practices is environmentally sustainable (in any of the following areas that are applicable):

A fund-raiser for Growing Gardens. This non-profit organization helps elderly, low income people in northeast Portland grow their own food. As a supporter of the program, Yudkin placed beautiful pictures of these gardens on the walls of Hot Lips restaurants where people could see the connection between the earth and food. Its product was very personal – something you put in your body – and directly connected to a healthy environment.

Production of raw materials: how has the company taken steps to decrease the production impact of the raw materials it uses? He took his employees out to visit an organic farm and decided to shift toward organically grown produce from local farmers. He saw this, in part, as addressing the social equity aspects of The Natural Step’s fourth system condition.

The decision to favor local farms has caused Yudkin to begin integrating seasonality into his menu. Typical toppings of the summer are tomatoes, corn and summer squash. During the winter, they are greens, potatoes and sun-dried tomatoes. Yudkin says, “This insures flavor, freshness and nutrition. It also helps keep money within our community and maintains local agriculture and regional food security. And it reduces the amount of fossil fuel used to grow and transport our food.”

Hot Lips currently uses organic flour for cookies, uses some organic produce in soups, and offers local organic fruit, salads, beer, juices and milk. It purchases cheese made from bovine-growth hormone-free milk produced in Oregon and Washington by small family farms. Shortly it will be using organic tomatoes for pizza sauce. In order to reduce reliance on factory-farmed meats, Hot Lips has begun making pepperoni in house

Similar Documents

Free Essay

Lab Questions

...01.08 Review & Critical Thinking Review Questions: 1. What are the differences between being a biological parent, an adoptive parent, and a foster parent? Being a biological parent means that the child has your DNA, an adoptive parent is someone who adopts the child which gives them full custody and parential rights, and a Foster parent is made for short term care, where foster parents keep the child tiil the bological parents meet all requirments to regain custody. 2. What financial needs are parents obligated to provide and which are optional? Finacial needs that parents are obligated to provide are food, shelter, clothing and health care. The optional financial needs are like Toys, Soccer club, band, and electronics. 3. What other needs might a child have that a parent is expected to provide? Other needs that parents are expected to provide are Emotional needs, Education, Discipline, Safety and security. 4. What are the qualties of a nurturing parent? Qualities of a nurturing parent is build trust with the child, and be patience and not hurry the situation, and being a responsible adult so the child can see how things are done and will eventually learn that asset, and empathy knowing when it’s the right time to speak and when is not, knowing when they are upset or happy. Critical thinking questions 1. What qualities make a person a good parent? A bad Parent? What makes a bad parent is Verbal abuse, Physical abuse, not having food regularly and...

Words: 467 - Pages: 2

Premium Essay

2.09: Lab Questions

...2.09 Lab Questions 1. Do you think that all of the safety regulations for children are limiting children’s opportunities to explore the world around them? Why or why not? No, I don't think safety regulations for children are limiting their opportunities to explore the world around them because kids can be really dangerous and they need some safety guidlines to live by. 2. Have you ever tried one of the “5 Dangerous Things”? If yes, which one? What did you learn from it? If not, which one would you like to try and what do you think you would learn? Yes, I have tried one of the "5 Dangerous Things." I have tried driving the car when I was younger while sitting on an adult's lap. I learned how to steer and the basics of driving a car. 3....

Words: 682 - Pages: 3

Free Essay

Lab 3 Questions

...Removing Malware: Tools and Techniques Devan A. Dunham American Military University, ISSC342, Instructor Peter Mylonakos In the digital world, there are many tools and techniques to harm your computer, but there are also the same for protecting your computer as well. Malware, or malicious software, is software that is intended to damage or disable computers and computer systems. It is very dynamic and can be hard to detect sometimes because it may disguise itself as something that should be running on your computer. For example, after installing a program, Jim doesn’t realize that the executable file he downloaded was infected with malware named “Wajam” but disguised itself as “Software Updater” under Control Panel. It ran in the background and updated itself automatically without Jim’s knowledge. So how would Jim detect and remove this virus? First, Jim should always be aware what is running on his computer. On Windows machines specifically, opening the Task Manager and taking a quick look at processes will give the user a good outlook on what is running on the computer. Users should look for anything suspicious or unknown processes and do further research upon discovering them. Another simplified way to discover malware is to use an anti-virus program. There are many available to users and doing a quick internet search will yield thousands of programs, but sticking with reputable programs will serve its purposes. Scanning for malware and other viruses is as simple as click...

Words: 579 - Pages: 3

Free Essay

7.07 Lab Questions

...Learn Genetics Gel Electrophoresis Virtual Lab 1. How is it possible to sort different lengths of DNA strands using gel electrophoresis? 1. Shorter strands travel faster, thus causing them to be farther down the gel. Longer strands travel slower, so they will appear near the top of the gel. 2. List the steps required to complete the gel electrophoresis process. 1. Make the gel 2. Set up gel apparatus 3. Load the DNA sample into the gel 4. Hook up the electrical current and run the gel 5. Stain the gel and analyze the results. 3. At the end of the lab, list your estimates of the 3 DNA strands. Were your estimates correct? 1) 6000 bp 2) 3500 bp 3) 1500 bp 1. Yes I got them all correct! Learn Genetics Can DNA Demand a Verdict? 1. Explain how DNA can be used to identify an individual when 99% of living things have a common genetic code. * We all have .01% of DNA that is unique to us out of 3 billion. With that there’s enough information to accurately identify a person. 2. When a small amount of DNA is found in human saliva on a glass at a crime scene, how do forensic scientists analyze the saliva to find a suspect? * Forensic scientist would use the PCR technique to identify the suspect. 3. Do you think DNA evidence alone is enough to exonerate a prisoner already convicted of a crime? Why or why not? How do states make this determination? * No. Using DNA, it’s easier to exclude people. Some states reconsider...

Words: 281 - Pages: 2

Premium Essay

Lab 3 Questions and Answers

...Lab #3: Worksheet Configure Windows File System Permissions Student Name: _____________________________________________________________ Lab Due Date: April 10, 2015 If you may work in groups to complete this lab. Folder Structure Drawing You are asked to draw a folder structure that meets the scenario’s requirements. You may draw the structure on paper, use Visio or another drawing program. If you draw the structure on a separate sheet of paper, turn this in to your instructor. If you use Visio or another drawing program, paste your diagram here: Screenshots The lab requires the student to provide several screen captures at specific points in the process. Place your screen captures here in the appropriate order. Assessment Questions Overview In this lab, you reviewed a scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed. Questions 1. When you designed a file system in the first section of this lab, why did you choose the structure that you selected? a. What I learned how to do in the associates program 2. As you look back on the file structure that you created, what changes would you want to make if you were to use it for a real college environment? b. Make sure OU stay together 3. In...

Words: 350 - Pages: 2

Premium Essay

Hiro

...Fall 2015 Analytical Chemistry I Quantitative Analysis Chem 341WI 4 Credit Hrs | Instruction Mode: L (lab) and P (class) Professor Andrew Holder holdera@umkc.edu • SCB 113 • 816-235-2293 • 913-543-3709 (fax) Office Hours: T/Th 1:00-4:00, 5:00 – 7:30 Lecture: T/Th 4PM | Labs: T/Th 1PM (AFT), 5PM (EVE) Credit: Lab + Lecture = 4 credits | Format: Lab + Lecture (P) Lecture / Class Policies and Procedures Correspondence with UMKC Student Learning Outcomes Scientific Reasoning & Quantitative Analysis * Apply principles/methods of sciencea, mathb, statisticsc and logicd to solve problems and draw logical inferences. * Chpt 3: Experimental Error (c) * Chpt 4: Statistics (c) * Chpt 6: Chemical Equilibrium (a, b, d, e, f) * Chpt 7: Activity & Systematic Trtmnt, (a, d, e, h) * Chpt 8: Monoprotic Acid-Base Equil., * Chpt 9: Polyprotic Acid-Base Equil. (a, d, e, g, h) * Develop quantitative literacy enabling comprehensione and evaluationf of info in broad contexts. * Chpt 3: Experimental Error, Chpt 4: Statistics (f) * Chpt 5: Quality Assurance and Calibration Methods (c) * Understand methodsg/principlesh of scientific discovery and their application * Sxn 0-2: The Analytical Chemist’s Job (g, h) * Sxn 0-3: General Stages in a Chemical Analysis (g, h) * Chpt 2: Tools of the Trade (g) * Carrying out laboratory analyses (g, h) ...

Words: 4091 - Pages: 17

Premium Essay

Biology Pre-Lab Questions

...Pre-Lab Questions 1. Nitrogen fixation is a natural process by which inert or unreactive forms of nitrogen are transformed into usable nitrogen. Why is this process important to life? The useable nitrogen created, is extremely important since it is used to form DNA, enzymes, and other biological processes. Nitrogen fixation is also important because when it is inert, it is useless for organisms. 2. Given when you have learned about the hydrogen bonding shared between nucleic acids in DNA, which pair is more stable under increasing heat: adenine and thymine, or cytosine and guanine? Explain why. Adenine and thymine are more stable because, the additional carbon bonds make their nucleotides more stable. 3. Which of the following is not an...

Words: 1083 - Pages: 5

Premium Essay

2.09 Lab Questions And Answers

...2.09 Lab Questions A Thousand Year Old Temple  and Great Living Chola Temples 1. Describe the temple and its shrines. Why has this site been designated as a UNESCO World Heritage site? The thousand-year-old temple and the great living Chola temple both share extremely detailed designs. They were probably designated as a UNESCO world heritage site because they were both revered as great architectural fleets in their day and age. 2. Who built the Brahadeeswara Temple? Why was it built? The Brahadeeswara Temple was constructed by the Chola king, Rajaraja I. It has been stated that the temple was built for the same reason other temples are built for: worship. More specifically for the worship of Siva. 3. What purposes did the Temple have during the Chola Empire?...

Words: 506 - Pages: 3

Free Essay

Lab 1 Assessment Questions

...Lab 1 Assessment Questions: 1. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA department LANs, departmental folders, and data. By establishing security principle within the Active Directory Domain. 2. Is it a good practice to include the account and user name in the password? Why or Why not? No it is not a good idea to include the account and user name in the password because there are Hackers out there who would use either a dictionary attack or brute force attacks which go though lists to find the correct combination of words, letters, numbers and characters in order to crack user names and passwords which depending on how simple or complex it is can take anywhere from 5 minutes or 5 months to decrypt, so it is a good practice to keep everything as unique as possible. 3. To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality? In this case the best way to ensure a strong password is to use 8 or more characters such as a mixture of Uppercase. Lowercase, numbers, and symbols in order to create a complex password that would be very difficult to crack. 4. Can a defined user in Active Directory access a shared drive if that user is not part of the domain? No they should not be able to access the shared folders unless they have authorized access. 5. Does Windows Server 2008 R2 require a user’s logon/password credentials prior...

Words: 469 - Pages: 2

Premium Essay

Lab 1 & Assessment Questions

...IT255 Lab 1 & Assessment Questions Starting Nmap 5.21 ( http://nmap.org ) at 2012-03-28 19:38 Eastern Standard Time Nmap scan report for 172.30.0.10 Host is up (0.0054s latency). Not shown: 92 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1027/tcp open IIS MAC Address: 00:0C:29:99:40:7B (VMware) Skipping SYN Stealth Scan against 172.30.0.75 because Windows does not support scanning your own machine (localhost) this way. Nmap scan report for 172.30.0.75 Host is up. PORT STATE SERVICE 7/tcp unknown echo 9/tcp unknown discard 13/tcp unknown daytime 21/tcp unknown ftp 22/tcp unknown ssh 23/tcp unknown telnet 25/tcp unknown smtp 26/tcp unknown rsftp 37/tcp unknown time 53/tcp unknown domain 79/tcp unknown finger 80/tcp unknown http 81/tcp unknown hosts2-ns 88/tcp unknown kerberos-sec 106/tcp unknown pop3pw 110/tcp unknown pop3 111/tcp unknown rpcbind 113/tcp unknown auth 119/tcp unknown nntp 135/tcp unknown msrpc 139/tcp unknown netbios-ssn 143/tcp unknown imap 144/tcp unknown news 179/tcp unknown bgp 199/tcp unknown smux 389/tcp unknown ldap 427/tcp unknown svrloc 443/tcp unknown https 444/tcp...

Words: 1062 - Pages: 5

Free Essay

Transmittal Letter

...and the policy’s effectiveness was our main focus. This report will show the results of that research. Students, faculty, and the administration in the college of business were our focal point. Surveys were given to students with questions regarding financial hardships caused by laptop requirement and their opinions of the policy among others. Faculty was interviewed on their thoughts and how the policy helped with the classroom. Administration helped with the reasoning behind implementing the policy and some hints to phase outs of the computer labs located in the college of business. We found that students believed that the policy is not effective, but should be enforced. For faculty, some believe that the policy is helpful for learning and welcome laptops in the classroom while others feel that laptops can be a distraction to everyone. The administration implemented the policy because they want students to have the ability to work anywhere at any time with the specialized tools/software needed for courses taken. They also feel laptops are necessary for non-traditional students who may be full time professionals and have the option to complete courses online. Rumors that the laptop requirement was put into place because of possible computer lab phase outs are false, null, and void. To improve the effectiveness of the laptop requirement in the college of business, we recommend the following: * Making sure students/faculty are aware of the laptop requirement * Enforcing...

Words: 314 - Pages: 2

Free Essay

Kaspersky Lab

...Kaspersky Lab: from Russia with anti-virus I will analyze the study case by putting focus on three important questions and points. First I will perform the internal and external environment analysis that Kaspersky Lab faced in year 2011. The internal environment can further be categorized in strengths and weaknesses of the company. It is inevitably that such a successful, fast growing company relies on many strengths. KL had initiatives and tendency to attract and retain qualified employees. Their skills and competences helped to delivering high-quality services and products. The products and services offered are technologically superior. Beside quality, their abilities also contribute to early detection of various threats. It was the first company to identify major shift in hackers behavior. The company ability to motivate and reward its employees is just a one piece of the strength puzzle. Another key strength is innovation. The constant updates and their pace with the changes and trends in the market is a key advantage over the other competitors. Furthermore, KL was the first company to introduce hourly anti-virus updates, leaving the competitors lacking with only daily updates. An important strength which helped KL to be successful in foreign emerging markets were the localized solutions. KL has great ability to launch products which will satisfy the needs of a certain market. Another strength is their webpage, which offers free trials, information and guidance for the customers...

Words: 1437 - Pages: 6

Free Essay

Lab Report Instructions

...Queen Mary University of London School of Engineering and Materials Science Laboratory report writing instructions DEN101 - Fluid Mechanics 1 Flow Rate Measurement Experiment A. Student Student Number: 1234567 Version 2.0, 27 November 2010 Template for Word 97-2003 Abstract This document explains what is expected in your Fluids 1 lab report. The sections that should be covered are outlined and a structure you could follow is proposed. Detailed advice on how to edit the report is given. The document concludes with the marking criteria for this lab report. Table of Contents Abstract 2 1. Introduction 3 1.1. Writing 3 1.2. Editing and formatting 3 1.3. Content of the introduction 4 2. Background and theory 4 3. Apparatus 4 4. Test 4 5. Experimental procedure 4 6. Results 5 7. Discussion 5 8. Conclusions 5 9. References 5 10. Appendix A: Marking criteria 6 Introduction Before starting to write a report, you should think about what is your audience. Am I writing for colleagues who want a lot of detail how it is done, or am I writing for my boss who just wants an executive summary as he has no time for details? In general, there is not a single type of audience and we have to make our writing suitable for the detailed read, as well as the fast perusal. To understand what is required from you in this report, please have a look at the marking criteria in the Appendix...

Words: 2017 - Pages: 9

Free Essay

Test

...Major Milestones of the Telecommunications Industry 1837 Samuel Morse invents the telegraph - The information age began with the telegraph, which was invented by Samuel F.B. Morse in 1837. This was the first instrument to transform information into electrical form and transmit it reliably over long distances. The earliest form of electrical communication, the original Morse telegraph of 1837 did not use a key and sounder. Instead it was a device designed to print patterns at a distance. 1858 Transoceanic telegraph cable is laid – The transoceanic telegraph cable is an undersea cable running under the Atlantic Ocean used for telegraph communications. The first communications occurred August 16, 1858, reducing the communication time between North America and Europe from ten days, the time it took to deliver a message by ship, to a matter of minutes. 1876 Alexander Graham Bell invents the telephone - The telegraph was followed by Alexander Graham Bell's invention of the telephone in 1876. The magneto-telephone was one of the first telephones on which both transmission and reception were done with the same instrument. 1885 - Incorporation of the American Telephone and Telegraph company (AT&T). After its incorporation in 1885, the American Telephone and Telegraph company dominated the telecommunications market. 1888 - Heinrich Hertz discovers the electromagnetic wave 1895 - Marconi begins experimenting with wireless telegraph 1901 Guglielmo Marconi invented the radio—the...

Words: 727 - Pages: 3

Premium Essay

Unit 1 Pt1420

...Unit 1 Research 1 PT1420 In the 1970s the programming language that was most popular was Pascal. Pascal was designed in 1968-69 but published in 1970. Niklaus Wirth created the Pascal language to “1) make available a language suitable for teaching programming as a systematic discipline based on fundamental concepts clearly by the language, and 2) to define a language whose implementations could be both reliable and efficient on then-available computers. In 1972 the C programming language was developed by Dennis Ritchie. C was created to work with the system Unix. “Unix gives C such advanced features as dynamic variables, multitasking, interrupt handling, forking, and strong, low-level, input-output. Because of this, C is very commonly used to program operating systems such as Unix, Windows, the MacOS, and Linux.” In the 1980s the popular programming language was C++. C++ was developed at Bell Laboratories. C++ is a general purpose multi-paradigm spanning compiled language that has both high-level and low-level languages’ features. It was started as an enhancement to the C programming language, Bjarne Stroustrup in 1979. In the 1990s Java was the popular programming language. It was created in 1991 developed by James Gosling at Sun Microsystems and release in 1995. In the 2000s Visual Basic (VB) was popular in the programming world. VB was developed from BASIC which was originally developed in 1964 by John Kemeny and Thomas Kurts. VB is a Microsoft programing language and software...

Words: 261 - Pages: 2