Premium Essay

Nt1310 Unit 4 Lab

Submitted By
Words 774
Pages 4
1. Using the data sheet, report your result of VJH test. If you don’t have your own measurement, you can report someone’s data.

ANSWER and DATA in the LAST PAGE (all the way in the bottom, Lab 4 Worksheet)

2. If two athletes have the same vertical jump height, but differ in body mass, which jumper is more powerful? Explain.

So if we assume that both their heights are the same the person that is heavier will be exhibiting much more strength as it takes more force to lift more weight to the same height. Also if we assume that both people generate force at the same rate, as in if it takes them half a second from the beginning of their jump for their feet to leave the ground then the heavier person will do more work in the same amount of time, generating more power and thus making his jump more powerful than the other person.

3. The power generated …show more content…
During the first few seconds of any activity, stored ATP supplies the energy and then for a few more seconds beyond that, PCr cushions the decline of ATP until there is a shift to another energy system. In this case those seconds go towards applying energy and power towards the vertical jump.

4. Which muscle fiber type is beneficial in anaerobic/explosive muscle power activities? Explain.

Type IIa fast twitch fibers are beneficial for anaerobic/explosive muscle power activities as they have the ability to be able to rapidly transmit action potentials and generate a high cross bridge turnover rate which is responsible for quick muscle contractions. These fibers in the muscles also contain a high activity level of myosin ATPase and have uptake by the sarcoplasmic reticulum and also show a rapid rate of calcium release.

5. Why is the power output of a 1-RM attempt lower than a person’s peak power, which typically occurs at relative low percentages of a person’s 1-RM (i.e. 30-60% of 1-RM)?

Similar Documents

Premium Essay

Nt1310 Unit 4 Lab 4

...TO: Dr. Jeffery Vipperman FROM: Jared Domhoff DATE: October 29, 2015 SUBJECT: Dynamic Controls Lab 4 On October 29, my lab partners, and I conducted an experiment on the fundamentals of feedback control. This was done by following the rhetoric laid out in the DC-4 manual, which included using speed controller of an electric motor as well as a proportional controls and PI controls, based on the steady state error. By definition a feedback control system includes a number of components that has their output signal modified by a controller who supplies the input signal. Gain is a very important property of a feedback control system if not the most important. Gain by definition is the measurement of the ability to increase the amplitude or power of a signal from input to output on a two port circuit which can simply be stated as the correction for an amount of error. The error corrected is increased as gain is increased as can be seen in Equation 1 listed below. For the variables the ess term is error in steady state, Yr is the reference speed, kp is the control gain, and G is calibration gain....

Words: 692 - Pages: 3

Premium Essay

Nt1310 Unit 4 Lab

...impact of the melting point on tablet production and quality. The moisture content of a pharmaceutical product is a highly significant factor in ensuring that the product is safe and effective, as too high of a moisture content within the product can alter its physical and chemical properties. Some of the factors that will affect the moisture content of a tablet will include considerations such as water holding capacity of the excipients, any hygroscopic behaviour of the active pharmaceutical ingredient (API) or any of the excipients and the reaction characteristics of the ingredients used in the tablets5. These considerations need to be taken into account to help ensure that the final formulation will contain an optimal moisture content, < 2%4. If these factors aren’t taken into consideration, a tablet’s flow ability, strength and texture can all be inversely affected. A tablet’s flow ability will be impacted by the moisture content of the tablet as moisture can cause an increase in granule size, producing an increase in friction and cohesion. This increase in size can cause blockage or clogging in the hopper and form a liquid bridge in the die cavity, which is a common cause of caking, hence producing undesirable formulation properties6. Compaction will also be affected by the moisture content of the ingredients as too low of a moisture content will produce a brittle tablets, which can chip and alter the disintegration in the body, potentially changing the intended pharmaceutical...

Words: 1862 - Pages: 8

Premium Essay

Nt1310 Unit 4 Lab Report

...Biology REN Stage 1 DeArne Holmes SACE: 976199G Assessment task 4 Issues Investigation: Reproduction: Contraceptive Methods The Pill and Implanon (REFERENCES) Knowing how contraceptive methods work is essential to using them properly and increasing the reliability so pregnancy doesn’t occur. The pill is an orally taken pill which is a combination of the hormones estrogen and progesterone to prevent ovulation (2). You can not get pregnant if you don’t ovulate because there in no egg to be fertilized. The pill also works by thickening the mucus around the cervix, which makes it difficult for the sperm to enter the uterus (2). If you use the pill you need to take it everyday at a certain time to receive optimum reliability because it could leave you unprotected and possibly become...

Words: 680 - Pages: 3

Premium Essay

Nt1310 Unit 4 Lab Report

...Step 1: Select secret image S and target image T. If the size of the target image T is different from that of the secret image S, change the size of T to be identical to that of S Step 2: Convert target image into HSV image by using the equation (1) to form new target image T Step 3: For performing color conversion, first means and of S and T are find out and then find standard deviation quotient from equation (3.5) for each color channel Step 4: Limit mean value by eight bits and standard deviation quotient to seven bits Step 5: Based on this value, for each pixel p in each secret image S with color value c where c = r, g, or b, transform c into a new value by (3) Step 6: if is not smaller than 255 or if it is not larger than 0, then...

Words: 1254 - Pages: 6

Premium Essay

Nt1310 Unit 4 Lab Report

...3a) Refer to Appendix C of block diagram showing how AM DSB FC demodulation can be performed using a receiving USRP. 3b) Using GNURadio Companion and a transmitting USRP, AM DSB FC modulation can be performed on a message signal with frequency 1 kHz and amplitude of one unit. The following code in Fig. 6 has been used to perform such a modulation with a transmitting USRP. Fig. 6 GNURadio Companion code to perform AM DSB FC modulation on a cosinusoidal message signal using a transmitting USRP. The modulated signal from the transmitting USRP is then received by a second USRP, which demodulates the signal, to obtain a signal whose waveform is comparable to that of the original message signal. Fig. 7 shows the code used on a receiving USRP to...

Words: 758 - Pages: 4

Premium Essay

Nt1310 Unit 4 Lab Report

...University of North Carolina at Charlotte Department of Electrical and Computer Engineering Laboratory Experimentation Report Name: Langston Tucker Date: September 28, 2014 Course Number: ECGR 2155 Section: L05 Experiment Titles: Experiment Number: 2, 3, & 4 Lab 2: Basic Circuit Elements Lab 3: DC Voltage and Current Sources Lab 4: Series Circuit Characteristics Lab Partners: James Henderson and Joshua Sayles Equipment List: Objective: Experiment 2 The purpose of this lab was to familiarize ourselves with basic circuit elements. Those being, resistors, capacitors, inductors. Furthermore using basic calculations we determined the dissipated power in our elements. Experiment 3 The purpose of this...

Words: 2987 - Pages: 12

Premium Essay

Nt1310 Unit 4 Lab Report

...Cesium iodide and Alkyl metals salt clusters (Na, K, Rb…. Acetates,), with wide m/e range are commonly used for calibration of mass spectrometers. Polymers as poly ethylene oxide or polypropylene oxide are other excellent calibrators. Dish washing compound lauryl sulfate ethoxylorte, is a good calibrator for the compound for negative ion ESI. Water cluster is another good reference standard, with closely spaced reference peaks the other reference compound used are cesium salt of mono butyl phthalate, perfluyorinated acids, aminomethylphosphonic acid etc. In general a compound is used as a reference, depending upon the calibration required in the lower or higher scale of spectrometer and a with the stable molecular ion with exact m/e value. Nominal Mass. Mass of C12 is taken as 12, is a nominal mass and is a whole number. 1/12 of carbon C12 is 1.nominal mass or µ (a.m.u). In the spectrum it is nominal mass of a sample which is recorded against their relative abundances. Nominal mass for CO2 is 44 and for CH3OH is 32. It is an integer, and is sum of integer masses of elements present in sample compound. Isotopic mass is the exact mass of an isotope of an element, and it is 12 for C12, it is only integer mass. For all other isotopic atoms mass is determined with reference to C12, 1/12 of carbon is µ, is equal to 1.66055x10-27 kg, is taken as standard mass since 1961. Isotopic mass is the mass of that particular atom of an element with reference to C12, 12.000000, For C13; it...

Words: 735 - Pages: 3

Premium Essay

Nt1310 Unit 4 Lab Report

...Discussion: The method by which the mass of a single object was calculated in part 1, is similar in many ways to the method by which the elementary charge was calculated in part 2. Once the relevant data set was either collected or calculated it was first ordered from greatest to least. Next, the first differences between consecutively ordered masses/charges were determined. Thirdly, first differences that were significantly closer to zero than the rest were removed from the data set. Fourthly, first differences that were the multiples of other first differences were removed from the data set. Finally the remaining first differences were averaged in order to determine a mean value for the mass/elementary charge. In order for this method for determining elementary charges to be valid, several traits of elementary charges must be true. Firstly, to determine the elementary charge, it must be true that charge is quantized. This means that the values of charge are discrete, not continuous. If this were not the case, ten this method would not be able to determine the elementary charge because an elementary charge would not exist. Secondly, to determine the elementary charge using this method, the mass and charge of the elementary charge must be constant, and it must maintain this consistency regardless of the temperature, the material that the elementary charges are present in, or any other factor. Finally, all charges, and their composite elementary charges must behave...

Words: 923 - Pages: 4

Premium Essay

Nt1310 Unit 4 Lab 1

...Lab Journal # 1 Windows installation: Window installation by CD or DVD: First buy the DVD or CD of windows. But you can also use bootable USB drive for the installation of windows 8.1 in your pc or laptop. There are many CD and DVD with pirated software which can disturb your computer to perform many tasks or may be encrypted during the time of running or by many other things. So buy original window cd or DVD for safe and register use. If you buy windows 8.1 on CD or DVD and downloaded windows 8.1. You should perform various steps for installation of window8.1. Step # 1: Turn on your laptop or pc then windows starts, insert the windows...

Words: 730 - Pages: 3

Premium Essay

Nt1310 Unit 4 Lab Report

...• Where has it traveled, and where was it ultimately stored? 6. Why is it important to include a time/date stamp in the security incident response form? Stamping the time and date on the security incident form make it hard to manipulate or modify the file and therefore make it indisputable. It also improves accuracy of the occurrence of activities. It also holds those who come in contact with the evidence accountable. Lab Report File Define the phrase chain of custody. Chain of custody: Documentation that describes how evidence is collected, used, and handled during the duration of the case. Paraphrase what you found for your search of Chain of Custody for Digital Evidence. As I read the link below, I found that maintaining digital evidence is more than just securing the true copy. The perseverance of the hardware is just as important when it comes to maintaining the accuracy of the evidence on the hardware. The durability of the hardware that stores the evidence could become an issue if it alters the evidence over a period of time. It is very important that the longevity of hardware that stores evidence be checked and confirmed to ensure that the true...

Words: 461 - Pages: 2

Free Essay

Tech Boi

...Mason Comia NT1310 Physical Networking Unit 4 Lab April 15th 2014 NT1310 Unit 4 Lab: Building a New Structure When it comes to designing a building, it is not just all about the carpentry or the drafting and design. Yes these resources are useful but they are both based on the cable infrastructure of the building. Especially for a computer science and electrical engineering lab that requires a ton of cabling from CAT6 and RJ45. The main cable that will be used in the buildings infrastructure would probably be CAT6. CAT6 is a standardized cable for Gigabit Ethernet and other network physical layers that is backward compatible with the Category 5/5e and Category 3 cable standards. The reason for choosing CAT6 over CAT7 is because CAT7 would probably not have as much traction as CAT6. It would also be good to have matching jacks and matching patch cables. The three main tools that we would need in this project are the three types of punch down tools used to terminate telecommunications cables which are Manual, Impact, and Multi-Wire. The Manual punch down tool is a small hand tool used by telecommunication and network technicians. It is used for inserting wire into insulation-displacement connectors on punch down blocks, patch panels, keystone modules, and surface mount boxes. Most punch down tools are the impact type, consisting of a handle, works with a spring, and a removable slotted blade. To use the punch down tool, a wire is pre-positioned into a slotted post, and...

Words: 426 - Pages: 2

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Nothing

...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...

Words: 10839 - Pages: 44