Free Essay

Types of Labs

In:

Submitted By nottsfandan
Words 729
Pages 3
Different types of laboratories
The work that is being carried out in a laboratory will influence the type of equipment that is used there. Most laboratories will have several large pieces of equipment, numerous smaller pieces and several computers linked in. The storage required will vary with specialist facilities for radioactive, flammable and toxic materials.
Chemistry laboratories
Chemistry laboratories tend to break down into the following generic spaces: organic chemistry, inorganic chemistry, physical chemistry and analytical chemistry.
Biosciences (biology) Laboratories
These laboratories, sometimes also called life sciences laboratories, serve as work spaces for a host of special research interests reflecting the investigators' research direction. They are distinguished by the support space that is required for each laboratory or group of laboratories.
Fume hoods, as well as biosafety cabinets and laminar flow hoods, are used in all areas of bioscience research. Storage for chemicals (solvents and acids) must be provided in accordance with applicable codes.
Physical Sciences Laboratories
Physical science laboratories are distinguished from other types of laboratories in a number of ways.
First, there is only a small amount of built-in furniture.
Second, there is abundance and a variety of electrical power. This, of course, is due to the fact that in most physical sciences research labs the floor space is occupied by an array of apparatus and instrumentation, both home-built and store bought. Almost all of this equipment requires power of varying voltage and amperage... Power and piped services are usually provided from an overhead suspended service carrier.
Medical
A medical laboratory or clinical laboratory is a laboratory where tests are done on clinical specimens in order to get information about the health of a patient as pertaining to the diagnosis, treatment, and prevention of disease.
Crime/forensic Lab
A crime laboratory - often shortened to crime lab - is a scientific laboratory, using primarily forensic science for the purpose of examining evidence from criminal cases.

Storage
These are general guidelines to storage Safely space shelves and racks to accommodate the upright removal of the largest chemical container; prevent tipping and dripping with adequate clearance Identify and substitute safer chemical alternatives Keep hazardous materials away from heat and direct sunlight to prevent the degradation of chemicals and deterioration of storage containers and labels Do not store hazardous materials (except cleaners) under sinks Avoid chemical stockpiling; procure hazardous materials as needed Limit fume hood storage of hazardous materials Conduct periodic cleanouts to minimize accumulation of chemicals Keep all food (including gum), beverages, tobacco and open cosmetics outside the work area

Radioactive

Chemical From reactive metals, including sodium, potassium and magnesium From sodium cyanide, iron sulphide, calcium carbide and other compounds that can react to produce toxic fumes/gases Place combustible organic carboxylic acids (i.e., acetic acid) in a flammable storage locker; store inorganic acids in acid storage cabinets Store acids and bases in air-tight containers with snug-fitting caps; avoid loose lids or glass stoppers; use vented caps when necessary to prevent over-pressurization Keep piranha etch and aqua regia in a fume hood at all times Use non-aluminium drip trays for aqueous sodium and potassium hydroxide solutions; isolate nitric acid when utilizing secondary containment Safely transfer containers of acid and base solutions using bottle carriers Never pour water into acid; slowly add the acid to the water and stir

Flammable and Combustible Liquids Store flammable and combustible liquids away from oxidizers and heat producers Store flammable and combustible liquids in excess of 10 gallons (per room) in approved flammable storage cabinets. Use only approved and well-labelled refrigerators and freezers for storing flammable liquids; never store lunch with science

Safety
General advice: Protect eyes and skin lab safety glasses with side shields lab coats and closed-toe shoes must be worn for basic personal protection
In some laboratories, the conditions are no more dangerous than in any other room. In many labs, though, hazards are present. Laboratory hazards are as varied as the subjects of study in laboratories, and might include poisons; infectious agents; flammable, explosive, or radioactive materials; moving machinery; extreme temperatures; lasers, strong magnetic fields or high voltage. In laboratories where dangerous conditions might exist, safety precautions are important. Rules exist to minimize the individual's risk, and safety equipment is used to protect the lab user from injury or to assist in responding to an emergency.

Eye wash station used in most labs

Similar Documents

Premium Essay

C57bi 6 Wild Type Mice Lab Report

...This experiment will be done using C57BI/6 wild type mice from Professor Moore’s lab. To begin two dams will be mated per male sire over night for a total of 10 females with 5 males by 5 pm. We will then look for evidence of fertilization through identification of the post copulation vaginal plug by 10:00 am the next morning. If more than two copulation plugs are identified then we will increase the number of dams per treatment group starting by increasing the number receiving lithium carbonate injections, but still attempting to maintain the 1:1 ratio of saline injected to lithium carbonate injected mice. The animals will be housed in specific pathogen-free barrier housing in the basement of LSP. It is likely that two rounds of timed matings...

Words: 684 - Pages: 3

Premium Essay

Unit 1 Labs

...Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh...

Words: 16182 - Pages: 65

Premium Essay

Jay Will

...Jones & Bartlett Learning ISSA Labs: Before You Begin Jones & Bartlett ISSA Labs: Before You Begin Table of Contents Click on a topic to jump to the appropriate page Purchasing Info .......................................................................................................................... 2 Virtual Security Cloud Lab (VSCL) ............................................................................................... 2 Step-by-Step Instructions........................................................................................................... 3 Deliverables ............................................................................................................................... 3 File Transfer ............................................................................................................................... 3 How Do I Redeem An Access Code? ........................................................................................... 4 How Do I Create A New User Account?...................................................................................... 9 How Do I Login to An Existing Account? ....................................................................................16 How Do I Get a Password Reminder?........................................................................................19 How Do I Disable The Pop-Up Blocker from Internet Explorer? ................................................23 How Do...

Words: 2021 - Pages: 9

Premium Essay

Police Abuse Essay

...all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus...

Words: 16043 - Pages: 65

Premium Essay

Anatomy and Physiology 1

...reference to the human body. (LECT & LAB) Describe each of the following levels of organization of the human body: chemical, cellular, tissue, system, organism. (LECT & LAB) Identify the principal systems of the body. (LECT & LAB) Describe the standard anatomical position of the human body. (LECT & LAB) Compare common anatomical terms used to describe the various regions of the human body. (LECT & LAB) List by name and location the principal body cavities. (LECT & LAB) Define homeostasis and explain the effects of the lack of homeostasis on the body's function. (LECT & LAB) Describe the chemical level of organization of the human body. Describe the interrelationship of matter, elements, and atoms. (LECT) Identify by name and symbol the principal elements of the human body. (LECT) Diagram and label the structure of a typical atom. (LECT) Describe the function of electrons located in incomplete outer energy levels. (LECT) Define the terms isotope and radioisotope and give their functions. (LECT) Describe the three types of chemical bonding (ionic, covalent, hydrogen) and give an example of each. (LECT) Describe what happens during a chemical reaction. Give three types of chemical reactions. (LECT) Interpret the information given in chemical notations. (LECT) Define ion, oxidation, and reduction. (LECT) Distinguish between organic and inorganic molecules. (LECT & LAB) Define solution, solute, and solvent. (LECT & LAB) Define...

Words: 2061 - Pages: 9

Premium Essay

Sharepoint Upgrade

...New Horizons Computer Learning Center of Cincinnati OFFICIAL MICROSOFT LEARNING PRODUCT 10174A Lab Instructions and Lab Answer Key: Configuring and Administering Microsoft® SharePoint® 2010 New Horizons Computer Learning Center of Cincinnati Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft® Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names...

Words: 74170 - Pages: 297

Premium Essay

Introduction to Networking

...all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus...

Words: 16043 - Pages: 65

Free Essay

Lab Step

...Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see exactly...

Words: 3168 - Pages: 13

Premium Essay

Jjjjjjjjjjjjjj

...INSTRUCTIONS: Enter the Virtual Lab cafeteria, and examine the food and any corresponding nutritional information to assess the diets of your patients. Please type your answers. When your lab report is complete, submit this document to the classroom. For additional help or information on any of the foods or on aspects of a healthy diet, visit your Course Materials and Web resources, and consult this Web site. Part I: Place each food or item in the appropriate category before proceeding. 1–7. Rank the 7 categories listed, from what should make up the highest portion of your daily diet to what category should contribute the least. List 2 examples of each category as well. INSTRUCTIONS: Enter the Virtual Lab cafeteria, and examine the food and any corresponding nutritional information to assess the diets of your patients. Please type your answers. When your lab report is complete, submit this document to the classroom. For additional help or information on any of the foods or on aspects of a healthy diet, visit your Course Materials and Web resources, and consult this Web site. Part I: Place each food or item in the appropriate category before proceeding. 1–7. Rank the 7 categories listed, from what should make up the highest portion of your daily diet to what category should contribute the least. List 2 examples of each category as well. INSTRUCTIONS: Enter the Virtual Lab cafeteria, and examine the food and any corresponding nutritional information to assess...

Words: 1483 - Pages: 6

Free Essay

Cis 206 Slingshot Academy / Tutorialrank.Com

...CIS 206 All iLabs: Devry University (DEVRY) For more course tutorials visit www.tutorialrank.com CIS 206 All iLabs: Devry University ----------------------------------------------------------- CIS 206 Case Study 2-3 Discussing the Functions of an Operating System (DEVRY) For more course tutorials visit www.tutorialrank.com You have been selected to present a short talk on the functions of an operating system for the weekly tech meeting. To support your talk, you must prepare a handout for the attendees. The handout should summarize the information that you have learned about this topic. ----------------------------------------------------------- CIS 206 Case Study 2-4 Discussing How Applications Interact with Operating Systems (DEVRY) For more course tutorials visit www.tutorialrank.com You have been asked to prepare a short lecture for users in the Accounting Department. They have expressed interest in learning more about how the operating system supports the applications they use. Your boss would like to review your lecture notes prior to the class, so you need to save them to a document. Your notes should provide details of your lecture. ----------------------------------------------------------- CIS 206 Case Study 8-2 Researching Background and Font Combinations in Fedora Core 4 (DEVRY) For more course tutorials visit www.tutorialrank.com Case 8-2: Researching Background and Font Combinations in Fedora Core 4 You have been asked to prepare...

Words: 3261 - Pages: 14

Premium Essay

Hgjfghk

...Protocol (DHCP) Lab – 1: Installing DHCP Service Lab – 2: Creating a Scope Lab – 3: Creating DHCP Reservations Lab – 4: DHCP Server Backup and Restore Page No. 5 6 12 20 22 2 Domain Naming System (DNS) Lab – 1: Installing DNS Service Lab – 2: Creating Standard Primary Forward Lookup Zones Lab – 3: Creating Standard Primary Reverse Lookup Zones Lab – 4: Creating Secondary Zone Lab – 5: Creating Stub Zone Lab – 6: Creating Active Directory Integrated Primary zone Lab – 7: Conditional Forwarders Lab – 8: Forwarders Lab – 9& 10: Root Hints and Cache Server 24 25 27 33 38 42 44 47 48 49 3 Internet Information Services (IIS)- Web Server Lab – 1: Installing Internet Information Service - Web Server Lab – 2: Creating a Website Lab – 3: Configuring Redirection of Websites Lab – 4: Creating Virtual Directory Lab – 5: Changing the Website IP address or Port no Lab – 6: Creating Self-Signed Certificate for HTTPS Website Lab – 7: Creating a HTTPS Web Site 50 51 54 62 64 67 68 71 4 Internet Information Services (IIS)- Ftp Server Lab – 1: Installing Internet Information Service - FTP Server Lab – 2: Creating Do not Isolate User FTP Site Lab – 3: Creating Isolate User FTP Site Lab – 4: Creating Isolate User using Active Directory FTP Site 84 85 86 90 96 2 Windows Server 2008 - Network Administration 5 Routing Lab – 1: Assigning the IP Address to Configure Routing Lab – 2: Installing Routing Service on Router1 & Router2 Lab – 3: Enabling Routing...

Words: 12134 - Pages: 49

Free Essay

Cis 534 - Lab Manual

...Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet ............................................................................

Words: 48147 - Pages: 193

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability...

Words: 3379 - Pages: 14

Free Essay

Nos 230 Lab 8

...Lab 8 Creating and Configuring Virtual Machine Storage | | This lab contains the following exercises and activities: Exercise 8.1Exercise 8.2Exercise 8.3 Exercise 8.4Exercise 8.5Lab Challenge | Creating a Virtual Hard DiskEditing a Virtual Hard Disk FileCreating a Virtual Machine with an Existing Virtual Hard DiskConfiguring QOS on a Virtual Hard DiskCreating a Pass-Through DiskCreating a Checkpoint | BEFORE YOU BEGIN The lab environment consists of three servers connected to a local area network, one of which is configured to function as the domain controller for a domain called adatum.com. The computers required for this lab are listed in Table 8-1. Table 8-1 Computers Required for Lab 8 Computer | Operating System | Computer Name | Domain controller 1 | Windows Server 2012 R2 | SERVERA | Member server 2 | Windows Server 2012 R2 | SERVERB | Member server 3 | Windows Server 2012 R2 | SERVERC | In addition to the computers, you also require the software listed in Table 8-2 to complete Lab 8. Table 8-2 Software Required for Lab 8 Software | Location | Lab 8 student worksheet | Lab08_worksheet.docx (provided by instructor) | Working with Lab Worksheets Each lab in this manual requires that you answer questions, take screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab08_worksheet.docx. It is recommended that you use a USB flash drive to store your worksheets, so you can submit them to...

Words: 1958 - Pages: 8

Premium Essay

Srdr

...AT Computer Labs Advanced Microsoft Excel 2013 Introduction Microsoft Excel is program designed to efficiently manage spreadsheets and analyze data. It contains both basic and advanced features that anyone can learn. Once some basic features are known, learning the advanced tools becomes easy. This lesson is composed of some advanced Excel features. It assumes basic prior knowledge of Excel, and it is expected that the objectives from AT Step’s Excel Essentials are known. This lesson will talk about the advanced customization and formatting features that allow for easier data manipulation and organization. Objectives 1) Learn how to Customize the Interface 2) Advanced Formatting: Custom Lists, Cell Groups, and Transposing Tables 3) Learn how to Reference Across Sheets 4) Advanced Formulas and Using Data Ranges 5) Using Data Validation AT Computer Labs Interface Customization Most of Excels interface can be customized to fit many people’s needs. For some, customization makes tools more readily available by placing those tools in a location that is more natural for the user. This section will introduce you to customizing Excel’s interface by adding a tab in the ribbon, customizing the status bar at the bottom of the program, opening separate panes, and scrolling through a sheet with a static column or row. Adding a Tab in the Ribbon In this subsection, we will explore the tab options in Excel. Tabs in Excel can be added, deleted and even reorganized. This feature is useful...

Words: 10539 - Pages: 43