...Exams” for due date information.) Connect to the iLab here. • Before beginning work, connect to your virtual lab platform (Skillsoft / Element K). NOTE: • There are two sections to this week’s iLab assignment. Be sure to complete both sections in order to receive full credit. o Lab 2a: Install and Configure Active Directory o Lab 2b: Organize Users and Groups Additional Resource You may find this resource helpful as you prepare to complete the lab. • Advanced Configuration and Organizing Resources LAB 2A OVERVIEW Scenario and Summary • You will explore Server Manager, install Active Directory, and add a Windows 7 PC to the domain. iLAB STEPS TASK 1: Explore Server Manager STEP 1: Explore the Basic Information in Server Manager Back to Top Action 1. Log on with a user name of Administrator and a password of password. It may ask about the network type. Click Work, then click Close. 2. Click the Server Manager icon in the lower left, to the right of the Start button. 3. Notice the Server information in the right pane. Scroll down to find out the following information, and put the answers in the lab report. 1. Is the firewall turned on? 2. What is the name of the link for the IE Enhanced Security Configuration? 3. Which link allows you to change the computer name? (You may have to try a few links for this one.) Insert a screenshot into your lab report of the configuration screen (#1). STEP 2: Explore Diagnostics Back to Top Action: Expand all the items under...
Words: 13210 - Pages: 53
...Name______________________________________________ IB Guide to Writing Lab Reports Standard and Higher Level Chemistry 2010-2011 Table of Contents page 1 Explanations, Clarifications, and Handy Hints page 2 - 13 IB Laboratory Evaluation Rubric page 14 - 15 Formal Lab Report Format page 16 Error Analysis Types of Experimental Errors page 17 Error Analysis: Some Key Ideas page 18 Precision and Accuracy in Measurements A Tale of Four Cylinders Assessment of Errors and Uncertainties in IB Lab Reports Explaining Terms and Concepts in Error Analysis page 19 - 20 page 21 Mathematics of Evaluating Accuracy and Precision page 26 - 27 Rejection of Data page 28 More Examples of Propagating Error page 29 - 31 page 22 - 25 Typical Instrumental Uncertainties page 32 Checklist for Writing IB Lab Reports page 33 - 34 Please read carefully and keep this handy reference for future use in writing exemplary lab reports. Page 1 IB Guide to Writing Laboratory Reports Explanations, Clarifications, and Handy Hints The nature of science is to investigate the world around you. An inquiring mind is essential to science. Experiments are designed by curious minds to gain insight into wonder-producing phenomena. Hopefully, this process of designing experiments, doing experiments, thinking about experimental results, and writing lab reports will tremendously benefit YOU! IB Chemistry is the challenge you have chosen...
Words: 11919 - Pages: 48
...Lesson 2: Formatting a lab report using APA style APA Style The APA Publication Manual sets out clear guidelines regarding the format of a lab report. General formatting issues Use the following formatting guidelines for your lab report. Your entire report should be: 1. 12-point font (e.g., Times New Roman, Arial, Courier) 2. Double spaced throughout 3. Without gaps – you need to indent the first line of every paragraph by one-half inch (1.27cm) 4. With standard margins – 1” or 2.54cm all round 5. Aligned left (do not use justified alignment) 6. Paginated, with page numbers being consecutive from the title page and located on the top right of the page using Arabic numerals (e.g., 1, 2, 3 ..). There are clear guidelines on the formatting of the headings in your report. See the guidelines below. Level of heading | Format | Sections using this heading level | 1 | Centred, Boldface, Uppercase and Lowercase heading | Method Results Discussion | 2 | Flushed left, Boldface, Uppercase and Lowercase heading | Participants Materials Procedure | 3 | Indented, boldface, lowercase paragraph heading ending in a period. | | 4 | Indented, boldface, italicized, lowercase paragraph heading ending in a period. | | 5 | Indented, italicized, lowercase paragraph heading ending in a period. | | When reporting numbers, use numerals when: 1. the number is greater than 10 2. the number is smaller than 10 and is compared to number greater...
Words: 276 - Pages: 2
...------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing and Maintaining an IT Security Policy Framework 83 Unit 10: Automated Policy Compliance Systems 90 Unit 11: Course Review and Final Examination 97 Course Support Tools 101 Evaluation of Student Learning 102 STUDENT COPY 103 Graded Assignment Requirements 104 Unit 1 Discussion 1: Importance of Security Policies 105 Unit 1 Assignment 1: Security Policies Overcoming Business...
Words: 18421 - Pages: 74
... |L. |T. |S. |Units | |MUP1101 |History of Human Settlement & Planning Principles |3 |0 |0 |1.0 | |MUP1103 |Housing & Community Planning |3 |0 |0 |1.0 | |MUP1105 |Planning Theory and Techniques |3 |0 |0 |1.0 | |TRS1017 |GIS with introduction to Remote Sensing |3 |0 |0 |1.0 | | Sessional / Laboratory subjects | |MUP1102 |Planning Studio / Workshop I (With Field study) |0 |0 |12 |1.5 | |MUP 1104 |Urban Design |0 |0 |4 |0.5 | |Non-Credit Laboratory subject | |TRS1018 |GIS Lab |0 |0 |4 ...
Words: 6033 - Pages: 25
...OPERATIONS ORDER | primary client NAVISION #: 100725 | |CLIENT: Albert Einstein College of Medicine |CONTACT: Melanie Brown | |1300 Morris Park Ave |Assistant Administrator | |Bronx, NY 10461 |718-430-4152 | | |Email: Melanie.brown@einstein.yu.edu | |SECONDARY CLIENT #: (Location & Contact) | |NAVISION #: 151776 | |1300 Morris Park Ave | |Bronx, NY 10461 | | ...
Words: 4459 - Pages: 18
...Week 3 Laboratory Week 3 Lab Part 1: Automate Digital Evidence Discovery Using Paraben’s P2 Commander Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Open an existing case file using P2 Commander * Analyze the data in the image and the files saved in the case * Sort and identify evidence file types in a case using Paraben's P2 Commander forensic tool * Use P2 Commander to identify information for potential evidence contained in chat logs such as Skype chat * Analyze the contents of user profiles and data using the P2 Commander browser Week 3 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab available in the Practice section of Learning Space Unit 5 and then answer the questions below. The video will demonstrate the use of Paraben's P2 Commander and outline the different forensics capabilities of the tool. Lab Assessment Questions & Answers 1. When talking about Information Security, what does the 'CIA' stands for? CIA in information security stands for confidentiality, integrity and availability. 2. When would it be a good practice to classify data? It would be a good practice to classify data when you need to extract files from a hard drive or system for investigating in order to accurately organize the findings. 3. What is Security classification? Security classification is the security level assigned to a government document, file...
Words: 635 - Pages: 3
...Cover page: Unit 2 Lab 2.1.1 States of Matter . Survey of the Sciences Week 2 Assignment 2 – Lab 2.1.1 – States of Matter Date of assignment: 12/18/2013 Date turned in: 01/15/2014 Liquid at over 650K | Liquid under 650K | The molecules appear to be faster and more spread apart | Molecules are even faster, mostly touching and mostly compact | Gas at over 1540K | Gas at under 300K | Faster and mostly apart and randomly touching | Slower, more clustered and in ring shapes and mostly touching with less space apart | Solid at 350 – 360K and over 600K | Solid at under 10K | Moving from one position to another at accelerated pace but mostly touching at an even faster rate and mostly spread apart | Less movement, but still clustered and connected in ring forms | Solid is at 157K and appears to be moving slower and less close but compact in rings. Liquid is at 328K and appears to be closely bonded but moving around much faster. Gas is at 809K and appears to be moving much faster and occupying more space than solid and liquid. But when the temperature is reduced to about 97K the rate of movement decreases and the molecules get more clustered and compact, the reaction in liquid is almost the same as gas when the temperature is reduced to the same 97K. The reaction in solid liquid and gas stages of water are almost constant at a reduced temperature of 97K. Only the solid state resembles itself in heated and cooled stages. The others have different resemblance. In...
Words: 1675 - Pages: 7
...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts Confidentiality, integrity, and availability...
Words: 3379 - Pages: 14
...MARKETING & RETAIL DIVISION MGT9A3: BUSINESS IN THE 21ST CENTURY SCQF Level: 8, SCQF Credit: 22 Pre-requisite: MGT9A2 AUTUMN 2013 Module coordinator: Student support: Teaching Staff: MODULE AIMS Carol Marshall, (3A40) carol.marshall@stir.ac.uk Lynne McCulloch (3B44) l.a.mcculloch@stir.ac.uk K Davies, J Joseph, C Marshall, S Mawson, C Taylor The first two foundation modules examined the firm and the external environment. The emphasis for the module is the management of organisations in the 21st century. As such, this module concentrates on the management of the functional areas of the business, namely operations management, human resource management and marketing within the broader context of the changing organisation and the global economy. MODULE LEARNING OBJECTIVES By the end of this module, through completion of the assessment, attendance at lectures and participation in seminars you will have gained knowledge and understanding of: the changing nature of the global economy and its impact on management, operations management and organisational aspects of the business, the future for managing human resources the changing nature of the market place, marketing and consumer behaviour Also, you will have developed skills in being able to: think critically, conceptually and contextually, select and apply theoretical academic models, search and select appropriate reading material, use case studies to apply theoretical models to real life present...
Words: 2031 - Pages: 9
...type University of Houston • College of Technology DIGM 3353: Visual Communications Technology SPRING 2013 SYLLABUS Lecture Section 30963 On-line, Lab Section 30965: Mon. 1:00-4:00; 31356: 5:30-8:30 Course: 3 credits. Use of technological systems in visual communications including design principles, typography, use of color, photography, pixel- and vector-based graphics, print and electronic delivery, and ethical considerations Instructors: Lloyd.Schuh, Lecture, Mike Dawson, Lab Email: leschuh@central.uh.edu and miked@mikedgraphics.com. Please use “Student Cafe” option on Blackboard for general questions and comments, use instructor’s email for private questions. Office Hours: In-person (by appointment) and virtual (through Blackboard Learn) schedule To Be Announced. Department Website: www.digitalmedia.tech.uh.edu Lecture: Section 18662, on BLACKBOARD LEARN, go to: https://accessuh.uh.edu/login.php Lab: Section: 18663, Thursday, 8:30-11:30, Sugar Land Campus, George Bldg Room 320. Prerequisites: ENGL 1303/1304 or equivalent and working knowledge of Microsoft Office. Course Goals: This course provides students with an understanding of the technological systems that extend the range of human communications, with an emphasis on the visual communications processes. The course is an overview, which only begins to scrape the surface of the field of graphic communication/digital media. You will walk away from this course knowing a little...
Words: 1967 - Pages: 8
...Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories: prevention and detection. Intrusion prevention systems (IPS) block the IP traffic based on the filtering criteria that the information systems security practitioner must configure. Typically, the LAN-to-WAN domain and Internet ingress/egress point is the primary location for IPS devices. Second to that would be internal networks that have or require the highest level of security and protection from unauthorized access. If you can prevent the IP packets from entering the network or LAN segment, then a remote attacker can’t do any damage. A host-based intrusion detection system (IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides...
Words: 3209 - Pages: 13
...Systems Module Code and Title: Title of Assignment: Academics responsible: ME2301, Thermofluids Thermal Power Lab Report T1 (Gas Turbine), Prof. T. Megaritis T2 (Refrigeration, Dr L. Ganippa Contribution to total module mark: 15% Suggested Allocation time: 20 hours Submission Date: Tuesday 8 January 2013 NO LATER THAN 4:00pm on the submission date to the General Office for FULL credit. Otherwise, a penalty for late submission as specified by the Board of Studies will apply. (NOTE: ANY MITIGATING CIRCUMSTANCES must be notified a.s.a.p. Failure to print work on the project in good time, or other machine-related failure will not be deemed to be a Mitigating Circumstance). Aims: • To show an understanding of the principles of vapour compression refrigeration cycle • To appreciate and apply thermodynamic analysis to a refrigerator • To show an understanding of the principles of a gas turbine power plant Specification of Assignment: The assignment comprises two parts: Part 1: Laboratory report on Refrigeration Experiment Part 2: Brief description of the gas turbine apparatus, its operation and sample calculation Specification of the material to be submitted: Marking Scheme Front cover: Title, name, group number, and the date of experiments Introduction and objectives of the Refrigeration Experiment 5% Sketch and brief description of the Refrigeration Experimental Setup 5% Refrigeration Laboratory Results (sample calculation for one of the tests) 35% Refrigeration Laboratory Discussion...
Words: 1338 - Pages: 6
...requiring invasive treatment. Similar complications are rare with insertion of central venous catheters, as they should not enter the heart. Injury to the right bundle during central venous catheter insertion can be by trauma from the guide wire or from the catheter itself. The function of the AV node and bundle of His in these patients has not been studied before. We report a patient with LBBB who developed CHB during insertion of a central venous cannula. Conduction through the AV node and His–Purkinje system was intact, showing that the transient RBBB was caused by traumatic injury rather than by other disease of the conduction system. Designing central venous catheter product, which will appeal customer who are looking for a quality, healthy, sterility, and pyrogen free. The new product should be on shelf in test markets within nine months of start of the project and meet following goals. Page 5 Team members: Mahmud Abu el-Atta Mohamed Elmorsy Hamada Sharaf Amr Abdel Aziz Ismail El Hamalawy Maged Hamdy Emad Ali Production Planning specialist Quality assurance specialist Production manager Quality control lab Purchasing manager Operations Warehouse manager The mission goals meet the five...
Words: 2122 - Pages: 9
...Formula for weighed mean: X ̅ = (∑fx)/N Where: − ×=Arithmetic mean ∑= Summation of symbol ƒ=Frequency ×=Score/Mean Ν=Number of Respondents Data Organization Table 2 Likert five point- scale Unit weight Equivalent weight points Verbal Interpretation 5 4.50-5.0 Strongly Agree 4 3.50-4.49 Agree 3 2.50-3.49 Minimally Agree 2 1.50-2.49 Disagree 1 1.0-1.49 Strongly Disagree Study Habits of CS 1 Students: What do they do outside the classroom? Donald Chinn Institute of Technology University of Washington, Tacoma Tacoma, WA, USA 98402 dchinn@u.washington.edu Judy Sheard Faculty of Information Technology Monash University Victoria, Australia Judy.Sheard@infotech.monash.edu.au Angela Carbone Faculty of Information Technology Monash University Victoria, Australia Angela.Carbone@infotech.monash.edu.au Mikko-Jussi Laakso Department of Information Technology and Turku Centre for Computer Science (TUCS) University of Turku, Finland milaak@utu.fi Abstract In this paper, we report the results of a survey of the study habits of CS1 students. In this survey, students were asked how much time they spent on course-related activities such as reading the textbook, working on problems outside class, using online learning tools, and consulting with their instructor. We identified factors that influenced student study habits and how those factors affected students’ final course score...
Words: 7517 - Pages: 31