Lab 5

Page 8 of 50 - About 500 Essays
  • Premium Essay

    Biol 111 Lab Exp.5

    (spiral-shaped), cocci (round-shaped), and bacilli (rod-shaped). In order to be able to see these shapes a bacteria must be stained or dyed. I hypothesis that we will have one Gram-positive culture and one Gram-negative culture. (Lab Manual) In order to prepare this lab experiment we performed five steps. The first step in preparing this experiment was to heat fix a bacteria culture sample which in return stopped the sample from coming off the slide during the experiment. In order to perform this

    Words: 1125 - Pages: 5

  • Premium Essay

    Nt1310 Unit 5 Lab Report

    This was the circuit’s input voltage. The Tektronix TDS 2014B oscilloscope was then used to verify the accuracy of the output wave by making sure that the amplitude was 10V peak-to-peak, with a frequency of .5 Hz and a mean value of zero. Subsequently, this square wave was then applied to the input of the RC circuit. The functionality of the circuit was also verified when the left two LEDs lit up in pairs and then right two LEDs lit in pairs successively.

    Words: 1894 - Pages: 8

  • Free Essay

    Et1220 Unit 5 Lab Report

    counter Test Procedure: 4. Record the observed values from Lab 5 Table 5-1. Record the state number, the value of QDQCQBQA, the hexadecimal and decimal values. StateNumber | DataLine 7 | DataLine 6 | DataLine 5 | DataLine 4 | Hexadecimal | Decimal | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 1 | 2 | 0 | 0 | 1 | 0 | 2 | 2 | 3 | 0 | 0 | 1 | 1 | 3 | 3 | 4 | 0 | 1 | 0 | 0 | 4 | 4 | 5 | 0 | 1 | 0 | 1 | 5 | 5 | 6 | 0 | 1 | 1 | 0 | 6 | 6 | 7 | 0 | 1 | 1 | 1 | 7 | 7 | 8

    Words: 591 - Pages: 3

  • Free Essay

    Cis333 Week 5 Lab 4

    Lab 5 Assessment 4- Questions & Answers Lab Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization. • Change control is a precision arrangement of managing every change made to a system. This is to ensure that no unneeded changes are done, that every change is documented, and that no service is disrupted unless absolutely necessary, and that all resources efficiently used. 2. What type of access control

    Words: 689 - Pages: 3

  • Premium Essay

    Nt1310 Unit 5 Lab Answers

    ANSWER THE FOLLOWING QUESTIONS (ignore questions in lab manual) 1) Describe clearly and precisely the function of a positive control. 2) Describe the function of a negative control. What conclusions you would make about your entire experiment if the negative control did not act accordingly? 3) What might you conclude about the results of your test samples if one or more of the test samples tested positive but the positive control did not work according to plan? 4) What tubes represent the positive

    Words: 590 - Pages: 3

  • Premium Essay

    Pentium Flaw

    Ariel Torrente NT1110 Unit 5 Analysis Pentium Flaw Ariel Torrente NT1110 Unit 5 Analysis 7/27/2013 Pentium Flaw The Pentium flaw also nicknamed the Pentium FDIV bug, was an identified error in the Intel P5 Pentium floating unit. The presence of the bug can be checked manually by performing the following application that uses native floating numbers, including Windows Calculator or Microsoft Excel in Windows 95/98 (Pentium FDIV bug). The Pentium flaw was discovered byProfessor Thomas R

    Words: 906 - Pages: 4

  • Premium Essay

    Microbiolgy 203 Post Lab #5

    Microbiology 203 Post Lab#5- Ex. 1-5, 2-2, 3-4, 3-5 1. Assume you want to streak a trypticase soy agar plate for isolation using a nutrient broth culture of Staphylococcus epidermidis. A. Indicate how many times you would need to remove the cap from the S. epidermidis broth culture tube, and explain why. B. How many times would you need to flame your inoculating loop, and explain why. Answers: A. The cap is removed one time when I obtain the original sample. B. The loop will be flamed

    Words: 313 - Pages: 2

  • Premium Essay

    Lab 5: Working with Firewalls, Encrypted

    Alusine T Jalloh NT1230 Client Server Networking 1 LAB 5 WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) ANDUSER ACCOUNT Exercise 5.1 Installing Internet Information Server* Exercise 5.2 Testing IIS Connectivity* 1. Webpage IIS7 Webpage (Internet information Services) appears which indicates that the web address was an accurate Web address and that I am connected to the internet. What is the result, and what does the result indicate? 2. The result is the same as before and indicates

    Words: 669 - Pages: 3

  • Premium Essay

    Lab 5: Working with Firewalls, Encrypted

    Alusine T Jalloh NT1230 Client Server Networking 1 LAB 5 WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) ANDUSER ACCOUNT Exercise 5.1 Installing Internet Information Server* Exercise 5.2 Testing IIS Connectivity* 1. Webpage IIS7 Webpage (Internet information Services) appears which indicates that the web address was an accurate Web address and that I am connected to the internet. What is the result, and what does the result indicate? 2. The result is the same as before and indicates

    Words: 669 - Pages: 3

  • Free Essay

    Unix

    Protection Scheme with Unix Adam Macon POS/355 8-10-13 Mr. Groves When considering a protection scheme that will protect up to 5,000 users the best choice would be Unix. Unix is an operating system developed in the 70’s in AT&T Bell Laboratories. The unique thing about Unix is that it is written in C, which gives it the ability to be portable and able to be integrated with other Unix machines. Program written on one Unix machine can be easily adapted to other Unix machines (C is particularly

    Words: 287 - Pages: 2

Page   1 5 6 7 8 9 10 11 12 50