(spiral-shaped), cocci (round-shaped), and bacilli (rod-shaped). In order to be able to see these shapes a bacteria must be stained or dyed. I hypothesis that we will have one Gram-positive culture and one Gram-negative culture. (Lab Manual) In order to prepare this lab experiment we performed five steps. The first step in preparing this experiment was to heat fix a bacteria culture sample which in return stopped the sample from coming off the slide during the experiment. In order to perform this
Words: 1125 - Pages: 5
This was the circuit’s input voltage. The Tektronix TDS 2014B oscilloscope was then used to verify the accuracy of the output wave by making sure that the amplitude was 10V peak-to-peak, with a frequency of .5 Hz and a mean value of zero. Subsequently, this square wave was then applied to the input of the RC circuit. The functionality of the circuit was also verified when the left two LEDs lit up in pairs and then right two LEDs lit in pairs successively.
Words: 1894 - Pages: 8
counter Test Procedure: 4. Record the observed values from Lab 5 Table 5-1. Record the state number, the value of QDQCQBQA, the hexadecimal and decimal values. StateNumber | DataLine 7 | DataLine 6 | DataLine 5 | DataLine 4 | Hexadecimal | Decimal | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 1 | 2 | 0 | 0 | 1 | 0 | 2 | 2 | 3 | 0 | 0 | 1 | 1 | 3 | 3 | 4 | 0 | 1 | 0 | 0 | 4 | 4 | 5 | 0 | 1 | 0 | 1 | 5 | 5 | 6 | 0 | 1 | 1 | 0 | 6 | 6 | 7 | 0 | 1 | 1 | 1 | 7 | 7 | 8
Words: 591 - Pages: 3
Lab 5 Assessment 4- Questions & Answers Lab Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization. • Change control is a precision arrangement of managing every change made to a system. This is to ensure that no unneeded changes are done, that every change is documented, and that no service is disrupted unless absolutely necessary, and that all resources efficiently used. 2. What type of access control
Words: 689 - Pages: 3
ANSWER THE FOLLOWING QUESTIONS (ignore questions in lab manual) 1) Describe clearly and precisely the function of a positive control. 2) Describe the function of a negative control. What conclusions you would make about your entire experiment if the negative control did not act accordingly? 3) What might you conclude about the results of your test samples if one or more of the test samples tested positive but the positive control did not work according to plan? 4) What tubes represent the positive
Words: 590 - Pages: 3
Ariel Torrente NT1110 Unit 5 Analysis Pentium Flaw Ariel Torrente NT1110 Unit 5 Analysis 7/27/2013 Pentium Flaw The Pentium flaw also nicknamed the Pentium FDIV bug, was an identified error in the Intel P5 Pentium floating unit. The presence of the bug can be checked manually by performing the following application that uses native floating numbers, including Windows Calculator or Microsoft Excel in Windows 95/98 (Pentium FDIV bug). The Pentium flaw was discovered byProfessor Thomas R
Words: 906 - Pages: 4
Microbiology 203 Post Lab#5- Ex. 1-5, 2-2, 3-4, 3-5 1. Assume you want to streak a trypticase soy agar plate for isolation using a nutrient broth culture of Staphylococcus epidermidis. A. Indicate how many times you would need to remove the cap from the S. epidermidis broth culture tube, and explain why. B. How many times would you need to flame your inoculating loop, and explain why. Answers: A. The cap is removed one time when I obtain the original sample. B. The loop will be flamed
Words: 313 - Pages: 2
Alusine T Jalloh NT1230 Client Server Networking 1 LAB 5 WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) ANDUSER ACCOUNT Exercise 5.1 Installing Internet Information Server* Exercise 5.2 Testing IIS Connectivity* 1. Webpage IIS7 Webpage (Internet information Services) appears which indicates that the web address was an accurate Web address and that I am connected to the internet. What is the result, and what does the result indicate? 2. The result is the same as before and indicates
Words: 669 - Pages: 3
Alusine T Jalloh NT1230 Client Server Networking 1 LAB 5 WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) ANDUSER ACCOUNT Exercise 5.1 Installing Internet Information Server* Exercise 5.2 Testing IIS Connectivity* 1. Webpage IIS7 Webpage (Internet information Services) appears which indicates that the web address was an accurate Web address and that I am connected to the internet. What is the result, and what does the result indicate? 2. The result is the same as before and indicates
Words: 669 - Pages: 3
Protection Scheme with Unix Adam Macon POS/355 8-10-13 Mr. Groves When considering a protection scheme that will protect up to 5,000 users the best choice would be Unix. Unix is an operating system developed in the 70’s in AT&T Bell Laboratories. The unique thing about Unix is that it is written in C, which gives it the ability to be portable and able to be integrated with other Unix machines. Program written on one Unix machine can be easily adapted to other Unix machines (C is particularly
Words: 287 - Pages: 2