Week 2 Complete Lab
1. Solve the exponential equation by expressing each side as a power of the same base and then equating exponents. 6 x = 216 x = 3 2. Solve the exponential equation. Express the solution in terms of natural logarithms. Then use a calculator to obtain a decimal approximation for the solution. ex = 22.8 x= ~3.12676 3. Solve the following logarithmic equation. Be sure to reject any value of x that is not in the domain of the original logarithmic expression. Give the exact answer. Log7 x = 2 x=49 4. Solve the logarithmic equation. Be sure to reject any value of x that is not in the domain of the original logarithmic expression. Give the exact answer. Log (x + 16) = log x + log 16 x=16/15 5. Modeling Population: The population of the world has grown rapidly during the past century. As a result, heavy demands have been made on the world's resources. Exponential functions and equations are often used to model this rapid growth, and logarithms are used to model slower growth. The formula models the population of a US state, A, in millions, t years after 2000. a. What was the population in 2000? 16.6 million

b. When will the population of the state reach 23.3 million? February, 2006 6. The goal of our financial security depends on understanding how money in savings accounts grows in remarkable ways as a result of compound interest. Compound interest is computed on your original investment as well as on any accumulated interest. Complete the table for a savings account subject to 4 compounding periods yearly. Amount Invested| Number of Compounding Periods| Annual Interest Rate| Accumulated Amount| Time t in Years| $15,500| 4| 5.75%| $30,000| |

7. Cell division is the growth process of many living organisms such as amoebas, plants, and human skin cells. Based on an ideal situation in which no cells die and no by-products are produced, the number of cells present at a given time follows the law...

...Purpose
The purpose of this lab is to learn more about how connected you are to the ecosystems and biosphere that you inhabit. You will learn how your everyday choices contribute to the human impacts on our environment you’ve been learning about. Most importantly, you will learn about benefits that you can achieve by joining the increasing number of people who are making choices that reduce their environmental impact.
Objectives
The objectives of this lab...

...___
Sara Komisarz
Student Name: ________________________________________________________________
Abena Shaw
Instructor Name: ______________________________________________________________
01/18/2015
Lab Due Date: ________________________________________________________________
Overview
In this lab, you used two very powerful forensic analysis tools, Wireshark and NetWitness
Investigator, to examine the same File Transfer Protocol (FTP) traffic capture file, and...

...NETW360 Week2Lab Report
1. Read through the lab instructions before executing the lab steps and creating the reports.
2. Follow all procedures in the lab instructions for the items you will need to include in your report.
3. After executing all steps contained in the lab instructions, submit a one Word document for each project containing your report to the...

...Lab2 – Water Quality and Contamination
Experiment 1: Effects of Groundwater Contamination
Table 1: Water Observations (Smell, Color, Etc.)
Beaker Observations
1 This beaker has water only, clear with no smell
2 I mixed oil in the water, the oil then started to settle at the top of the water. (oil is not a soluble)
3 Beaker contained vinegar and water, the water got a little cloudy and the vinegar smell is very strong.
4 The water and laundry...

...1.) From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5, High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities)
a. Fire destroys primary data center
b. User downloads an unknown e-mail attachment
c. Hacker penetrates your IT infrastructure and gains access to your internal network
d. Workstation OS has known software vulnerability
2.) For the above identified threats and vulnerabilities, which of the...

...Statistics – LabWeek2
Name:
Math221
Creating Graphs
1. Create a Pie Chart for the variable Car -
2. Create a histogram for the variable Height –
3. Create a stem and leaf chart for the variable Money –
Stem-and-Leaf Display: Money
Stem-and-leaf of Money N = 20
Leaf Unit = 1.0
9 0 124456667
(3) 1 249
8 2 128
5 3 03
3 4 27...

...Chapter 2 Quiz lab
1. What mineral composition is most characteristic of felsic rocks?
a. olivine, pyroxene, and calcium-rich plagioclase
b. orthoclase, quartz, and biotite
c. calcium-rich plagioclase and hornblende with some olivine
d. particles of volcanic ash welded together
2. What mineral composition is most characteristic of mafic rocks?
a. olivine, pyroxene, and calcium-rich plagioclase
b. orthoclase, quartz, and biotite
c. sodium-rich...

...Mo Thenard
IS3350 Lab #2
3/24/13
1. Security is a tool to build privacy and privacy is result of that.
2. Yes, because they gave him permission to do it and he knows not to share it with anybody.
3. Identity theft, and embarrassment to the company are some possible consequences.
4. Yes, because they used HIPAA compliance information.
5. The company took the action to fired him.
6. Yes, if it happened at work the company would be...

420 Words |
3 Pages

Share this Document

Let your classmates know about this document and more at StudyMode.com

## Share this Document

Let your classmates know about this document and more at StudyMode.com