Week 2 Complete Lab
1. Solve the exponential equation by expressing each side as a power of the same base and then equating exponents. 6 x = 216 x = 3 2. Solve the exponential equation. Express the solution in terms of natural logarithms. Then use a calculator to obtain a decimal approximation for the solution. ex = 22.8 x= ~3.12676 3. Solve the following logarithmic equation. Be sure to reject any value of x that is not in the domain of the original logarithmic expression. Give the exact answer. Log7 x = 2 x=49 4. Solve the logarithmic equation. Be sure to reject any value of x that is not in the domain of the original logarithmic expression. Give the exact answer. Log (x + 16) = log x + log 16 x=16/15 5. Modeling Population: The population of the world has grown rapidly during the past century. As a result, heavy demands have been made on the world's resources. Exponential functions and equations are often used to model this rapid growth, and logarithms are used to model slower growth. The formula models the population of a US state, A, in millions, t years after 2000. a. What was the population in 2000? 16.6 million

b. When will the population of the state reach 23.3 million? February, 2006 6. The goal of our financial security depends on understanding how money in savings accounts grows in remarkable ways as a result of compound interest. Compound interest is computed on your original investment as well as on any accumulated interest. Complete the table for a savings account subject to 4 compounding periods yearly. Amount Invested| Number of Compounding Periods| Annual Interest Rate| Accumulated Amount| Time t in Years| $15,500| 4| 5.75%| $30,000| |

7. Cell division is the growth process of many living organisms such as amoebas, plants, and human skin cells. Based on an ideal situation in which no cells die and no by-products are produced, the number of cells present at a given time follows the law...

...___
Sara Komisarz
Student Name: ________________________________________________________________
Abena Shaw
Instructor Name: ______________________________________________________________
01/18/2015
Lab Due Date: ________________________________________________________________
Overview
In this lab, you used two very powerful forensic analysis tools, Wireshark and NetWitness
Investigator, to examine the same File Transfer Protocol (FTP) traffic capture file, and...

...NETW360 Week2Lab Report
1. Read through the lab instructions before executing the lab steps and creating the reports.
2. Follow all procedures in the lab instructions for the items you will need to include in your report.
3. After executing all steps contained in the lab instructions, submit a one Word document for each project containing your report to the...

...Purpose
The purpose of this lab is to learn more about how connected you are to the ecosystems and biosphere that you inhabit. You will learn how your everyday choices contribute to the human impacts on our environment you’ve been learning about. Most importantly, you will learn about benefits that you can achieve by joining the increasing number of people who are making choices that reduce their environmental impact.
Objectives
The objectives of this lab...

...Statistics – LabWeek2
Name:
Math221
Creating Graphs
1. Create a Pie Chart for the variable Car -
2. Create a histogram for the variable Height –
3. Create a stem and leaf chart for the variable Money –
Stem-and-Leaf Display: Money
Stem-and-leaf of Money N = 20
Leaf Unit = 1.0
9 0 124456667
(3) 1 249
8 2 128
5 3 03
3 4 27...

...Lab2 – Water Quality and Contamination
Experiment 1: Effects of Groundwater Contamination
Table 1: Water Observations (Smell, Color, Etc.)
Beaker Observations
1 This beaker has water only, clear with no smell
2 I mixed oil in the water, the oil then started to settle at the top of the water. (oil is not a soluble)
3 Beaker contained vinegar and water, the water got a little cloudy and the vinegar smell is very strong.
4 The water and laundry...

...Mo Thenard
IS3350 Lab #2
3/24/13
1. Security is a tool to build privacy and privacy is result of that.
2. Yes, because they gave him permission to do it and he knows not to share it with anybody.
3. Identity theft, and embarrassment to the company are some possible consequences.
4. Yes, because they used HIPAA compliance information.
5. The company took the action to fired him.
6. Yes, if it happened at work the company would be...

...solution
NaOH is a very corrosive chemical and contact with it can cause burns to body tissue and
possible eye damage. Can irriate the lungs and can cause permanent lung damage. also contact
with water can generate enought heat to ignite combustibles.
2. In your own words, briefly explain the terms below. Copied answers will receive zero points.
a. equilibrium state
When a chemical reaction is equal. when the products and reactients are at equal rates
b. the effect of...

...1. What are the five steps of a hacking attack?
Reconnaissance , Scanning, Gaining Access, Maintaining Access , Covering Tracks
2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.
Nmap uses the –O option to perform OS fingerprinting. The process monitors and captures network traffic. The traffic is then analyzed for patterns that would suggest which operating systems are in use.
3. What step in the...

## Share this Document

Let your classmates know about this document and more at StudyMode.com