Solvent/Water Trap Diagram Rodney Atwaters Halle Bair May 28‚ 2013 Chemistry 36100 Introduction The purpose of this lab was to produce benzoic acid by mixing sodium benzoate with hydrochloric acid. The Hydrochloric acid used in the experiment was a stock solution made by mixing HCl Acid and deionized water. HCl acid‚ historically called‚ muriatic acid or spirits of salt‚ hydrochloric acid is produced from sulfuric acid and common salt‚ NaCl (Princeton.edu). Since the early 1900 ’s‚ sodium
Premium Hydrochloric acid Chlorine Chemistry
MLA Worksheet Works-Cited Page Part One: Works-Cited Page Entries Create entries for an MLA Works-Cited page using the following sources. 1. A book by Robert Akins called Greeks and Romans. It was published by Random House in Philadelphia in 1987. 2. A book by Henry Goldman and Elizabeth Howard called Ancient Civilizations. It was published in Philadelphia by Gold House in 1989. 3. An article called “Writing Utensils” in the 5th edition (published in 1985) of the Encyclopedia
Premium Greeks Writing Greece
Macromolecules of Life Hands-On Labs‚ Inc. Version 42-0085-00-01 Lab Report Assistant ________________ Name: Akil Kelly Exercise 1: Testing for Proteins Data Table 1: Biuret results. Substance Tested Predicted Results Biuret Color & Number of drops added 1: Egg white Contains Protein Purple color – 9 drops 2: Pepsin Contains Protein Purple color – 9 drops 3: Sugar Doesn’t contain protein Blue
Free Glucose Carbohydrate Starch
INET Lab Report 2 Microscope and the Cell Template Student: Mavon Riley Email: shantariley@yahoo.com Date: 09/05/2014 I. Purpose of the Microscope II. The Compound Microscope EXERCISE 2.1 – Label the parts of the compound microscope 1. Eyepiece 2. Arm 3. Course Adjustment 4. Fine Adjustment 5. Revolving Nose piece 6. Objective Lenses 7. Stage Clips 8. Stage 9. Iris Diaphragm Lever 10. Condenser 11. Light Source 12. Base EXERCISE 2.2 – Calculate microscope
Free Cell Eukaryote Bacteria
LAB #8 – Assessment Worksheet Course Name and Number: CIS333 Lab Due Date: May 26th‚ 2013 Introduction In this lab‚ you will verify and perform a cross-site scripting (XSS) exploit and an SQL injection attack on the test bed Web application and Web server using the Damn Vulnerable Web Application (DVWA) found on the TargetUbuntu01 Linux VM server. You will use a Web browser and some simple command strings to identify the IP target host and its known vulnerabilities and exploits‚ and then
Premium Web server Internet World Wide Web
320 Lab 1 Homework Part 1 a) A piano manufacturer wants to track all pianos it makes. Each piano has a unique serial number and a manufacturing completion date. Each instrument represents exactly one piano model‚ all of which have an identification number and model. The company produces thousands of pianos of a certain model‚ and the design is specified before any single piano exists. 1. Identify the degree and cardinalities of the relationship. Piano-Model: Cardinality: one-to-many (1:M)
Premium File Transfer Protocol Identification Entity-relationship model
Lab 2: Protiens and Starches Purpose: An introduction to testing procedures for two large‚ organic molecules: proteins and starches. Hypothesis: In the test for protiens the water‚ being that it is inorganic will not test positive for protiens; it will serve as the negative control. The milk and 50% egg solution should test positive for protien as they are subsatnce derived from animals which contain protiens in order to carry the functions of life. The sucrose will test negative due
Premium Carbohydrate Protein Glucose
California Department of Economics ECON 317 Introduction to Statistics for Economists Prof. Safarzadeh Assignment # 2 Student Name: ________________ Answer all the questions on the spaces provided. Underline your answers and show your calculations and work on the tables. Item |Speed |Mileage | | |X - X |(X- X)2 |(Y-Y) |(Y-Y)2 |(X-X)(Y-Y) | | | |1 | 30 | 25 | | | | | | | | | | |2 | 50 | 20 | | | | | | | | | | |3 | 35 | 23 | | | | | | | | | | |4 | 45 | 21 | | | | | | | | | | |5 | 40 | 23 |
Premium Median Arithmetic mean Standard deviation
1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. They change to keep authentication and integrity. 2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample fi le? What if they were different when you re-calculated the hash value at the other end? These are the same to verify authentication and integrity.
Premium Cryptography Windows XP Microsoft Windows
University of Phoenix Material Weekly Vocabulary Exercise: Health Care Structures and Divisions Complete the worksheet according to the following guidelines: In the space provided‚ write each term’s definition as used in health care. You must define the term in your words; do not simply copy the definition from a textbook. In the space provided after each term’s definition‚ provide a sentence that illustrates the importance of the skill‚ concept‚ procedure‚ organization‚ or tool to which the term
Premium Medicine Health care