Chewing Gum Purpose To find the mass percentage of sucrose in chewing gum and compare the actual mass to the mass indicated on the package and compare the masses to that of different brands of chewing gum. Hypothesis The theoretical mass percentage of sucrose (C12H22O11) in chewing gum. Materials - Sample of chewing gum + wrapper - Electronic balance Procedure 1. Form groups of 3‚ and distribute a different brand of gum to each member of the group. 2. Record the brand of chewing gum used
Premium Scientific method Sugar Hypothesis
LAB 1: Footprinting a Network One of the most astounding side-effects of the Internet is how readily accessible information is about individuals‚ organizations‚ and computer systems. This assignment is designed to give you some experience in obtaining this information. Materials Needed: Computer Internet connection with “Ping” command available Activity Use “Ping” command to determine the IP address of www.google.com and www.uhv.edu e.g. launch the command prompt and type in “ping www
Premium Internet IP address Web server
injections. Reporting - Jennifer Le Schedule Between 2:00 am – 6:00 am. Saturdays only EST. Unanswered Questions – How many employees are in this company? - Will the employees be aware of this test? Authorization Letter – From John Smith‚ CEO of E-Commerce Sales stating that I have permission to do this test. Lab Assessment Questions and Answers 1. Provide a brief summary of the activities in each of the hacking steps listed below: 1. Reconnaissance—The initial stage of collecting
Premium Computer security Hacker World Wide Web
Lab #1 Submission 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop‚ and identify whether that application starts as a service on the system or must be run manually. Wireshark – manual Nessus Client – manual Nessus Server Manager – can be set up to run at Startup Filezilla Server Interface – starts as a service Zenmap GUI - manual 2. What was the allocated source IP host address for the TargetWindows01 server‚ TargetUbuntu01 server‚ and the
Free Linux Subnetwork Internet Protocol
Keith Brown IS 4670 Lab 1 Perform a Byte-Level Computer Audit 1. What is the main purpose of a software tool like WinAudit in computer forensics? Answer: WinAudit is a great free tool that will give you a comprehensive view of the components that make up your system‚ including hardware‚ software and BIOS. 2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation? Answer: Computer Name‚ OS‚ Security Settings for Windows
Free Computer forensics Forensic science Computer program
Lab #1 1. List the five (5) steps of the Hacking process. Reconnaissance‚ Scanning‚ Gaining Access‚ Maintaining Access‚ Covering Tracks 2. In order to exploit or attack the targeted systems‚ what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan? The first step would be the reconnaissance or footprinting step of the hacking process. 3. What applications and tools can be used to perform
Premium Computer security
Attack and Penetration Plan Table of contents 1 Scope 2 Goals and Objectives 2 Tasks 2 Reporting 2 Schedule 2 Unanswered Questions 2 Authorized Letter 2 SCOPE Located on ASA_Instructor‚ the e-commerce Web Application server is acting as an external point-of-entry into the network: Ubuntu Linux 10.04 LTS Server (TargetUbuntu01) Apache Web Server running the e-commerce Web application server Credit card transaction
Premium Computer security Web server Security
GROUP CASE STUDY 1 INSTRUCTIONS Complete a case study of ABC Corporation (your instructor will assign the specific company for the case study at the beginning of Module/Week 3) in the case section of the text (e.g. Case Number 1). A formal‚ in-depth case study analysis requires you to utilize the entire strategic management process. Assume your group is a consulting team asked by the ABC Corporation to analyze its external/internal environment and make strategic recommendations. You must include
Premium Net present value Cash flow Strategic management
ACSM POSITION STAND: TYPE 2 DIABETES & EXERCISE Albright et al.‚ 2000 • • Physical activity is an underutilised therapy Favourable changes in glucose tolerance and insulin sensitivity usually deteriorate within 72 h of the last exercise session: consequently‚ regular physical activity is imperative to sustain glucose-lowering effects and improved insulin sensitivity Individuals with type 2 diabetes should strive to achieve a minimum cumulative total of 1‚000 kcal per week from physical activities
Premium Diabetes mellitus Obesity Exercise
Experiment 1: Basic Laboratory Techniques Briana S. Golar Laboratory Partners: Dayreal Brown Valerie Marcellus Andrew Thompson January 16‚ 2013 Conclusion Introduction: The intent of the experiment is to sucessfully understand that chemistry is an experimental science which is dependent upon certain observation and the use of good laboratory techniques. The experimenter should become familiar with basic operations necessary
Premium Temperature Thermodynamics Water