# LAB 6

Satisfactory Essays
5674 Words
Grammar
Plagiarism
Writing
Score
LAB 6
CHM130 Lab 6 Exploring Density Name A. Data Tables Place your completed Data Tables here Part IIIa (3 points) Volume of water in graduated cylinder (mL)10 mlMass of rubber stopper (g)11.15Volume of water and rubber stopper (mL)16.5 Part IIIb (6 points) Volume of water in graduated cylinder (mL)20Mass of iron nail (g)3.66Volume of water and iron nail (mL)20.5 Part IV (20 points) Type of Aluminum FoilMass (g)Length (cm)Width (cm)Volume (cm3)Thickness (cm)Regular.63g15 cm 10.02 cm.21 cm3.0014 cm Heavy Duty.97g15 cm10.01 cm .36 cm3.0024 cm B. Follow Up Questions Show all work for questions involving calculations. Part I Use the concepts/vocabulary of density to explain why the liquids formed layers in Part I of the procedure. (8 pts) The liquids formed layers because they all had different densities. The liquids with light density were towards the top of the layers. What was the control used during the liquid portion of Part I of this experiment (8 pts) (Hint What did you do the same with each liquid to ensure a fair comparison) The control used during the portion of part I was the amount of liquid used. Rank the following in terms of relative density (9 pts) Isopropyl alcohol (rubbing alcohol) lowest relative density Liquid dishwashing detergent- intermediate relative density Dark corn syrup-high relative density Vegetable oil-second lowest relative density (intermediate) Glycerin-second highest relative density Rubber stopper- second highest relative density Cork stopper- low relative density (ended up with the alcohol Wood- low relative density (ended at the top with the rubber alchohol. Lead- highest relative density Part II (7 pts each) In Part II, what happened to the cans of soda when you placed them in water Use the concepts/vocabulary of volume and mass to explain the final positions of the cans in the sink full of water. The diet soda floated in the water while the regular soda sank. The regular soda had a higher relative

## You May Also Find These Documents Helpful

• Satisfactory Essays

1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

• 1001 Words
• 3 Pages
Satisfactory Essays
• Satisfactory Essays

Compare the portions that address Internet and e-mail access of at least three different companies.…

• 451 Words
• 2 Pages
Satisfactory Essays
• Better Essays

Take a screen shot of the Devices and Printers control panel with the new printer icon you created by pressing Alt+Prt Scr, and then paste the resulting image into the lab09_worksheet file in the page provided by pressing Ctrl+V.…

• 1213 Words
• 5 Pages
Better Essays
• Satisfactory Essays

1. Run your model. Compare the queue statistics of the 3 processes with those obtained for Part C in the previous Lab. How have they changed and what conclusions can you draw? (Note the sums of all capacities for both cases are equivalent – 12 in each).…

• 690 Words
• 3 Pages
Satisfactory Essays
• Good Essays

8. With the DMM’s positive red lead, touch each of the conductors in the dish and record your findings.…

• 846 Words
• 3 Pages
Good Essays
• Satisfactory Essays

In this exercise, you will create a connection that enables the workstation to connect to your server using virtual private networking.…

• 490 Words
• 3 Pages
Satisfactory Essays
• Satisfactory Essays

Question 4 | What is the size of the backup, as indicated on the Backup and Restore control panel? 1.25GB |…

• 866 Words
• 4 Pages
Satisfactory Essays
• Good Essays

PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

• 424 Words
• 2 Pages
Good Essays
• Satisfactory Essays

1. Radio signals attenuate through walls and obstacles. How would this affect AP placement in a home or office? Use your textbook and Internet research to justify your answer.…

• 386 Words
• 2 Pages
Satisfactory Essays
• Powerful Essays

## Lab 12

• 3059 Words
• 13 Pages

In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

• 3059 Words
• 13 Pages
Powerful Essays
• Satisfactory Essays

4. Through command window determine the cause of the network connection loss using the IP configuration. Next renew the connection lost.…

• 252 Words
• 2 Pages
Satisfactory Essays
• Satisfactory Essays

Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into.…

• 567 Words
• 3 Pages
Satisfactory Essays
• Good Essays

1.List four cell structures that were common to both plant and animal cells. (4 points)…

• 575 Words
• 3 Pages
Good Essays
• Good Essays

1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

• 928 Words
• 3 Pages
Good Essays
• Satisfactory Essays

4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

• 414 Words
• 2 Pages
Satisfactory Essays