Biology Lab Unit 2

In: Science

Submitted By jjuisto
Words 606
Pages 3
Name:

Date: October 18, 2013

Instructor’s Name:

Assignment: SCIE207 Phase 2 Lab Report

Title: Animal and Plant Cell Structures

Instructions: Your lab report will consist of the completed tables. Label each structure of the plant and animal cell with its description and function in the tables provided.

When your lab report is complete, post it in Submitted Assignment files.

1. Animal Cell: Observe the diagram showing the components of an animal cell. Using the textbook and virtual library resources, fill in the following table:

Animal Cell

|Number |Cell Structure |Description and Function |
|1 |Nuclear pore |Microscopic channels that allow certain material in |
| | |and out of the nucleus |
|2 |Chromatin (DNA) |Made up of DNA and protein, packages DNA into smaller|
| | |volume to fit in the cell and serves as a mechanism |
| | |to control expression and DNA replication |
|3 |Nucleus |Synthesizes components of ribosomes |
|4 | Nuclear envelope |Regulates movement of materials in and out of the |
| | |nucleus |
|5 | Nucleus…...

Similar Documents

Unit 2. Lab 1 - Cloud Computing Research

...Unit 2. Lab 1: Cloud Computing Research With Amazon, you get anywhere between 5GB and 1TB depending upon how much you’d like to pay for the privilege. Amazon passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. To use Amazon EC2, you simply: * Select a pre-configured, templated Amazon Machine Image (AMI) to get up and running immediately. Or create an AMI containing your applications, libraries, data, and associated configuration settings. * Configure security and network access on your Amazon EC2 instance. * Choose which instance type(s) you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. * Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. * Pay only for the resources that you actually consume, like instance-hours or data transfer. With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from Google if you have a Google Apps account up to a total of 16TB. On...

Words: 469 - Pages: 2

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Unit 2 Lab

...Unit 2 Lab The five characteristics of cloud computing as defined by the NIST is as follows, on demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. On demand self-service is defined as a service provided by cloud computing vendors that enables the provision of cloud resources on demand whenever they’re required. Broad network access is defined as a private cloud network operated within a company’s firewall that are available for access from a wide range of devices such as tablets, PC’s, Mac’s and smartphones. These resources are accessible from a wide range of locations that offer online access. Resource pooling is defined as a situation in which providers serve multiple clients, and customers with provisional and scalable services. These services can be adjusted to suit each client’s needs without any changes being apparent to the client or end user. Rapid elasticity is defined as the ability to provide scalable services. Measured service is defined as aspects of cloud service that are controlled and monitored by the cloud provider. Rackspace offers many options for cloud computing. You can build your own account which you would manage or you can get one for a flat fee an account that Rackspace will manage for you. Services offered by Rackspace are cloud servers, cloud backup, cloud files, cloud load balancers, could database, cloud monitoring, cloud block storage, and cloud bandwidth. Rackspace also offers services...

Words: 260 - Pages: 2

Biology Lab Unit 4 Ip

...Name: Date: November 10, 2013 Instructor’s Name: Assignment: SCIE207 Phase 4 Lab Report Title: Exploring Endocrine, Circulatory, and Respiratory Systems Instructions: Your lab report will consist of the completed tables. Label each component of the endocrine, cardiovascular (circulatory), and respiratory systems and their functions in the following tables. When your lab report is complete, post it in Submitted Assignment files. 1. Endocrine System: Observe the diagram showing the major organs of the endocrine system. Using the textbook and Virtual Library resources, fill in the following table: Endocrine System Note: Some organs support the system, but may not produce or secrete hormones. |Number |Name of the Organ or Part |Hormone(s) Produced or Secreted | |1 |Parathyroid glands  |Parathyroid hormone  | |2 |Thyroid gland  |Thyroxine, calcitonin  | |3 |Trachea  |No hormone secreted  | |4 |Pineal gland  |Melatonin  | |5 |Hypothalamus  |Produces ADH and oxytocin, regulatory hormones......

Words: 676 - Pages: 3

Unit 5 Biology Lab

...Name: Date: November 10, 2013 Instructor’s Name: Assignment: SCIE207 Phase 5 Lab Report Title: Taxonomy Lab to Show Organism Relationships Instructions: You will need to fill out the data table and answer a set of questions. When your lab report is complete, post it in Submitted Assignment files. Part 1: Using the lab animation, fill in the following data tables to help you answer the questions that follow: Table 1: Samples 1–5 |Phylum/Division |Sample 1: Chrysophyta |Sample 2: Annelida |Sample 3: Arthropoda |Sample 4: Amphibia |Sample 5: Aves | |Common Feature | | | | | | |Nutrition |Autotrophic |Heterotrophic: Earthworms|Some are vegetarian, some|These are usually | | |How does the organism break down and absorb food? | |eat their way through |are carnivorous, and some|vegetarian as tadpoles | | | | |dirt, so they are ...

Words: 834 - Pages: 4

Unit 2 Lab

...Name: Patricia Sellers Date: November 22, 2013 Instructor’s Name: Trena Woolridge Assignment: SCIE211 Phase 2 Lab Report Title: Speciation Instructions: You will need to write a 1-page lab report using the scientific method to answer the following question: • What would happen if a species within a population were suddenly split into 2 groups by an earthquake that creates a physical barrier like a canyon? When your lab report is complete, post it in Submitted Assignment files. Part I: Use the animated time progression of speciation to help you write up your lab report. Part II: Write a 1-page lab report using the following scientific method sections: • Purpose • What would happen if a species within a population were to suddenly split in two groups by an earthquake that creates a physical barrier like a canyon? • Introduction • Reproduction is a natural and normal thing in our day to day lives. Animals and humans reproduce offspring, all year round. Separation is usually the furthest thing from our minds. But, mother natural can always turn anyone’s world upside down. For Example, What if a really bad earthquake hit, and caused the ground to split and drift far away from one another? Many species would be isolated from their families and environments. • Hypothesis/Predicted Outcome • A species is defined as a group of organisms that are able to interbreed to produce fertile and viable offspring under natural conditions. (Audesirk,......

Words: 450 - Pages: 2

Unit 6 Lab 2

...Unit 6 Lab 6.2 1. What are the available Password Policy options that could be enforced to improve security in a Group Policy? * Enforce password history: * Maximum password age * Minimum password age * Minimum password length * Passwords should always meet complexity requirements 2. How could you se security permissions and user access rights on a home computer using Windows XP Professional or similar that is not a member of the domain? Security permissions and user access can still be managed locally on the computer with local groups and applying the proper permissions to local users on the computer. Local group policies can also be managed. 3. Why is the use of different password policy options available and why is it important to implement complexity and length requirements? There are different policy options to have different options for companies to use, if it were all the same then hackers would know exactly what to look for, in this case it can be vary. It is important implement complexity and length requirements to secure and assure the company that proper passwords are being used to prevent easy hacking access for hackers. 4. Microsoft defines user rights in two types of categories: Logon rights and privileges. Explain the difference of the two from an access control perspective. Log on rights manage and control who can log in to a specific computer. Privileges determine what the user can access one they log in, they go hand and hand. ...

Words: 657 - Pages: 3

Unit 2 Labs

...Lab 2.3 Exercise 2.3.1 LAN Local Area Network is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building using network media. MAN Metropolitan Area network is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN. PAN personal area network is a computer network used for data transmission among devices such as computers, telephones and personal digital assistants. WAN A wide area network (WAN) is a computer network that spans a relatively large geographical area and consists of two or more interconnected local area networks (LANs). The classification metric used here Exercise 2.3.2 Network Topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network, and may be depicted physically or logically. The metric used to define networks by topology is what clients they are using and how they are using them. A wide area network is larger than a metropolitan network for example. Exercise 2.3.3 It would take 1 hop to send a message from A to B. To get from B to A it would take 3 hops to send a message. It would take one link to connect E to D and C. It would add one message to the transverse of the ring. Exercise 2.3.4 It......

Words: 633 - Pages: 3

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

Unit 2 Lab 2: Self - Control

...Jaime H. Cabigtnig Unit 2 Lab 2: Self - Control TEMPTATION |WHAT WILL I DO IF I YIELD TO TEMPTATION?|WHAT WILL I DO IF I BEHAVE HOW I WANT MYSELF TO BEHAVE?| Leaving work earlier|I will not make the money that Is owed to me|Know that the extra money will benefit my family| Cursing|Donate $2 to charity|Reward myself with a positive word for today| Lying|Defame my character to my boss or co-workers|I will develop a good reputation of dependability with my co-workers | Quick to anger|Alienate people and their ideas and possible resolutions|I will encourage an atmosphere of understanding and cohesion which is a good quality when trying to move up the ladder professionally| Eating fast food|Waste money and gain weight|Keep money in pocket and not gain weight| Driving poorly (Fast, recklessly, etc.)|Get a bad driving record putting in danger potential jobs and possibly our license|People will not be mad at you in traffic jams. Employers will not have any problems hiring you. You will save money in cars and tickets.| Judging Co-Workers|Alienate myself from open discussions about problems we encounter and are trying to solve as a team|Develop a reputation of a team player and a problem solver who can work with others and rationally discuss solutions| Procrastination|Not finish projects and jobs I am put in charge of and miss opportunities to bigger projects that come with promotions and raises|Finish by jobs well within the time constraints and attract upper managements’......

Words: 352 - Pages: 2

Unit 4 Lab 2

...Security and Web Applications Unit 4 Vlab 2 Assessment 1. Injection, Broken Authentication and Session Management, XSS, Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery, Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards. 2. A Brute force attack in an attack that uses force instead of vulnerabilities to make its way into a site. Usually trying to crack username and password combinations. The risks of these attacks can be mitigated by strengthening password requirements, introducing lockouts when let’s say 3 attempts are made. That would unmotivated and attacker. 3. A user has established a level of privilege with Amazon. AN attacker uses CSRF to exploit the trust of that user. The attacker is posing as the user and is performing actions to get the latest porn film sent to his house. Boom, free porn. 4. SQL Injection, Brute Force, CSRF. 5. Hackers will use web applications with uploading options to upload files that are malicious. 6. A successful SQL injection exploit can read sensitive data from the database, modify database data execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. (http://www.owasp.org/index.php/SQL_Injection) 7. That user information pertaining to...

Words: 285 - Pages: 2

Biology as Unit 2

...AS Biology Unit 1 Key Terms and Definitions Make sure you use these terms when answering exam questions! Chapter 1 – Causes of Disease Book Ref | Key Term | Definition | 1.1 | Pathogen | A micro-organism that causes disease | 1.1 | Transmission | Passing a pathogen from one individual to another | 1.2 | Correlation | A change in one variable is reflected by a change in another e.g. incidence of cancer increases as number of cigarettes increases | 1.2 | Cause | There is experimental evidence to prove that one factor causes another | 1.3 | Risk | A measure of the probability that damage to health will occur as a result of a given hazard | 1.3 | Lifestyle Factors | Factors to do with how we live that contribute to suffering a disease. These are in our power to change. | Chapter 2 – Enzymes and the Digestive System Book Ref | Key Term | Definition | 2.1 | Digestion | Physical and chemical breakdown of food | 2.1 | Hydrolysis | Splitting up of molecules by adding water to them. Enzymes do this to help break down molecules. | 2.1 | Assimilation | Incorporating broken down molecules into body tissues/using them in processes | 2.2 | Monomer | One of many small molecules that combine to form a larger one | 2.2 | Polymer | Larger molecule made up of repeating smaller molecules | 2.3 | Condensation Reaction | When 2 monosaccharides combine, water is removed | 2.3 | Glycosidic Bond | The bond in a disaccharide | 2.5 | Peptide Bond | The bond between......

Words: 1192 - Pages: 5

Unit 2 Lab

...ALPHA JALLOH Unit 4. Exercise1. Cabling –Definitions HORIZONTAL CABLE -The cabling between and including the telecommunications outlet and the horizontal cross-connect. Horizontal cabling is considered the permanent portion of a link; may also be called horizontal wiring. BACKBONE CABLE A cable connection between telecommunications or wiring closets, floor distribution terminals, entrance facilities, and equipment rooms either within or between buildings. This cable can service voice communications or data communications. In star-topology data networks, the backbone cable interconnects hubs and similar devices, as opposed to cables running between hub and station. In a bus topology data network, it is the bus cable. Backbone is also called riser cable, vertical cable, or trunk cable. PATCH CORDS Any flexible piece of cable that connects one network device to the main cable run or to a patch panel that in turn connects to the main cable run; also called. Used for interconnecting circuits on a patch panel or cross-connect. Patch cables are short distance, usually have connectors preinstalled on both ends, are used to connect equipment, and are generally between 3 and 6 meters long. CONNECTORS -With respect to cabling, a device attached to the end of a cable, receiver, or light source that joins it with another cable, device or fiber. A connector is a mechanical device used to align and join two conductors or fibers together to provide a means for attaching and......

Words: 1109 - Pages: 5

Biology Lab

...Melina Franco Lab 1 - Biology 1408 Metric Practice Kilo - Hecto - Deka - meter, liter, or gram - Deci - Centi - Milli --- Micro --- Nano Length Conversions: 1,000mm = 1m 10 mm = 1cm 1,000m = 1km 100cm = 1m 1,000,000 µm = 1 m 1,000,000,000 nm = 1 m Volume Conversions: 1,000ml = 1 Liter Mass Conversions: 1,000mg = 1 gram Convert the following: To convert from mm to cm you have to move left on the chart 1 unit or 1 decimal place. Therefore, 20.0 mm converts to 2 cm by moving 1 decimal place to the left. To convert from mm to meter you have to move left on the chart 3 unit or 3 decimal place. Therefore, 20.0 mm converts to 0.02 meters by moving 3 decimal places to the left. To convert from cm to mm you have to move right on the chart 1 unit or 1 decimal place. Therefore, 76.0 cm converts to 760 mm by moving 1 decimal place to the right. To convert from cm to meters you have to move left on the chart 2 unit or 2 decimal place. Therefore, 76.0 cm converts to 0.76 meters by moving 2 decimal places to the left. To convert from meters to cm you have to move right on the chart 2 unit or 2 decimal place. Therefore, 15.0 m converts to 1,500 cm by moving 2 decimal places to the right. To convert from meters to mm you have to move right on the chart 3 unit or 3 decimal place. Therefore, 15.0 m converts to 15,000 mm by moving 3 decimal places to the right. To convert from cm to mm you have to move right on the chart 1 unit or 1 decimal......

Words: 1244 - Pages: 5

Unit 2 Lab Cobit Framework

...Erica Callahan IS3110 Risk Mgmt. IT Unit 2 Lab CORBIT Framework 1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5, High/Medium/Low Nessus Risk Factors Definitions for Vulnerabilities) a. Denial of Service attack of organized e-mail server Nessus: High b. Loss of Production Data Nessus: Medium c. Unauthorized access to organization owned Workstation Nessus: High d. Workstation browser has software vulnerability Nessus: Low e. User downloads an unknown e-mail attachment Nessus: Low 2. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5, High/Medium/Low Nessus Risk Factors Definitions for Vulnerabilities) f. Denial of Service attack of organized e-mail server Nessus: High g. Loss of Production Data Nessus: Medium h. Unauthorized access to organization owned Workstation Nessus: High i. Workstation browser has software vulnerability Nessus: Low j. User downloads an unknown e-mail attachment Nessus: Low 3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No more than 5), Specify whether the threats or vulnerability impacts confidentiality – integrity – availability: a. Denial of Service attack of organized e-mail server – Integrity, Availability b. Loss of Production Data – Confidentiality, availability c. Unauthorized access......

Words: 977 - Pages: 4