...POINT LISAS CAMPUS Esperanza Road, Brechin Castle, Couva www.utt.edu.tt LAB 1 Decomposition reaction Aim: Determination of the number of moles of water molecules of crystallization present in hydrated Magnesium Sulphate (MgSO4.xH2O) Apparatus: Mass balance, test tube, test tube holder, heat-proof mat and bunsen burner. Reagents: Hydrated sodium carbonate. Theory: Chemical decomposition, analysis or breakdown is the separation of a chemical compound into elements or simple compounds. A more specific type of decomposition is thermal decomposition or thermolysis, which is caused by heat. ABA+B, the reaction is endothermic, since heat is required to break the chemical bonds. Most decomposition reaction require energy either in the form of heat, light or electricity. Absorption of energy causes the breaking of the bonds present in the reacting substance which decomposes to give the product. When a hydrated salt is heated it decomposes into a pure form of the salt and water. MgSO4.xH2O MgSO4 + H2O Procedure: Refer to Handout Results: A. Mass of test tube/g = 21.77 B. Mass of the tube and salt/g = 24.0 A table showing the mass of the test tube and salt after 3 consecutive heating: Heating | Mass of the test tube and salt/g | 1st | 23.96 | 2nd | 23.81 | 3rd | 23.81 | Calculations: G. Mass of anhydrous magnesium sulphate/g = F - A = 23.81 – 21.77= 2.04 H. Mass of water of crystallization......
Words: 2572 - Pages: 11
...Basic steps to get you cracking WEP (for scriptkiddies) Once you got your tools ready it is time to get cracking. Routers especially those given out by our local ISP have their default security settings set to WEP to encrypt their traffic. This can be easily cracked by aircrack-ng suite in about 5 min once you are “au fait” with the setup. For those who want to jump straight into the cracking process here are the basic steps you need to take. Step 0: Spoof MAC address Open terminal and run the command: sudo ifconfig < attacker’s wlan interface > hw ether Step 1: Gather essential background data about yourself and your target. target_router SSID -> target_router target_router MAC address -> 00:14:7F:99:EB:99 target router channel-> 6 attacker’s MAC address -> 00:0f:b5:ff:ff:f9 attacker’s wlan interface: wlan0 attacker’s monitoring interface name (spawned from wlan0): mon0 Note: Replace the above variables with your own. These were mine for my setup. Step 2: Using aircrack-ng suite to crack WEP. sudo airmon-ng start wlan0 -> spawn a monitoring interface from wlan0. sudo airodump-ng mon0 -> survey / scan for your target router. sudo airmon-ng stop mon0 -> stop the monitoring interface so that you can start it again to listen on channel 6. sudo airmon-ng start wlan0 6 -> This starts the mon0 interface listening to only channel 6 [Important step!]. sudo airodump-ng -c6 -w outputfile mon0 -> pump output to a file called......
Words: 363 - Pages: 2
...networking, and my goal is to inform you of those vulnerabilities to help you stay protected from them. Wired Equivalent Protocol (WEP) was the original wireless security protocol. WEP was flawed in numerous ways and hackers were able to get information in minutes. WPAv1 was then introduced as an interim replacement because WEP was that flawed. WPAv1 was made to improve on the secure wireless networks and also used a newer and more improved algorithm. When WPAv2 was finally released, many devices began to be created to be compatible with the AES algorithm WPAv2 uses. There still have not been any major hacks or attacks on a WPAv2-AES network that would cause the Wi-Fi alliance look into using another algorithm a replacement. WPAv1 is too easy to hack so it is not recommended and WPAv1 is now susceptible to multiple types of attacks. There are several different ways you can help to protect yourself and your information. Verify your spam in your e-mail to make sure a file accidentally was not forwarded to spam. There are also others to improve your security. The length of your passkey is very important in security, as well as keeping an up-to-date anti-virus and staying up-to-date on all the latest hacks, cracks, and technology are critical for your protection. N. Justin Bernard Network Security Term Paper November 13, 2012 The difference between cracking a WEP and a WPA network passkey and how to protect yourself from it In today’s always evolving and improving......
Words: 3607 - Pages: 15
...Crack the whip Recently I don't know if it's just me or not, but I've noticed that everywhere I go there happens to be a child that is throwing a fit, crying or even scream at their parents. Generally it seems to be the subject they're not getting what they want that day at that moment. And it doesn't bother me that it's happening, the thing that bothers me is that parents give in to their child's or children's demand and walks them back into Walmart, Toys R Us, Target or whatever store that I happen to be at that day and them whatever it is that they want. It's kind of sad to see that today's kids lack discipline and that parents don't do anything about it beside turn. Kids today are spoiled and parents are not doing what is necessary to fix. As I said last kids are spoiled, at least kinds where I live are spoiled. I believe it starts with the parents. Parents who don't feel like standing their ground because their kids happen to throw a tantrum, cry, and complain at them. Parents have become pushovers and cave in at the signs that their children might become upset or cause a scene. The parents have I believe gotten lazy when it comes to keeping their kids in line or so self-absorb they care more about their image and how their children are acting. Parent who believe that they can buy their children's affection by giving them everything they want. Are just as bad those parents are just trying to fill a void that they have made with material items saying yes to everything...
Words: 923 - Pages: 4
...The American Crack Epidemic: How the War on Drugs was as Detrimental to Society as Drugs Themselves. Lucas Carneiro U.S. History 4/21/2013 Throughout the mid-20th century, Americans have experimented with illicit drugs, from marijuana to LSD. In the late 70s and early 80s, the high cost of cocaine made it the drug of choice for wealthy, elite, White Americans. On the other side of the social spectrum, lower-class African Americans sought an escape from their difficult circumstances in impoverished inner-city neighborhoods. They found refuge in crack, a smokeable form of cocaine, whose low production cost, high addictiveness, and debilitating nature made it the drug of choice for urban African American communities in 1986 (Reinarman, 1997; Watkins, 1998; Fullilove, 1998). The drug contributed to the increase in disease, violence, and poverty in these communities, turning inner-city neighborhoods into “war zones”. The U.S. Government’s War on Drugs campaign did little to solve this crisis, using aggressive, military tactics to address an epidemic surrounded by socioeconomic and health issues. In the 1960s, the Vietnam conflict among several unpopular moves by the U.S. government created a generation of rebellious, young Americans. This generation experimented with drugs in order to alter their state of mind, and to escape from the problems that came with politics and society. The generation of young “hippies” ignited a drug culture in the U.S. As time progressed,......
Words: 2189 - Pages: 9
...A crack in the mug, can Starbucks mend it? In January 2008 Starbucks announced the closer of 100 US stores, but that number grew to 600 by July of 2008. After 20 years of remarkable growth, the last six months of 2007 saw Starbucks shaken by a decline in share price of 50 per cent and a reduction in customer visits to its outlets in North America. Its share price declined from $19 to $18.00 by mid-2008. The company’s brand image took a major hit with a $0.09 cent increase per cup and several similar increases in price over the past four years. All of this has led to disapproval from their shareholders. To increase favor with their shareholders, Starbucks will need to do a combination of tactics .They need to increase their sales quite a bit in order to suppress the shareholders fears. As long as consumers buy, the shareholders will buy stock, and feel comfortable with keeping it. To get consumers to consume more, they need to offer more of their products. They could possibly start offering products that they currently do not offer but use in making their products. For example they could start selling the accessory items like spices, syrups, sprinkles and the rest of the things that makes Starbucks so great. These are items that already have a great demand with preexisting Starbucks customers since they are used with all of their most popular items. Also, since Starbucks has no complete advantage over their major competitors like McDonalds and Dunkin Donut, one thing they......
Words: 408 - Pages: 2
...Willie Harris ------------------------------------------------- is3230 lab 4.2 Implement Organizational-Wide Network and WLAN Access Controls 1. Each time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to othersEach time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to others. 2. 2. By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. First if you’re sitting in a coffee shop and decide you want to check your Facebook page and your email to kill some time. You scan the available networks and see one that’s open and unsecured. You connect and start surfing. Coffee and free WiFi, what could be better, right? Wrong! A hacker is also fond of coffee shops and he is located within range of the router you connected to. He’s waiting for one or more people to connect to the network so he can start......
Words: 628 - Pages: 3
...Tissues The Integumentary System 35 43 The Cell: Transport Mechanisms and Permeability–Wet Lab Classification of Covering and Lining Membranes 49 Overview of the Skeleton: Classification and Structure of Bones and Cartilages 53 The Axial Skeleton The Fetal Skeleton 59 67 81 87 93 103 77 The Appendicular Skeleton Articulations and Body Movements Microscopic Anatomy and Organization of Skeletal Muscle Gross Anatomy of the Muscular System Histology of Nervous Tissue 113 119 125 Exercise 16A Skeletal Muscle Physiology: Frogs and Human Subjects Exercise 18A Neurophysiology of Nerve Impulses: Wet Lab Gross Anatomy of the Brain and Cranial Nerves Electroencephalography Human Reflex Physiology General Sensation 153 157 167 177 173 Special Senses: Vision 133 Spinal Cord, Spinal Nerves, and the Autonomic Nervous System 145 137 Special Senses: Hearing and Equilibrium Special Senses: Olfaction and Taste Functional Anatomy of the Endocrine Glands iii Exercise 28A Role of Thyroid Hormone, Pituitary Hormone, Insulin, and Epinephrine: Wet Lab 183 Exercise 29A Blood Exercise 30 Exercise 31 Exercise 32 189 199 205 209 Anatomy of the Heart Conduction System of the Heart and Electrocardiography Anatomy of Blood Vessels Exercise 33A Human Cardiovascular Physiology: Blood Pressure and Pulse Determinations 217 Exercise 34A Frog Cardiovascular Physiology: Wet Lab Exercise 36 Exercise 38 Exercise 40 Exercise 42 Exercise 43 Exercise 44 Exercise 45 Exercise......
Words: 120457 - Pages: 482
...Chemical and Mechanical Weathering of Rock Lab Lauren Templeton, Heather Mullen, Katherine Welmaker, Becca Gojda 2 October 2015 Abstract This lab explores several different forms of weathering and the specific effects they have on rocks. Mechanical Weathering was found to reduce the weight of different types of rocks more efficiently than others. Geological Changes were found to make small physical changes to the exterior of the rock. Glacial Changes were found to affect the ground through the the sand the “glacier” moved around. Chemical Weathering was found to quickly dissolve the marble but not the granite. Oxidation was found to dissolve the pyrite very quickly and continue to dissolve it over the next 2-3 days. Organic Processes were found to have a major physical effect on the paste as it broke it apart. Materials Bean Seeds, 10 Magnifying glass Calcium sulfate, CaSO4, 2 spoonfuls Marker Granite chips, 20 g Paper towels Halite chips, 15 g Pipets, Beral, graduated Hydrochloric acid solution, HCl, 1 M, 15 mL Plastic cups, small, 3 Ice cube Sample......
Words: 1232 - Pages: 5
...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT......
Words: 2487 - Pages: 10
...extinguishers, phones, showers, etc. The safety equipments available to me while doing the experiments are safety gear, such as gloves, goggles, and protective clothing. Also, equipments such as extinguishers, fire blankets, shower and eye washes are important to have and should be located around and near you for quick use. 2. What is an MSDS? An MSDS is a material safety data sheet where it contains the chemical’s or item’s physical or chemical characteristics. It also lists the information about health and safety about the usage of the product. 3. What can make glassware unuseble? Glassware become unusable when it has cracks on them because they become dangerous when experimenting anything especially using them with heating. 4. When should you wear goggles in the lab? You should wear goggles when doing lab at all times to prevent any injury or damage. 5. How long should you wash your eyes if you get a chemical in them? You should wash your eyes for at least fifteen minutes immediately after coming contact with chemicals. 6. What should you do if your clothing catches on fire? When your clothes get on fire, you should immediately go to the safety shower. If there is none, you should attempt the stop-drop-roll-yell technique or get the fire blanket as soon as possible. Also, yell for help when needed. 7. How should you heat the liquid in a test tube to a temperature less than 100 (C? When heating the liquid in a......
Words: 524 - Pages: 3
...care and lacks knowledge about his medical condition. Nurses have numerous legal, professional and ethical duties. The three main duties are to respect all patients’ confidentiality and autonomy and to recognize duty of care owed to all patients. This paper will explore the ethical dilemma involved with a patient unwillingness to comply and the nurse’s duty to respect the patient’s wishes. Further discussion will give insight into the nurse’s legal responsibilities and elaborate on the principle of beneficence, health concepts, autonomy vs. paternalism, patient teaching, family as caregiver, Eco mapping, and therapeutic nursing interventions. Analysis of a Case Study Situation Overview The article, “The Patient Who Fell Through The Cracks,” described Mr. H as a 65 years old, morbidly obese man diagnosed with CHF, PVD, bilateral venous stasis ulcers, and HTN. He lived at home with his diabetic wife and mentally-challenged adult son. The environment in which they resided was unhealthy, possibly due to self-care deficit and lack of knowledge about health and wellness. Mr. H. lacked the support system that he needed to care for himself. Due to Mr. H’s inability to comprehend and self-care deficit immediate intervention had to be initiated by the nurse which involved providing wound care and health promotion. Principle of Beneficence: Rule of utility Beneficence is the concept of supporting the patient by preventing further harm, yet the nurse has an ethical......
Words: 3145 - Pages: 13
...Laboratory 7: Security Basics December 1, 2014 Lab 7: Security Basics Task 1: Procedure 1. Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Locate an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zonelabs Zone-Alarm firewall is an example of a software firewall. a. Cisco RV082 Dual WAN VPN Router i. Dual Fast Ethernet WAN ports for load balancing and/or business continuity ii. Built-in 8-port Fast Ethernet switch iii. Strong security iv. High capacity VPN capabilities v. Optional cloud-based web security service vi. Support for Small Business QuickVPN software b. Linksys WRT54GS Wireless i. G Broadband Router with SpeedBooster IEEE 802.3/3u, IEEE 802.11b/g ii. VPN Pass Through iii. Stateful Packet Inspection (SPI) Firewall, Internet Policy Wi-Fi Protected Access 2 (WPA2), WEP, Wireless MAC Filtering Task 2: Procedure 1. By 2010 the number of different known viruses numbered over 4 million. Many companies produce anti-virus programs to help protect your computer against these threats. Some of the companies are Panda, Norton, McAfee, AVG, and Kaspersky. Which of these companies provide free versions of their software? Which ones provide trial versions? a. Free versions i. AVG b. Trial versions i. Panda ii. Norton iii. McAfee iv. AVG v. Kaspersky 2. Viruses and......
Words: 1291 - Pages: 6
...In 80s and 90s the crack epidemic took over the ghetto world and played a big role in developing hip hop music. Black Americans even sung about it in their songs. Drug dealers distributed crack in black neighborhoods and got them involved into that business. For African Americans it was a way to earn money and get out of ghetto. Especially back then when they were discriminated. So, the crack epidemic and hip hop back in 80s and 90s went hand in hand. It was very interesting to read the "Dark Alliance". I found out a lot of interesting staff of which I didn't know before. Of course, not every black american was involved in drug distribution and consumption. There were the ones who worked hard to pursue their dreams; however, there were more people who consumed and distributed than those who didn't. Rappers raped about it in their songs. The song "White Lines" describes how at parties MC and other party people consumed it. MC also tells us about his feelings and illusions he had. Once, people get involved into the crack epidemic, it is hard to stop. Also in the song, MC tells that every time you want it more and more. So, the dosage increases and money decreases. Some still suffer from the crack epidemic. People who used to party and play cool are now addicts who just think about getting drugs. The Crack Epidemic brought violence and sickness. People on crack are not stable and can think straight. As a consequence they are more violent and uncontrollable. People also become......
Words: 767 - Pages: 4
...CRACK Should women addicted to crack be able to have children? Barbara Harris says no. Harris has adopted four children from a drug addict. She has also founded CRACK (Children Requiring A Caring Kommunity) a non-profit organization that offers $200 in cash to addicts who agree to be sterilized or undergo long-term contraception like Norplant, which is surgically imbedded under the skin. In this essay I will be discussing what the ethical dilemma is, who the stakeholders are in this ethical dilemma, analyzing the problem by reference to the categorical imperative, analyzing the problem from a Kantian and utilitarian standpoint and giving my overall opinion of this matter. As I understand it the ethical dilemma here is the procedure in itself. Some are saying that the women are doing it for the money to buy more drugs. Also, saying that it takes away women rights to reproduce. Physicians and attorneys are saying that the women are in no condition to consent to being sterilized. They say that because these women are mentally ill and poor they are not capable of making their own decisions. But Barbara Harris from her own experiences says that women addicted to crack do not need to have babies. These women are bringing babies into the world addicted to crack. She tells of a story of how she adopted four children from a crack addicted woman. One of the children would wake up screaming in the middle of the night. She says it looked like his eyes were about to pop out of his......
Words: 1057 - Pages: 5