Lab 1: Microscopy and the Metric System

In: Science

Submitted By jkpatel87
Words 856
Pages 4
Lab 1: Microscopy and the Metric System
Purpose
The purpose of this lab is to become familiar with the lighted microscope, how to prepare a wet mount, and understand taking measurements in the metric system and its conversions.

Materials & Methods Materials:
Part A: * Computer for videos

Part B: * Tape measure with centimeters * Scale that measures grams * Thermometer that shows Celsius * Campbell Biology Book * 1 piece Orange Starburst

Methods: Part A: Combined Lighted Microscope 1. Watch video on microscope 2. Answer the provided questions on the microscope
Wet Mount: 1. Watch video on wet mount 2. Explain the process of creating a wet mount Part B: Width of Book: 1. Lay book flat 2. Take the measuring tape and measure the width of the book in centimeters
Mass of Orange Starburst: 1. Place the scale on flat surface 2. Zero the scale and set the display to grams 3. Place the orange starburst and write down the mass in grams
Meniscus:
1. Answer the provided question on Meniscus in a graduated cyclinder
Temperature:
1. Set thermometer to display temperature in Celsius 2. Take room temperature by turning on the thermometer and noting temperature 3. Take body temperature by placing the thermometer on the back of your hand

Results
Part A: Microscopy 1) Parts of a compound microscope and their functions. a) Focal Adjustment- helps adjusts the slide into focus b) Eyepiece- the lens that you look into to see what is on the slide c) Objective lenses- the lens closest to the slide d) Stand- Holds all the parts together e) Light Source- located under the area where you put the slide and helps illuminate the slide for better observation f) Base- bottom of the microscope g) Arm- how you carry the microscope and it attaches the tube to the base…...

Similar Documents

Lab 1 Questions for Fundamentals of Information Systems Security

...Lab 1 Assessment Questions 1. Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM and identify whether that application starts as a service on the system or must be run manually? Windows Applications Loaded | Starts as Service Y/N | FileZila Server | Y | Nmap | N | WireShark | N | WinPcap | N | Tenable Network Security | N | Tftpd32-SE | N | 2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP default gateway router? a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40 3. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? e. Yes. f. 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-plies vary? g. The TTL on Windows was 128 while on Ubuntu the TTL was 64. 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? h. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those......

Words: 415 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1, LAN Switch 2, and the IP default......

Words: 489 - Pages: 2

Lab 1

...1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. Windows application loaded sTarTs as service Y/n 1. q Yes q No adobe reader 2. q Yes Wireshark q No 3. q Yes q No Nessus 4. q Yes q No Firefox 5. q Yes Nmap q No 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? IP default 172.30.0.8 server 14147 LAb #1 – ASSESSMENT WORKSHEET 1 1 Assessment Worksheet 15 38351_LB01_Pass4.indd 15 23/04/13 10:02 PM 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes it did I got four back 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? The TTL changes from 64 to 128 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 172.30.0.0/24 6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans. Intense Scan-Complete Nmap report about all of the host discovered......

Words: 442 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 467 - Pages: 2

Lab 1

...lExercise 10: Acid-Base Balance: Activity 2: Rebreathing Lab Report Pre-lab Quiz Results You scored 100% by answering 4 out of 4 questions correctly. 1. In cases of acidosis, the pH of the blood is You correctly answered: c. less than 7.35. 2. Carbon dioxide and water form You correctly answered: a. carbonic acid (a weak acid). 3. Which of the following is true of respiratory acidosis? You correctly answered: c. The amount of carbon dioxide in the blood is greater than normal. 4. Rebreathing You correctly answered: b. is exemplified by breathing into a paper bag. 01/09/14 page 1 Experiment Results Predict Question: Predict Question: What do you think will happen to the pH and PCO2 levels during rebreathing? Your answer : b. pH will decrease and PCO2 will increase. Stop & Think Questions: Which of the following can cause respiratory acidosis? You correctly answered: c. airway obstruction Experiment Data: Condition Normal Rebreathing Min PCO2 40 40 Max PCO2 40 53.02 Min pH 7.40 7.24 Max pH 7.40 7.42 01/09/14 page 2 Post-lab Quiz Results You scored 100% by answering 4 out of 4 questions correctly. 1. Rebreathing simulates You correctly answered: a. hypoventilation and respiratory acidosis. 2. Hypoventilation results in You correctly answered: c. an accumulation of carbon dioxide in the blood. 3. The renal system can compensate for respiratory acidosis by You correctly answered: b. excreting H+ and retaining bicarbonate ion. 4. Respiratory acidosis can be......

Words: 381 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 467 - Pages: 2

Lab#1

...IS 3220July 7, 2014 Lab #1 Analyze Essential TCP/IP Networking Protocols 1. What is the purpose of the address resolution protocol (ARP)? ARP is used to mediate between Ethernet (and other broadcast link-level protocols) and the network layer, or IP protocols. Put more simply, ARP converts IP addresses to Ethernet addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP (Dynamic Host Configuration Protocol) is a communications protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network. http://searchunifiedcommunications.techtarget.com/definition/DHCP/ARP. Lab #2 Network Documentation 1. When you TELNET to LAN Switch 1 and LAN Switch 2, why is it a good idea to first PING an IP interface or port’s IP address? The ping verifies connectivity by sending ICMP echo packets to a host and listening for an echo reply. This will detect if there are any name resolution issues. 2. Why is using Telnet a security risk for an IP network infrastructure? Telnet sessions are in clear text and programs such as packet sniff can capture passwords and then use them to log into those sessions. 3. How can you mitigate the security risk caused by Telnet? Intrusion detection is a packet inspection tool that monitors, intercepts and responds to abuse in real time. ICMP inspection permits responses to ICMP packets like ping and traceroute that come......

Words: 427 - Pages: 2

Lab 1

...Laboratory #1 Lab #1: Evaluate Business World Transformation – Impact of the Internet and WWW Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the security challenges on the web as they relate to various business models and the impact that is made in e-Commerce and Internet-based deployments * Extract various businesses’ personal identifiable information (PII) that is collected and stored from Internet users by a business in a web application * Distinguish among the different reasons for the attacks on web sites and determine exactly what the attackers are after when they target your WWW presence * Evaluate the current state of security on a LAMP server using Telnet, Skipfish and TCPdump to identify whether the proper tools are installed for a security evaluation of the server * Install and use Firefox Web Browser with the Live HTTP Headers plug-in Lab #1 – Compromised Business Application Impact Analysis Course Name & Number: ______________________________________________________________ Student Name: _______________________________________________________________________ Instructor Name: _____________________________________________________________________ Lab Due Date: _______________________________________________________________________ Overview The threats of the Internet go way beyond an attacker defacing your website. An attack can include......

Words: 849 - Pages: 4

Microbiology Lab 1

...Module 1 Experiment 1: Observing Bacteria and Blood (No microscope needed for this lab) List the following parts of a microscope and briefly describe each part. * Eyepiece Lens: To transmit and magnify the image from the objective lens to your eye * Body Tube: To hold the eyepiece at the proper distance from the objective lens and blocks out stray light * Nosepiece: A rotating mount that holds many objective lenses * Objective Lens: To gather light from the specimen * Stage: This is the flat surface on which the slides are placed on. It can be moved up and down for focusing. * Diaphragm: Placed in the light path to alter the amount of light that reaches the condenser. Varying the amount of light alters the contrast in the image * Mirror: A mirror is an alternative to an electrical lamp for illuminating light to the slide. * Coarse Adjustment Knob: To bring the object into the focal plane of the objective lens * Fine Adjustment Knob: To make fine adjustments to focus the image * Arm: A curved portion that holds all of the optical parts at a fixed distance and aligns them * Stage Clips: to hold the specimen still on the stage. Because you are looking at a magnified image, even the smallest movements of the specimen can move parts of the image out of your field of view * Stage: Where the specimen rests Define the following microscopy terms: * Focus: Is the image blurry or well-defined? Focus is related to focal length...

Words: 915 - Pages: 4

Proposal for America to Convert to the Metric System

...CONVERTING AMERICA TO THE METRIC SYSTEM TITLE OR PURPOSE To convert the United States of America from the Standard Issue Units to the Metric System. MAJOR AREAS TO BE AFFECTED The entire population of the U.S.. All of the U.S. major organizations and associations. JUSTIFICATION In 1970, Canada enacted the White Paper Metric Conversion Law to convert their country to the metric system. This law ensured that Canada would change all their forms of units to be metric. Policies in their Parliament and Constitution changed before the law went into motion. These changes allowed the government to implement the conversion into the everyday lives of the Canadian people. The year following after the law was enacted the government established the Preparatory Commission. This was considered the metric commission to organize and enforce the conversion in all sectors of the Canadian economy and spread the ideals of the metric system. In 1973, over 100 committees with members from all national associations and major organizations were created. Each of these committees were set up with a plan of preparation for the sectors conversion. The process of replacing the original imperial units with metric units involved all kinds of documents, processes, and measurements. the practical approaches to all these complications were created by the committees, each with strategies and policies conformed to suit their interests. Public awareness was an important area of consideration in......

Words: 373 - Pages: 2

Lab 1

...CIS 333 Networking Security Fundamentals Jessica Sykes Professor Arend Clayborn January 18, 2015 1. Name at least 5 applications and tools used in lab. a. Wireshark b. Putty.exe c. Nmap-Zenmap d. OpenVAS e. NetWitness Investigator 2. What is promiscuous code? It allows an application to listen to all traffic on a subnet or VLAN. . 3. How does Wireshark differ from NetWitness Investigator? Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education and NetWitness is an interactive threat analysis application of the NetWitness NextGen product suite. Wireshark captures live traffic and displays results at the packet level. NetWitness Investigator provides an aggregated overview of previously captured traffic which can be used to spot anomalies, compliance issues, and attacks. 4. Why is it important to select the student interface in the wireshark? So that you are in the student lab environment while work and choosing the Public network will prevent Wireshark from seeing traffic that is related to the lab. 5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24? Nmap -T4 -A -v 172.30.0.0/24 6. Name at least five different scans that may be performed with Zenmap. Intense scan, Intense scan plus UDP, Intense scan all TCP ports,......

Words: 386 - Pages: 2

Lab 1

...Unit 1 Labs Lab 1.1 Step 13 Lab 1.2 Define Major Topics for a Database NOUNS | MAJOR TOPIC | Doctors | Patients | Drugs | Side Effects | Researchers | Patient Information | Westlake Research Hospital | Conducting test of new Depression Drugs | Lab 1.3 Create a Statement of Work Scope The Software-Tracking database will be used to help manage the school’s software licensing. The software will be monitored for lifecycle and version corrections as well as keeping track of the number of users accessing the software under the constraints of the license agreement. The faculty and staff computers will be tracked for which version and licensed copy of software is currently running on each system. Constraints The database can be used for accessing the faculty and staff’s logon to the school employee website for the purpose of inputting and updating hours worked. Faculty and staff members can conduct business related work, such as adjusting work schedules, and student’s grades in the system but are not able to view student’s personal files in the registrars system. Objectives * Make for a more efficient system by allowing employees to have control of shared calendars and student’s grades. * Improve the tracking of Software Licensing and the Lifecycle of programs. Tasks and Timeline 1. Gathering Data: Meet with School Board and those involved to discuss the needs and wants for a database. Time Allotted: 3 weeks. Deliverables: A list of......

Words: 365 - Pages: 2

Lab 1 Securing Systems

...Lab #1 – Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN) 1. What is the first Nmap command you ran in this lab? Explain the switches used. The first nmap command used was nmap -O -v 10.20.100.50. -O was to detect the operating system of the 10.20.100.50 machine, while -v showed much detail. 2. What are the open ports when scanning 192.168.3.25 and their service names? There are twelve open ports. 80 is HTTP services, 135 is the Microsoft EPMAP aka DCE/RPC locator service, 139 is the NetBios session service, 445 is the Microsoft-DS, SMB file sharing, and the common internet file sharing, 3389 is the RDP, 5357 is the web services for devices, and 49152 to 49157 is the DCOM or ephemeral ports. 3. What is the command line syntax for running an SMB vulnerability scan with Nmap against 10.20.100.50? nmap --script=smb-check-vulns -p445 10.20.100.50 4. Explain why SMBv2 DoS (CVE-2009-3103) is bad. It allows a denial of service attack with the blue screen of death. It makes the system a high risk system. 5. What is the operating system of IP address 192.168.40.238? The operating system is FreeBSD 7.X|8.X|9.X|10.X The only open port is port 22 which indicates it is the SSH. 6. What are the reverse IP addresses for the three remote computers scanned in this lab? 10.20.100.50 is 50.100.20.10-apples.colo9.sg.com. 192.168.3.25 is 25.3.168.192-WASHDC103.mainstreet.coresite.com. 192.168.40.238 is 238.40.168.192-lichen.de...

Words: 291 - Pages: 2

Lab #1

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Wireshark , NetWitness Investigator ,OpenVAS ,PuTTY ,FileZilla . 2. What is promiscuous mode? Promiscuous mode allows Wireshark to capture any packets to any host on the same subnet or virtual LAN. if the promiscuous mode is not selected Wireshark will only capture the packets passing through the virtual LAN. 3. How does Wireshark differ from NetWitness Investigator? NetWitness analyze......

Words: 401 - Pages: 2

Lab 1

...Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Introduction to Computer Security CSS150 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Putty, Wireshark, Zenmap, FileZilla, Tftpd64, OpenVAS, NetWitness Investigator 2. What is promiscuous mode? Promiscuous mode is a network interface mode in which the NIC (network interface card) reports every packet that it sees on the same subnet or VLAN. Does not assume that this mode means you will see all traffic on you network mode but for purposes......

Words: 531 - Pages: 3