Premium Essay

Buffer Lab Report

Submitted By
Words 1344
Pages 6
Introduction
Buffer is a solution that resists a change in pH when bases or acid are added. Solutions that are acidic contain high concentrations of hydrogen ions (H+) and have pH values less than seven. Buffer usually consist of a weak acid, and its conjugate base or a weak base and its conjugate acid. The function of buffer is to resist the changes in hydrogen ion concentration as a result of internal and environmental factor. This buffer experiment is important so that we relies the important of buffer in our life. Besides that, it is also important so that we master the buffer preparation techniques and can conduct the experiment ourselves without anyone to instruct us. Other than that, we got to learn how to operate a pH meter and we …show more content…
The NaH2PO4 and Na2HPO4 powdered were weighted by using weighing machine, followed the mass that has been calculated in step (3). The NaH2PO4 and Na2HPO4 powdered were mix in a 500 mL beaker. 500 mL of distilled water were measured by using a 500 mL measuring cylinder, then is poured inside the 500 mL beaker containing both the powdered. The mixture were stirred by using a glass rod until the mixture is fully dissolved. The solution were tested by using calibrated pH meter to get the pH value of the solution.

Results and Discussions pH ratio between acid and base:

7.3 = 6.82 + x x = 0.48
0.48 = log ([base])/([acid])
100.48 =base/acid salt/acid = 3.02

There, 1 acid : 3 base

calculate number of mole of acid and base to find the mass :

molar = mol/L
50 mM = (mol )/(0.5 L)

mol = 25 mol

number of mole of NaH2PO4
25/4 = acid = 6.25 mol number of mole of Na2HPO4
25/4 × 3 = salt = 18.75 mol

to calculate the mass of the acid and base :

Mass of NaH2PO4
(6.25 mol)/(119.98 g/mol)=0.052g Mass of Na2HPO4
(18.75 mol)/(141.96 …show more content…
A good buffer should have some of the characteristic such as have a pKa between 6 and 8. This is because most of the biochemical experiments have an optimal range of 6-8. Besides that, the bufferl used should be soluble in water. This is because the reaction only will take part in aqueous environments. Lastly, the salt used in this experiment should have the minimal effects in the experiment. Thus, the buffer components should not affect the ions involved in the biochemical reactions being

Similar Documents

Free Essay

Lab Report Instructions

...London School of Engineering and Materials Science Laboratory report writing instructions DEN101 - Fluid Mechanics 1 Flow Rate Measurement Experiment A. Student Student Number: 1234567 Version 2.0, 27 November 2010 Template for Word 97-2003 Abstract This document explains what is expected in your Fluids 1 lab report. The sections that should be covered are outlined and a structure you could follow is proposed. Detailed advice on how to edit the report is given. The document concludes with the marking criteria for this lab report. Table of Contents Abstract 2 1. Introduction 3 1.1. Writing 3 1.2. Editing and formatting 3 1.3. Content of the introduction 4 2. Background and theory 4 3. Apparatus 4 4. Test 4 5. Experimental procedure 4 6. Results 5 7. Discussion 5 8. Conclusions 5 9. References 5 10. Appendix A: Marking criteria 6 Introduction Before starting to write a report, you should think about what is your audience. Am I writing for colleagues who want a lot of detail how it is done, or am I writing for my boss who just wants an executive summary as he has no time for details? In general, there is not a single type of audience and we have to make our writing suitable for the detailed read, as well as the fast perusal. To understand what is required from you in this report, please have a look at the marking criteria in the Appendix. 1 Writing To limit...

Words: 2017 - Pages: 9

Premium Essay

Acid Base Buffers

...Acis CHEMICAL REACTIONS: ACID-BASE BUFFERS Short Overview Acids and bases represent two of the most common classes of compounds. Many studies have been done on these compounds, and their reactions are very important. Perhaps the most important reaction is the one in which an acid and base are combined, resulting in the formation of water (in aqueous solution) and a salt; this reaction is called neutralization. A buffer solution is a solution that contains both an acid and a salt containing the conjugate base anion in sufficient concentrations so as to maintain a relatively constant pH when either acid or base is added. In this experiment you will prepare a buffer solution and observe its behavior when mixed both with an acid and a base. You will also compare the behavior with that of solutions containing only the acid. Theory In his theory of ionization in the 1880’s, Svante Arrhenius defined acids are substances which form H+ and bases as substances which form OH- in water. He further defined a salt as a substance other than an acid or base which forms ions in aqueous solution. Such substances are thus capable of producing an electric current and are called electrolytes. The amount of electricity produced is directly proportional to the concentration of ions in solution. With regard to electrolytes we have learned previously that strong acids and strong bases ionize completely, and are therefore strong electrolytes because they...

Words: 2786 - Pages: 12

Free Essay

Death

...Chromatography INTRODUCTION IN THIS LAB, WE WILL BE EXPRESSING THE GREEN FLUORESCENT PROTEIN (GFP) IN BACTERIA AND PURIFYING IT USING COLUMN CHROMATOGRAPHY. THE SPECIFIC TYPE OF CHROMATOGRAPHY WE WILL BE USING IS HYDROPHOBIC INTERACTION CHROMATOGRAPHY (HIC). THE FOLLOWING IS INFORMATION FROM BIO-RAD INC., THE SUPPLIER OF THE REAGENTS: GFP has several stretches of hydrophobic amino acids, which results in the total protein being very hydrophobic. When the supernatant, rich in GFP, is passed over a HIC column in a highly salty buffer (Binding Buffer), the hydrophobic regions of the GFP stick to the HIC beads. Other proteins which are less hydrophobic (or more hydrophilic) pass right through the column. This single procedure allows the purification of GFP from a complex mixture of bacterial proteins. Loading the GFP supernatant onto the chromatography column When students load the GFP supernatant onto their columns, it is very important that they do not disturb the upper surface of the column bed when performing the chromatography procedure. The column matrix should have a relatively flat upper surface. A slightly uneven column bed will not drastically affect the procedure. However, subsequent steps of loading, washing, and eluting should minimize disrupting the column such that beads "fluff up" into the buffer. When loading the GFP supernatant onto the column, the pipette tip should be inserted into the column and should rest against the side of the column...

Words: 1541 - Pages: 7

Free Essay

Biochemistry Ldh Assay

...BIOL 3380 Name:_____________________________________ Circle Session: T-PM W-AM W-PM R-AM R-PM F-AM F-PM Experiment 9 – Pre-lab Homework Enzyme Kinetics of LDH This pre-lab homework assignment is due at the beginning of your lab session. You are provided with the following portion of a protocol: • Determine concentration of enzyme stock solution, if unknown, by taking an A280 nm reading of a 1:100 dilution (in water). Use a total volume of 1 ml in the cuvette. • Dilute some of the enzyme stock with buffer A to make a 4 mg/ml solution. • Serially dilute the 4 mg/ml solution with buffer A to make working solutions of 400 µg/ml and 40 µg/ml. • Prepare 30 µl of each working solution for every sample The PI of the lab gives you a tube of enzyme and tells you the following before disappearing into the office to write more grant proposals: ➢ There is 50 µl of enzyme stock solution. The enzyme is expensive to purify, so follow the protocol exactly, using as little of the stock solution as possible. ➢ The concentration of the stock solution is currently not known, but a 1 mg/ml concentration of the pure enzyme has an A280 nm of 2.0. ➢ You’ll be performing the assay on 12 samples. ➢ Make enough of each working solution so that you have at least 400 ul to work with when you do the assay (to cover any waste and/or inefficiencies in pippetting). Using the spectrophotometer to read the absorbance at 280 nm, you get...

Words: 3629 - Pages: 15

Free Essay

Css 200 Ip2-Lab

...CSS200-1401B-01 Principals of Network Security Instructor: Gregory Roby Phase 2, Individual Project Date: March 08, 2014 By: Gil Palacio Lab #3 Overview: In this Lab I am learning how to use the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application. This application is an open source tool that automates network exploration to perform several different types of security audit scans of large IP networks (LAB 3, CTU. 2014). SO here is what I gather while doing this Lab: I added several IPs to putty in order to build information or to give information to the GUI that I am looking into. I copy pasted the two interfaces that are up,up in the 1st question from the Lab Assessment sheet of the putty profile created: Interface Ethernet0/0 "", is up, line protocol is up Hardware is 88E6095, BW 100 Mbps Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps) Available but not configured via nameif MAC address c84c.7556.de9e, MTU not set IP address unassigned 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 L2 decode drops 0 switch ingress policy drops 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collisions, 0 deferred 0 lost carrier, 0 no carrier 0 rate limit drops ...

Words: 1306 - Pages: 6

Premium Essay

Ph Reports

...Unit 15 P5 PH report Hypothesis: the aim of this experiment was to see the effects that different levels of PH values has upon amylase enzyme activity. Apparatus: * Stirring rod * Dimple tray * Five pipettes * Syringe * Starch solution * Amylase * Iodine * Buffer of PH4, 7 and 10 * Test tube holder * Stopwatch Procedure: the first thing to do would be to ensure that you have all of the equipment needs for the experiment. The first step is to get a test tube and place it within the test tube holder, once you’ve done that you get a pipette using the pipette take some of the iodine and then very carefully put to drops of the iodine solution into the test tube. After that gets another pipette using that one to very gently to store 2 mL of the amylase enzyme solution, then very carefully put to drops of the amylase solution into the test tube. Once you’ve done that you get a third pipette and use that one to store 1 mL of the PH4 buffer, you then very carefully put the 1 mL of the pH4 buffer into the test tube, the second to last thing that is now added is 2 mL of starch. Once all of these chemicals have been put into one test tube it is then gently stirred, your lab partner will at the same time put 2 drops of iodine into 4 wells of the dimple tray, labelled 4 wells as 10 seconds, 20 seconds, 30 seconds and 40 seconds, using a stopwatch keep an eye on the time and wants 10 seconds of past use a syringe get a few drops of your amylase...

Words: 575 - Pages: 3

Premium Essay

Ph on Amylase Function

...acts as a buffer against any possible changes in the pH from acids produced from bacteria, maintaining the oral cavity at an almost neutral pH level.(3) If saliva was introduced to a differing pH than its optimal pH, it would cause the amylase action to either decrease or cease functioning all together if the pH changed dramatically enough. With the given information, it could be said that salivary amylase would be at its optimal functioning level at around the average saliva pH of 6.78.(1) A change in pH would be detrimental to amylase given the protein nature of amylase and the instability of proteins in more acidic or basic pH concentrations.(3) When proteins are surrounded by an acidic pH, they become unstable due to the increase in positive charge from the disassociated hydrogen ions, the positive charge acting to pull the proteins out of their folded shape.(3) In similar opposition, when proteins are surrounded by a basic pH, they are instead pulled apart by the negative charge produced by the increased amount of hydroxide ions.(3) Methods: In this experiment, a saliva solution was procured by first rinsing the mouth with distilled water, then taking another quantity of distilled water into the mouth and mixed with saliva for 2 minutes. The prepared saliva wash was spit into a dixie cup and diluted with distilled water with roughly a 1:2 ratio of saliva solution to distilled water. Next, 7 test tubes were pipetted with 2.5 ml each of a specific pH buffer. Tube 1...

Words: 999 - Pages: 4

Premium Essay

Strategy and the Master Budget

...Chapter 10 Strategy and the Master Budget Cases 10-1 Emerson Electric Company © Joseph San Miguel, reprinted with permission. 10-2 LetsGo Travel Trailers (Source: “LetsGo Travel Trailers: A Case for Incorporating the New Model of the Organization into the Teaching of Budgeting,” by Sally Wright, Cases from Management Accounting Practice, Vol. 14, Montvale, NJ: Institute of Management Accountants, 1998). Note that part 2 of this case requires the use of Excel. 10-3 Building Processes for a Solid Foundation: The Case of Community Health Initiatives (Source: Sandra Richtermeyer, Strategic Finance, August 2007, pp. 52-57. Note: this case was the case used as the 2008 IMA Student Case Competition. The Student Case Competition is sponsored annually by the IMA to provide an opportunity for students to interpret, analyze, evaluate, synthesize, and communicate a solution to a management accounting problem.) 10-4 Academic Advising at Bay State (Source: Janice E. Bell and Shahid L. Ansari, Strategic Finance, September 2008, pp. 44-51. Note: this case was the case used as the 2009 IMA Student Case Competition. The Student Case Competition is sponsored annually by the IMA to provide an opportunity for students to interpret, analyze, evaluate, synthesize, and communicate a solution to a management accounting problem.) Readings 10-1: “How to Set Up a Budgeting and Planning System” by Robert N. West and Amy M. Snyder, Management Accounting (January 1997)...

Words: 28910 - Pages: 116

Free Essay

Syllabus for Chem

...*If I have to contact the class as a whole it will be through D2L email. Check regularly for notes and announcements.* Credit Hours: 4 Contact Hours: 5 Lab Hours: 2 Prerequisite(s): Math 1710 or equivalent. Required Text(s): 1. Chemistry: The Central Science, 12th edition, Brown, et. al., Prentice Hall, ISBN #978-0-321-78756-9 2. General Chemistry Lab Manual, Cengage Learning ISBN # 9781285127712 3. Register for Sapling Learning homework system ($29.99) See bottom of last page of syllabus for more information!!! Required Supplies/Material(s): Chemical Splash Proof Safety Goggles Recommended Supplementary Material(s): 1. Study Guide and Solutions Manual for Chemistry: The Central Science, 12th edition, Brown, et. al., 2. Scientific calculator Disabilities: A student with a disability who requires academic accommodations MUST contact Sonja Hood, director of disability services, to request an academic accommodation plan. Contact information: Simon Hall 129, (931) 393-1765, shood@mscc.edu Evaluation Plan (subject to revision): |Task |Weight | |Exam 1 (Chapters 10-12) |10% | |Exam 2 (Chapters 13-16) |10% | |Exam 3 (Chapters 17,19-21)...

Words: 1068 - Pages: 5

Premium Essay

Information System Controls for Systems Reliability

...CHAPTER 7 INFORMATION SYSTEM CONTROLS for SYSTEMS RELIABILITY SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 7.1 1. Encryption is the final layer of preventative controls in that encrypting data provides a barrier against an intruder who has obtained access to company data. Encryption employing a digital signature and a public key infrastructure (PKI) can also strengthen authentication procedures and helps to ensure and verify the validity of e-business transactions. The digital signature is some sort of identifying information about the signer that is encrypted with the signer’s private key. This identifying information can only be decrypted using the corresponding public key. Since a private key is only known to it’s owner, only the owner can hold both the public and the private key and be the creator of the digital signature. Thus, digital signatures can be used to authenticate a particular party involved in a transaction as being the creator of a document. This provides for non-repudiation: the creator of the digital signature cannot deny having signed a document.. A digital certificate is an electronic document that is digitally signed by a trusted third party that certifies the identity of the owner of a pair of public and private keys. The PKI is a system that is used to process and manage the public and private keys used in digital signatures and digital certificates. An organization that handles digital certificates is called a certificate...

Words: 5091 - Pages: 21

Premium Essay

Computer

...NETW320 -- Converged Networks with Lab Lab #4 Title: IPv4 TOS and Router Queuing – Cont. Procedure Start OPNET IT Guru Open the scenario 1. Select File/Open. 2. Select Computer or My Computer (depending on your O/S). You may also need to allow Citrix access to your computer. 3. On your F: drive, open the op_models and then open the NETW320 folder. 4. Open the Lab2_RouterTOS.project 5. Click on Lab2_RouterTOS.prj 6. Click Open. The project should open. 7. Choose Scenarios > Switch To Scenario > FIFO Configure the Simulation Run 1. We are now ready to configure the Simulation Run. Select the Configuration/Run Discrete Event Simulation tab (the running man) from the tool bar. The following screen will open. 2. Set the Duration to 4 (if it is not set) and change hour(s) to minute(s). 3. Click Apply and Cancel. 4. Go to File > Save, to save your configuration. 5. Before we duplicate the scenarios, now would be a good time to run the first simulation to ensure we have all the configurations made correctly. Once we copy them over to the PQ and WFQ scenarios, if something is configured incorrectly, that mistake will be transferred over. 6. Select the running man icon again to bring up the Configuration/Run Discrete Event Simulation panel again and click Run. The Simulation Execution window will open and the sim will start. 7. When the Sim completes and the Close window lights, click it to end. 8. We are now ready to look at the results. From the tool...

Words: 2594 - Pages: 11

Premium Essay

Computer Science

...A REPORT ON INTELLIGENT HUMIDISTAT BY Rohan Mehta 2011B5A3376P Aditya Pillai 2011B3A3530P Shantanu Maharwal 2011B2A3700P Gaurav Dadhich 2011B3A8513P AT BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI A REPORT ON INTELLIGENT HUMIDISTAT BY Rohan Mehta 2011B5A3376P Aditya Pillai 2011B3A3530P Shantanu Maharwal 2011B2A3700P Gaurav Dadhich 2011B3A8513P Prepared in Partial fulfilment of the requirements of the course “Microprocessors and Interfacing” Course Number: EEE F241 AT BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI (April 2014) ACKNOWLEDGEMENT We would like to express our gratitude to all those who have helped us directly or indirectly to complete this report. Firstly, we would like to express our gratitude towards the Instructor-in-Charge (IC) of this course, Dr. K. R. Anupama (from Goa Campus) and Dr. Pawan Sharma (from Pilani Campus) for giving us this opportunity to work on such an interesting assignment. Their teachings and support during the program were greatly valuable to all of us. We would also like to thank our tutorial professors, viz., Dr. Rajiv Ranjan Singh, Mr. Tulsi Ram Sharma, for their excellent personal guidance, help and teachings throughout the project, and further. Last, but not the least, we would like to thank our Lab Instruction Mr. V. Balaji and his team of assistants for all the help and knowledge imparted to us related to the assembly language programming in the...

Words: 2608 - Pages: 11

Free Essay

Sociology

...http://jozefg.ecs.fullerton.edu/public/CS906/Assignment/ |Ass # |Text Chapter |ASSIGNMENT CPSC 906 FALL 2004 |Due |Max Points | | | |Section 1 | | | | | |Note: Please provide the program assignment documentation according to | | | | | |SyllabusCS901.doc and Project Submittals.doc. | | | |1 |Ch1 |Problems: 26 p.69. Unit conversion. |09-09 |2 | | |Ch2 |Problems: 4 p.153. Stacks separated | | | |2 |Ch2 - 3 |See the exercise assignment description below |09-21 |3 | | | | |Tue | | |3 |Ch2 |Problem: 39 p.156 - provide a Gantt chart for each case and calculate AWT,| 09-30 |3 | | | |ATT and ART. Problems 44. |Thu | | | | |Provide the solution in the PowerPoint slides...

Words: 5471 - Pages: 22

Free Essay

Lab #10 Securing the Network with an Intrusion Detection System (Ids)

...Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories: prevention and detection. Intrusion prevention systems (IPS) block the IP traffic based on the filtering criteria that the information systems security practitioner must configure. Typically, the LAN-to-WAN domain and Internet ingress/egress point is the primary location for IPS devices. Second to that would be internal networks that have or require the highest level of security and protection from unauthorized access. If you can prevent the IP packets from entering the network or LAN segment, then a remote attacker can’t do any damage. A host-based intrusion detection system (IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides...

Words: 3209 - Pages: 13

Free Essay

Computer Network Lab Manual

...CN LAB REPORT Dept. of ISE, BVBCET Department of Information Science & Engineering, BVBCET Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card, network...

Words: 3647 - Pages: 15