Premium Essay

Lab Course Go Virtual

In:

Submitted By brialo
Words 631
Pages 3
Lab oourses go virtual
A
Thomas F. Edgar
University of Texas number of universities have main- tained a dedicated laboratory course as part of the process control sequence, but those numbers have been shrinking due to the high resource requirements of lab courses and the pressure to reduce the number of hours in the engineering curriculum. While some chemical engineering departments run a junior measurement lab and a senior unit-operations lab, many now operate only one lab in the senior year which may incorporate control-related experiments. Labo- ratory courses are evolving, and new directions are being examined at specific universities, combining elements of simulation and also dis- tance learning. In the chemical process industries, the high cost of pilot scale equipment and operating per- sonnel has led to greater reliance on computer- based simulations rather than traditional pilot- scale experiments. Consequently, today's engineers work more often from a control room or from behind a computer screen. Now, you
LabView computer-interfaces of the VUOL give students an experience of controlling the equip- ment via the computer in addition to physically turning valves and checking temperatures. Another approach being employed involves the use of a computer connected to the Internet to allow students to carry out experimental studies in a remotely located physical laborato- ry. Permitting students to operate real laborato- ries at any time, from anywhere, using stan- dard, digital communication software such as
Web browsers is a burgeoning topic as Interest increases in remote control and maintenance.
This approach also permits a teacher and stu- dents at another institution to have access to laboratory facilities without incurring the cost of equipment maintenance and

Similar Documents

Premium Essay

Module 3 Essay

...NT1210 Introduction to Networking SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite: NT1110 Computer Structure and Logic or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 05/08/2013 Introduction to Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances in computer...

Words: 4795 - Pages: 20

Premium Essay

Itt Syllabus

... 22 Lab) GS1145 Strategies for the Technical Professional Syllabus COURSE SUMMARY COURSE DESCRIPTION This course reviews characteristic and trends of the global information society including basic information processing, Internet research, other skills used by the technical professionals and techniques that can be used for independent technical learning. MAJOR INSTRUCTIONAL AREAS 1. Getting Started at ITT Technical Institute 2. Productivity Software 3. Overview of Technology Tools 4. Microsoft Word 5. Microsoft PowerPoint 6. Microsoft Excel 7. Microsoft Access 8. Communication Tools 9. Exploring Career Goals 21st-century skills o Changes in work and the workplace o Building marketable proficiencies o Projecting professionalism ITT Technical Institute Career Services Resources o Targeting job descriptions  o Transferable skills Crafting a Resume 10. Skills and Techniques of a Successful Student Strategies for independent learning Learning styles Note-taking strategies Test-taking techniques © ITT Educational Services, Inc. All Rights Reserved. [2] 10/29/2013 GS1145 Strategies for the Technical Professional Syllabus Critical thinking Problem solving Basic research skills o ITT Tech Virtual Library o Web searches o Citing sources Time management Working in teams COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Gather relevant information using ITT Technical Institute resources, such as student email, ITT Tech Virtual Library...

Words: 14113 - Pages: 57

Free Essay

Virtualization

...Please Note: This course is no longer being offered The following is the announcement for the last course offering (Fall 2006) Engineering 477 -- Course Announcement for Fall Term 2006 Principles of Virtual Reality Eng 477 - NA 477 (Eng477_Flyer.pdf) Note for Fall Term 2006: The class will meet for the first time on Tuesday, September 5 from 4:30 to 6:30 pm in #1504 GGBL. No Laboratory Sessions on September 7 and September 8 ! Laboratory Sessions will start on September 14 and 15. (See First Week of Classes) Note: This is only the course announcement. The comprehensive Course Web Site is password-protected and will be made available to enrolled students at the beginning of the term.  | | | | | | This course teaches the fundamentals of Virtual Reality (VR) and provides laboratory experiences in the UofM 3D Lab in the Duderstadt Center (former Media Union) on North Campus. The course is being offered to students from all schools and colleges at the University of Michigan and emphasizes cross-discipline collaboration and teamwork in group projects. "Principles of Virtual Reality" has been developed as part of the mission for the Duderstadt Center, a university-wide information technology center on North Campus. The UofM 3D Lab in the Duderstadt Center operates state-of-the-art virtual reality systems (including a CAVE installation) and provides the university community with access to an emerging technology that is expected to dramatically impact...

Words: 2001 - Pages: 9

Free Essay

Sc4730 Assignments

...Science Onsite Course GRADED ASSIGNMENTS ------------------------------------------------- Assignments and Exercises………………………………………………………… page 2 Labs…………………………………………………………………………………….page 16 Project…...............................................................................................................page 21 ------------------------------------------------- Graded Assignments Unit 1 Exercise 1: Statistics and Graphing Course Objectives and Learning Outcomes In this assignment, you will interpret and graph descriptive statistics. Assignment Requirements Work in small groups to complete Problems 1-4 given in the worksheet provided by your instructor (Problems Worksheets). This is also available at the link below. Fill out one activity sheet (found at the end of the document) for each of the 4 questions. Required Resources * Statistics and Graphing (SC2730.U1.HO1) Worksheets also available at: http://esa21.kennesaw.edu/activities/stats/stats.pdf * Problems Worksheets (SC2730.U1.HO2) also available at: http://esa21.kennesaw.edu/activities/stats/problems.pdf Submission Requirements 4 completed activity sheets (1 each for Problems 1-4) Unit 1 Problem Set 1: Scientific Method Applied Problem Sets Course Objectives and Learning Outcomes In this assignment, you will outline the steps of the scientific method. Assignment Requirements Refer to the Applied Problem Sets located on pp. 153-162 of the Wagner lab manual. Use...

Words: 5239 - Pages: 21

Premium Essay

Le Vlademe Eh

...El Paso Community College Syllabus Instructor’s Course Requirements I. Course Number and Instructor Information ITSY 2300- ‘Operating Systems Security’ Instructor: Danny A. Dominguez Campus and Office Number: Valle Verde Campus - Room A-1109 Office/Voice Mail Number: (915) 831-2833 Office Hours: Monday/Wednesday/Friday 8:00am – 9:00am 11:00am – 12:00pm Monday/Wednesday 3:00pm - 5:00pm By Appointment E-Mail Address: adomi146@epcc.edu II. Text and Materials A. Fundamentals of Information Systems Security 2nd Edition, Kim, David. Students have two options. They can order from the EPCC campus bookstore, or they can order from the publishers shopping portal (www.shopjblearning.com). Below are the bundle breakdowns and options: OPTION 1: Purchase at EPCC Bookstore: Printed Access Code (For Bookstore) Print Bundle: a. Print Text + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07445-1 Bookstore sets student price: eBundle: a. eBook Rental + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07444-4 Bookstore sets student price: OPTION 2: JONES & BARTLETT: E-mailed Access Code (For Student). Students can go to: www.shopjblearning.com, enter the ISBN in the Search field, and then Add to Cart- proceeding through the checkout process. Print Bundle: b. Print Text + Virtual Lab Access/eLab Manual ISBN: 978-1-284-07440-6 Approx. cost to the student:...

Words: 1345 - Pages: 6

Premium Essay

Trying to Join Site

...Theory, 20 Lab) IT1115 Introduction to Information Technology Syllabus COURSE SUMMARY COURSE DESCRIPTION This course explores foundational topics related to information technology. Topics examined include computing devices, hardware, software, operating systems, computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and connections, protocols, and services used on the Internet. 8. Describe virtual computing and virtual networking concepts...

Words: 12527 - Pages: 51

Premium Essay

Appendix E

...After submitting the article, “Lab Courses Go Virtual,” by Thomas F. Edgar, to the Plagiarism Checker in the Library Forum, the results were retrieved and reviewed. The Plagiarism Checker indicated that the publication that I submitted was an original publication and listed all of the sources that the publication was associated with on via internet and other sources. Attention: John Doe Re: Course of Action for a submitted plagiarism document It is with my sincere regret that I must write to you regarding a recent assignment document that was submitted and was detected as being a plagiarized publication. The said document was titled, “Lab Courses Go Virtual,” by Thomas F. Edgar. The University of Phoenix has a very strict Code of Conduct that all students must uphold at all times during their educational process. All students are responsible for themselves and are expected at all times to not only respect yourself, but to respect the rights and privileges of your fellow classmates. Each student is responsible for their actions and when those actions constitute a dishonest behavior the University has no other choice because of what we stand for, to take disciplinary actions against you starting today, Thursday, November 11, 2012. During this investigation you can refer to you Student Handbook for the procedures that will be taking place during this investigation. Your responsibility as a student during this investigation so that you will not fall into any other...

Words: 291 - Pages: 2

Premium Essay

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Free Essay

Unit 2

...can update your personal email address? | My Personal Setting – My Information | 3 | Which link would you click to locate the Academic Calendar? | University Policies | NAME: Shalonda Delone Click on the “Academics” tab to answer the following questions: | # | “Academics” Tab Questions | Your Answer | 1 | What categories are listed under the “Resource Center” link? | Classroom ResourcesVirtual Campus TutorialsTools for your ToolboxCommunitySuccess Is | 2 | Where can you find your Ebooks? | Bookshelf | Click on the “Classroom” tab to answer the following questions: | # | “Classroom” Tab Questions | Your Answer | 1 | What is your degree program? | Associate’s (AABA) – Business Administration | 2 | What is your current course code? | UNIV103- 1205B31 | 3 | Who is your instructor? | Dave Hinkes | Click on the “Library” tab to answer the following questions: | # | “Library” Tab Questions | Your Answer | 1 | List two upcoming Library Classes. | Business Research for BeginnersFinding Library Resources for Criminals | 2 | List one research guide/tutorial designed specifically for UNIV103. | Guide to Library Resources | 3 | Name two library research databases, located on the library’s Find Articles and Books page, which you can use to find information related to your program. | ABI Inform Complete (Proquest)Academic Search Premier (Ebsco) | Click on the “Learning Center” tab to answer the following questions: | # | “Learning Center” Tab Questions...

Words: 985 - Pages: 4

Free Essay

Lab #10 Securing the Network with an Intrusion Detection System (Ids)

...Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories: prevention and detection. Intrusion prevention systems (IPS) block the IP traffic based on the filtering criteria that the information systems security practitioner must configure. Typically, the LAN-to-WAN domain and Internet ingress/egress point is the primary location for IPS devices. Second to that would be internal networks that have or require the highest level of security and protection from unauthorized access. If you can prevent the IP packets from entering the network or LAN segment, then a remote attacker can’t do any damage. A host-based intrusion detection system (IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides...

Words: 3209 - Pages: 13

Free Essay

Computer

...Strategies for the Technical Professional Onsite Course GRADED ASSIGNMENTS Table of Contents Graded Assignments 2 Unit 1 Assignment 1: It Takes Courage 2 Unit 2 Assignment 1: Left in the Lurch 3 Unit 3 Assignment 1: Gratitude Journal 4 Unit 4 Assignment 1: Create a Business Letter 5 Unit 5 Presentation 1: Small Group Presentation: Leadership, Conflict Resolution, and Teamwork 7 Unit 5 Assignment 1: Compare and Contrast Effective and Ineffective Leaders 8 Unit 6 Assignment 1: Create a Long-Term Financial Plan 10 Unit 7 Assignment 1: Calculating Credit Scores 11 Unit 8 Assignment 1: Writing a Prospective Schedule 12 Unit 9 Assignment 1: Using Social Media for Job Searches 14 Unit 10 Assignment 1: Putting the Finishing Touches on Your ePortfolio 15 Laboratory Assignments 17 Unit 1 Lab 1: Personal Persistence Narrative 17 Unit 1 Lab 2: Grit Test 21 Unit 2 Lab 1: Optimism 24 Unit 2 Lab 2: Self-Control 25 Unit 3 Lab 1: Curiosity in Modern Times 27 Unit 3 Lab 2: Integrity Matters 28 Unit 4 Lab 1: Create a Research Summary Memorandum 29 Unit 5 Lab 1: Resolving Systemic Conflict: Scenario Analysis 31 Unit 6 Lab 1: Time Value of Money 32 Unit 6 Lab 2: Budget Exercise 33 Unit 7 Lab 1: Calculating House Cost 35 Unit 7 Lab 2: Delayed Gratification 37 Unit 8 Lab 1: Initiative Reflection 39 Unit 8 Lab 2: Time Management Reflection 40 Unit 9 Lab 1: Creating a Professional Profile 41 Unit 10 Lab 1: Creating a Personal and Professional Development...

Words: 11662 - Pages: 47

Premium Essay

Dfhdfh

... | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A | |Blackboard Web Site |HTTP://toro.csudh.edu...

Words: 1433 - Pages: 6

Free Essay

Student Portal User Manual Eng 221

...accessing, navigating, and using the selected tool * Visual elements, such as images, flowcharts, tables, and screenshots * Effective page layout, including the order of information, use of whitespace, and highlighting * Terminology definitions, a key to define any symbols or diagrams used, and any other necessary information to help the user navigate the manual Finalize and submit the user manual. University of Phoenix Student Web Portal User Manual Introduction The University of Phoenix Portal is a brand new environment for students to participate in online classes and collaborate with in residence courses. The Web Portal allows faculty and students to come together along with University assisted career enhancement tools. Students can access any University supplied materials from the Web Portal, and online students can come together in the virtual classroom environment. Log In and Home Screen The University of Phoenix has standard authentication for users. This should be set up for users prior to use in the scope of this documentation. Standard authentication is as follows: username and password. Classroom The classroom page will allow you to choose which class presently on your schedule to access. If there is only one class on a student's schedule, the student portal will...

Words: 4083 - Pages: 17

Free Essay

Health Assess

...Ke’Ara Simmons Lab, Week # 6 SPECIFIC IMMUNITY Introduction The purpose of this lab experiment is to conduct a series of biochemical test to identify the bacterium responsible for the symptoms the 4 year old is suffering from. Also to see if her body has specific immunity to any distinct species or strains of invader. Case Study: A 4-year old girl was suffering from severe, watery diarrhea, lethargy, and nosebleeds. Emergency room personnel reported a fever of 101 F, blood pressure of 110/70 and heart rate of 72. Blood and stool samples were taken. Urine samples contained blood. The blood work revealed an acidic pH and abnormally low levels of platelets and erythrocytes. High levels of creatinine and urea were observed. This organism was cultured from various body fluids. After conducting a series of biochemical test the bacterium responsible for the young girl suffering was Escherichia coli Procedure To repeat the experimental procedure one will need Chemicals such as Gram Stain, Acid from Glucose, Gas from Glucose, Lactose Fermentation, Indole Production, Lysine Decarboxylase, and Malonate Utilization. Tools such as: Buner, loop tool, incubator, microscope, and Access to the virtual unknown lab software. Observations and Results | Result + or - | Appearance after Incubation | Gram Stain | Negative | N/A | Acid from Glucose | Positive | Yellow | Gas from Glucose | Positive | Yellow; bubbles present | Lactose Fermentation | Positive...

Words: 486 - Pages: 2

Free Essay

Bio340

...SimBio Virtual Labs® EcoBeaker®: The Barnacle Zone NOTE TO STUDENTS: This workbook accompanies the SimBio Virtual Labs® The Barnacle Zone laboratory. Only registered subscribers are authorized to use this material. Laboratory subscriptions may not be shared or transferred. Student’s Name: _________________________________ Signature: __________________________________ Date: __________________________________ This and other SimBio Virtual Labs® are accessible through SimBio’s SimUText System®. . SimBio Virtual Labs®: EcoBeaker® The Barnacle Zone Background When we tell our kids about different species and where they live, we naturally start talking about weather and the physical environment. Camels are adapted to life in the desert and can go a long time without water. Polar bears live in the Arctic and are adapted to cold with their thick layers of insulation. A polar bear wouldn’t be very happy in the desert, and a camel would have a hard time in the Arctic (though a herd of camels pulling a sled over the ice is an amusing image). The underlying idea is that in order to be adapted to one environment, you necessarily give up the ability to live in other environments. But is this true for most species? Do species live where they do primarily because of their adaptations to the physical environment, or might the other species in the environment also be important? The intertidal zone of rocky coastlines makes an interesting natural laboratory in which...

Words: 4477 - Pages: 18