Premium Essay

Pt1420 Unit 9 Lab Report

Submitted By
Words 558
Pages 3
1) The phase of the Moon during a total solar eclipse is a new moon. In a solar eclipse, the Moon is in between the Sun and the Earth. The Moon blocks some sunlight creating a the Earth to become dark for a few minutes at specific locations. The phase of the Moon during a total lunar eclipse is a full moon. In a lunar eclipse, the Earth is in between the Sun and the Moon. The Earth blocks the Moon from the Sun. The Earth casts its shadow on the Moon, giving it a red color.

2) Earth’s core is spilt into two sections, the outer core and inner core. The liquid outer core is made up of iron, nickel, and perhaps sulfur. The solid inner core is made of iron and nickel. The mantle is made up of silicates. We know this because of seismic waves that are generated by earthquakes. The seismic waves move at a certain speed depending on the material which they travel through. …show more content…
Rocks were brought back from the Moon by the Apollo Astronauts. They applied the techniques to date rocks on Earth to the Moon rocks. Radioactive day was used to determine the age of the rocks. The radioactive atoms decay into daughter atoms. Therefore, the more daughter atoms there are the older the rock is. Radioactive elements with half-lives we have determined can help scientist get a more accurate nuclear clock. We have used this data to determine the age of the Moon as well as the Earth. They both formed about 4.5 billion years ago. We also concluded that colliding planetesimals formed the Earth’s moon. Earth and another body collided and the Moon formed from the left over

Similar Documents

Premium Essay

Pt1420 Unit 9 Lab Report

...Suppose at ith position, plotted pixel is (xi , yi ). At position (i + 1)th , we have two candidate y-coordinates for xi+1 = xi + 1 as shown in figure 4.11. These candidate locations are marked as S(xi + 1 , yi -1) and T(xi + 1 , yi ). From the above figure, it can be seen that if we generating points from 90° to 45°(i.e. from x= 0 to x= y), each new pixel position closest to the actual circumference of the circle can be found by taking either of the two actions: moving in the x-direction by unit interval and not changing the y-coordinate. moving in the x-direction by unit interval and moving in the negative y-direction by unit interval (i.e. decrementing y-coordinate by unit interval). Distance of the pixel T from the origin is calculated by using distance formula i.e. CT = √(〖(x_i + 1)〗^2+〖y_i〗^2 ) Similarly Distance of the pixel S from the origin is given as CS = √(〖(x_i + 1)〗^2+〖(y_i -1)〗^2 ) Here we are using a function D( ) that provides a relative measurement of the distance from the center of the pixel from the actual circle. Let D(T) be the square of the distance from the origin to the pixel T minus square of the distance to the actual circle ( i.e. r...

Words: 1907 - Pages: 8

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10