# Lab 2

In: Science

Submitted By nwwildcat55
Words 619
Pages 3
UMUC NSCI 101/103

Lab 2: Types of Forces

INSTRUCTIONS:

On your own and without assistance, complete this Lab 2 Answer Form electronically and submit it via the Assignments Folder by the date listed on your Course Schedule (under Syllabus).

To conduct your laboratory exercises, use the Laboratory Manual that is available in the classroom. Laboratory exercises on your CD may not be updated.

Save your Lab 2 Answer Form in the following format: LastName_Lab2 (e.g., Smith_Lab2).

You should submit your document in a Word (.doc or .docx) or Rich Text Format (.rtf) for best compatibility.

Experiment 1: Friction

Table 1: Applied Force Required to Slide Cup

Cup Material Force Applied F1

m1 = 300 g water Force Applied F2

m2 = 150 g water F1 / FN1

F2 / FN2

Plastic

Avg: Avg: Avg: Avg:

Styrofoam

Avg: Avg: Avg: Avg:

Paper F1

m1 = 150 g water F2

m1 = 100 g water F1 / FN1

F2 / FN2

Avg: Avg: Avg: Avg:

Surface Description

Questions:

What happened to your applied force Fapp as you decreased the amount of water in the cup?

Assume the mass to be exactly equal to the mass of water. Calculate the normal force (FN) for 300 g, 150 g, and 100 g. Use these values to compute the ratio of the Applied Force (Fapp) to the Normal Force (Fn). Place these values in the rightmost column of Table 1.

What do these last two columns represent? What is the ratio of the normal forces F1 / F300? Compare this to your values for F2/ F150, and...

### Similar Documents

#### Lab 2

Words: 381 - Pages: 2

#### Lab 2

...IS3110 Lab #2: Assessment Worksheet Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls Student Name: _____________________________________________________________ 1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities) a. b. c. d. e. 2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk Management control objectives are affected? • PO9.1 IT Risk Management Framework • PO9.2 Establishment of Risk Context • PO9.3 Event Identification • PO9.4 Risk Assessment • PO9.5 Risk Response • PO9.6 Maintenance and Monitoring of a Risk Action Plan 3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), specify whether the threat or vulnerability impacts confidentiality – integrity – availability: Confidentiality Integrity Availability a. b. c. d. e. 4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3 and No More than 5) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure? 5. For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 – No More than 5), assess the risk impact or risk factor that it has on your organization in the following areas: a. Threat or Vulnerability #1: o......

Words: 469 - Pages: 2

Free Essay

#### Lab 2

...| Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]\$ mkdir Unit2 2. [Denise@localhost ~]\$ cd Unit2 [Denise@localhost Unit2]\$ mkdir memos reports 3. [Denise@localhost Unit2]\$ cd [Denise@localhost ~]\$ touch memo.one [Denise@localhost ~]\$ touch memo.two [Denise@localhost ~]\$ touch memo.three [Denise@localhost ~]\$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]\$ cp memo.one Unit2/memos 5. [Denise@localhost ~]\$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]\$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]\$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]\$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]\$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]\$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after......

Words: 1139 - Pages: 5

Free Essay

#### Lab 2

Words: 276 - Pages: 2

#### Lab 2

...Virtual Machine Name | Network Settings | BackTrack Internal (Host Only)gedit .bash_profileinit 6 | IP 192.168.seat.50Subnet Mask 255.255.255.0Gateway 192.168.seat.1DNS 192.168.seat.100 | 2003 ENT SQL Server (Host Only | IP 192.168.seat.100Subnet Mask 255.255.255.0Gateway 192.168.seat.1DNS 192.168.seat.100 | SnifferInternalExternal | eth0eth1 | ISA Firewall (Internal)Host-only-ISA Firewall (External)NAT | IP 192.168.seat.1Subnet Mask 255.255.255.0------------------------------IP 216.1.seat.1Subnet Mask 255.0.0.0 | BackTrack External (NAT)gedit .bash_profileinit 6 | IP 216.100.seat.50Subnet Mask 255.0.0.0Gateway 216.1.seat.1 | Windows 7 (NAT) | IP 216.200.seat.175Subnet Mask 255.0.0.0Gateway 216.1.seat.1DNS 127.0.0.1 | Take a screenshot for each of the steps below: 1. Disable Routing and Remote Access Install ISA. Create an Access rule that allows all out. Allow pings to and from internal, external, and localhost. Create server publishing rules for FTP, TELNET, SMTP, HTTP, and POP3 for Internal 2003. From the BackTrack external machine, do a nmap scan. 5 ports should be open. * On the Firewall, open the Start Menu and click on “Administrative Tools”. Select “Routing and Remote Access”. * Right-click on “FW (local)” and select “Disable Routing and Remote Access”. * Click “Yes” when prompted. After a moment, a red down arrow will appear next to “FW (local)”. Close Routing and Remote Access. * Click on “VM” and......

Words: 2739 - Pages: 11

#### Lab 2

...Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 12 2. Label the appropriate names to the ports and adaptors given below. PS/2 keyboard port PS/2 keyboard port Parallel port Parallel port Ethernet Ethernet USB ports USB ports Serial port Serial port USB mini jack USB mini jack Audio ports Audio ports USB ports USB ports Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot. USB 1 USB 1 Memory card slot Memory card slot Examples: USB 3.0 ports USB 3.0 ports Audio port microphone and earphone jacks Audio port microphone and earphone jacks IEEE 1394 port IEEE 1394 port E sata port E sata port Sd mini slot Sd mini slot Micro sd slot Micro sd slot USB 2.0 PORT USB 2.0 PORT Compact flash Compact flash Dual slot Dual slot Task 3: Identify the Configuration Procedure 1. Identify the following configuration. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- SCSI is a set of parallel interface standard used to attach printers, scanners, disk......

Words: 403 - Pages: 2

#### Lab 2

...Role: Voter 1. Voters should use cost-benefit analysis to make their decisions but not everyone uses it. There will be a lot of voters making the same decision but every voter will make the same decision. There are many factors in the decision making but it differs for each voter. 2. Some of the decisions made by representatives are budget, new laws and many more, most of which are aimed for the wellbeing of the people. 3. It is necessary for voters to be informed and educated to make the right decision. Given the chance to vote, a voter should have all the information to make the best decision. Role: Entrepreneur 1. Entrepreneur creates job and bring in income for the city or state through taxes. Without Entrepreneur there would be major impact on the economic system. Big businesses often need the small businesses in order to stay in business. 2. It really doesn’t matter if the resources are scarce or not. Most entrepreneur care more about maximizes the profit and little about what type of resources is used. Role: Taxpayer 1. Higher tax on gasoline mean little these day. Regardless if gas goes over \$5 a gallon people still need to buy gas to get to work and to do their daily chores. 2. It could swing both ways. It all comes down to the individual, if they need the money they will put in more hours and if they don’t need the money then why should they work more if they are getting paid less per hour. 3. Of course it’s important for government to understand the......

Words: 507 - Pages: 3

Free Essay

#### Lab 2

...Bullying- I think that bullying is best defined by saying: a unsecure person looking and prying on someone that they see they can take advantage of either physically or mentally. I think the physical part is mostly in young adults and children. I think the mental bullying come into place in the work place and a lot in relationships. I think it is important to define the word bulling accurately because there are several types of bulling. It could be physical.it could be mental. It could also be verbally. The reason I say verbal and mental is because verbal you could call someone names and etc... Mentally you could play with someone’s mind by placing thoughts of threats and losses. I think in the two article the same problem was punishment. Who should get punished and should there be a standard for bulling. I think that this is a problem due to fact that there are different types of bulling it is hard to set a standard when at most times we are talking about children and who is to say if they are aware of the severity of being a bully. I think this affects the victim mostly because they never get justice. I think it’s hard to make right are take back the effects of being on the receiving end of being bullied. I don’t think that my definition of bulling has changed after reading the articles. I think that it was reinforced by both of the articles because they was on two different topics but surrounding the main subject knowns as...

Words: 267 - Pages: 2

#### Lab 2

...------------------------------------------------- Top of Form Report Details for | Security assessment: | | Severe Risk (One or more critical checks failed.) | Computer name: | | IP address: | 192.168.2.100 | Security report name: | | Scan date: | 3/16/2016 2:54 PM | Scanned with MBSA version: | 2.3.2211.0 | Catalog synchronization date: | Security updates scan not performed | | | Sort Order: | Bottom of Form Windows Scan Results Administrative Vulnerabilities   Score   | Issue  | Result  | | Automatic Updates | | The Automatic Updates system service is not running. | What was scanned                How to correct this | | | | | Password Expiration | | All user accounts (3) have non-expiring passwords. | What was scanned      Result details      How to correct this | | | | | Incomplete Updates | | No incomplete software update installations were found. | What was scanned                | | | | | Windows Firewall | | Windows Firewall is disabled and has exceptions configured. | What was scanned      Result details      How to correct this | | | | | Local Account Password Test | | Some user accounts (1 of 3) have blank or simple passwords, or could not be analyzed. | What was scanned      Result details | | | | | File System | | All hard drives (1) are using the NTFS file system. | What was scanned      Result details | | | | | Autologon | | Autologon......

Words: 1675 - Pages: 7

#### Lab 2

Words: 1015 - Pages: 5

#### Lab 2

...1. The difference between privacy law and information systems security is very simple you must apply security to ensure privacy. In IT they relate because you must have a security process that in return will have privacy as a successful action. 2. The employee should have never taken home official data because of all the information that the files had. All the files had personal information of each patient. 3. The possible consequences that are associated with data loss are financial and in the scenario mentioned identity theft. 4. Regarding the loss of privacy data, there was data containing personal healthcare information PHI making this HIPPA compliance violation because institutions want to make sure that their patients information is not jeopardize and they to ensure security with any medical records. 5. The action that any company can take against any concerned employee is training and making sure that all employees are aware the policies. 6. The response of the company would have been different if the data theft had occurred at work instead of happening at the employee’s residence because at work the company could have traced the employee and his where abouts within the premises of the company. The consequences of violating company policy would have been much simpler to implement. 7. The VA Data Analyst’s and two supervisors that were reprimanded and demoted by the VA Secretary and the action is justified because the incident had been happening over the last......

Words: 485 - Pages: 2

Free Essay

#### Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

#### Unit 2 Lab

...Name: Patricia Sellers Date: November 22, 2013 Instructor’s Name: Trena Woolridge Assignment: SCIE211 Phase 2 Lab Report Title: Speciation Instructions: You will need to write a 1-page lab report using the scientific method to answer the following question: • What would happen if a species within a population were suddenly split into 2 groups by an earthquake that creates a physical barrier like a canyon? When your lab report is complete, post it in Submitted Assignment files. Part I: Use the animated time progression of speciation to help you write up your lab report. Part II: Write a 1-page lab report using the following scientific method sections: • Purpose • What would happen if a species within a population were to suddenly split in two groups by an earthquake that creates a physical barrier like a canyon? • Introduction • Reproduction is a natural and normal thing in our day to day lives. Animals and humans reproduce offspring, all year round. Separation is usually the furthest thing from our minds. But, mother natural can always turn anyone’s world upside down. For Example, What if a really bad earthquake hit, and caused the ground to split and drift far away from one another? Many species would be isolated from their families and environments. • Hypothesis/Predicted Outcome • A species is defined as a group of organisms that are able to interbreed to produce fertile and viable offspring under natural conditions. (Audesirk,......

Words: 450 - Pages: 2

#### Nt2670 Lab 2

...Unit 1 Lab 2 Preparing an Application Server LAB 1-2-1 1. Which computer is hosting the Administrator account that you specified in this authentication? . This question confuses me. The administrator account I am logging into is on the VM, but my laptop is the actual host LAB 1-2-2 2. Why is the system prompting you to initialize Disk 1 at this time? Because it was not initialized when it was created 3. What happens to the Disk 1 type and status when the initialization process is complete? The type changes to basic and the status changes to online 4. Now that Disk 1 has been initialized, why doesn’t it appear in the volume list pane at the top of the console? Because it hasn’t been formatted LAB 1-2-2 Task 5 Based on the information displayed in the Disk Management snap-in, fill out the information in Table 1-2-1 on your lab worksheet. | Disk 0 | Disk 1 | Disk type (basic or dynamic) | basic | basic | Total disk size | 80GB | 16GB | Number and type of partitions | 1 Primary | 0 | Amount of unallocated space | 40GB | 16GB | 5. What volume sizing options are available in the context menu? It gives me the minimum possible, the maximum possible, and a field to input what I want the size to be 6. Why are you unable to extend the Data2 volume to Disk 1? I was able to extend Data2 to Disk 1. 7. Why is it necessary to convert both of the disks? Because a basic disk does not support a spanned volume 8. Why are you......

Words: 721 - Pages: 3