Free Essay

Lab3

In: Computers and Technology

Submitted By akhkhart4
Words 484
Pages 2
ET1410 - Module 2 - Homework Wk3
Due: Beginning of Class Week 4 Student Name: _________________________
Instructions: This is a homework assignment that covers Week 3 of our ET1410 class. You should neatly show your steps in the middle column, and provide your final answer in the right hand column. NEATNESS COUNTS. You must work in pencil, not pen.

Must include units of measure in your answer!!! If no units, or incorrect units, points will be deducted.

ProblemNo. | Your Solution | Final Answer (Restate Your Final Answer Here) | 1 | The upper critical frequency of an op-amp’s open-loop response is 200 Hz. If the midrange gain is 175,000 what is: (a) ideal gain at 200 Hz? (b) the actual gain? (c) The op-amps open loop bandwidth? | (a)____________(b)____________(c)____________ | 2 | Determine the attenuation of an RC lag network with fc = 12 kHz for each of the following frequencies. (a) 1 kHz (b) 5 kHz (c) 12 kHz (d) 20 kHz (e) 100 kHz | (a)____________(b)____________(c)____________(d)____________(e)____________ | 3 | Determine the phase shift through the network at a frequency of 2 kHz: | | 4 | Determine the phase shift through the network at a frequency of 2 kHz: | | 5 | Determine the phase shift through the network at a frequency of 2 kHz: | | 6 | A certain op-amp has three internal amplifier stages with midrange gains of 30dB, 40dB, and 20dB. Each stage also has a critical frequency associated with it as follows: fc1= 600Hz, fc2 =50kHz, and fc3 = 200kHz. (a) What is the midrange open-loop gain of the op-amp, expressed in dB? (b) What is the total phase shift through the amplifier, including inversion, when the signal is 10 kHz? | | 7 | A certain amplifier has an open-loop gain in midrange of 180,000 and an open-loop critical frequency of 1500 Hz. If the attenuation of the feedback path is 0.015, what is the closed-loop bandwidth? | | 8 | Find the value of Rf that will produce a closed loop gain of 8. | | 9 | Find the value of Rf that will produce a closed loop gain of -75. | | 10 | If a signal voltage of 10 mVrms is applied to the amplifier, what is the output voltage and what is the phase relationship to the input? | | 11 | For the amplifier determine the closed-loop gain and bandwidth. Open-loop gain is 125 dB and unity-gain bandwidth is 2.8 MHz. | | 12 | For the amplifier determine the closed-loop gain and bandwidth. Open-loop gain is 125 dB and unity-gain bandwidth is 2.8 MHz. | | 13 | For the amplifier determine the closed-loop gain and bandwidth. Open-loop gain is 125 dB and unity-gain bandwidth is 2.8 MHz. | | 14 | For the amplifier determine the closed-loop gain and bandwidth. Open-loop gain is 125 dB and unity-gain bandwidth is 2.8 MHz. | |

Similar Documents

Premium Essay

Lab3

...Name ____Anjad itayem______________ Projectile Motion Go to http://phet.colorado.edu/simulations/sims.php?sim=Projectile_Motion and click on Run Now. Pre Lab Reflections: What are the • What forces are at play on a body under fall ? gravity and air resistance • Make a prediction of which angle results in maximum range. My prediction is that angel of 70 degrees will be the mazimum range Activity: - Open the sim, projectile motion. - Familiarize yourself with the variables shown there. - Ensure the air resistance check box remains unchecked. - Using the mouse set the angle of projection(i) to 5 deg. Alternatively enter the value in directly. - Set the initial speed to a value U=15m/s . - Click on Fire to start the projectile and record the corresponding value of the range R. - Repeat with values i= 10,15,20,25,30,35,40,45,50,60,70,75,80,85. - Draw a graph of Range (R) against Angle of projection (i) You may want your lay out to appear like in the table. U=……… |Angle (i) |Range(m) | |5 |9.7 | |10 |12.2 | |15 |14.9 | |20 |17.5 | |30 |21.8 | |35 |23.2 ...

Words: 404 - Pages: 2

Premium Essay

Lab3

...56 Lab #3 | Configure BitLocker and Windows Encryption LAB #3 – ASSESSMENT WORKSHEET Configure BitLocker and Windows Encryption Course Name and Number: IS3340 Windows Security Student Name: Daniel Longo Instructor Name: Dakrouni Lab Due Date: 10/4/2013 Overview In this lab, you used the Microsoft® Encrypting File System (EFS) to encrypt files and folders on a Windows Server 2008 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft® BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the server and created a recovery key. Lab Assessment Questions & Answers 1. Within a Microsoft® Windows 2008 server R2 environment, who has access rights to the EFS features and functions in the server? 2. What are some best practices you can implement when encrypting BitLocker drives and the use of BitLocker recovery passwords? 38542_Lab03_Pass2.indd 56 3/2/13 10:01 AM Assessment Worksheet 3. What was the recover key created by BitLocker in this lab? 57 4. BitLocker secured drives. How would you grant additional users access rights to your EFS encrypted folders and data files? 5. What are the main differences between EFS and BitLocker? 6. The customer privacy data policy in your company’s data classification standard requires encryption......

Words: 279 - Pages: 2

Premium Essay

Lab3

...LAB 3.2 3.1.2 Using Figure 3-1 define each layer of the OSI model in your own words and state what layer provides. Use your textbook or internet to support your answer. Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads 3.2.2 Using Figure 3-2 as a basis, complete the diagram to show the intermediate encapsulation provided by each layer. Application Presentation Session | Data | Transport | Segment | Network | Packet | Data Link | Frame | Physical | Bit | 3.2.3 Briefly explain the deencapsulation steps in the communication from host B receiving a message from host A destined for an active application. First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the Transport layer processes the segment......

Words: 347 - Pages: 2

Free Essay

En1320 Lab3

...Alyssa Bauman En1320 Lab3 “Why We Crave Horror Movies” by Steven King presents an intriguing philosophy of watching horror movies. I believe that the purpose behind this article is to appeal to the reader’s unrealized dark side. King implies that are able to overcome their hysterical fear of things when they’re confronted with it and watching a horror movie is the easiest way to do that. He explains that in some way we all have this courage to overcome our deepest fears and one of the ways we show it is placing ourselves, in this case a movie theater, directly in front of what we know will scare us. The intended audience for this article is most likely the younger age demographic. Horror Movies are especially popular with ages 15-35. When you are younger you have this need to seek out new experience and thrills. Throughout the essay King directs a message to the young by making a comparison of horror movies to roller coasters describing the excitement that is felt throughout the ride. King is trying to persuade his reading audience to watch horror movies that bring his popularity up because he has books that have been made into movies. Although persuasive, King's article does not have factual evidence to solidify his argument that we all crave horror movies. The article uses many rhetorical strategies such as: compare and contrast, analysis and evaluation, cause and effect, absolutes, generalizations, and assumptions. King's ability to use these strategies......

Words: 373 - Pages: 2

Premium Essay

Phys216 Lab3

...Worksheet for Interactive Lab3: Circular Motion Name _____________ Physics 216 Grade ___/42 Date ______ Circular motion is one of the fundamental building blocks for understanding the physical world because it is so common. This interactive lets you examine the basic ideas of kinematics and forces for objects moving in circular motion. 1. (6 points) Use the controls under Show Vectors to draw arrows for several different quantities. The velocity vector is drawn in a special way: a big, bold arrow showing its direction and magnitude, plus smaller arrows for its horizontal and vertical components. * How are the directions of the acceleration and force vectors related? Force has a magnitude and a direction, and it is a vector. If a force is applied to an object, the object will accelerate in proportion to the magnitude of the force and in the direction of the applied force * What about the directions of the velocity and force vectors? The velocity of the object changes in response to the application of force. * And how are they influenced by the increase in mass and velocity slide bars? This question can be answered by the equation F = ma or force equals the product of mass and acceleration. An increase in mass or acceleration will result in more force. 2. (6 points) The large slider on the left changes the angle at which you view the spinning system. Try watching the motion from above (the default) and from the side. What would the system look......

Words: 1008 - Pages: 5

Premium Essay

Ip Subnetting Project

...This is newest updated file from today. See below. IP Subnetting Project XUMUC is has the WAN links in place to the new locations in the Houston Region. XUMUC currently has 2 other Regions San Francisco and Denver. Originally, XUMUC was only in one region (San Francisco). The previous consultant did a poor job with the integration resulting in a poor IP address scheme as a result routing tables at the summarization points and at the San Francisco Campus are very large. In addition, no VLAN structure was developed to isolate broadcast traffic. There are 4 main departments in XUMC: sales, finance, human resources, and research and development. Also, there has been some concern that the WAN transport was not able to accommodate the network traffic. The XUMC sales team has added a call center with hours of operation from 9AM-9PM EST. Access to the call center network should be restricted after hours. The research and development department has (3) unique special projects which will require over 1000 devices to be enabled to use IPV6. A new network should be created for this area. Finally, all addresses in the network are statically assigned resulting in high administration overhead when changes are needed XUMC would like this changed to lower administrative overhead. The Board of Director meet and decided to add a Security Analyst role to the team. The new Security Analyst has request the access restrictions be documented. The Finance Department should have......

Words: 526 - Pages: 3

Premium Essay

Gang Street

...REFERENCES 1) http://chemed.chem.purdue.edu/genchem/lab/equipment/pipet/error.html 2) http://www.indiana.edu/~nimsmsf/P215/p215notes/LabManual/Lab3.pdf 3) http://www.biochem.duke.edu/wysiwyg/downloads/GrimsleyPace.pdf 4) http://www.clinchem.org/content/21/6/776.full.pdf INTRODUCTION Basic Laws of Light Absorption. For a uniform absorbing medium (solution: solvent and solute molecules that absorb light) the proportion of light radiation passing through it is called the transmittance, T, and the proportion of light absorbed by molecules in the medium is absorbance, Abs. Transmittance is defined as: T = I/Io where: Io= intensity of the incident radiation entering the medium. I = intensity of the transmitted radiation leaving the medium. T is usually expressed as percent transmittance, %T: %T = I/Io x 100 The relationship between percent transmittance (%T) and absorbance (A) is given by the following equation: A = 2-log (%T) On most spectrophotometers two scales are present, %T and Abs. Absorbance has no units (Why?) and varies from 0 to 2 (linear region for most substances is from 0.05 to 0.7). The Beer-Lambert Law states that Abs is proportional to the concentration (c) of the absorbing molecules, the length of light-path through the medium and the molar extinction coefficient: A = εcl where: ε = molar extinction coefficient for the absorbing material at wavelength in units of 1/(mol x cm) c =......

Words: 376 - Pages: 2

Free Essay

My Paper on Things and Stuff

...Active Directory structure and Domain Controller configuration: DHCP We will be using DHCP for wireless devices. All other devices (servers, printers, lab PCs, switches) will receive static IPs as they will all be permanent fixtures. I have DHCP enabled on both DC’s with a split-scope configured for the wireless address pool. This will help with load-balancing and will ensure that if DC1 goes down, wireless devices will still be able to receive an IP address from DC2. Active Directory Users and Computers User Groups are located under the Users container. All users will be in the Domain Users group, and then will be added to Domain Admins, Server Admins, Faculty, or Students based on role. Guest users will be added to Domain Guests. User accounts are generated with first initial, last name, and a number to distinguish duplicates (e.g. Anthony Matthews becomes amatthews001) Domain Controllers will remain in the Domain Controllers OU, Servers will be in the Servers OU, and workstations will be under the workstations OU in the OU that corresponds to their physical location (i.e. lab 1-3) This will allow us to apply GPOs to all devices based on location and role. Domain Controllers are WestSideDC01 and WestSideDC02, Lab machines are named with Lab name and an assigned number (e.g. Lab1PC1) Group Policy Management Currently I have the following options configured with group policy: Server Admins – adds the Server Admins security group to the Administrators......

Words: 409 - Pages: 2

Free Essay

Book Review

...Point of sale evaluation case study Name Institution Course Date Task 1 Evaluation of POS system Evaluation of a POS system involves an analysis of its features and usability to the user needs and requirements. Evaluation of a POS system helps the user order for the most appropriate POS system for their retail operations. In skate board selling, an appropriate POS needs to fulfill several factors to ensure a smooth flow of transactions for both the administrators and users. From lab 3, criteria covered include the set up and configuration, data entry, customization and mail merge. These criteria have left out several important consideration factors for an appropriate POS for skate board selling. The evaluation has not fully considered important aspects of the POS especially its interaction with the environment (users, administrators and clients). One of the important criteria left out by lab 3 evaluation is the time required for implementation. The sellers of skate boards should be aware of how long the system is going to take to install and run. This should consider its integration with the current systems. The time should be valued in terms of cost, ranging from expenses of training the employees to cost implications that may happen upto the time the users understand the POS operations fully. This is important in that it gives the unseen cost for the retailers of the skate boards. Another left out evaluation criteria is system security. System security......

Words: 2915 - Pages: 12

Free Essay

Sociology

...http://jozefg.ecs.fullerton.edu/public/CS906/Assignment/ |Ass # |Text Chapter |ASSIGNMENT CPSC 906 FALL 2004 |Due |Max Points | | | |Section 1 | | | | | |Note: Please provide the program assignment documentation according to | | | | | |SyllabusCS901.doc and Project Submittals.doc. | | | |1 |Ch1 |Problems: 26 p.69. Unit conversion. |09-09 |2 | | |Ch2 |Problems: 4 p.153. Stacks separated | | | |2 |Ch2 - 3 |See the exercise assignment description below |09-21 |3 | | | | |Tue | | |3 |Ch2 |Problem: 39 p.156 - provide a Gantt chart for each case and calculate AWT,| 09-30 |3 | | | |ATT and ART. Problems 44. |Thu | | | | |Provide the solution in the PowerPoint......

Words: 5471 - Pages: 22

Free Essay

218 Report

...else { *(digit1+numdigists1-1) = ((*(digit1+numdigists1-1)-‘0’)+1)%10; *(digit1+numdigists1)= *(digit1+numdigists1)+1; } Addition: For(int i=0; i<= length ;i++) If(*bigInteger1[i]+ *bigInteger2[i]<10) *result[i]= *bigInteger1[i]+ *bigInteger2[i]; else *result[i]= (*bigInteger1[i]+ *bigInteger2[i])%10; *result[i+1]=*result[i+1]+1; Subtraction: For(int i=0; i<= length ;i++) If(*bigInteger1[i]- *bigInteger2[i]>=0) *result[i]= *bigInteger1[i]- *bigInteger2[i]; else *result[i]= (*bigInteger1[i]+10- *bigInteger2[i]); *result[i+1]=*result[i+1]-1; Multiplication: for(int a=digInteger1; a>0; a--) *result=addition(multiplier); 2. Flowchart 3. Compiling Instruction # include "Lab3.h" # include <cstdlib> # include <cmath> char *add; char *sub; //char *mult; //char *div; int...

Words: 2137 - Pages: 9

Premium Essay

Hgjfghk

...NETWORK ADMINISTRATION LABMANUAL Student Name: ________________________ Faculty Name: ________________________ Institute Name: ________________________ Branch Name: ________________________ Batch Date : ________________________ Windows Server 2008 - Network Administration INDEX Sr. No. 1 Topic Dynamic Host Configuration Protocol (DHCP) Lab – 1: Installing DHCP Service Lab – 2: Creating a Scope Lab – 3: Creating DHCP Reservations Lab – 4: DHCP Server Backup and Restore Page No. 5 6 12 20 22 2 Domain Naming System (DNS) Lab – 1: Installing DNS Service Lab – 2: Creating Standard Primary Forward Lookup Zones Lab – 3: Creating Standard Primary Reverse Lookup Zones Lab – 4: Creating Secondary Zone Lab – 5: Creating Stub Zone Lab – 6: Creating Active Directory Integrated Primary zone Lab – 7: Conditional Forwarders Lab – 8: Forwarders Lab – 9& 10: Root Hints and Cache Server 24 25 27 33 38 42 44 47 48 49 3 Internet Information Services (IIS)- Web Server Lab – 1: Installing Internet Information Service - Web Server Lab – 2: Creating a Website Lab – 3: Configuring Redirection of Websites Lab – 4: Creating Virtual Directory Lab – 5: Changing the Website IP address or Port no Lab – 6: Creating Self-Signed Certificate for HTTPS Website Lab – 7: Creating a HTTPS Web Site 50 51 54 62 64 67 68 71 4 Internet Information Services (IIS)- Ftp Server Lab – 1: Installing Internet Information Service - FTP Server Lab – 2: Creating Do not Isolate User FTP...

Words: 12134 - Pages: 49

Premium Essay

Does Beauty Have a Cost? the Ecological Footprint of the Cosmetics Industry

...Does
Beauty
Have
a
 Cost?
 
 The
Ecological
Footprint
of
the
Cosmetics
 Industry
 
 
 
 
 
 
 Alexandra
Noelle
Penny
 Brown
University
2008
 Environmental
Studies
Senior
Thesis
 
 May
8,
2008
 
 
 
 
 
 1 Acknowledgements To Caroline Karp, my thesis advisor and primary reader, for her boundless suggestions, ideas, encouragement, and support as I attempted to creatively apply a structured environmental policy analysis to a new problem. To Catherine Goodall, Amit Sheth, and ShaSha at Environmental Packaging International for introducing me to the subject of packaging, guiding me carefully through various analytical techniques, and sparking my interest in redesigning consumerism. To Dave Murray and Joe Orchardo for their assistance running the spectrometer analyses in the Environmental Chemistry Lab as well as their vast patience and willingness to answer my many questions. To Daniela Quilliam and Bill Dundulis at the Rhode Island Department of Health for their honesty in answering my pointed questions and insights into government regulations when funding is a challenge. To my sister, Elena, for her endless patience and support, and especially for her late-night company in the Science Library Friedman Study Center. To my father, Luther, for advising me to work on my thesis early in the year, advice I listened to carefully, agreed with, but never quite followed through. To my mother, Joanne, for never doubting my ability to achieve goals that are seemingly out of......

Words: 27198 - Pages: 109