Premium Essay

Nt1310 Unit 4 Lab Report

Submitted By
Words 2987
Pages 12
University of North Carolina at Charlotte
Department of Electrical and Computer Engineering

Laboratory Experimentation Report

Name: Langston Tucker Date: September 28, 2014

Course Number: ECGR 2155 Section: L05

Experiment Titles: Experiment Number: 2, 3, & 4
Lab 2: Basic Circuit Elements
Lab 3: DC Voltage and Current Sources
Lab 4: Series Circuit Characteristics

Lab Partners: James Henderson and Joshua Sayles

Equipment List:

Objective: Experiment 2
The purpose of this lab was to familiarize ourselves with basic circuit elements. Those being, resistors, capacitors, inductors. Furthermore using basic calculations we determined the dissipated power in our elements. Experiment 3
The purpose of this …show more content…
Source voltage = 18V
VR1+…+VR6 = 1.72 V + 2.10 V + 4.51 V + 3.19 V + 1.14 V + 5.34 V = 18V

Similarly to the VCD + VDE = VCE example, we can add partial circuits to find the voltage drop over part of a circuit. We would expect:

VAB + VBC = VAC = 3.82 V
VCB + VBA = VCA = -3.82 V
VDE + VEF + VFG = VDG = 9.67 V
VED + VDC + VCB + VBA = VEA = 11.52 V
VBC + VCD + VDE + VEF = VBF = 10.94
VCD + VDE + VEF + VFG = VCG = 14.18

By connecting the voltmeter across the following connections as seen at the figure on the right, we can measure the voltage drop at each resistor.

VAB=VR1= 2.750 V
VBC=VR2= 2.239 V
VCD=VR3= 5.884 V
VDE=VR4=4.105 V

Connecting one end of the multimeter to ground and the other to the nodes A, B, C, D, and E, we obtain voltages:

VA = 14.84 V
VB = 12.17 V
VC = 9.97 V
VD = 4.11 V
VE = 0

We expect to see zero at point E because it is the ground.

For each of the following figures the voltage has been determined by using the multimeter.

Grounded at point D Grounded at point C

VA = 10.77 V VA = 5.013 V
VB = 7.97 V VB = 2.341 V
VC = 5.91 V VC = 0 V
VD = 0 V VD = -5.924 V
VE = -4.22 V VE = -1.052 …show more content…
Ohm’s law was key to successfully completing this experiment because voltage, current, and resistance provide the foundation in which all electrical devices are built upon. Percent error should also be taken into account because various physical traits come into play that could disturb the nominal value of the resistances. For example, the more current forced through a resistor, the more the electrons vibrate, generating heat thus making it more difficult for additional electrons to pass through, increasing the resistance in the wire. This phenomenon was observed when we burned out our 470 Ω resistor. Experiment 3
In this experiment we observed the model of a constant voltage and current supply. With the help of our variable resistor, the linear relationship provided to us by Ohm’s law was generated. Experiment 4
In this experiment we observed the behavior of a series circuit with a load and resistors. Basic electronics principals came into play here like RT = R1+ R2 +R3+… and Ia = Ib = Ic = Id = Ie = If = Ig … Ohm’s law was also key in this experiment as it helped define the voltage divider which can only be used in series circuits and helps us determine voltages at specific locations.
List of Attachments:
POST-LAB QUESTIONS Experiment

Similar Documents

Premium Essay

Nt1310 Unit 4 Lab Report

...Biology REN Stage 1 DeArne Holmes SACE: 976199G Assessment task 4 Issues Investigation: Reproduction: Contraceptive Methods The Pill and Implanon (REFERENCES) Knowing how contraceptive methods work is essential to using them properly and increasing the reliability so pregnancy doesn’t occur. The pill is an orally taken pill which is a combination of the hormones estrogen and progesterone to prevent ovulation (2). You can not get pregnant if you don’t ovulate because there in no egg to be fertilized. The pill also works by thickening the mucus around the cervix, which makes it difficult for the sperm to enter the uterus (2). If you use the pill you need to take it everyday at a certain time to receive optimum reliability because it could leave you unprotected and possibly become...

Words: 680 - Pages: 3

Premium Essay

Nt1310 Unit 4 Lab Report

...Step 1: Select secret image S and target image T. If the size of the target image T is different from that of the secret image S, change the size of T to be identical to that of S Step 2: Convert target image into HSV image by using the equation (1) to form new target image T Step 3: For performing color conversion, first means and of S and T are find out and then find standard deviation quotient from equation (3.5) for each color channel Step 4: Limit mean value by eight bits and standard deviation quotient to seven bits Step 5: Based on this value, for each pixel p in each secret image S with color value c where c = r, g, or b, transform c into a new value by (3) Step 6: if is not smaller than 255 or if it is not larger than 0, then...

Words: 1254 - Pages: 6

Premium Essay

Nt1310 Unit 4 Lab Report

...3a) Refer to Appendix C of block diagram showing how AM DSB FC demodulation can be performed using a receiving USRP. 3b) Using GNURadio Companion and a transmitting USRP, AM DSB FC modulation can be performed on a message signal with frequency 1 kHz and amplitude of one unit. The following code in Fig. 6 has been used to perform such a modulation with a transmitting USRP. Fig. 6 GNURadio Companion code to perform AM DSB FC modulation on a cosinusoidal message signal using a transmitting USRP. The modulated signal from the transmitting USRP is then received by a second USRP, which demodulates the signal, to obtain a signal whose waveform is comparable to that of the original message signal. Fig. 7 shows the code used on a receiving USRP to...

Words: 758 - Pages: 4

Premium Essay

Nt1310 Unit 4 Lab Report

...• Where has it traveled, and where was it ultimately stored? 6. Why is it important to include a time/date stamp in the security incident response form? Stamping the time and date on the security incident form make it hard to manipulate or modify the file and therefore make it indisputable. It also improves accuracy of the occurrence of activities. It also holds those who come in contact with the evidence accountable. Lab Report File Define the phrase chain of custody. Chain of custody: Documentation that describes how evidence is collected, used, and handled during the duration of the case. Paraphrase what you found for your search of Chain of Custody for Digital Evidence. As I read the link below, I found that maintaining digital evidence is more than just securing the true copy. The perseverance of the hardware is just as important when it comes to maintaining the accuracy of the evidence on the hardware. The durability of the hardware that stores the evidence could become an issue if it alters the evidence over a period of time. It is very important that the longevity of hardware that stores evidence be checked and confirmed to ensure that the true copy...

Words: 461 - Pages: 2

Premium Essay

Nt1310 Unit 4 Lab Report

...Discussion: The method by which the mass of a single object was calculated in part 1, is similar in many ways to the method by which the elementary charge was calculated in part 2. Once the relevant data set was either collected or calculated it was first ordered from greatest to least. Next, the first differences between consecutively ordered masses/charges were determined. Thirdly, first differences that were significantly closer to zero than the rest were removed from the data set. Fourthly, first differences that were the multiples of other first differences were removed from the data set. Finally the remaining first differences were averaged in order to determine a mean value for the mass/elementary charge. In order for this method for determining elementary charges to be valid, several traits of elementary charges must be true. Firstly, to determine the elementary charge, it must be true that charge is quantized. This means that the values of charge are discrete, not continuous. If this were not the case, ten this method would not be able to determine the elementary charge because an elementary charge would not exist. Secondly, to determine the elementary charge using this method, the mass and charge of the elementary charge must be constant, and it must maintain this consistency regardless of the temperature, the material that the elementary charges are present in, or any other factor. Finally, all charges, and their composite elementary charges must behave...

Words: 923 - Pages: 4

Premium Essay

Nt1310 Unit 4 Lab Report

...Cesium iodide and Alkyl metals salt clusters (Na, K, Rb…. Acetates,), with wide m/e range are commonly used for calibration of mass spectrometers. Polymers as poly ethylene oxide or polypropylene oxide are other excellent calibrators. Dish washing compound lauryl sulfate ethoxylorte, is a good calibrator for the compound for negative ion ESI. Water cluster is another good reference standard, with closely spaced reference peaks the other reference compound used are cesium salt of mono butyl phthalate, perfluyorinated acids, aminomethylphosphonic acid etc. In general a compound is used as a reference, depending upon the calibration required in the lower or higher scale of spectrometer and a with the stable molecular ion with exact m/e value. Nominal Mass. Mass of C12 is taken as 12, is a nominal mass and is a whole number. 1/12 of carbon C12 is 1.nominal mass or µ (a.m.u). In the spectrum it is nominal mass of a sample which is recorded against their relative abundances. Nominal mass for CO2 is 44 and for CH3OH is 32. It is an integer, and is sum of integer masses of elements present in sample compound. Isotopic mass is the exact mass of an isotope of an element, and it is 12 for C12, it is only integer mass. For all other isotopic atoms mass is determined with reference to C12, 1/12 of carbon is µ, is equal to 1.66055x10-27 kg, is taken as standard mass since 1961. Isotopic mass is the mass of that particular atom of an element with reference to C12, 12.000000, For C13; it...

Words: 735 - Pages: 3

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10