Premium Essay

Chapter 4 Lab

In: Science

Submitted By banjo234
Words 305
Pages 2
383 bp
383 bp
1058 bp
1058 bp
929 bp
929 bp
1857 bp
1857 bp
(-)
(-)
18
18
19
19
17
17
16
16
15
15
14
14
13
13
12
12
Student:
Student: During our experiment we found the following ^

The term allele is used to describe different forms of a gene or genetic site. For those who have the Alu repeat, they are said to be positive for the insertion and we denote that allele configuration with a “+” sign. If the Alu repeat is absent we give it a “-“ sign. If the student has a single band, whether it’s a single 715 bp band or a single 415 bp band, then both their number 16 chromosomes must be the same in regards to the Alu insertion. If that happens then they’re said to be homozygous and can be identified with the symbols “+/+” or “-/-“. If a student has a 415 bp band and a 715 bp band they are said to be heterozygous and the symbol “+/-“ is assigned. A student’s combination on alleles is called their genotype. As you can see in the picture above, all of the students in my group were homozygous “-/-“ at the 383 bp band.

Sources of Error: After the class contained their cheek cells into the tubes that were provided all of the tubes got mixed up so therefore most of the class didn’t get their cheek cells/DNA back. That could have caused a huge error in the results because we don’t know whose cheek cells we were using and maybe if we had our original samples the data would be much different.

Improvements: To improve this experiment there should be better labeling of the tubes so that nothing will be mixed up and we can get accurate data.

References: Campbell Biology Test book…...

Similar Documents

Free Essay

Chapter 4 Lab Intro to Networking

...Lab Chapter 4 4.1.1 Exercise: Standards are important for NIC, Connectors and Media, because of the Stability, Consistency, and Minimization of packet errors. 4.1.2 Exercise: Why is it so low when the capacity for transmission electricity on the copper wire is so high? Because, due to truncation on the transmission of voltage with an electric current. 4,1,3 Exercise: It’s used in the Healthcare facilities, because it’s more fire resistance. 4.1.4 Exercise: Category | Maximum Speed | Application | 1 | 10 Mbps | Telephone Cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 10 Mbps | Ethernet | 4 | 20 Mbps | Token Ring | 5 | 100 Mbps | Fast Ethernet | 5e | 1 Gbps | Gigabit Ethernet | 6 | 2500 Mbps | Gigabit Ethernet | 6a | 10,000 Mbps | Gigabit Ethernet | 4.1.5 Exercise: 4.1.6 Exercise: * , The central layer comprises of a conducting material. This layer transmits the baseband video signal. * The dielectric layer surrounds the centre copper core. The function of the dielectric is to separate the inner conductor from the shield and provide physical support. * The next layer is the metallic shield, generally composed of braided copper. It has two main purposes: to protect the conductor from noise or other unwanted signals, referred to as ingress, and to retain the transmitted signal in the conductor. * The last layer is the outside insulation which encloses all the inner layers. This is called a jacket and is usually made from......

Words: 358 - Pages: 2

Premium Essay

Chapter 4

...John Williams January 16,2014 Chapter 4 problems 2,3,4,5,15,18,and 26 2. Property is transferred to the corporation only in exchange for stock in the transferee corporation. Immediately after the exchange, the transferor-shareholders in aggregate control the transferee corporation by owning at least 80% of its stock And If a transferor receives money or property (other than stock in the transferee corporation), the transferor recognizes a gain (but no loss) equal to the lesser of the boot received or the realized gain. In addition, a corporation that transfers appreciated property (other than its own stock or debt obligations) to the transferor-shareholders also recognizes a gain on the exchange. 3. provide tax relief when a person transfers property to a corporation in exchange for stock in that corporation and has no proceeds from the sale of the existing property with which to pay the tax on any realized gain. 4. taxpayers participating in a like-kind exchange receive cash or other property in addition to the like-kind property. This non-like-kind property is referred to as a “boot, when that occurs, the taxpayer has not received solely like-kind property. Fortunately, a “ceiling rule” in section 1031 takes care of this problem by providing that gain or loss is recognized, but only to the extent of the amount of boot received. 5. No gain willl be recognized if property is transferred to a corporation by one or more persons solely in exchange for stock in such......

Words: 549 - Pages: 3

Premium Essay

Lab 4

...1. The five steps to a hacking attack is reconnaissance, scanning, gaining access, maintaining access and covering tracks. 2. During the reconnaissance step Zenmap GUI performs the task of fingerprinting and port scanning. It sends commands to the platform-specific nmap executable and pipes the output back. The process monitors and captures network traffic. The traffic is analyzed to determine which operating system is used. 3. Zenmap GUI is used during the scanning process. 4. Vulnerabilities and exploits are identified in the enumeration step of the hacking process. 5. The software vulnerability that was found was ms-08-067 and this vulnerability makes the remote host vulnerable to a buffer overrun in the Server service that may allow an attacker to execute arbitrary code on the remote host with the System privileges 6. The tools used to exploit the identified know software vulnerabilities on the targeted Windows XP professional workstation were the Microsoft Server Service Relative Path Stack Corruption and Metasploit. 7. When you are a member of a security penetration testing team. You should obtain written permission from an owner prior to compromising and exploiting the know vulnerabilities. 8. Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It is capable of intercepting traffic on a network segment, capturing passwords...

Words: 281 - Pages: 2

Free Essay

Lab 4

...Willie Harris ------------------------------------------------- is3230 lab 4.2 Implement Organizational-Wide Network and WLAN Access Controls 1. Each time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to othersEach time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to others. 2. 2. By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. First if you’re sitting in a coffee shop and decide you want to check your Facebook page and your email to kill some time. You scan the available networks and see one that’s open and unsecured. You connect and start surfing. Coffee and free WiFi, what could be better, right? Wrong! A hacker is also fond of coffee shops and he is located within range of the router you connected to. He’s waiting for one or more people to connect to the network so he can start......

Words: 628 - Pages: 3

Premium Essay

Chapter 4

...features designed to support various car2go operational systems, like an onboard immobilizer and telematics unit. Many of the cars in the Hamburg program will be fitted with gasoline engines, as opposed to diesel, using start-stop technology better suited to urban driving. With many of these programs still in the infancy stages, it is difficult to tell how profitable they are and whether they can operate sustainably in the long run. But at least one thing is for certain: as new consumer patterns emerge, companies like BMW and Daimler will have to respond to keep up. By creating programs like BMW on Demand and car2go, these companies are paying attention to who these new consumers are and what they’re looking for. CASE ASSIGNMENT CHAPTER 4: Daimler/BMW: A New Breed of Driver Open-ended questions 1. Discuss environmental factors related to population that are changing the way certain people approach car buying and are thus creating new market segments. - Consumers expect businesses to address environmental influence on how products and services are delivered, and to work with the natural environment instead of slowly destroying it. 2. Describe the values held by this emerging group of drivers that incline them toward car sharing programs. -The drivers who use the car sharing are attracted to the program because of it is affordable. It is also convenient for low-income households as it enables us they money they would usually use for a car payment toward...

Words: 870 - Pages: 4

Premium Essay

Chapter 1 Lab

...Chapter 1 First Look at Computer Parts and Tools Lab 1.1 Record Your Work and Make Deliverables Review Questions 1. What are the eight categories in the Category view in Control Panel? Answer: System and Security Network and Internet Hardware and Sound Programs User Accounts and Family Safety Appearance and Personalization Clock, Language and Region Ease of Access 2. What are the four file types that can be used to save a snip using the Windows Snipping Tool? Answer: Portable Network Graphic file (PNG) (*.PNG) GIF file (*.GIF) JPEG file (*.JPG) Single file HTML (MHT) (*.MHT) 3. The Windows Experience Index rates a computer’s performance on a scale of 1.0 to 7.9. Based on the rating of your computer, what can you conclude about its performance? Answer: The Windows Experience Index rates certain components giving them a sub score. The component with the lowest score is the Windows Score Index Score. In this case the lowest score was for the graphics components, which means that it has a basic graphics chip, instead of high end graphics chip. 4. Search the web for information about the price of Windows 7. How much would it cost to buy your current edition of the Windows 7 operating system as an upgrade from Windows Vista? Answer: About $76.00 for an upgrade Lab 1.2 Gather And Record System Information Review Questions 1. List two categories available in Control Panel that were...

Words: 862 - Pages: 4

Premium Essay

Lab 4

...Sandra Guzman 01/22/2015 Lab 4 Deliverables Note: Screenshots will be provided at the end. Q: From your local computer, use your favorite Internet browser to research the threat identified on this screen and the possible remediation steps and document your findings in your Lab Report file. Viruses found: 1. Win32/DH{eR4UTxVzG3U} 2. Win32/DH{eR4UTxVzG3U} 3. Win32/DH{HhMXFE8Vcxt1} 4. Trojan horse Dropper.Generic4.BVMA 5. Trojan horse Hider.BNG 6. Trojan horse PSW.Generic11.NYJ 7. Potentially harmful program Logger.IAC 8. Potentially harmful program RemoteAdmin.IH 9. Potentially harmful program Tool.IT Assessment: 1. It seems that the first three are all the same type of virus. A “Win/DH is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs”( Win/DH). They “can steal hard disk space and memory that slows down or completely halts your PC, corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users” (Win/DH). To avoid the possibility of one, you should be careful of e-mail attachments especially if they are from an outside source, as well as download links on websites. Having a virus removing application such as AVG is essential to being able to remove these viruses before they spread. AVG is capable of detecting this virus while surfing the web and...

Words: 1494 - Pages: 6

Free Essay

Chapter 1 Lab

...Chapter 1 Lab 1.1.1 10^3 10^2 10^1 10^0 1000*2=2000 100*9=900 10*3=30 1*1=1 =2931 1.1.2 2^2=4 2^1=2 2^0=0 1 2 0 1.1.3 2^1=2 2^0=1 1 1 1.1.4 2^4=16 2^3=8 2^2=4 2^1=2 2^0=1 1 0 0 1 0 1.1.5 2^7=128 2^6=64 2^5=32 2^4=16 2^3=8 2^2=4 2^1=2 2^0=1 1 1 1 0 0 1 0 1.1.6 156-128=28 28-16=12 12-8=4 4-4=0 128 64 32 16 8 4 2 1 1 0 0 1 1 1 0 0 = 1001110=156 1.1.7 255-128=127 127-64=63 63-32=31 31-16=15 15-8=7 7-4=3 3-2=1 1-1=0 128 64 32 16 8 4 2 1 1 1 1 1 1 1 1 1 =11111111=255 1.1.8 200-128=72 72-64=8 8-8=0 128 64 32 16 8 4 2 1 1 1 0 0 1 0 0 0 =11001000=200 1.2.1 111 1.2.2 1011 1.2.3 1111 1.2.4 111 1.2.5 100 1.2.6 0110 1.2.7 1110 1.2.8 1100 1.2.9 1111 1.3.1 -6400 -233 1.3.2 -6633 -There is an increase of bits. From 8 to 16, which increase the decimal number. 1.3.3 1024KB*120=122880 122880KB*1024=125829120B 1.3.4 -16*1024MB=16384MB -16384MB*1024KB=16777216KB -16777216KB*1024B=1.71798918E10 -1.7179891E10/32=536870912 words 1.3.5 -0011 0110 -0011 represents 3 -0110 represents 6 -36 1.3.6 - Change it to binary first. - F is 1111 - 6 is 0110 - 11110110 in binary...

Words: 334 - Pages: 2

Free Essay

Lab 4

...NT1210 Lab 4.1 : Copper Cabling Exercise 4.1.1 Stability, consistency, and minimization of packet errors. Exercise 4.1.2 The power requirements to send data is much lower than the requirements to transfer electricity. Exercise 4.1.3 Protection from power frequency, radio frequency interference, reducing errors generated. Exercise 4.1.4 CategoryMaximum SpeedApplication 11MbpsVOICE ONLY( TELEPHONE WIRES) 24MbpsLOCAL TALK & TELEPHONE 316Mbps10 BASE T ETHERNET 420MbpsTOKEN RING 5100/1000100 BASE T ETHERNET/GIGABIT ETHERNET 5E1Gbps/1000mbpsGIGABIT ETHERNET 610GbpsGIGABIT ETHERNET/IP TELPHONY 6E10GbpsGAGBIT ETHERNET/HIG END WORK STATION Exercise 4.1.5 Exercise 4.1.6 Coaxial cable conducts electrical signal using an inner conductor (usually a solid copper, stranded copper or copper plated steel wire) surrounded by an insulating layer and all enclosed by a shield, typically one to four layers of woven metallic braid and metallic tape. The cable is protected by an outer insulating jacket. Normally, the shield is kept at ground potential and a voltage is applied to the center conductor to carry electrical signals. Exercise 4.1.7 The distance limit is 100m for UTP cabling.  It is very important that you know exactly how to wire UTP cables. Cabling is the base of a solid network, and doing it correctly the first time will help you avoid hours of frustration and troubleshooting. On the other hand, if you are dealing with a poorly cabled network,......

Words: 611 - Pages: 3

Free Essay

Lab 4

...Leando Henderson Jr NT1210 Lab Exercise 4.1.1 On page 107 the book explains that standards exist for the NIC and the cabling so that all networks and equipment would match up if not then you might buy a computer and it not fit your cabling on your network or vice versa. These standards exist so that all equipment would match up and networks could be simplified. Exercise 4.1.3 Shielded copper cable is currently best known for POE equipment. Security systems, Microphones, and other high end audio cables would be my best examples for a clear visual. This super expensive cabling is used for these types of applications because the shielding help to prevent the Electro Magnetic Interference to be more specific on a security system this shielding and braiding eliminates the false alarms that would occur if not for the shielding. Exercise 4.1.10 Multimeter : The purpose of a multimeter is to measure how much voltage or electrical signal that is currently being transmitted thru a cable or medium. A basic tool for any electrician or IT personnel Tone Generator: This equipment generates audio pulses to components. In the case of audio equipment testing, frequency response and sound evaluation are recorded. Pair Scanner: A Pair Scanner is used to find faults on cabling in a network. Time domain reflector (TDR): Used to locate faults in metallic cables (for example, twisted pair wire or coaxial cable). It can also be used to locate discontinuities in a connector,......

Words: 320 - Pages: 2

Free Essay

Chapter 4

...Chapter 4 Types of Change First order: incremental change, maintain and develop the organization, they are changes designed to support organizational comunity and order. Fine-tuning, incremental Adaptive, incremental but recreative: * Individual initiatives: small-scale changes, personal initiatives, identifying and emplementing small-scale changes. Individual ability to create or exploit a tech. 1. Autocratic 2. Meritocratic 3. Social club Second order: discontinuos change “is transformational. Alters org core, not developing but transforming: * Downsizing, restructuring and reengineering are regarded as transformational. Ocurring recommendations for major change with hypercompetitive bussines eviroments: 1. Delayering; vertical levels 2. Networks/alliance; internal and external collaboration 3. Outsourcing; no distinctive competence 4. Dissaggregation, smaller bussines units 5. Empowerment; to provide employees with authority, resources and encouragement to take actions 6. Flexible work groups 7. Short-term staffing; short period, specific issues/tasks 8. Reduction of internal and external boundaries; to encourage communication and resource sharing Reorientation, Re-creation. Transformational Types: * Type 1, org moves from an entrepreneurial to a professional management structure; Apple Computers from an entrepreneurial company, larger professional. * Type 2, revitalization of already-established......

Words: 617 - Pages: 3

Premium Essay

Chapter 4

...Chapter Four Business Ethics and Social Responsibility: Doing Well by Doing Good Review Questions How do relative ethics compare to universal ethical standards? Should ethics ever be relative? Provide a rationale for your response. Relative ethics apply to you and your family. Universal ethics apply to everyone depending on the situations that they encounter. Ethics should be relative because everyone should be held accountable to know the difference between right and wrong. What is an ethical dilemma? Give 3 examples of ethical dilemmas that workers or managers might face in a business setting. An ethical dilemma is when you are in put in a situation with negative consequences forcing you to choose between two or more bad options. 1) Your boss tells you to write a check for him to cover the cost of entertaining a company client the previous night. He turns in the necessary receipts, but you over hear him talking to his girlfriend thanking him for the dinner the previous night. 2) You are in real estate, and you have a potential seller who says to help them sell their deceased parents house and they don’t know how much it is worth, but they will be happy with $100,000. You look at the house and realize this house is easily worth $200,000 and would be a perfect house for your sister. 3) You are a teacher, you have a student who is a full time student and is also working full time to pay for college. His job is interfering with his school performance......

Words: 944 - Pages: 4

Premium Essay

Chapter 4

...posted under Course Information. REQUIRED TEXT Phillip V. Lewis, Ethics in the World of Business, Kendall-Hunt Publishing Co., 2014 (ISBN: 978-1-4652-3979-2). COURSE DESCRIPTION This course examines the basic ethical issues involved in the conduct of business from a biblical perspective. Critical thinking of organizations as a spiritual, social, moral, and ethical activity is explored, as well as the decision process. The way these decisions are communicated to others is also studied. LEARNING OUTCOMES/OBJECTIVES 1. Compare the roles of ethics, values, and morals in the world of business. 2. Identify the roles and effects of social issues in the workplace. 3. Create a global framework for ethical decision-making. 4. Construct the reasons why character counts. 5. Translate (communicate) ethics to the organizational culture. DEFINITION OF “A WEEK” (OR “A UNIT”) A week (or a unit) starts and ends at approximately midnight Sunday night during each of the seven weeks. COURSE REQUIREMENTS Quizzes A quiz is scheduled each week, and will cover information assigned in the current week. The quizzes are located under Quizzes on Bb. The weekly quizzes will be “alive” for a week’s duration (Sunday midnight to Sunday midnight) and may be taken as many times as you wish during that week. Case Analyses For Units 1-7, case study analyses will be assigned. Each person will analyze the assigned case study. All cases must follow the “Rubric for......

Words: 2380 - Pages: 10

Premium Essay

Lab 4

...Lab 4 Daniel Torres NT1410 Mr. Kay 1/28/2016 Virtual Lab Tour The first difference I did take notice was the entirely different look that it brought up. With Windows 10, we have the start menu, which in my case, is a reason I love Windows and its OS. Ubuntu doesn’t have one, but it is still manageable. The office applications it comes with is pre-installed and works just as fine as it would with Windows. Spreadsheets to Word, it is all in there with no hassle. The office suite that really makes the difference in both configurations is the look and feel. With icons being changed and a different feel about it. The windows landscape of it changing the closing current window bugs me because it is on the left rather than the normal right I am used to. Although Ubuntu office software is limited and only most used applications for that suite would be used on everyday uses, it doesn’t compare to that of Windows 10. The dash home environment from Ubuntu brings up limited content that you would use immediately, but not the essentials in Windows 10. I would like to implement the Start Menu to Ubuntu as many users in the Windows 8 community did not like the fact that Microsoft took the number one feature out. The installation of Ubuntu differed on the fact that it took quite some time to install and the student next to me had a problem himself though. It sent him into terminal rather than the GUI interface of the desktop. I had no issues on my part, other than......

Words: 278 - Pages: 2

Premium Essay

Lab 4

...Lab 1 – Introduction to Science Exercise 1: The Scientific Method Dissolved oxygen is oxygen that is trapped in a fluid, such as water. Since many living organisms require oxygen to survive, it is a necessary component of water systems such as streams, lakes, and rivers in order to support aquatic life. The dissolved oxygen is measured in units of parts per million (ppm). Examine the data in Table 4 showing the amount of dissolved oxygen present and the number of fish observed in the body of water the sample was taken from and then answer the questions below. QUESTIONS 1. Make an observation – Based on the data in Table 4, describe the relationship between dissolved oxygen content and fish populations in the body of water. Discuss the pattern observed in the data set. Answer = as the Dissolved Oxygen goes up the greater the survival rate is for the fishes. The pattern for the Dissolved Oxygen goes up by two’s and the number of fish has a unique pattern when matched with the dissolved oxygen. Pattern (2, 4 ppm)…..the fishes decrease by one. (6, 8 ppm)……the fishes increase by 4 (10, 12 ppm)…the fishes increase by 3 (14, 16 ppm)….the fishes decreases by 4 18 ppm…..the fishes decreases by 5 2. Do background research – Utilizing at least one scholarly source, describe how variations in dissolved oxygen content in a body of water can affect fish populations. Answer = According to research the dissolved...

Words: 888 - Pages: 4