Premium Essay

Glg Lab 6

In: Science

Submitted By bmcneil21
Words 603
Pages 3
Brittany McNeil
GLG 111
May 24, 2014

To: Mayor; Ms. Leona Graham

Hazard City Volcanic Assessment
No. 04-12-7221

Purpose: To evaluate the potential hazard and provide a report with analysis, conclusions, and recommendations to the city council.
Procedure: In this investigation I reviewed all the maps of the city, and all of the locations in-between Lava Mountain and the different types of hazards. As well as the damage that has done to each part of the city.
Data
* What is the danger to the areas between Lava Mountain and the city? - Location 1:Thick layers of ash have been deeply eroded and some of the ash layers are up to 10 feet thick and are thicker here than at any other location around Lava Mountain. Location 2: This stream channel is choked with ash and tephra fragments up to one foot in diameter. Location 3: The ash layers are all less than 2 feet thick. Also found in these deposits are large tephra fragments, up to six inches in diameter. Location 4: At this location there is a thin lava flow that is overlaid by alternating deposits of mud, ash, and stream sediments. The mud deposits are dense and have embedded boulders and tree branches. Location 5: This location contains a diversity of deposits, which include: ash, lava flow, mud, and stream sediments. Location 6: No danger to areas. Location 7: This location is steep and narrow, but the valley walls are covered with vegetation. Location 8: The only volcanic deposit was a thin ash layer. Location 9: This location has thick soils, bedrock, and one thin ash fall. * About which hazards do the various portions of Hazard City need to be concerned? –Hazard City needs to be concerned with Pyroclastic flows due to its high-density mixtures of hot, dry rock fragments and hot gases that erupted them at high speeds and destroys almost everything in its path. They should also be concerned with Lahars…...

Similar Documents

Premium Essay

Unit 6 Subnetting Lab 6

...Unit 6 Subnetting Lab 6 Answer the following questions listed. Using the Class B Subnetting Guide, answer the following: Given an IP address of 172.16.8.1 use the guide to get 30 hosts on each of your 2000 networks: 1. What Class is this IP address? B 2. How many bits would you borrow or take? 11 3. What subnet mask would you generate? 255.255.255.224 4. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.30 5. What is the last subnetwork range created? 172.16.255.225 to 172.16.255.254 Given an IP address of 172.16.4.1 use the guide to get 62 hosts on each of your 1000 networks: 6. What Class is this IP address? B 7. How many bits would you borrow or take? 10 8. What subnet mask would you generate? 255.255.255.192 9. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.62 10. What is the last subnetwork range created? 172.16.255.193 to 172.16.255.254 Given an IP address of 172.16.5.1 use the guide to get 100 hosts on each of your 500 networks: 11. What Class is this IP address? B 12. How many bits would you borrow or take? 9 13. What subnet mask would you generate? 255.255.255.128 14. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.126 15. What is the last subnetwork range created? 172.16.255.129 to 172.16.255.254...

Words: 274 - Pages: 2

Free Essay

Lab 6 Securing a Server

...|ITCS202 Week 6 Lab Worksheet | Student Name: John Smith General Instructions: This worksheet will assist you in completing your Labs for this week and is the MS Word document referred to in the lab instructions. After you complete this worksheet, please save it as lastname_lab6.doc and submit. You are required to complete all sections indicated by red brackets. You will replace the red brackets and text with the indicated material. For example, for the “Student Name” section above, a completed response would look like this: Student Name: John Smith When responding with text, please leave the text red so that your instructor will be able to find your responses easily. When pasting an image, please replace the red text with the image. Guidelines for the Week 6 Lab Securing a Server and Securing Infrastructure Services Total Points: 35 • Students will be using a login to the Microsoft virtual labs. Assignments (Using Labs 8 and 9 of the Microsoft virtual labs): 1. Perform Lab 8 Exercise 1 (3 points). [pic] [pic] 2. Perform Lab 8 Exercise 2 (3 points). >[pic] [pic] 3. Perform Lab 8 Exercise 3 (3 points). [pic] [pic] 4. Perform Lab 8 Exercise 4 (3 points). [pic] [pic] 5. Perform Lab 9 Exercise 1 (3 point). [pic] [pic] 6. Perform Lab 9 Exercise 2 (4 point). [pic] [pic] 7. ......

Words: 343 - Pages: 2

Premium Essay

Lab 6

...Chapter 6 Assessment Questions 1. In terms of business continuity, a hostage situation could be considered a disaster. True 2. _____ is choosing not to engage in an activity that carries some element of risk. Risk avoidance 3. _____ is carrying on despite the risks involved in a given activity. Risk acceptance 4. _____ is the process of assigning risk to someone else. Risk transference 5. _____ combines attempts to minimize the probability and impact of risk. Risk mitigation 6. The three main threat categories are information confidentiality, _____, and availability. Integrity 7. Even non-sensitive data should be kept under some level of access control. True 8. Any system or data resource that, if it were lost, stolen, damaged, altered, or publicly divulged, would cause a significant negative impact to the organization should be considered _____. Sensitive 9. Which of the following is an access control system in which rights are assigned by the owner of the resource? Discretionary access control 10. Which of the following is an access control system in which rights are assigned based on a user's role rather than his or her identity? Role-based access control 11. Which of the following is an access control system in which rights are assigned by a central authority? Mandatory access control 12. The principle of separation of responsibility requires a minimum of how many conditions to be met before...

Words: 282 - Pages: 2

Free Essay

Lab 6

...3. What are three modes of SELinux? Explain their basic functionality. Enforcing: SELinux policy is enforced/SELinux denies access based on policy rules Permissive: SELinux policy is not enforced/SELinux does not deny access, but denials are logged for actions that would have been denied if running in enforcing mode. Disabled: SELinux is disabled/Only DAC (Discretionary Access Control) rules are used. 4. Consider the following firewall rule, and describe what this permits or denies. Allow http (web) traffic through SSL using SSH & allow ICMP pings, while denying all other traffic. 5. What command would you use to allow all the traffic from the loopback? iptables -A INPUT -i lo -m ACCEPT iptables -A OUTPUT -o lo -m ACCEPT 6. What command would you use to view the network port configuration for the iptables? /etc/network/interfaces 7. If a service is to allow in one place and to deny in another, what is the outcome? Allow, because deny is the file pulled first and then the allow file, so the last one pulled is to allow. 8. Is the order of the rules important? If you deny something within the IP network layer, but permit something within the TCP transport layer that uses IP network layer that you just denied, will your TCP traffic be permitted? Yes. Because the "allow/permit" is in the next layer and pulled after the Network layer where you had the "deny", it will work as this is the last information pulled and enforced. 9. If one of the files does......

Words: 355 - Pages: 2

Premium Essay

Lab 6

...Assessment Worksheet 91 LaB #6 – aSSESSmENt WORKSHEEt Perform Business Continuity Implementation Planning Course Name and Number: Student Name: Instructor Name: lab due date: 6 Perform Business Continuity Implementation Planning Overview In this lab, you were asked to begin the business continuity planning process for an e-commerce company, Online Goodies. You reviewed the key business functions and a prioritized list of impacted IT systems, applications, and data provided by your supervisor. You also compared the components of the major documentation required by the business continuity planning process: risk analysis, business impact analysis, business continuity plan, disaster recovery plan, and the business continuity implementation plan. Lab Assessment Questions & Answers 1. What is the difference between a risk analysis (RA) and a business impact analysis (BIA)? Risk analysis is often identifying the potential threats and the associated vulnerabilities to the organizations .Risk analysis doesn’t view the organization from the mission critical Business Process point of view. BIA the organization from the impact that is going to occur for an organization if the critical business processes are interrupted or tampered 2. What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)? Disaster recovery plan is have a full access to recover any lost data or essentials after a disaster while the business......

Words: 681 - Pages: 3

Premium Essay

Lab 6

...1. Why are spindle fibers important for mitosis? (5 points) Chromosomes use spindle fibers as pathways to daughter cells during mitosis. 2. State the four bases that make up DNA. (4 points) a. Adenine b. Guanine c. Thymine d. Cytosine 3. What are the two base pairs? (2 points) a. T & C b. A & G 4. Answer the following questions: a. Define the term crossing over. (3 points) During meiosis’ prophase the homologous chromatids exchange segments. b. Explain why crossing over is important in meiosis. (3 points) Parents cell use it to pass genes off to their children cells. 5. What are the two main differences between mitosis and meiosis? (4 points) a. The amount of cell divisions b. The genes that are exchanged between chromosomes 6. Answer the following questions: a. Explain the difference between mitosis and cytokinesis. (3 points) Cytokinesis is running one cell into two cells. Mitosis is a nuclear division that causes the separation of chromosomes. b. When does mitosis occur during the cell cycle? (1 point) During the prophase, metaphase, anaphase, and telophase. c. When does cytokinesis occur during the cell cycle? (1 point) The telophase 7. Explain the differences that occur during cytokinesis of plant and animal cells. (5 points) The animal cell membrane is drawn inward until the cytoplasm is divided into two equal parts. In plant cells, cytoplasm is divided by the formation of a cell plate that extends until the two daughter cells become......

Words: 821 - Pages: 4

Free Essay

Lab 6

...Category | Points | Description | Section 1Configuring OSPF Single Area: 40 Points * Task 1: Step 5 * Related Explanation or Response * Task 1: Step 6 * Related Explanation or Response * Task 1: Step 10 * Related Explanation or Response * Task 2: Step 4 * Related Explanation or Response * Summary Paragraph | 2323232320 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about IP subnetting and configuration. | Total | 40 | | ------------------------------------------------- Name: Barry Bird Date:4/17/14 Professor: Mohammad Kasraian ------------------------------------------------- Configuring OSPF Single Area vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and (just as important) how you feel it will benefit you in your academic and professional career. (10 points) In this Ilab we learned how to Configuring OSPF setting in a router simulated environment. We learned the commands that must be used to properly install these settings. We learned how to create a designated router and a backup......

Words: 506 - Pages: 3

Premium Essay

Lab# 6

...Lab #6 – Assessment Worksheet Identifying and Removing Malware on a Windows System Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans, malware, or other malicious software found on a compromised Windows machine. You completed a scan of the entire computer, learned how to exclude folders to avoid false positives, and understood the importance of maintaining the signatures database. You discovered the difference between a full computer scan and a Resident Shield scan. Finally, you also permanently removed the malware identified by the antivirus software and scheduled the scan to run automatically. Lab Assessment Questions & Answers 1. Why is it recommended to update the antivirus software’s signature database before performing an antivirus scan on your computer? updating the antivirus software with the latest virus definitions ensures the software has the latest information to identify and quarantine threats. 2. What are typical indicators that your computer system is compromised? slow response opening, operating system not booting up correctly or no functioning normally, event logs reporting numerous unusual......

Words: 291 - Pages: 2

Premium Essay

Lab 6

...Lab Assessment Questions & Answers 1. What is the difference between roles and features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in. 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup. 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup that you created earlier with Windows Server Backup. 8. What are the options to......

Words: 304 - Pages: 2

Free Essay

Glg 220 Week 3 Groundwater Lab Report

...This document of GLG 220 Week 3 Discussion Questions shows the Solutions to the following problems: DQ 1: Answer in 200-300 word count. Choose one question below and title your answer with Reply. 1. Describe the hydrologic cycle. How does this cycle affect the earth? 2. What is the potential danger due to mass wasting in your state or region? What is the effort spent to minimize the impact of mass wasting? 3. What is the impact of soil erosion on farmland? What are the tools that could be utilized to minimize the loss of farmland to soil erosion? DQ 2: Answer in 200-300 word count. Choose one question below and title your answer with Reply. 256 1. Based on your reading, do you believe that we are in a period of glacial or interglacial stage? Why or why not? What are the current factors that might cause the acceleration of one stage over the other? 2. One philosophy about pollution of water is that water can always be cleaned (e.g. by the use of distillation). Is this a viable solution? Why or why not? 3. What are the different sources of water in the United States? Which source of water is mostly used in your region? How could we protect the sources of our water from drying up and contamination? General Questions - General General Questions Resource: Ch. 9 of Geoscience Laboratory Complete University of Phoenix Material: Week Two Earthquakes Lab Report and University of Phoenix Material: Week Two Lab Report Worksheet by answering the following questions in......

Words: 407 - Pages: 2

Free Essay

Lab 6

...University of West Florida Electrical and Computer Engineering Digital Logic and Computer Systems EEL 3701L Lab 6: BCD to Seven Segment Display Decoder Due: November 3, 2014 Meghan Szatkowski, Brandon Burrows, Michael Long Abstract: For this lab we were to create a circuit that displays decimal numbers from binary numbers since most humans are not capable of reading binary. Using a 7-segment display we are able to achieve that by converting the BCD value into a 7 bit output. The 7-segment display has 7 LEDs and a certain amount of voltage triggers each of the 7 segments to produce a decimal number. Procedure 1. Create a truth table for your 4 bit input and the corresponding output necessary to light the proper segments of the display. For example, if the input is represented by WXYZ and the output is identified as ABCDEFG then if the input is 0000, all outer LEDs should be lit while the middle LED should be off. Once you create the rows in a truth table for the other 9 combinations, find the function for each segment. 2. Depending on whether you are dealing with more 0s or 1s, choose NAND or AND gates to implement each segment function. 3. Wire the input DIP switches to the decoder input. Note that you have 2 3x8 decoders. You will need to use the inputs and enable lines to combine them in order to implement these 7 functions. 4. Wire the NAND or AND gates to the proper outputs of the decoders in order to implement the functions for each......

Words: 1151 - Pages: 5

Premium Essay

Lab 6

...Unit 6 Lab 6.1: Pseudocode Learning Objectives and Outcomes Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.1: Pseudocode from the lab manual. Deliverables Submit the following at the end of this lab activity: The completed inputOptions() module in pseudocode in Step 1 The completed displayProvider() module with a case structure in pseudocode in Step 2 The completed and workable algorithm with nested If-Else statements using logical operators in Step 3 Unit 6 Lab 6.2: Flowcharts Learning Objectives and Outcomes Use flowcharts and pseudocode to represent Boolean conditions. Use if-then, if-then-else, and case structures in a computer program. Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.2: Flowcharts from the lab manual. Deliverables Submit the following at the end of this lab activity: Corrected variable declarations and initializations using Visio in Step 2 Corrected module calls using Visio in Step 3 Corrected inputOptions() module using Visio in Step 4 Corrected displayProvider() module with case labels and flow lines using Visio in Step 5 Corrected displayChoices() module with......

Words: 355 - Pages: 2

Free Essay

70-687 Lab 6

...Lab 6 Controlling Access to local hardware and applications ------------------------------------------------- This lab contains the following exercises and activities: Exercise 6.1 | Installing Remote Server Administration Tools | Exercise 6.2 | Configuring Removable Storage Access Policies | Exercise 6.3 | Using AppLocker | Lab ChallengeLab Challenge | Creating an AppLocker Rule Based on File Hash Using Assigned Access | BEFORE YOU BEGIN The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called adatum.com. The computers required for this lab are listed in Table 6-1. Table 6-1 Computers Required for Lab 6 Computer | Operating System | Computer Name | Server | Windows Server 2012 R2 | SERVERA | Client | Windows 8.1 Enterprise | CLIENTB | In addition to the computers, you will also need the software listed in Table 6-2 to complete Lab 6. Table 6-2 Software Required for Lab 6 Software | Location | Remote Server Administration Tools for Windows 8.1 (Windows8.1-KB2693643-x64.msu) | \\SERVERA\Downloads | Lab 6 student worksheet | Lab06_worksheet.docx (provided by instructor) | Working with Lab Worksheets Each lab in this manual requires that you answer questions, shoot screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab06_worksheet.docx. You will find these......

Words: 2361 - Pages: 10

Premium Essay

Week 6 Lab

...NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues A good troubleshooter should be capable of discerning whether the problem is software or hardware related and repair all of these problems. In this lab, you will demonstrate your ability to use the six-step troubleshooting model to fix a networking issue and outline the steps toward a solution. Required Setup and Resources: A computer with access to the Internet Before starting work on Task 1, perform the following steps: 1. Open Internet Explorer. Click the Tools menu and select Internet Options. 2. Click the Connections tab. 3. Click the LAN Settings button. 4. In the Proxy Server section, select Use a proxy server for your LAN. Then, click the Advanced button. 5. In the Proxy Settings window, enter 192.168.100.1 for the HTTP proxy address and port 80 for the port. Note: Remember to reset the proxy settings to their original values when Task 1 is finished. Recommended Procedures Task 1: Network Troubleshooting When you boot your computer and open Internet Explorer, this is what you see: 1 NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues Apply the six-step troubleshooting model to the problem. Document everything associated with each step of the troubleshooting model. 1. Ascertain what the problem is. 2. Write down probable causes of the problem. 3. Determine if theories are correct...

Words: 513 - Pages: 3

Premium Essay

Networking Labs for Unit 6

...Brandon Hellbach Unit 6 Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the......

Words: 574 - Pages: 3

Filtre Pour Ordinateur | Say My Name | Mindhunter