Free Essay

Phys 310 Lab 2

In: Science

Submitted By d03077651
Words 621
Pages 3
DATA SHEET

Name: Robert Bass Date: 01/28/2015

15 questions, 2 points each, 30 points total

1. What is the precision of the vernier caliper?

1 / 20mm = 0.05mm

2. Record your measurements of the outer diameter of the washers in the table below.

| diameter (d outer) | radius (r outer) | measurement #1 | 18.4mm | 9.2mm | measurement #2 | 18.3mm | 9.2mm | measurement #3 | 18.2mm | 9.1mm | measurement #4 | 18.2mm | 9.1mm | measurement #5 | 18.3mm | 9.2mm | average | 18.3mm | 9.16mm |

3. Record your measurements of the inner diameter of the washers in the table below.

| diameter (d inner) | radius (r inner) | measurement #1 | 7.8mm | 3.9mm | measurement #2 | 7.9mm | 3.9mm | measurement #3 | 8.0mm | 4.0mm | measurement #4 | 8.1mm | 4.1mm | measurement #5 | 7.9mm | 3.9mm | average | 7.94mm | 3.96mm |

4. Record your measurements of the thickness of the washers in the table below.

| thickness (t) | measurement #1 | 1.6mm | measurement #2 | 1.6mm | measurement #3 | 1.7mm | measurement #4 | 1.7mm | measurement #5 | 1.7mm | average | 1.66mm |

5. What coin did you choose for the next part of the experiment?

U.S Quarter

6. Record your measurements of the diameter of the coin in the table below.

| diameter (d) | radius (r) | measurement #1 | 24mm | 12mm | measurement #2 | 23.9mm | 12mm | measurement #3 | 23.8mm | 11.9mm | measurement #4 | 23.8mm | 11.9mm | measurement #5 | 24.1mm | 12mm | average | 23.92mm | 11.96mm |

7. Record your measurements of the thickness of the coin in the table below.

| thickness(t) | measurement #1 | 1.5mm | measurement #2 | 1.6mm | measurement #3 | 1.5mm | measurement #4 | 1.5mm | measurement #5 | 1..5mm | average | 1.52mm |

8. Why is it a good idea to average your measurements?

It is good to get a multiple samples to get the most accurate readings as possible.
If you take just one sample your results may not be accurate enough to present.

9. What is the relative precision of your diameter measurements?

.3mm

10. What is the relative precision of your thickness measurements?

.3mm

11. Use the averages of your measurements and the coin masses listed in the table in the introduction and calculate the volume and density for the washers and your coin. Record your results in the table below. Be sure to use the appropriate number of significant digits and units (cm3 and g/cm3).

| Washer | Coin | Volume | 27.11822779cm^3 | 57.1164117cm^3 | Density | .0995640283g/cm^3 | 0.0992709421 g/c |

12. How does the density you found for the washers compare with the density of iron? Calculate a percent difference. Is your result reasonable? Explain.

13. How does the density you measured for the coin compare with the density you found in your research? Calculate a percent difference. Is your result reasonable? Explain.

14. How many quarters would be required to make a stack as tall as your height? What would the total mass of such a stack be?

1337 ,7580 g

15. Could you use your caliper to measure the thickness of a sheet of paper? To what precision? To what relative precision? Devise a scheme to measure the average thickness of the pages of a book more precisely than using the caliper on a single sheet. Describe and implement your scheme.

* If a caliper can measure to an accuracy of .01mm then you can multiply the thickness of a single sheet of paper by the number of pages. Then measure the thickness of the covers and add that to your result.

- 0.06mm Single piece of paper
- 0.35mm Front Cover
- 0.42mm Back Cover

Math: 0.06*70(sheets) + 0.35(Front Cover) + 0.42(Back Cover) = 4.97mm…...

Similar Documents

Premium Essay

Lab 2

...“Next”. * Click on the dropdown menu and select “FTP Server”. Click “Next”. * Check the box next to “External” and click “Next”. * Click the “Finish” button, and then click “Apply”. * Click the “Create a New Server Publishing Rules” and call it “Telnet”. Click the “Next” button. * Enter the IP address of Windows 2003 and click “Next”. * Click on the dropdown menu and select “Telnet Server”. Click “Next”. * Check the box next to “External” and click “Next”. * Click the “Finish” button, and then click “Apply”. * On the BackTrack 5r3 External machine, open a terminal and type the command nmap 216.1.seat.1 to nmap the Firewall. Five ports should be open. 2. Edit the local.rules file on snort creating a custom rule for yourname that has the message yournamepractice login. Start the sniffer on eth0 (tcpdump -i eth0 –s 0 –nntttt –w capture1.cap.) Log on to the Windows 2003 virtual machine. Create an account called yournamepractice with the password of P@ssw0rd. Add yourself to the administrators group. From the Windows 7 machine, telnet and ftp to the firewall IP Address. Log in as yournamepractice. Stop the capture and run it through snort. Take a screenshot of the yournamepractice alert. * Open a terminal on the Sniffer and type the command kwrite /etc/snort/rules/local.rules to edit the local.rules file. * Copy/past the last rule in the file onto a new line. ......

Words: 2739 - Pages: 11

Free Essay

Lab 2

...1. What is the principle of least privilege? The priniclple of least privilege make it possible for user to have the least amount of privilege so that not everybody has full access to the files. 2. Why would you add permissions to a group instead of the individual? It is easier and more efficient to add a group to permission instead of having to add each user. If the user is already in the group, then the user would automatically get access to the shared files. 3. Why would you allow shared access to groups instead of to everyone? Because there are different groups in a business. HR is a different group than SF. Also you do not want employees having access to the manager group folders and files 4. List at least three different types of access control permissions you can enable for a file. Read, Delete, Modify 5. Which access control permissions allow you to delete files and/or folders? Delete Child (DC) 6. What is the lowest level permission needed to view a folder’s contents? Read Data (RD) 7. If you don’t remember the syntax when using icacls.exe, what command do you type to see the options? Icacls.exe 8. What other tool could you use to modify the privileges of the files or folders of a shared drive? The command prompt \grant command 9. During the lab exercise, were you able to create, modify, or delete a text file on Server B as SFmanager or HRmanager? Explain. Yes. While using the server A as admin, While using the command prompt I gave both SFmanager and......

Words: 276 - Pages: 2

Premium Essay

Lab 2

...Lab #2 – Student Steps: Student steps needed to perform Lab #2 – Align Risk, Threats, & Vulnerabilities to the COBIT Risk Management Controls: 1. Connect your removable hard drive or USB hard drive to a classroom workstation. 2. Boot up your classroom workstation and DHCP for an IP host address. Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -11- Student Lab Manual 3. Login to your classroom workstation and enable Microsoft Word. 4. Conduct a high-level narrative discussion and review of the COBIT v4.1 Framework. 5. Review the COBIT P09 Control Objective definition, scope, and focus areas for assessing and managing IT risk. 6. Relate how the COBIT (P09) Control Objective definition relates to assessing and managing IT risk within each of the seven domains of a typical IT infrastructure: User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains 7. Explore the structure and format of how to align risks, threats, and vulnerabilities identified from your IT infrastructure to the COBIT P09 Control Objective definition, scope, and focus areas Information, Applications, Infrastructure, and People. 8. Explore the hierarchy for assessing and managing IT risks: • Step #1: Align the risk, threat or vulnerability assessment to C-I-A primary first and assess • Step #2: Align the risk, threat, or vulnerability remediation to Effectiveness,......

Words: 381 - Pages: 2

Free Essay

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

Premium Essay

Network 310 Lab Report

...NETW310 Week 5 Lab Report To complete your Week 5 Lab Report, answer all of the questions below. Create your report using the template starting on page 2 and submit it to the Week 5 Dropbox by the due date. NETW310 11/25/2014 Lab #5, Wireshark Introduction Lab Lab Report Each answer is worth seven points. Use a red colored font for you answers. Place the answers below the questions. 1. Is Wireshark open-source or proprietary? Open Source 2. What is seen in each of the three panes that display the packets seen on a local area network? The List Pane shows the packets that have been captured. The Tree View Pane shows the protocols in the packet. The Byte View Pane shows the raw data . 3. What does a display filter do? Allow you to define what packets are displayed in the filter pane 4. What does the protocol column show? The Highest Level Protocol in the frame 5. How do you expand the details in a layer of the packet in the middle frame? By pressing the plus sign in the upper left hand corner 6. Capture files have what file name extension? .pcap 7. The time column shows what? It shows the time relative to the first packet in increasing order. 8. When you right click on something in one of the panes what happens? A set of options appear that can be apllied to the packet 9. How is a display filter removed? Select clear in the top toolbar 10. When a filter is correct what color is the background of the filter window? Green...

Words: 271 - Pages: 2

Free Essay

Phys Lab 1

...Partners: Joseph Dea Adrian Capinpin Plotting Electric Potential Lab Purpose: To understand and experiment with electric potentials and examine electric fields, from their directions to their strengths and their behavior. Also, to map electric equipotential lines and electric field lines for two-dimensional configurations. Procedure: Starting the first of two parts of our lab (part A), we began by setting up our equipment. We first set up our conducting paper and pushed two aluminum push pins into each of the two conducting metallic holes on the paper. We then followed by connecting the negative terminal of the power supply to the push pin on the left and the positive terminal to the opposite push pin on the right (see figure below). After everything was set up we turned the dial of the voltmeter to 20 Volts (V), and proceeded by pushing the tip of our probe in the middle of the conducting paper and adjusted the DC power supply until the voltmeter read 5.00 V. Once we got an accurate reading, we gently used the probe to find points on the conducting paper that also read 5.00 V, generally about 2 cm above the starting position. We proceeded with this technique until we reached the apex of the y coordinate, which was capped at 20.0 cm. Following completion of the superior part of the x-axis, we took our probe and repeated the same procedure for the inferior portion of the x-axis, which extended down to 0 cm. We continued this process for the y-axis as......

Words: 537 - Pages: 3

Premium Essay

Lab 2

...Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 12 2. Label the appropriate names to the ports and adaptors given below. PS/2 keyboard port PS/2 keyboard port Parallel port Parallel port Ethernet Ethernet USB ports USB ports Serial port Serial port USB mini jack USB mini jack Audio ports Audio ports USB ports USB ports Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot. USB 1 USB 1 Memory card slot Memory card slot Examples: USB 3.0 ports USB 3.0 ports Audio port microphone and earphone jacks Audio port microphone and earphone jacks IEEE 1394 port IEEE 1394 port E sata port E sata port Sd mini slot Sd mini slot Micro sd slot Micro sd slot USB 2.0 PORT USB 2.0 PORT Compact flash Compact flash Dual slot Dual slot Task 3: Identify the Configuration Procedure 1. Identify the following configuration. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- SCSI is a set of parallel interface standard used to attach printers, scanners, disk......

Words: 403 - Pages: 2

Premium Essay

Lab 2

...Chapter 9 (Writing Today, pp. 171–196) 1. What is the purpose of a commentary? * The purpose of a commentary is to express opinions on current issues and events. 2. What is the basic organizational pattern of the commentary? * Basic Organization of a commentary is Introduction, Explain the current event or issue, Support for your argument *3, Clarification of your argument, and your conclusion. 3. What are strategies for inventing the content of your commentary? * For inventing the content of your commentary you need a good and recent event/ topic. You want to watch the news, and research the event to find out what people are talking about. 4. Which sources do you consult to gain information about what others know? * The sources you consult to gain information about what others know are, Online sources, Print sources, and Empirical sources. 5. What are strategies for organizing and drafting your commentary? * The Introduction – State your purpose and state your main point/ thesis statement * Explain the Current Event or Issue- Give enough background information to help readers understand the event or issue. Also show your readers that you understand the conversation. * Support Your Position- Each reason for your argument should support the main point or thesis, you stated in the introduction. Your support needs to steadily build up your argument for your side of the issue. * Clarify Your Position – Show your...

Words: 1015 - Pages: 5

Premium Essay

Lab 2

...IS3110 Lab #2: Assessment Worksheet Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls Student Name: _____________________________________________________________ 1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities) a. b. c. d. e. 2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk Management control objectives are affected? • PO9.1 IT Risk Management Framework • PO9.2 Establishment of Risk Context • PO9.3 Event Identification • PO9.4 Risk Assessment • PO9.5 Risk Response • PO9.6 Maintenance and Monitoring of a Risk Action Plan 3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), specify whether the threat or vulnerability impacts confidentiality – integrity – availability: Confidentiality Integrity Availability a. b. c. d. e. 4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3 and No More than 5) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure? 5. For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 – No More than 5), assess the risk impact or risk factor that it has on your organization in the following areas: a. Threat or Vulnerability #1: o......

Words: 469 - Pages: 2

Free Essay

Netw 310 Week 7 Lab Report

...NETW 310 Week 7 Lab Report Purchase here http://devrycourse.com/netw-310-week-7-lab-report Product Description 1. Looking at the above graph, write a short paragraph on what is happening here with the congestion window and the flight size. (8 points) ß 2. In the results browser, bring up the Global TCP statistics for delay (sec) and segment delay sec). In a short paragraph, comment on the delay graph. (8 points) ß 3. Overlay the statistics for client-received segment ack number and sent segment ack number. Write a short paragraph on why the client numbers are so different from the servers, and an explanation of what is happening. (9 points) ß 1. Given the configuration of the packet discarder, write a short paragraph explaining why the server’s Congestion Window size has this variation. Paste a copy of this window into your answer. When finished, hide or delete the panel. (4 points) ß 2. Examine the statistics for the client node. Can you tell if the packet drops have affected anything on the client? (4 points) ß 3. Examine the delay stats for the entire network (Global) and for the nodes. Can you see any delay caused by these drops? (4 points) ß 4. Copy this window to your answer sheet, and in a short paragraph, explain why the congestion window sizes are different in the two scenarios. (4 points) ß 5. Unselect the servercongestion window and then select server flight size. Show and zoom the window as done previously. Copy this window to your lab report,......

Words: 997 - Pages: 4

Premium Essay

Lab 2

...UMUC NSCI 101/103 Lab 2: Types of Forces INSTRUCTIONS: On your own and without assistance, complete this Lab 2 Answer Form electronically and submit it via the Assignments Folder by the date listed on your Course Schedule (under Syllabus). To conduct your laboratory exercises, use the Laboratory Manual that is available in the classroom. Laboratory exercises on your CD may not be updated. Save your Lab 2 Answer Form in the following format: LastName_Lab2 (e.g., Smith_Lab2). You should submit your document in a Word (.doc or .docx) or Rich Text Format (.rtf) for best compatibility. Experiment 1: Friction Table 1: Applied Force Required to Slide Cup Cup Material Force Applied F1 m1 = 300 g water Force Applied F2 m2 = 150 g water F1 / FN1 F2 / FN2 Plastic Avg: Avg: Avg: Avg: Styrofoam Avg: Avg: Avg: Avg: Paper F1 m1 = 150 g water F2 m1 = 100 g water F1 / FN1 F2 / FN2 Avg: Avg: Avg: Avg: Surface Description Questions: What happened to your applied force Fapp as you decreased the amount of water in the cup? Assume the......

Words: 619 - Pages: 3

Free Essay

Lab 2

... | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after......

Words: 1139 - Pages: 5

Premium Essay

Phys 152 Resistance Lab

...resistance begins to level off at this point. You can see the same point on the graph of current versus resistance because the line begins to curve at the corresponding critical point of 0.390 Amps. As the light gets brighter, more energy is lost as heat and the curve levels off even more. Conclusion: In the lab we measured resistance in a resistor and in a light bulb. We built a circuit and used an ammeter and a voltmeter to measure the current and the electric potential difference to measure resistance. The resistor has a linear relationship between current and resistance because resistance does not change as the current increases. However the light bulb is not linear because some energy is lost as heat in the filament when the light bulb comes on. Our experimental data confirms these hypotheses and you can see the point where the light bulb comes on and the line starts to curve on our graph. Lab Questions: 1. Electric resistance in materials is caused by energy being lost to heat when there are collisions with free electrons and atoms. This property of materials to oppose the flow of electrons is what makes some materials have a higher resistance than others. 2. Ohm’s Law states that the current through a conductor between two points is directly proportional to the potential difference, and inversely proportional to the resistance across the two points. In other words, the current through a circuit is equal to the potential difference, divided by the resistance.......

Words: 420 - Pages: 2

Premium Essay

Issc421 Lab#2

...Lab Assessment Questions & Answers1. Which tool, Wireshark or NetWitness, provides information about the wireless antenna strength during a captured transmission? Wireshark, under 802.11n MAC +PHY line to expand those fields. That field reveals a large amount of data about the 802.11n connection including signal strengths, noise ratios and other information about the antenna. 2. Which tool displays the MAC address and IP address information and allows them to be correlated for a given capture transmission? NetWitness3. What is the manufacturer specific ID for the GemTek radio transmitter/receiver?Wireshark displays transmitter/receiver addresses in both full hexadecimal (00:14:a5:cd:74:7b) and a kind of shorthand, in this case, GemtekTe_cd:74:7b. That shorthand code is Wireshark’s translation of the first part of the receiver address (00:14:a5)into the manufacturer’s name or alphanumeric designation (GemtekTe_).4. The receiver and/or transmitter address is hard-coded in hardware and cannot be changed: it can always be counted on to correctly identify the device transmitting. True or False. False5. The actual web host name to which www.polito.it resolved was? Under Queries (www.polito.it): Type A (Host address) Class A: IN (0x0001). Under Answers (www.polito.it): type CNAME, class IN, cname webo1.polito.it 6. How can one determine that the website www.polito.it is in Italy? In NetWitness – there is a field “Destination Country” – Italy. 7. What is the IP address......

Words: 264 - Pages: 2

Premium Essay

Lab 2

...Role: Voter 1. Voters should use cost-benefit analysis to make their decisions but not everyone uses it. There will be a lot of voters making the same decision but every voter will make the same decision. There are many factors in the decision making but it differs for each voter. 2. Some of the decisions made by representatives are budget, new laws and many more, most of which are aimed for the wellbeing of the people. 3. It is necessary for voters to be informed and educated to make the right decision. Given the chance to vote, a voter should have all the information to make the best decision. Role: Entrepreneur 1. Entrepreneur creates job and bring in income for the city or state through taxes. Without Entrepreneur there would be major impact on the economic system. Big businesses often need the small businesses in order to stay in business. 2. It really doesn’t matter if the resources are scarce or not. Most entrepreneur care more about maximizes the profit and little about what type of resources is used. Role: Taxpayer 1. Higher tax on gasoline mean little these day. Regardless if gas goes over $5 a gallon people still need to buy gas to get to work and to do their daily chores. 2. It could swing both ways. It all comes down to the individual, if they need the money they will put in more hours and if they don’t need the money then why should they work more if they are getting paid less per hour. 3. Of course it’s important for government to understand the......

Words: 507 - Pages: 3

ダウンロード APK | 30 días juntos | Autodata 8 45 + Crack FULL