Sci103 Lab2

In: Science

Submitted By traciel
Words 610
Pages 3
Name: Tracie Loggins

Date: 9/6/15

Instructor’s Name:

Assignment: SCI103 Phase 3 Lab Report

Title: Soil Infiltration and Runoff

Instructions: Enter the Virtual Lab and gather the information needed to complete the report from the field. Please type your answers. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom.

Part I: Field Research

Section 1: Gather the following information from field research while in the Phase 3 lab environment. Notice that each site you visit has a distinctly different surface, which could affect runoff.

|One Inch of Rainfall | |
| |Shallow water infiltration |Deep water infiltration |Runoff water |Evaporation water |
|Vegetation |25% |25% |10% |40% |
|Mountain |10% |5% |60% |25% |
|Bare soil |20% |15% |35% |30% |

Section 2: One inch of rainfall deposits 144 cubic inches (0.623 gallons) of water per square foot of surface area. Use the following formula to calculate the amount of water after one inch of rainfall (in gallons) for each section:

(0.623) x (square feet of surface area) x (% from lab demo*) = gallons of water

*Remember 40% is written as “0.40” in an equation.

|One Inch of Rainfall | |
| |Shallow water infiltration |Deep water…...

Similar Documents

Lab2

...Targeted attacks did not start in 2010 and will not end there. in addition, while Hydraq was quickly forgotten and, in time, Stuxnet may be forgotten as well, their influence will be felt in malware attacks to come. Stuxnet and Hydraq teach future attackers that the easiest vulnerability to exploit is our trust of friends and colleagues. Stuxnet could not have breached its target without someone being given trusted access with a USB key. Meanwhile, Hydraq would not have been successful without convincing users that the links and attachments they received in an email were from a trusted source. Social networks. Whether the attacker is targeting a CEO or a member of the QA staff, the internet and social networks provide rich research for tailoring an attack. By sneaking in among our friends, hackers can learn our interests, gain our trust, and convincingly masquerade as friends. Long gone are the days of strange email addresses, bad grammar, and obviously malicious links. A well-executed social engineering attack has become almost impossible to spot. Zero-day vulnerabilities and rootkits. Once inside an organization, a targeted attack attempts to avoid detection until its objective is met. Exploiting zero-day vulnerabilities is one part of keeping an attack stealthy since these enable attackers to get malicious applications installed on a computer without the user’s knowledge. in 2010, 14 such vulnerabilities were discovered. Rootkits also play a......

Words: 548 - Pages: 3

Lab2

...Learning Objectives and Outcomes  Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows:  Windows laptops: Traveling salespeople, remote suppliers, branch offices  Windows desktops: Accounting group, developer group, customer service group  Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories at http://technet.microsoft.com/en-us/security/advisoryarchive Answer the following questions based on the advisories for the past 12 months: 1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each. 2. Do any vulnerabilities involve privilege elevation? Why would this be considered a high-priority issue?......

Words: 312 - Pages: 2

Lab2

...1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application. Port scanning, Passive OS fingerprinting. If we need to find a host that may be causing a problem, it can be used to quickly identify hosts that are running on a certain network. 2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan? Nessus 3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step? You must get written permission. 4. What is a CVE listing? Who hosts and who sponsors the CVE database listing website? CVE stands for Common Vulnerabilities and Exposures. It’s a listing for vulnerabilities and exposures. Mitre Corporation hosts the DB. The Department of Homeland Security and the U.S. National Cyber Security Division sponsor it. 5. Can Zenmap GUI detect which operating systems are present on IP servers and workstations? Which option includes that scan? Yes it can detect what operating systems are being used. Intense. 6. If you have scanned a live host and detected that it is running Windows XP workstation OS, how would you use this information for performing a Nessus vulnerability assessment scan? Configure the scan to only include Windows vulnerabilities. 7. Once vulnerability is identified by Nessus, where can you check for more information......

Words: 305 - Pages: 2

Lab2

...Lab 2 Part 1: 10 points Learning Objectives and Outcomes * Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows: * Windows laptops: Traveling salespeople, remote suppliers, branch offices * Windows desktops: Accounting group, developer group, customer service group * Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories at http://technet.microsoft.com/en-us/security/advisoryarchive Answer the following questions based on the advisories for the past 12 months: 1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each. 1. Update for Vulnerabilities in Adobe Flash Player in Internet Explorer...

Words: 684 - Pages: 3

Cs 315 Lab2

...sin(x); printf("sin(x) = %f\n\n ", y); return 0; } Copy and paste the running result here: zfei@cslinux2:~/week02/lab2$ ./q1 Input a real number: 8 sin(x) = 0.989358 2) #include <stdio.h> int main() { int integer1, integer2, sum; printf( "Enter first integer\n" ); scanf( "%d", &integer1 ); printf( "Enter second integer\n" ); scanf( "%d", &integer2 ); sum = integer1 + integer2; printf( "Sum is %d\n", sum ); return 0; } Copy and paste the running result here: zfei@cslinux2:~/week02/lab2$ ./q2 Enter first integer 5 Enter second integer 4 Sum is 9 3) #include <stdio.h> int main() { int counter, grade, total, average; total = 0; counter = 1; while ( counter <= 10 ) { printf( "Enter grade: " ); scanf( "%d", &grade ); total = total + grade; counter = counter + 1; } average = total / 10; printf( "Class average is %d\n", average ); return 0; } Copy and paste the running result here: zfei@cslinux2:~/week02/lab2$ ./q3 Enter grade: 11 Enter grade: 1 Enter grade: 2 Enter grade: 5 Enter grade: 4 Enter grade: 54 Enter grade: 5 Enter grade: 4 Enter grade: 2 Enter grade: 3 Class average is 9 zfei@cslinux2:~/week02/lab2$ 4) #include <stdio.h> int main() { float average; int counter, grade, total; ...

Words: 1271 - Pages: 6

Lab2

...Assessment Worksheet Obtaining Personally Identifiable Information through Internet Research Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored a variety of search engines and social networking Web sites that may contain personal information about you that, in the hands of an identity thief, could compromise and exploit your privacy. You documented the sites that displayed your personal information and suggested methods for controlling access to that information within the specific sites. You also explored the privacy policy of some of the more popular social networking sites. Lab Assessment Questions & Answers 1. Complete the following table to describe the results you discovered about your own personally identifiable information on the Internet. Search Engine Was personal information returned? (Yes or No) Dogpile.com Google.com InstantCheckmate.com AlltheInternet.com WhitePages.com Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Instructor Lab Manual ZabaSearch.com Your local government Web site Facebook LinkedIn Twitter 2. Was there enough personal information returned that......

Words: 435 - Pages: 2

Lab2

...Lab #2 - Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _______EM200_________________________________________ Student Name: _______________________Lorena Agreda_________________________ Instructor Name: __Professor Noura Abbas______________________________________ Lab Due Date: ___02/23/15_________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings. Lab Assessment Questions & Answers 1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application. Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts and detect what operating system and services are running on them, and all without privileged access. Zenmap, and similar tools, are typically used during the scanning and vulnerability phase of the ethical hacking process. 2. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the ethical hacking......

Words: 334 - Pages: 2

Nt1330 Lab2

...Lab 2 worksheet CONFIGURING DNS AND DHCP THIS LAB CONTAINS THE FOLLOWING EXERCISES: Exercise 2.1 Designing a DNS Namespace Exercise 2.2 Creating a Zone Exercise 2.3 Creating Domains Exercise 2.4 Creating Resource Records Exercise 2.5 Creating a Scope Exercise 2.6 Confirming DHCP Server Functionality Exercise 2.7 Configuring DHCP Reservations Workstation Reset: Returning to Baseline Estimated lab time: 100 minutes |Exercise 2.1 |Designing a DNS Namespace | |Overview |You have been tasked with creating a test DNS namespace structure for your organization. Your first | | |task is to design that namespace by specifying appropriate domain and host names for the computers in| | |the division. | |Completion time |15 minutes | 2. In the diagram provided in Figure 2-1, write both the domain names and the fully qualified domain names that you have selected for the computers in the appropriate spaces. Figure 2-1 |Exercise 2.2 |Creating a Zone ......

Words: 782 - Pages: 4

Lab2

...Laboratory 2 Switches, Lights, and Multiplexers Part I Objectives The purpose of this part is to connect the switches and lights by using FPGA chip with VHDL entity. These switches (SW17-0) represent the inputs of a circuit, and LEDR17-0(red lights) represents the outputs of a circuit. Switches are assigned to the LEDR which means each switch connects one light separately. So when one of the switches is on, the corresponding light will be light. Equipment DE2 package, Altera’s Quartus II Design and Test Procedure 1. Create a new project: to start click File > New Project Wizard > select the directory for storing this project and the same name of the project with directory > select Cyclone II and EP2C35F672C6 as the target chip; 2. Create a new VHDL entity: File > New > VHDL File; 3. Type the VHDL code in this file; 4. Start the calculation and it will be automatically saved; 5. When it is completed, the next step which is the most important thing is importing assignment: Assignments > Import Assignments > select the file (DE2 pin assignments.csv); 6. Save the project and click the compilation; 7. Download the compiled circuit: Tools > Programmer > Hardware Setup > select USB-Blaster > make sure the Program Configure box is checked > Start; 8. Test: for every switches, the red LED lights will turn on when the switch is on Results It is successful when our group does it in the first time. For every......

Words: 2728 - Pages: 11

Lab2

...Lab #2 – Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings. Lab Assessment Questions & Answers 1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application. Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts and detect what operating system and services are running on them, and all without privileged access. Zenmap, and similar tools, are typically used during the scanning and vulnerability phase of the ethical hacking process. It 2. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the......

Words: 474 - Pages: 2

Sci103

...Name: Raymond Date: 10/19/2015 Instructor’s Name: Assignment: SCI103 Phase 2 Lab Report2 TITLE: Estimating the Red Wolf Population INSTRUCTIONS: Enter the Virtual Lab and gather information from the field. Please type your answers on this form. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I – Answer the following questions while in the Phase 2 lab environment. Section 1 (Smaller Population Estimation) – One year ago, you set up your first trap area and caught four red wolves. Each one of the wolves was marked with a white collar. It is now one year later and you have set up six trap areas. Visit these areas and record the total number of re-captured wolves as well as how many are marked with white collars. Use the following equation when asked to calculate population estimates for the area: Population Estimate = (Total number re-captured) X (Number marked initially) (Total number re-captured with mark) 1. How many red wolves were initially trapped, marked, and then released last year? | |Total re-captured wolves |Total re-captured with collars | |Trap Area 1 |2 |1 | |Trap Area 2 |3 |0 ...

Words: 820 - Pages: 4

Sci103 Phase 3 Lab

...Name: Date: 10-26-2015 Instructor’s Name: Professor Jackson Assignment: SCI103 Phase 3 Lab Report Title: Soil Infiltration and Runoff Instructions: Enter the Virtual Lab and gather the information needed to complete the report from the field. Please type your answers. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Field Research Section 1: Gather the following information from field research while in the Phase 3 lab environment. Notice that each site you visit has a distinctly different surface, which could affect runoff. |One Inch of Rainfall | | | |Shallow water infiltration |Deep water infiltration |Runoff water |Evaporation water | |Vegetation |25% |25% |10% |40% | |Mountain |10% |5% |60% |25% | |Bare soil |20% |15% |35% |30% | Section 2: One inch of rainfall deposits 144 cubic inches (0.623 gallons) of water per square foot of surface area. Use the following formula to calculate the amount of water after one......

Words: 578 - Pages: 3

Lab2

...This assessment is about the identification of I/O ports and devices linked to a computer. It is easy to accidentally unplug an I/O device. If you do, knowledge of the ports and the devices that connect to them will help you correctly reconnect the device. Required Setup and Tools In this laboratory, you need to: * Look at the outside of a desktop or notebook computer. * Access to the Internet for research. Recommended Procedures Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 2. Label the appropriate names to the ports and adaptors given below. mouse mouse Parallel port Parallel port Ethernet Ethernet usb usb Vga port Vga port Hdmi port Hdmi port 1/8 inch mini jack audio 1/8 inch mini jack audio Usb port Usb port Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot. Examples: SD micro SD micro Micro drive Micro drive Memory Stick Memory Stick Compact Flash Compact Flash Secure Digital Secure Digital Task 3: Identify the Configuration Procedure 1. Identify the......

Words: 603 - Pages: 3

Sci103 Lab1

...Name: Vannessa Watkins Date: 04/09/2016 Instructor’s Name: Kenneth Gordon Assignment: SCI103 Phase 1 Lab Report Title: Measuring pH Levels Instructions: Enter the Virtual Lab, and conduct the experiments provided before going out into the virtual field for additional research. Please type your answers on this form. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Answer the following questions while in the Phase 1 lab environment. Section 1: You will be testing 4 known solutions for pH levels using a standard wide-range indicator. Based off of the results obtained in the lab room, fill in the following table: |Solution Number |pH from Lab |Acid, Base or Neutral? |Solution Name (what was in the test tube?) | |Solution 1 |6.5 |Neutral |Water | |Solution 2 |1 |Acid |Lemon Juice | |Solution 3 |11.5 |Base |Bleach | |Solution 4 |5 |Acid |Coffee | 1. How many drops of wide range indicator will you use...

Words: 675 - Pages: 3

Sci103 Lab 3 Soil Infiltration and Runoff

...Name: Date: 04/26/2016 Instructor’s Name: Assignment: SCI103 Phase 3 Lab Report Title: Soil Infiltration and Runoff Instructions: Enter the Virtual Lab and gather the information needed to complete the report from the field. Please type your answers. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Field Research Section 1: Gather the following information from field research while in the Phase 3 lab environment. Notice that each site you visit has a distinctly different surface, which could affect runoff. |One Inch of Rainfall | | | |Shallow water infiltration |Deep water infiltration |Runoff water |Evaporation water | |Vegetation |25% |25% |10% |40% | |Mountain |10% |5% |60% |25% | |Bare soil |20% |15% |35% |40% | Section 2: One inch of rainfall deposits 144 cubic inches (0.623 gallons) of water per square foot of surface area. Use the following formula to calculate the amount of water after one inch of rainfall (in...

Words: 602 - Pages: 3