Lab Research

In: Science

Submitted By rhysgreer
Words 1010
Pages 5
Lab Research Report 2: Global Warming: Cause and Mitigation
Rhys Greer
September 14, 2014
Dr. Rana Miller
Strong University

Compare and contrast natural versus anthropogenic climate changes. Include specific examples of each.

In an article written by the United States Environmental Association (EPA) it lists natural changes in greenhouse gas (GHG) concentrations, volcanic eruptions and solar energy as some of the natural causes of climate changes on earth. The article goes on to say “Recent climate changes, however, cannot be explained by natural causes alone. Research indicates that natural causes are very unlikely to explain most observed warming, especially warming since the mid-20th century. Rather, human activities can very likely explain most of that warming.” These human activities are the causes of anthropogenic climate changes. The article also adds “Since the Industrial Revolution began around 1750; human activities have contributed substantially to climate change by adding CO2 and other heat-trapping gases to the atmosphere. These greenhouse gas emissions have increased the greenhouse effect and caused Earth’s surface temperature to rise. The primary human activity affecting the amount and rate of climate change is greenhouse gas emissions from the burning of fossil fuels.” Some human activities that initiate climate changes are caused by the gas emissions from fossil fuels used to heat homes, petroleum based fuels like gasoline and diesel used for transportation and electricity production which comes from burning fossil fuels.

Take a position as to whether or not global warming is taking place. Provide three (3) lines of evidence to support your position.
Global warming is definitely taking place. This is evident in the unseasonable weather we are having and the severity of the storms that have taken place like Katrina to name a few.…...

Similar Documents

Unit 2. Lab 1 - Cloud Computing Research

...Unit 2. Lab 1: Cloud Computing Research With Amazon, you get anywhere between 5GB and 1TB depending upon how much you’d like to pay for the privilege. Amazon passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. To use Amazon EC2, you simply: * Select a pre-configured, templated Amazon Machine Image (AMI) to get up and running immediately. Or create an AMI containing your applications, libraries, data, and associated configuration settings. * Configure security and network access on your Amazon EC2 instance. * Choose which instance type(s) you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. * Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. * Pay only for the resources that you actually consume, like instance-hours or data transfer. With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from Google if you have a Google Apps account up to a total of 16TB. On...

Words: 469 - Pages: 2

Labs

...POINT LISAS CAMPUS Esperanza Road, Brechin Castle, Couva www.utt.edu.tt LAB 1 Decomposition reaction Aim: Determination of the number of moles of water molecules of crystallization present in hydrated Magnesium Sulphate (MgSO4.xH2O) Apparatus: Mass balance, test tube, test tube holder, heat-proof mat and bunsen burner. Reagents: Hydrated sodium carbonate. Theory: Chemical decomposition, analysis or breakdown is the separation of a chemical compound into elements or simple compounds. A more specific type of decomposition is thermal decomposition or thermolysis, which is caused by heat. ABA+B, the reaction is endothermic, since heat is required to break the chemical bonds. Most decomposition reaction require energy either in the form of heat, light or electricity. Absorption of energy causes the breaking of the bonds present in the reacting substance which decomposes to give the product. When a hydrated salt is heated it decomposes into a pure form of the salt and water. MgSO4.xH2O MgSO4 + H2O Procedure: Refer to Handout Results: A. Mass of test tube/g = 21.77 B. Mass of the tube and salt/g = 24.0 A table showing the mass of the test tube and salt after 3 consecutive heating: Heating | Mass of the test tube and salt/g | 1st | 23.96 | 2nd | 23.81 | 3rd | 23.81 | Calculations: G. Mass of anhydrous magnesium sulphate/g = F - A = 23.81 – 21.77= 2.04 H. Mass of water of crystallization......

Words: 2572 - Pages: 11

Labs

...Schultz Associate Production Editor: Tina Chen Rights & Photo Research Associate: Lian Bruno Manufacturing and Inventory Control Supervisor: Amy Bacus Senior Marketing Manager: Andrea DeFronzo Cover Design: Anne Spencer Composition: CAE Solutions Corp. Cover Image: © ErickN/ShutterStock, Inc. Printing and Binding: Edwards Brothers Malloy Cover Printing: Edwards Brothers Malloy 38351_FMxx_Pass4.indd 2 23/04/13 5:13 AM Contents Ethics and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 AssessmeNt WoRksheet LAB #2 Perform a Vulnerability Assessment scan Using Nessus Introduction Deliverables Hands-On Steps 19 19 21 31 32 20 Learning Objectives 19 Evaluation Criteria and Rubrics LAB #2 AssessmeNt WoRksheet LAB #3 enable Windows Active Directory and User Access Controls Introduction Deliverables Hands-On Steps 35 35 37 49 50 36 Learning Objectives 35 Evaluation Criteria and Rubrics LAB #3 AssessmeNt WoRksheet LAB #4 Configure Group Policy objects and microsoft® Baseline security Analyzer (mBsA) Introduction Deliverables Hands-On Steps 53 53 55 63 64 54 Learning Objectives 53 Evaluation Criteria and Rubrics LAB #4 AssessmeNt WoRksheet iii 38351_FMxx_Pass4.indd 3 23/04/13 5:13 AM iv Contents LAB #5 Perform Protocol Capture and Analysis......

Words: 26285 - Pages: 106

Labs

...36 LAB #3 | Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) LAB #3 – ASSESSMENT WORKSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using......

Words: 303 - Pages: 2

Lab Research Report 1: Procedures in the Physical Sciences

...Lab Research Report 1: Procedures in the Physical Sciences Rhoda H. Jefferson Professor Cassie Prisco Introduction to Physical Science November 2, 2013 The specific challenges to making direct measurements in the fields of astronomy, chemistry, physics, or earth science are measuring global warming and climate changes, measuring how the earth rotates on its axis, and measuring the distance from the earth to the stars. Scientist have had these issues for a number of years but overcome using indirect forms to measure these challenges. For global warming, scientist used a 350-year record of precipitation in California determined by using 52 tree ring chronologies as proxies for precipitation. (www.geosociety.org/gsatoday/archive/11/12/pdf/i1052-5173-11-12-41.pdf) This method was used to determine average annual precipitation, which showed extended dry periods. These methods were not 100% because there were no baselines to compare. In this day and time to obtain a temperature that represents a large area, it requires measurements of multiple locations. Measurements are taken by thermometers, and averaged together, this can aide in determining regional trends. (http://www.thenewatlantis.com/publications/taking-the-earths-temperature) Another challenge that scientist come up against is measuring how the earth rotates on its axis. When the earth rotates on its axis, it fluctuates in relation to space. This is caused by the gravity from the sun and the......

Words: 429 - Pages: 2

Week5 Lab

...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting. Your......

Words: 296 - Pages: 2

Labs

...ISSC362 Week 1 Lab #2: Implement Hashing and Encryption for Secure Communications Instructor Name: ________________ Lab Assessment Questions 1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. 2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample file? What if they were different when you re-calculated the hash value at the other end? 3. 2 4. 3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? 4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet? 5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? 6. Where can you store your public keys or public certificate fi les in the public domain? Is this the same thing as a public key infrastructure (PKI) server? 7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender? 8. What encryption mechanisms are built into Microsoft® Windows XP Professional? 9. Which Windows encryption......

Words: 296 - Pages: 2

Nt11110T Lab 10 Research Project

...Social Networking Definition: The term “social networking” does not exclusively belong to digital technology on the Web. On the contrary, social networks had been studied from the beginning of 20th century with the aim to comprehend how the members of a certain community interact and which mechanism can determine the interaction itself. In shorter terms it’s the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself. In today’s social networking refers to all activities that are carried out with-in specific online services that provides free space and software tools which allows you to create networks of people. In other words social networking is a Web site that allows individuals to construct a public or semi-public profile. The mechanism following: social networking services enable users to create a profile for themselves, by inserting their personal data. Users’ data are not only constituted by vital statistics, but they include a lot of other information which pertains to user hobbies, passions, interests, professional background and so on. This kind of personal data, all spontaneously provided by the user her/himself, permit to create interconnected networks of people who decide to put in common their interests and to have an online identity which fully describes them. The great strength of social networking are the multiple ways the users have to interact. Below is a list of the......

Words: 383 - Pages: 2

Geomechanics Lab

...Computer Lab Rules & Regulations Swinburne University computing facilities may only be used by current Swinburne students and staff. Swinburne identity card must be presented upon request. The computing facilities should only be used for educational and research purposes. The following rules and regulations apply to all lab computers on campus. Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your......

Words: 484 - Pages: 2

Lab 3

...Lab #3 – Assessment Worksheet Data Gathering and Footprinting on a Targeted Web Site Student Name: ___Westley Mixon________________________________________________ Lab Due Date: __________January 28, 2015________________________________________ Overview The first phase of hacking is the footprinting phase, which is designed to passively gain information about a target. In this lab, you performed technical research against three Web domains using Internet search tools. You collected public domain information about an organization using the Google search engine to uncover information available on the Internet. Finally, you recorded the information you uncovered in a research paper, describing how this information can make an organization vulnerable to hackers. Lab Assessment Questions & Answers 1 What information can you obtain by using the WHOIS tool contained within Sam Spade? Domain owner, including contact names, numbers, addresses, and the names of associated servers. 2 Besides the WHOIS utility covered in this lab, what other functions did you discover are possible with the Sam Spade utility? That you can Ping, nslookup, Whois, IP Block, Dig, Traceroute, Finger SMTP Verify, Time, Blacklist, and Abuse Lookup. 3 What is the purpose of the tracert command? What useful information does the trace route tool provide? How can this information be used to attack the targeted website? It identify the network path that must be followed to reach......

Words: 521 - Pages: 3

Labs

...Tissues The Integumentary System 35 43 The Cell: Transport Mechanisms and Permeability–Wet Lab Classification of Covering and Lining Membranes 49 Overview of the Skeleton: Classification and Structure of Bones and Cartilages 53 The Axial Skeleton The Fetal Skeleton 59 67 81 87 93 103 77 The Appendicular Skeleton Articulations and Body Movements Microscopic Anatomy and Organization of Skeletal Muscle Gross Anatomy of the Muscular System Histology of Nervous Tissue 113 119 125 Exercise 16A Skeletal Muscle Physiology: Frogs and Human Subjects Exercise 18A Neurophysiology of Nerve Impulses: Wet Lab Gross Anatomy of the Brain and Cranial Nerves Electroencephalography Human Reflex Physiology General Sensation 153 157 167 177 173 Special Senses: Vision 133 Spinal Cord, Spinal Nerves, and the Autonomic Nervous System 145 137 Special Senses: Hearing and Equilibrium Special Senses: Olfaction and Taste Functional Anatomy of the Endocrine Glands iii Exercise 28A Role of Thyroid Hormone, Pituitary Hormone, Insulin, and Epinephrine: Wet Lab 183 Exercise 29A Blood Exercise 30 Exercise 31 Exercise 32 189 199 205 209 Anatomy of the Heart Conduction System of the Heart and Electrocardiography Anatomy of Blood Vessels Exercise 33A Human Cardiovascular Physiology: Blood Pressure and Pulse Determinations 217 Exercise 34A Frog Cardiovascular Physiology: Wet Lab Exercise 36 Exercise 38 Exercise 40 Exercise 42 Exercise 43 Exercise 44 Exercise 45 Exercise......

Words: 120457 - Pages: 482

Research Paper Lab 10

...Morgan Johnson (19407679) NS 1110  Friday Research Paper Lab 10 Morgan Johnson (19407679) NS 1110  Friday Research Paper Lab 10 The topic I chose for my research project is setting up a business on the Darknet. I think it would be more accurate to say that the topic chose me. I was originally browsing the internet on the various subjects presented to us in the assignment handout and had started reading a little about ecommerce when this topic jumped out at me. As I started looking into the other topics on the sheet, I couldn’t get the information about the Darknet world out of my mind. I think I have a bit of a fascination with the outer edges of society and that includes cyber-society. The secretive world of the Darknet is interesting in itself but setting up an ebusiness that may or may not provide illegal goods and services requires such an intricate system of safeguards that, for someone new to the tech world like myself, it is like opening the door to a bizarre and complicated dimension. Even after spending some time researching the subject, it would take hours more and I still would have barely explored the world of the cyber underbelly. The first thing a person needs to do when setting up a potentially questionable business, is to research various countries legal relationship with the country you’re based in. For the sake of this paper, we will assume we live in the U.S. Find out which have or don’t have Mutual Legal Assistance Treaties. When you......

Words: 809 - Pages: 4

Lab Guide

...can be doing before, during, and after lab to help you meet the course objectives and be successful in the course. PRIOR TO LAB Like any scientist, doing preliminary research is essential in developing methods for solving problems. We highly suggest you do some researching prior to planning, experimenting, and presenting, and have provided some resources that may help guide you in this process. * Prior to planning in lab, each student should read over the project and the planning questions for the day. At the beginning of each project, you will complete a prelab assignment in Mathematica that will get you thinking about the project. You will save significant time and trouble during the planning sessions by also reading suggested articles, looking over the study guides (posted in the Resources folder in Collab), and preparing a preliminary draft of what you propose to do in lab that day. This preliminary plan will help you contribute to the group discussion and final proposed plan. * Prior to experimenting, students should read over other relevant laboratory techniques in the lab manual beyond the practice technique, watch any pertinent videos, and look up techniques online prior to performing the techniques in lab. * Prior to presenting, each team member should be contributing to the creation of a presentation on the project. This may take the form of doing some additional research on chemistry concepts related to lab and integrating these ideas into your......

Words: 507 - Pages: 3

Labs

...Sonia Graham Normal Lab Values   | REFERENCE RANGE | SI REFERENCE INTERVALS | BLOOD, PLASMA, SERUM | | | Alanine aminotransferase (ALT) | 8-20 U/L | 8-20 U/L | Amylase, serum | 25-125 U/L | 25-125 U/L | Aspartate aminotransferase (AST) | 8-20 U/L | 8-20 U/L | Bilirubin, serum (adult) Total // Direct | 0.1-1.0 mg/dL // 0.0-0.3 mg/dL | 2-17 µ mol/L // 0-5 µ mol/L | Calcium, serum (Total) | 8.4-10.2 mg/dL | 2.1-2.8 mmol/L | Cholesterol, serum | < 200 mg/dL | < 5.2 mmol/L | Cortisol, serum | 0800 h: 5-23 µ g/dL // 1600 h: 3-15 µ g/dL | 138-635 nmol/L // 82-413 nmol/L | | 2000 h: ≤ 50% of 0800 h | Fraction of 0800 h: ≤ 0.50 | Creatine kinase, serum (at 30 ° C) ambulatory | Male: 25-90 U/L | 25-90 U/L | | Female: 10-70 U/L | 10-70 U/L | Creatinine, serum | 0.6-1.2 mg/dL | 53-106 µ mol/L | Electrolytes, serum | Sodium | 135-145 mEq/L | 136-145 mmol/L | Chloride | 95-105 mEq/L | 95-105 mmol/L | Potassium | 3.5-5.0 mEq/L | 3.5-5.0 mmol/L | Bicarbonate | 22-28 mEq/L | 22-28 mmol/L | Magnesium | 1.5-2.0 mEq/L | 1.5-2.0 mmol/L | Gases, arterial blood (room air) | pH | 7.35-7.45 | [H + ] 36-44 nmol/L | PCO 2 | 33-45 mm Hg | 4.4-5.9 kPa | PO 2 | 75-105 mm Hg | 10.0-14.0 kPa | Glucose, serum | Fasting: 70-110 mg/dL | 3.8-6.1 mmol / L | | 2-h postprandial: < 120 mg/dL | < 6.6 mmol/L | Growth hormone - arginine stimulation | Fasting: < 5 ng/mL | < 5 µ g/L | | provocative stimuli: 7 ng/mL | > 7 µ g/L | Immunoglobulins, serum |...

Words: 635 - Pages: 3

Labs

...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT......

Words: 2487 - Pages: 10