Michael Pham
March 20, 2015
Lab #2
1. Although both bonobos and chimpanzees share 98% of their DNA with humans, I think bonobos are more similar in behavior to humans. Bonobos and chimpanzees can use tools and also somewhat communicate with humans using sign language. In chimpanzee society, the male is the most dominate figure, while in bonobo society it is the female who holds the highest rank. Bonobos are sexually active, and scientists believe this is why they are more peaceful than chimpanzees. In human society, we started off as a partriarchal society where men hold power and make the decisions. However, now women have taken part in positions of authority, such as the females in bonobos, and are figures of their own family. Also, I believe humans are more peaceful than violent and will seek ways to maintain peace rather than fight. This is why I believe bonobos are more similar to humans than chimpanzees.
2. Bonobos and other primates make poor pets because their natural instinct is to be in the wild. They cannot be domesticated like dogs and controlled. Diseases that the bonobos and other primates carry can be transmitted to humans. Their behavior can also change unsuspectingly. This will be problematic to keep them as pets because one second their behavior can be calm, while the other it can be extremely violent. As humans we want them as pets because we think it will be cool, but without full knowledge and understanding of bonobos and other primates, not only are we putting ourselves in danger, but the animals as well.
3. The solution I would provide in regards to the bushmeat trade in Central and West Africa would be to implement better and more federal programs to aid people in feeding themselves and their families. If people were well fed and not starving to the point where they would have to eat bushmeat, then there would be no need for it. Also, to strengthen and enforce laws prohibiting eating and or selling
Technique Trial with Acetone: Trial 1 Trial 2 Mass of empty, capped vial 7.6705g 7.6859g Volume of liquid used 0.5ml 0.5ml Mass of capped vial with liquid 8.0558g 7.9808g Mass of Liquid 0.3853g 0.3029g Calculated density of acetone: D=M/V 0.3441g = 0.6882g/ml 0.5ml Unknown liquid vial # 1 Perform three density determinations of your unknown and average the result. Trial 1 Trial 2 Trial 3 Mass of empty, capped vial…
Observations of Chemical Changes Pre lab Questions: (4pts.) 1. What are the learning goals of this lab? To be able to interpret underlying microscopic in terms of the behavior of atoms & molecules. To be able to separate mixtures into their component substances by solubility. 2. What is the meaning of chemistry? The identification of the substance of which matter is composed and the identification of their properties and the way they interact. 3. What are the common observations of chemical changes…
LAB Network Documentation 2 Introduction In this lab, you will learn how to use various tools and techniques to determine and document IP network design. You will use the Windows Command Prompt to generate network traffic; Wireshark to capture and analyze the generated traffic; PuTTY to remotely access the Cisco Switch; and finally, you will issue IOS commands on the Cisco Switch to understand its various interfaces and inner workings. Learning Objectives Upon completing this lab…
Kristen Jones Section: Lab Report 5: Lymphatic System – Lab Manual Pages 103-112 Relevant Websites to Help You with This Lab – Be sure to review these Websites before and during the completion of this Lab. • Antigen/Antibody Test Results • Human Anatomy Online : The Lymphatic System • Immune Response Animation • Lymph Node Animation Review Your Lab Summary: What were the most significant 2 or 3 concepts you learned while doing this Lab? Exercise 1: Microscopic Anatomy…
different exercises this lab. One consisted of observing bacteria in a blood sample, and the other was observing bacteria in yogurt. With the blood bacteria we took the slide and observed it under the microscope. We did a similar thing with the yogurt slide except to observe the bacteria in the yogurt we had to make a fresh sample. So on the first day of our lab we took a sample of yogurt and placed it on a petri dish and left it on the side until the next day. On the next lab day we took the sample…
IR table: Chemical Structure Experimental Absorbance (cm-1) Lit Absorbance (cm-1) Intensity Functional groups/ Bonding 2929.40 2958.00 2872.19 1740.30 ~2900 ~2890 ~2840 ~1760 Weak Weak Weak Moderate Sp3 C-H Stretch Sp3 C-H Stretch Sp3 C-H Stretch C=O carbonyl stretch Discussion: The objective of the experiment was to oxidize a secondary alcohol, isoborneol to ketone camphor. Secondary alcohols can be converted to ketones using very strong oxidizing agents such as chromic acid. In this…
Performed 1-27-15 Chem 2204 – 12 Due 2-03-15 Samer Baher Experiment 28: Halogenation: Synthesis of 4-Bromoacetanilide by Electrophilic Aromatic Substitution, Part 1 I Objective The objective of this lab was to learn about conditions needed for Electrophillic Aromatic Substitution. This reaction will be a halogenation reaction where acetanilide will react with bromine to yield 4-Bromoacetanillide collected…
Lab 2 – CSEC630 1. When running Snort IDS why might there be no alerts? When using Snort IDS, there are several modes that if configured properly, will generate alerts. Alerts are set by the user within the command prompt when initiating a rule set. There are five alerting options available with Snort IDS. According to (Roesch, 1999), Alerts may either be sent to syslog, logged to an alert text file in two different formats, or sent as Win-Popup messages using the Samba smbclient program…
Unit 2 Lab 1. The major difference between DIACAP and DITSCAP is a strengthened focus on information assurance controls as the primary set of security requirements for all automated information systems (AIS’s) 2. Director of central intelligence Directive 6/3 (DCID 6/3) has more detail regarding physical security and encryption. 3. Certification & Accrediation (C&A), Defense information systems Network (DISN), Global Information Grid (GIG), Principal Accrediting Authority (PAA), Designated Accrediting…
Unit 2 Lab 1 1. Risk assessment and vulnerability assessment, can uncover known weaknesses and vulnerabilities in its existing IT infrastructure, prioritize the impact of these vulnerabilities based on the value and importance of affected IT and data assets, and then implement the proper security controls to mitigate the weaknesses. 2. It sorts sensitive information into different access levels. Making it so that only a person with the approved level of access is allowed to view the information…