3 Lab Created Pigs

In: English and Literature

Submitted By AFMexican
Words 326
Pages 2
The year is 2329 and there were three lab created pigs. Their intelligence allowed them to remain off the breakfast menu. One pig built a house with straw as he calculated the material to be the least inexpensive in nature. The second pig created his house with sticks formulating the idea that he could grow the material needed for the build. The third pig who was created just a tad bit more special constructed a house using Vanadium metal as its properties allow for higher thermal resistance and durability. Within the same lab those pigs were created in, a failed genetically enhanced wolf escaped. It was by fate that these pigs should encounter this wolf. When the first pig caught glimpse of the foul creature, he fled inside his straw house. The wolf cried, “Come out pig so I can turn you into bacon!” The wolf inhaled deeply and created a space like vacuum in his belly and exhaled a powerful wind blast towards the first pig’s house rendering it incapacitated. The first pig ran inside the second pig’s house. The wolf walked to the second pig’s house with a grimace expression and without hesitation hurled his grotesque acid based saliva at the second pig’s house. The pigs escaped to the third pig’s house as the first house was blown away and the second incinerated. Again, the wolf in rage launched a full scale attack blasting and spitting only to see the third pig’s house unscathed. The wolf exploited the third pig’s house and found a weak spot. He then ‘wind blasted’ his way through and upon leaping inside does he find himself in the lava pit where the vanadium metal is enriched. The wolf dies a horrible death and the third pig uses the vanadium wolf mixture to cover the weakened section of the house. The other two pigs take a note from this and adopt the third’s creation into their own. The…...

Similar Documents

Lab 3

...Lab #3 Assessment Questions & Answers 1. What are the three fundamental elements of an effective access control solution for information systems? Identification, Authentication, and Authorization 2. What two access controls can be setup for a Windows Server 2003 folders and authentication? Authentication and Access control. 3. lf you can browse a file on a Windows network share but are not able to copy it or modify it what type of access controls and permissions are probably configured? What type of Access Control would best describe this access control situation? List Folder Contents – Security Policy based control. 4. What is the mechanism on a Windows Server where you can administer granular policies and permissions on a Windows network using role-based access? Group Policy Editor 5. What is two-factor authentication and why is it an effective access control technique? Two Factor uses two of the three characteristics in Authentication types (Knowledge, Ownership, Characteristics) 6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve C-1-A for departmental LANs, departmental folders, and data. creates security principals in the Active Directory domain partition 7. Is it a good practice to include the account or user name in the password? Why or why not? It is not a good idea to have a user name in the password, because it easy for people can try to hack or decode the password. 8. Can a user...

Words: 324 - Pages: 2

Lab 3

...Lab 3 assessment 1) What is the significance of creating Groups and Users to Groups? Explain Creating groups enables access to specific files rather than giving everyone access to specific files. 2) Given the scenario where there are five database administrators that may periodically need access to a given system. Discuss a concept to better manage these administrators' access permissions. Each administrator will need to have their own password to access the system. 3) The new web administrator's account has been set up and a password provided. What is the process to force a password change upon first long? su -c 'chage -d 0 jtemp' 4) What is the purpose of the "su" command? Explain its significance. su is so that the user can enter superuser mode. 5) Restricting the use of the 'su' command can be configured using what mechanism? Vi /etc/pam.d/su 6) What is the purpose of the login.defs files? Explain the contents and configuration options. The login.defs file contains the maximum number and minimum number of data a password may be used, the minimum acceptable password length, and number of days a warning is given before a password expires. 7) What is the PASS_MIN_DAYS setting? Why would it be a good idea to set the PASS_MIN_DAYS setting? This setting is the minimum number of days allowed between password changes. It's a good idea to set this setting so that the user is always able to change their password. 8) What is the PASS_MAX_DAYS setting?......

Words: 390 - Pages: 2

Lab 3

...Lab 3 Assessment Questions & Answers 1. What two access controls can be set up for Windows Server 2003 folders and authentication? Authentication & Access Control 2. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? Security Policy 3. What is the Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access? Group Policy Editor 4. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. Creates security principals in the Active Directory partition 5. Would it be a good practice to include the account or user name in the password? Why or why not? No- it is not a good idea, because most password cracking programs will insert the account. 6. Can a user who is defined in the Active Directory access a shared drive if that user is not part of the domain? Non domain machines cannot access shared folders 7. Does Windows Server 2003 require a user’s logon/password credentials prior to accessing shared drives? Yes- Credentials are required 8. Using what you know about access controls, what security controls would you recommend when granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.) that will maintain CIA of......

Words: 252 - Pages: 2

The 3 Little Pigs

...The Story of The Three Little Pigs Once upon a time, there was a mother pig who had three little baby pigs. The three little pigs grew so big that their mother said to them, "You are too big to live here any longer. You must go and build houses for yourselves. But take care that the wolf does not catch you." The three little pigs set off. "We will take care that the wolf does not catch us," they said. Soon they met a man who was carrying some straw. "Please will you give me some straw?" asked the first little pig. "I want to build a house for myself." "Sure," said the man, and he gave the first little pig some straw. The first little pig built himself a house out of it. He was very pleased with his house. He said, "Now the wolf won't catch me and eat me!" The second little pig and the third little pig went on along the road. Soon they met a man who was carrying some sticks. "Please will you give me some sticks?" asked the second little pig. "I want to build a house for myself." "Sure," said the man, and he gave the second little pig some sticks. Then the second little pig built himself a house of sticks. It was stronger than the house of straw. The second little pig was very pleased with his house. He said, "Now the wolf won't catch me and eat me!" The third little pig walked along the road by himself. Soon he met a man carrying some bricks. "Please will you give me some bricks?" asked the third little pig. "I want to build a house for myself." "Sure," said the......

Words: 784 - Pages: 4

The 3 Little Pigs

...Little Pigs classic bed time story that teaches us life lessons and brings back memories of our childhood. What more can anyone ask for from a story? The story begins with an old mother pig who had three little piglets. She could not afford to have them living at home and so asked them to go out and seek their own fortune. The trio set out on the road full of optimism. The first piglet met a man selling straw, he asked for some and set out to build a house. Enter the Big Bad wolf, who had his eye on the piglets. He went up to the first piglet’s house; he huffed and puffed and blew the house down. That was the end for little piggy. Next he went to the second piglet’s house, whose house was built from grass. This house was no match for the huffing and puffing wolf. Finally he came across the third piglet, who had built a house of bricks, and the wolf tried and tried but couldn’t do a thing to bring the house down. Undeterred, he tried a new course of action; he invited the piglet to come and pick turnips the next day. The piglet, however had sensed his ulterior motives and went early and got the turnips. The wolf was not done yet; he invited the piglet to go apple picking the next day. This time the wolf arrived early, but the piglet had gone earlier. The wolf trapped the pig up on the tree, but the piglet tossed an apple far from the wolf and fooled the wolf with this distraction. Next the wolf called the little pig to the fair, this time the wolf caught the pig as......

Words: 353 - Pages: 2

Lab 3

...9. 10. 9. 10. 1. 2. 3. 4. 5. 6. 7. 8. 1. 2. 3. 4. 5. 6. 7. 8. Lab 3: Exploring Busses Justin Faile October 6, 2014 NT1110 Lab 3: Exploring Busses Justin Faile October 6, 2014 NT1110 Lab 3: Exploring Busses Justin Faile October 6, 2014 NT1110 Lab 3: Exploring Busses Justin Faile October 6, 2014 NT1110 1. MagSafe is a series of proprietary magnetically attached power connectors. 2. Ethernet 3. FireWire 4. Thunderbolt – it’s a hardware interface that allows connection for external displays such as MDP (Mini Display Port) 5. USB 3.0 6. SDXC Card Slot 7. Audio Line In/Out 8. Battery Light Indicator 9. Kensington Lock Slot - (K-Slot) anti theft reinforced metal hole used for attaching lock apparatus. 10. 8XSuper Drive – (Disk Drive) http://designchair.co.uk/wp-content/uploads/2011/11/macbook.jpg http://hothardware.com/articleimages/Item1538/small_MacBook-Pro-right-side-view.jpg http://en.wikipedia.org/wiki/Thunderbolt_%28interface%29 http://en.wikipedia.org/wiki/Kensington_Security_Slot 11. MagSafe is a series of proprietary magnetically attached power connectors. 12. Ethernet ......

Words: 273 - Pages: 2

Lab 3

...LAB 3Ex 3.1.1 We would have a harder time making devices that we use every day.so We would to have multiple routers depending on the devices we own and probably would not be able to use internet when anywhere like we do today. Ex 3.1.2 Laptop and Wireless router model is the easiest model to understand because we use them every day. Ex 3.1.3 Hub – physical  Switch – Data Link Router – Network Review 3.1 1. It would be insufficient because it would have to include the other important layers like data which is what is being sent. 2. Much of the work on the design of OSI was done by a group at Honeywell Information Systems. This group was chartered with advanced product planning and with the design and development of prototype systems. The main idea in OSI is that the process of communication between two end points in a telecommunication network can be divided into layers, 3. The TCP/IP protocols were initially developed as part of the research network developed by DARPA. It was designed to use a number of protocols that had been adapted from existing technologies Lab 3.2: The OSI Reference Model  Ex 3.2.1 1. PHYSICAL (Layer 1) – It describes the electrical/optical and functional interfaces to the physical medium, and carries the signals for all of the higher layers. It provides data encoding. 2. Data Link-The data link layer provides transfer of data frames from one node to another, allowing layers above it to assume virtually error-free......

Words: 584 - Pages: 3

Lab 3

...Lab 3 TCP\IP networking communication protocols 1. Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network. 2. The DHCP is used to distribute the main IP and create subnets for all additional computer connected to the same network. The DHCP server will be connected to the router and switch; it will distribute specific IP address to each individual computer so they can all be identified. 3. The DNS is the service that converts/translates the alphabetical name of a domain in to a numeric number known as an IP address. It can assign a specific IP address for a domain www.website.com or subsite.website.com. 4. FTP stands for file transfer protocol and it allows people to transfer files from a local destination to a remote location. A lot of web developers use this protocol because it is the main source of uploading and downloading data to their server. POP3 is the main email protocol that email programs use to retrieve emails from an email server. POP3 physically downloads the email to the local location and usually does not leave a copy of the remote server; there is an option to allow a copy to be saved on the mail server. 5. Student IP was 192.168.1.1 and the target IP is 192.68.1.52 6. There was 13,535 packets were delivered back to the IP source. 7. The 3-way handshake is used to establish a strong connection. The handshake allows the server and client to agree......

Words: 348 - Pages: 2

Lab 3

...Lab #3 – Assessment Worksheet Data Gathering and Footprinting on a Targeted Web Site Student Name: ___Westley Mixon________________________________________________ Lab Due Date: __________January 28, 2015________________________________________ Overview The first phase of hacking is the footprinting phase, which is designed to passively gain information about a target. In this lab, you performed technical research against three Web domains using Internet search tools. You collected public domain information about an organization using the Google search engine to uncover information available on the Internet. Finally, you recorded the information you uncovered in a research paper, describing how this information can make an organization vulnerable to hackers. Lab Assessment Questions & Answers 1 What information can you obtain by using the WHOIS tool contained within Sam Spade? Domain owner, including contact names, numbers, addresses, and the names of associated servers. 2 Besides the WHOIS utility covered in this lab, what other functions did you discover are possible with the Sam Spade utility? That you can Ping, nslookup, Whois, IP Block, Dig, Traceroute, Finger SMTP Verify, Time, Blacklist, and Abuse Lookup. 3 What is the purpose of the tracert command? What useful information does the trace route tool provide? How can this information be used to attack the targeted website? It identify the network path that must be followed to reach......

Words: 521 - Pages: 3

Lab 3

...Objective To implement the Product of Sums (POS) of a Boolean expression. Components ICs: NOT (7404), 2-input AND (7408), 2-input OR (7432) Lab equipment: breadboard, power supply, multimeter. Problem Derive the Product of Sums (POS) expression from the equation provided below. Y = A’B + B’C’D’ + BCD + AB’CD Note that gates with large number of inputs can be constructed from gates with less number of inputs. Introduction The equation Y=A’B+B’C’D’+BCD+AB’CD needs to be rearranged using a Karnaugh map to support the product of sums circuit. The truth table for the previous experiment, Lab 2 SOP Implementation of Boolean Expressions, is used for the Karnaugh map. IC 7408 and 7432 only has 2 inputs for each gate, so an extra pair is needed to be able to manage the amount of OR gates required. Prelab In order to simplify the equation, the truth table needed to be solved for Y = A’B + B’C’D’ + BCD + AB’CD and converted using a Karnaugh map. During simplification, the coordinates at the 0’s that are grouped up horizontally and vertically, in groups of two, and are divided. When searching for the product of sums the 1’s turn to 0’s, and is a commonly missed error. After simplifying the expression, the schematic was drawn to map out the 2 input gate structure of the ICs: 7404, 7408, and 7432. Truth Table for Y = A’B + B’C’D’ + BCD + AB’CD A’ | B’ | C’ | D’ | A | B | C | D | A’B | B’C’D’ | BCD | AB’CD | Y | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |......

Words: 1506 - Pages: 7

Lab 3

...In this lab, you will demonstrate the ability to examine and investigate the different types of motherboards and CPUs used in a computer. Required Setup and Tools Photos of motherboards and CPUs are provided in the lab worksheet. However, if possible, the case cover of a desktop computer should be removed in order to get a look inside the system at the motherboard. The system should be unplugged and off when this work is done. You also need access to the Internet for research. Use the Lab 3 Worksheet to submit your responses. Recommended Procedures Task 1: Examine the Motherboard Procedure 1. Examine the following motherboard. One interesting thing you will see is the use of two BIOS chips. The M-BIOS chip is the Main BIOS chip and the B-BIOS chip is the Backup BIOS chip, which is used to rewrite the M-BIOS chip if it becomes corrupted. (Refer to the high-resolution images for closer inspection.) 2. Using the Internet, locate information on the LGA 1156 connector. What processors is it used with? What is its purpose on the motherboard? 3. Using the Internet, locate information on the Intel H55 Chipset. What processors is it used with? What is its purpose on the motherboard? 4. Using the Internet, locate information on the Gigabyte GA-H55M-UD2H motherboard. What interesting information can you find? Task 2: Examine the Chipset and Connectors 1. Examine the following motherboard. (Refer to the high-resolution images for closer......

Words: 676 - Pages: 3

Lab 3

...MBK – Lab Report Name: __Jade Smart___ Section: ___________________ Aseptic Technique and Culturing Microbes Part 3: Generating Microbial Cultures: Observe your organisms after 24 hours to assess the growth patterns of all tubes. If there is no observable growth allow the tubes to incubate an additional 24 hours. Record your observations. Questions: A. What is the difference between a bactericidal and bacteriostatic agent? Between sterilization and disinfecting? The difference between the two is that bactericidal kills bacteria directly. While bacteriostatic stops the bacteria from growing. Bactericidal will injure the plasma membrane and the cell will leak out, killing it. Bacteriostatic stops bacteria from replicating. The main difference between sterilization and disinfection is, that sterilization kills all microorganisms, while disinfection eliminates harmful microorganisms from inanimate objects and surfaces. Sources: http://study.com/academy/lesson/types-of-antibiotics-bacteriocidal-vsbacteriostatic-narrow-spectrum-vs-broad-spectrum.html http://www.diffen.com/difference/Disinfect_vs_Sterilize B. List five sterilization methods, how they work, and what they are used for. The first form is steam. A machine called an autoclave is heated to 121-134 degrees Celsius. You hold the object there for 15 minutes for 121 degree Celsius or 3 minutes at 134 degree Celsius. It is used to inactivate all fungi, bacteria, viruses,...

Words: 774 - Pages: 4

Lab 3

...Name_______________________________ My Solar System Lab Worksheet 1. Go to: http://phet.colorado.edu/en/simulation/my-solar-system 2. Select RUN 3. Move the slider all the way to accurate, click on the tape measure and the grid. 4. Click the radio button for 4 objects and run the simulation until the purple planet (body 2) has made one complete orbit (one year). 5. After the first orbit (year), turn off the traces (show traces box) and watch another orbit (year) of the purple planet (body 2). Question One: Is blue moon (body 3) circling the yellow sun (body 1) or the purple planet (body 2)? Explain your answer. ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ 6. Increase the mass of the sun (body 1) to 400 and allow the simulation to run for one complete orbit of the purple planet (body 2). 7. Decrease the mass of the sun (body 1) to 175 and allow the simulation to run for one complete orbit of the purple planet (body 2). (~90 seconds) Question Two: How do the orbits of the planets change when the mass of the sun is increased or decreased? Why? Explain your......

Words: 578 - Pages: 3

3 Little Pigs

...Summary of the Facts Three Little Pigs, Inc. (PIGS) is trying to determine if they should impair their inventory due to a decline in futures prices. Although prices are declining, it is believed that the futures prices will begin to recover within the year. PIGS inventories consists of the following: live hogs to be internally processed, developing animals to be internally processed, internally processed pork products, live hogs to be sold to a third party, and developing animals to be sold to a third party. The question of impairment applies only to the live hogs and developing animals to be sold to a third party because it is believed that internally processed pork products will be able to cover the costs of live hogs and developing animals to be processed internally. Question: How should the Company determine whether an inventory impairment exists at September 30, 2002? More specifically, how should management evaluate impairment? Response: ASC 330-10-35-2 states that, “in accounting for inventories, a loss shall be recognized whenever the utility of goods is impaired by damage, deterioration, obsolescence, changes in price level, or other causes.” In PIGS case they should recognize a loss because the utility of their live hogs to be sold to a third party and their developing animals to be sold to a third party have suffered from a decrease in price level. When determining whether inventory should be evaluated for impairment under the lower of......

Words: 700 - Pages: 3

Pig Disection Lab

...KU= | | | | Name: Spencer DiPaolo Pig Dissection Lab Complete the “Birth Certificate” for your pig: (3 marks, TH) Birth Certificate | ------------------------------------------------- This is to certify that ------------------------------------------------- ------------------------------------------------- (Laner) | Was born the 12th Day of January2016, in Brantford, Ontario | Sex: Male | Gestational Age: 140 days | Length 27cm | External Anatomy of the pig: Insert a picture of your pig’s external anatomy here. Label the body regional terms. (Anterior, Posterior, Dorsal, Ventral, Medial, Lateral, Proximal (indicate the proximal region of the forelimb) Distal (indicate the distal region of the forelimb) (8 marks, TH) Mouth Insert a picture of your pig’s external anatomy here. Label the body regional terms. (Anterior, Posterior, Dorsal, Ventral, Medial, Lateral, Proximal (indicate the proximal region of the forelimb) Distal (indicate the distal region of the forelimb) (8 marks, TH) Organs not seen: Digestive Cavity of the Fetal Pig Insert a picture of your pig’s digestive cavity here. Label the bolded organs from the dissection guide. Below, the figure indicate any missing organs. If you had to remove organs to see others, include the individual pictures. (10 marks, TH) Organs not seen: Insert a picture of your small and large intestines unwound. Use a ruler as a reference guide. (3 marks) Length of small intestine 90 cm ...

Words: 567 - Pages: 3

Winspector | Je browsegeschiedenis bekijken of bewerken | Mutfak Armatürleri