Assignment Mineral Lab

In: Other Topics

Submitted By cheyanne
Words 416
Pages 2
Associate Level Material
Appendix C

Mineral Identification Worksheet

Open the simulation and print this worksheet and the Mineral Identification Job Aid. Then do the following:

1. Conduct all tests on the minerals in the virtual lab. Minerals in the virtual lab are numbered 1–7. Keep track of which mineral you are working with as you record your observations.

2. Record your observations of each test in Part 1 of this worksheet.

Help: Refer to the job aids in the upper right corner of the test screens to help you interpret what you observe.

3. Identify the minerals by comparing your observations with the Mineral Identification Reference Sheet. Write the name of each mineral in Part 2 of this worksheet.

Help: The minerals in the virtual lab are numbered to conceal their identities, but the minerals will include seven of those listed below. To help you identify them, refer to the Mineral Identification Job Aid.

• Borax • Calcite • Corundum • Graphite • Gypsum • Orthoclase feldspar • Pyrite • Quartz • Talc • Topaz

4. Post Part 1, Part 2, and Part 3 in this worksheet as an attachment to your Assignment Section. Delete the introductory instructions in this worksheet before you submit it to your instructor.

Part 1: Recording Observations

In the chart below, record your observations of each test for the seven minerals. After you have completed all tests, name the minerals in Part 2 of this worksheet. An example of how to fill out the chart is illustrated below.

|Recorded Observations for Minerals 1–7 |
|Tests |Example…...

Similar Documents

Lab 1 Assignment Question

...Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADED STARTS AS SERVICE Y/N 1. ❑ Yes ❑ No 2. ❑ Yes ❑ No 3. ❑ Yes ❑ No 4. ❑ Yes ❑ No 5. ❑ Yes ❑ No 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server,and the IP default gateway router? • The source IP host address was 172.30.0.8 but the IP default gateway was 172.30.0.1 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? • Yes the host sent a response, and there were 4 responses. 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? • The TTL changes from 64 to 128. 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? • nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 173.30.0.0/24 6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans. • Intense Scan • Quick Scan ...

Words: 345 - Pages: 2

Asttronomy Lab Assignment

...Lab 11 Assignment Part 1: Exploring the Moon I- How many Apollo missions were there and what years did they take place? 1. Apollo 1 on January 27, 1967 2. Apollo 7 on October 11, 1968 3. Apollo 8 on December 21, 1968 4. Apollo 9 on March 3, 1969 5. Apollo 10 on May 18, 1969 6. Apollo 11 on July 16, 1969 7. Apollo 12 on November 14, 1969 8. Apollo 13 on April 11, 1970 9. Apollo 14 on January 31, 1971 10. Apollo 15 on July 26, 1971 11. Apollo 16 on April 16, 1972 12. Apollo 17 on December 7, 1972 Apollo 2 and 3 (these were no craft named) Apollo 4 (Also called AS-501) on November 9, 1967. Apollo 5 (also called AS-204) on January 22, 1968. Apollo 6 (Also called AS-502) on April 4, 1968. There were 17 in total. II- How many of the missions orbited the Moon and how many landed? Which ones? * Apollo 8 and Apollo 10 orbited the Moon and returned. * Apollo 11, 12, 14, 15, 16 and Apollo 17 landed on the Moon. A total of 6. III- Unfortunately, there was an accident early on. Which mission was it? The mission that suffered a tragic accident was Apollo 1. Part 2: Venus I- How many Venera Missions (Russian) were there? Over what time period did these missions occur? Did any of the crafts actually land on the surface? What happened? * Venera 1 in 1961 - Venera 8 in 1972 * Venera 2 and 3 in 1965 - Venera 9 and 10 in 1975 * Venera 4 in 1967 - Venera 11 and 12 in 1978 ...

Words: 1570 - Pages: 7

Week 3 Lab Assignment

...PEACHTREE COMPLETE ACCOUNTING 2010 ®: The Winery At Chateau Americana LEARNING OBJECTIVES After completing and discussing this assignment, you should be able to: • Recognize the managerial and technological issues associated with the implementation of a general ledger package • Complete sample transactions • Understand the implications of the design of the user interface • Recognize and evaluate the strengths and weaknesses of controls embedded in a general ledger package • Compare and contrast a general ledger package with a manual accounting information system BACKGROUND As the winery has grown, Rob Breeden, the chief financial officer, has realized that management does not have timely information about the financial condition of the company. This has resulted in several instances in which the decisions made were not optimal. Therefore, he has determined that it is time to convert the current system to a general ledger package. After investigating the possibilities, he has decided to utilize Peachtree Complete Accounting 2010®. Chateau Americana has hired you to convert the system. REQUIREMENTS Using the Peachtree Complete Accounting 2010® software program contained in your CAST package or in your school computer lab, you are to convert Chateau Americana from a manual system to a general ledger software package. If you are working on this assignment on your home computer, load the software following the instructions contained on the CD envelope. As with any......

Words: 3080 - Pages: 13

Securing Linux Lab Assignment

...Week 3 Lab This lab consists of two parts. Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 5 and Unit 6 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part #1 Apply Hardened Security for Linux Services & Applications Learning Objectives and Outcomes Upon completing this lab, students will learn about the following tasks: * Harden Linux server services when enabling and installing them, and keep a security perspective during configuration * Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened before hosting a web site * Configure and perform basic security for a MySQL database, understanding the ramifications of a default installation and recommending hardening steps for the database instance * Install, setup and perform basic security configuration for Sendmail to be able to leverage the built-in messaging capabilities of the Linux System * Enable and implement secure SSH for encrypted remote access over the network or across the Internet of a Linux server system Overview This lab is an extension of the previous hands-on labs, and it incorporates security hardening for Linux services and applications loaded in the physical server. This demonstration will configure security and hardened......

Words: 2020 - Pages: 9

Geology 220 Minerals Lab

...observations of each test for the seven minerals. After you have completed all tests, name the minerals in Part 2 of this worksheet. An example of how to fill out the chart is illustrated below. |Recorded Observations for Minerals 1–7 | |Tests |Example |Mineral 1 | |Example: Fluorite |80% certain |I am almost certain this mineral is fluorite, but I am not completely sure. Fluorite and gypsum| | | |are both white, shiny, have white streaks, cleave, and show no reaction to acid. However, the | | | |specific gravity of this mineral is 3.18, which is higher than gypsum, so I am pretty sure it | | | |is fluorite. | |Mineral 1: Pyrite |95% |I’m almost certain this mineral is Pyrite. Pyrite is Fool’s......

Words: 610 - Pages: 3

Mineral Lab Paper

...Mineral Lab Paper Week One Mineral Lab Geology SCI/245 Axia College Mineral lab Paper The four requirements for minerals are that they must be naturally occurring in other words they must appear in nature something that that was formed by the earth and not man made. It must be inorganic which means I must not be formed from an organic substance like a fossil of any other living creature. It must have a specific crystalline structure that is formed from simple salts and complex silicates. And it must have a definite chemical composition which defines the minerals structure. The way that you differentiate between minerals is by the way they react to specific tests like for instance the acid test some minerals will have a bubbling action and other one will have no reaction and by color minerals come in many different shades an colors. The six methods to tell minerals apart are the color test by looking at the mineral it can be classified by its color. Another method is the streak test which is the color of the mineral in its powered form this is the true color of a mineral specimen as it lessens the impurity impact and eliminates the light distortion from the crystal. The luster test refers to the absorption, refection, or refraction of light by the surface of a mineral. The fluorescence test in ultraviolet light, some mineral specimens appear to Florence due to the fluorescent mineral impurities or due to locality. Chemical composition is another method because......

Words: 379 - Pages: 2

Lab Assignment 3

...Week 3 - Lab 3: Exploring Busses (computer and paper) Requirements 1. Label each type of port in the picture below: P/S 2 Ethernet Parallel Port HDMI Port IEEE Mouse Port Port 1394a Port P/S 2 Keyboard USB Ports Serial Port VGA Port Speakers Line In Microphone Port 2. Locate and print a picture of a: a. Secure Digital (SD) card or card reader b. Compact Flash (CF) card or card reader c. Micro Drive or reader d. Memory Stick or reader 3. Be sure to label each picture, and a flash drive is not the same as any of these devices. A. Secure Digital (SD) card B. Compact Flash (CF) card C. Micro Drive D. Memory Stick http://www.google.com/search?q=secure+digital+card&biw=1301&bih=641&source=lnms&tbm=isch&sa=X&ei=jXs1VJrDKsWeyATV6oLwAQ&sqi=2&ved=0CAcQ_AUoAg#facr...

Words: 286 - Pages: 2

Csec630 Lab Assignment 2

...CSEC630 Lab Assignment 2 1. When running Snort IDS why might there be no alerts? It is possible that a user might not get any alerts while using Snort IDS. One reason could be that the user didn't set up the Snort with optimum settings. The user may have set it up on a port that is not been used by the network. Snort works by using a set of rules. The user can either download and use these rules from the Snort website with default settings, or can modify them to his/her network requirements and needs. By changing the default settings of the rules provided on the Snort website, there is a chance that the user might disable packet sniffing on a port that needs to be enabled, causing no alerts on that port. There is also a possibility that user may have set a range of ports to be scanned by Snort IDS for sniffing and the traffic that is coming in the network is not through any of those ports, muting the alerts. 2. If we only went to a few web sites, why are there so many alerts? An Intrusion Detection System (IDS) provides a wide range of monitoring techniques including packet sniffing, file integrity monitoring, and even artificial intelligence algorithms that detect anomalies in network traffic. Snort, a public domain intrusion detection system, monitors traffic by analyzing every packet on a network, looking for malevolent content. It does this by putting the network adaptor in promiscuous mode so that it can see all network traffic on the wire, a process referred...

Words: 1658 - Pages: 7

Hrm 560 Week 7 Assignment 3 – Ajax Minerals and Perrier

...Week 7 Assignment 3 – Ajax Minerals and Perrier Click Link Below To Buy: http://hwcampus.com/shop/hrm-560/hrm-560-week-7-assignment-3-ajax-minerals-and-perrier/ Or Visit www.hwcampus.com HRM 560 Week 7 Assignment 3 – Ajax Minerals and Perrier Read the Ajax Minerals exercise and the Problems at Perrier case study in Chapter 6 of the Palmer textbook. Write a six to eight (6-8) page paper in which you: 1. Identify two (2) sources of resistance to change in the Ajax Minerals exercise and describe how the organization dealt with each type of resistance. 2. Identify two (2) sources of resistance to change in the Perrier case study and describe how the organization dealt with each type of resistance. 3. Compare and contrast how management diagnosed and approached change at the two (2) companies and indicate which company dealt with resistance to change in a more effective manner. Justify the reasoning. 4. Consider a situation as a consultant with Ajax Management. Propose two (2) adjustments that should be made to improve its change strategy and provide a justification as to why those adjustments would improve the effectiveness of the strategy. 5. Consider a situation as a consultant with Perrier. Propose at least two (2) adjustments that should be made to improve its change strategy and provide a justification as to why those adjustments would increase the effectiveness of the strategy. 6. Use at least three (3) quality academic resources in this assignment.......

Words: 262 - Pages: 2

Hrm 560 Week 7 Assignment 3 – Ajax Minerals and Perrier

...Week 7 Assignment 3 – Ajax Minerals and Perrier Click Link Below To Buy: http://hwcampus.com/shop/hrm-560/hrm-560-week-7-assignment-3-ajax-minerals-and-perrier/ Or Visit www.hwcampus.com HRM 560 Week 7 Assignment 3 – Ajax Minerals and Perrier Read the Ajax Minerals exercise and the Problems at Perrier case study in Chapter 6 of the Palmer textbook. Write a six to eight (6-8) page paper in which you: 1. Identify two (2) sources of resistance to change in the Ajax Minerals exercise and describe how the organization dealt with each type of resistance. 2. Identify two (2) sources of resistance to change in the Perrier case study and describe how the organization dealt with each type of resistance. 3. Compare and contrast how management diagnosed and approached change at the two (2) companies and indicate which company dealt with resistance to change in a more effective manner. Justify the reasoning. 4. Consider a situation as a consultant with Ajax Management. Propose two (2) adjustments that should be made to improve its change strategy and provide a justification as to why those adjustments would improve the effectiveness of the strategy. 5. Consider a situation as a consultant with Perrier. Propose at least two (2) adjustments that should be made to improve its change strategy and provide a justification as to why those adjustments would increase the effectiveness of the strategy. 6. Use at least three (3) quality academic resources in this assignment.......

Words: 262 - Pages: 2

Hrm 560 Wk 7 Assignment 3 Ajax Minerals and Perrier

...HRM 560 WK 7 ASSIGNMENT 3 AJAX MINERALS AND PERRIER To purchase this visit here: http://www.activitymode.com/product/hrm-560-wk-7-assignment-3-ajax-minerals-and-perrier/ Contact us at: SUPPORT@ACTIVITYMODE.COM HRM 560 WK 7 ASSIGNMENT 3 AJAX MINERALS AND PERRIER HRM 560 WK 7 Assignment 3 - Ajax Minerals and Perrier Read the Ajax Minerals exercise and the Problems at Perrier case study in Chapter 6 of the Palmer textbook. Write a six to eight (6-8) page paper in which you: 1. Identify two (2) sources of resistance to change in the Ajax Minerals exercise and describe how the organization dealt with each type of resistance. 2. Identify two (2) sources of resistance to change in the Perrier case study and describe how the organization dealt with each type of resistance. 3. Compare and contrast how management diagnosed and approached change at the two (2) companies and indicate which company dealt with resistance to change in a more effective manner. Justify the reasoning. 4. Consider a situation as a consultant with Ajax Management. Propose two (2) adjustments that should be made to improve its change strategy and provide a justification as to why those adjustments would improve the effectiveness of the strategy. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of HRM 560 WK 7 Assignment 3 Ajax Minerals and Perrier in order to ace their studies. HRM 560 WK 7 ASSIGNMENT 3 AJAX MINERALS AND PERRIER To......

Words: 724 - Pages: 3

Prelab Assignment Lab 5

...global variables ● Practice with functions that can return more than a value and whose parameters’ scopes are not local to the function ● Input validation These pre-labs are directly related to the lab activities. You don’t need to complete the program. What you need to do is to work on the logic and perhaps some key parts of each program and then complete them in the lab. Assigned: Date of your lab 4 Due: the night before lab 5 Questions Prelab activity for Lab 5A: Find the difference between two types of returning values. Implement the following function prototypes (which take hours of work as integer and the rate of pay as float and calculates the net-payment as float) on paper. Also, write a main function which calls both functions. Compare the calculated net values and show the proper message whether or not they match. Name your variables as hours, rate, and netPay. float calNetPay(int, float); void calNetPay2(float&, int, float); Also, answer the following questions: What does the operator & do? Create a table and put all of the variables of the program inside the first column. The second column should show the scope of each variable. For example for calNetpay2 function if you called the integer variables hours, its scope will be the function calNetPay2. Prelab activity for Lab 5B: Create a flowchart showing the following scenario: 1. Present the user with a list of options, 1-3 with proper message as indicated below. 2. Get......

Words: 471 - Pages: 2

Nt2580 Unit 3 Assignment & Lab

...NT2580 Unit 3 Assignment & Lab Unit 3. Assignment 1 - Remote Access Control Policy Definition There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentication. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must......

Words: 477 - Pages: 2

Mineral Lab Worksheet

...following chart, record your observations of each test for the seven minerals. After you have completed all tests, name the minerals in Part 2 of this worksheet. An example of how to fill out the chart is illustrated follows. Recorded Observations for Minerals 1-7 Tests Example Mineral 1 Mineral 2 Mineral 3 Mineral 4 Mineral 5 Mineral 6 Mineral 7 Color White Gold Green White Pink White White Black Streak White Black White White White White White Brown Luster Shiny Shiny Specks Shiny Specks Shiny Dull Shiny Shiny Shiny Specks Specific Gravity 3.18 5.1 2.8 2.7 2.6 2.65 2.4 2.2 Cleavage & Fracture Cleavage Fracture Fracture Cleavage Fracture Fracture Cleavage Fracture Hardness 4 3.1-5.4 1-2.9 1-2.9 3.1-5.4 6.1-10 1-2.9 1-2.9 Acid No Reaction No Reaction No Reaction Active bubbling and Fizz No reaction No reaction No Reaction Light bubbling and fizz Part 2: Naming the Minerals Name the minerals in the following table. Then, insert a percentage of how certain you are in your identification. Finally, explain your percentage of certainty: What was confusing about this mineral? What other minerals do you think it could be? Remember, the minerals include seven of the following: borax, calcite, corundum, graphite, gypsum, orthoclase feldspar, pyrite, quartz, talc, and topaz. Identification of Mineral Percent Certain Explanation of Certainty Example: Fluorite 80% certain I am almost certain this mineral is fluorite, but I am not completely sure. Fluorite and gypsum......

Words: 1502 - Pages: 7

Lab Assignment

...Lab Assignment No. 5 Topic: Inheritance Instructions: Write a program called bookstore.cpp that can read information of book, CDMusic, and DVDMovie from keyboard and then display all the information by its type: book, CDMusic, and DVDMovie. Specifications: Create a base class called Publication. The Publication class contains two member data: * title as an array of characters * price as float It also contains two member functions: * GetData() reads title and price from the keyboard. * DisplayData() displays title and price. Create a derived class called Book. The Book class is derived from Publication class. It contains the page_number as an integer. It also contains two member functions: * GetData() reads the page number from the keyboard. * DisplayData() displays the page number. Create a derived class called CDMusic. The CDMusic class is derived from Publication class. It contains the playing time as float type. It also contains two member functions: * GetData() reads the length of playing time in minutes from the keyboard. * DisplayData() displays the length of playing time in minutes. Create a derived class called DVDMovie. The DVDMovie class is derived from Publication class. It contains the rating as an array of characters. It also contains two member functions: * GetData() reads the rating type from the keyboard. * DisplayData() displays the rating type. In the main routine, the program will...

Words: 430 - Pages: 2