Lab2

In: Computers and Technology

Submitted By sharonshar13
Words 2728
Pages 11
Laboratory 2
Switches, Lights, and Multiplexers
Part I
Objectives
The purpose of this part is to connect the switches and lights by using FPGA chip with VHDL entity. These switches (SW17-0) represent the inputs of a circuit, and LEDR17-0(red lights) represents the outputs of a circuit. Switches are assigned to the LEDR which means each switch connects one light separately. So when one of the switches is on, the corresponding light will be light.
Equipment
DE2 package, Altera’s Quartus II
Design and Test Procedure 1. Create a new project: to start click File > New Project Wizard > select the directory for storing this project and the same name of the project with directory > select Cyclone II and EP2C35F672C6 as the target chip; 2. Create a new VHDL entity: File > New > VHDL File; 3. Type the VHDL code in this file; 4. Start the calculation and it will be automatically saved; 5. When it is completed, the next step which is the most important thing is importing assignment: Assignments > Import Assignments > select the file (DE2 pin assignments.csv); 6. Save the project and click the compilation; 7. Download the compiled circuit: Tools > Programmer > Hardware Setup > select USB-Blaster > make sure the Program Configure box is checked > Start; 8. Test: for every switches, the red LED lights will turn on when the switch is on
Results
It is successful when our group does it in the first time. For every switch, the corresponding red LED light will turn on when the switch is on. The LED light will be off when the switch is off.
Conclusion
I learned how to connect the switches as input and the lights as output by FOGA chip from this part. It’s simple but basal for every laboratory.

Part II
Objectives
The purpose of this part is to create a circuit which has two eight-bit inputs X and Y, one…...

Similar Documents

Security Contexts Lab2

...Week 2 Lab Compliance Law | Purpose | Requirements | PCI | To enhance security of credit card data. The key pieces of data that can be stolen are: name, credit card number, expiration date, and security code. | 1. Install and maintain a firewall. 2. Do no use defaults. 3. Protect stored data. 4. Encrypt transmissions. 5. Use and update antivirus software. 6. Develop and maintain secure systems. 7. Restrict access to data. 8. Use unique logons for each user. 9. Restrict physical access. 10. Track and monitor all access to systems and data. 11. Regularly test security. 12. Maintain a security policy. | HIPAA | To ensure that health information data is protected. Health information is any data that is created or received by health care providers, health plans, public health authorities, employers, life insurers, schools or universities, and health care clearinghouses. It relates to any past, present, or future health, physical health, mental health, or condition of an individual, and past, present, and or future payments for health care. | Security standards: Specific standards are to be used for storage of data, use of data, and transmission of data.Privacy standards: Data must not be shared with anyone without the express consent of the patient.Penalties: Penalties include mistakes, knowingly obtaining or releasing data, obtaining or disclosing data under false pretenses, and obtaining or disclosing data for personal gain or malicious harm. | ......

Words: 375 - Pages: 2

Nt1430 Unit 2 Lab Procedure

...ls ------------------------------------------------- Unit02 Unit04 Unit06 Unit08 Unit10 ------------------------------------------------- Unit03 Unit05 Unit07 Unit09 ------------------------------------------------- fred[fred@localhost NT1430]$ 4. Now we will change directories to Unit02 and use vim to create a text file called LastnameF-Lab2.txt replacing LastnameF with your last name and first initial. ------------------------------------------------- [fred@localhost IT302]$ cd Unit02 ------------------------------------------------- [fred@localhost Unit02]$ touch LastnameF-Lab2.txt 5. We will be gathering information as we create this document. For some of this, we will need root privileges, so we will use the su command, without the dash, to switch to the root user because we do not want to change to the root environment and the root home directory. ------------------------------------------------- [fred@localhost Unit02]$ su ------------------------------------------------- Password: enter root password ------------------------------------------------- [root@localhost Unit02]# vim DoeF-Lab2.txt (cont’d) 6. Put your name in the file and save it, then check to make sure that it belongs to your non-root-user self even though it has been edited by your root self. (Note: The ls command option below is the lowercase letter L, not the number 1.) ------------------------------------------------- [root@localhost Unit02]# ls......

Words: 1532 - Pages: 7

Lab2

...Targeted attacks did not start in 2010 and will not end there. in addition, while Hydraq was quickly forgotten and, in time, Stuxnet may be forgotten as well, their influence will be felt in malware attacks to come. Stuxnet and Hydraq teach future attackers that the easiest vulnerability to exploit is our trust of friends and colleagues. Stuxnet could not have breached its target without someone being given trusted access with a USB key. Meanwhile, Hydraq would not have been successful without convincing users that the links and attachments they received in an email were from a trusted source. Social networks. Whether the attacker is targeting a CEO or a member of the QA staff, the internet and social networks provide rich research for tailoring an attack. By sneaking in among our friends, hackers can learn our interests, gain our trust, and convincingly masquerade as friends. Long gone are the days of strange email addresses, bad grammar, and obviously malicious links. A well-executed social engineering attack has become almost impossible to spot. Zero-day vulnerabilities and rootkits. Once inside an organization, a targeted attack attempts to avoid detection until its objective is met. Exploiting zero-day vulnerabilities is one part of keeping an attack stealthy since these enable attackers to get malicious applications installed on a computer without the user’s knowledge. in 2010, 14 such vulnerabilities were discovered. Rootkits also play a......

Words: 548 - Pages: 3

Lab2

...Learning Objectives and Outcomes  Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows:  Windows laptops: Traveling salespeople, remote suppliers, branch offices  Windows desktops: Accounting group, developer group, customer service group  Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories at http://technet.microsoft.com/en-us/security/advisoryarchive Answer the following questions based on the advisories for the past 12 months: 1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each. 2. Do any vulnerabilities involve privilege elevation? Why would this be considered a high-priority issue?......

Words: 312 - Pages: 2

Lab2

...1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application. Port scanning, Passive OS fingerprinting. If we need to find a host that may be causing a problem, it can be used to quickly identify hosts that are running on a certain network. 2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan? Nessus 3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step? You must get written permission. 4. What is a CVE listing? Who hosts and who sponsors the CVE database listing website? CVE stands for Common Vulnerabilities and Exposures. It’s a listing for vulnerabilities and exposures. Mitre Corporation hosts the DB. The Department of Homeland Security and the U.S. National Cyber Security Division sponsor it. 5. Can Zenmap GUI detect which operating systems are present on IP servers and workstations? Which option includes that scan? Yes it can detect what operating systems are being used. Intense. 6. If you have scanned a live host and detected that it is running Windows XP workstation OS, how would you use this information for performing a Nessus vulnerability assessment scan? Configure the scan to only include Windows vulnerabilities. 7. Once vulnerability is identified by Nessus, where can you check for more information......

Words: 305 - Pages: 2

Lab2-Chem

...LAB REPORT CH-114A       Experiment: Properties of gases.       Objectives:             The objective of the experiment is to see the physical and chemical properties of gases and how to identify the gases when you have to encounter them. OBSERVATIONS: The things I observed during this experiment were bubbles and color change. DATA: Gas Flame reaction Glowing splint Limewater reaction Brothothymol blue reaction Hydrogen: Flame got bigger with popping Flame went out Light brown color Green color Oxygen: Flame lit up quickly Reignited Color red Color blue Hydrogen and Oxygen: No reaction Flame went out Brown color Greenish blueish color Carbon dioxid- No flame No flame Bubbles and then it turns cloudy Bubbles and then it turns yellow Alka Seltzer: Quickley bubbled Breath: No reaction Quickly bubbles and turns cloudy No reaction Turns blue   CALCULATIONS:   CONCLUSION: In this experiment it made me learn that reactions are way different when you compare them as acidic or basic.   QUESTIONS: 1. Give two reasons why we fill the gas generator test tubes almost to the top with chemicals. -We want to make sure we minimize the amount of air so the gas will stay pure, also, some gases react differently with air. The less space so it will less likely affect the results. 2 What happens to the zinc in the hydrogen generation experiment? -The zinc dissolves. 3. What happens to the manganese in the oxygen generation......

Words: 366 - Pages: 2

Lab2

...Lab 2 Part 1: 10 points Learning Objectives and Outcomes * Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows: * Windows laptops: Traveling salespeople, remote suppliers, branch offices * Windows desktops: Accounting group, developer group, customer service group * Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories at http://technet.microsoft.com/en-us/security/advisoryarchive Answer the following questions based on the advisories for the past 12 months: 1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each. 1. Update for Vulnerabilities in Adobe Flash Player in Internet Explorer...

Words: 684 - Pages: 3

Cs 315 Lab2

...sin(x); printf("sin(x) = %f\n\n ", y); return 0; } Copy and paste the running result here: zfei@cslinux2:~/week02/lab2$ ./q1 Input a real number: 8 sin(x) = 0.989358 2) #include <stdio.h> int main() { int integer1, integer2, sum; printf( "Enter first integer\n" ); scanf( "%d", &integer1 ); printf( "Enter second integer\n" ); scanf( "%d", &integer2 ); sum = integer1 + integer2; printf( "Sum is %d\n", sum ); return 0; } Copy and paste the running result here: zfei@cslinux2:~/week02/lab2$ ./q2 Enter first integer 5 Enter second integer 4 Sum is 9 3) #include <stdio.h> int main() { int counter, grade, total, average; total = 0; counter = 1; while ( counter <= 10 ) { printf( "Enter grade: " ); scanf( "%d", &grade ); total = total + grade; counter = counter + 1; } average = total / 10; printf( "Class average is %d\n", average ); return 0; } Copy and paste the running result here: zfei@cslinux2:~/week02/lab2$ ./q3 Enter grade: 11 Enter grade: 1 Enter grade: 2 Enter grade: 5 Enter grade: 4 Enter grade: 54 Enter grade: 5 Enter grade: 4 Enter grade: 2 Enter grade: 3 Class average is 9 zfei@cslinux2:~/week02/lab2$ 4) #include <stdio.h> int main() { float average; int counter, grade, total; ...

Words: 1271 - Pages: 6

Lab2

...Assessment Worksheet Obtaining Personally Identifiable Information through Internet Research Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored a variety of search engines and social networking Web sites that may contain personal information about you that, in the hands of an identity thief, could compromise and exploit your privacy. You documented the sites that displayed your personal information and suggested methods for controlling access to that information within the specific sites. You also explored the privacy policy of some of the more popular social networking sites. Lab Assessment Questions & Answers 1. Complete the following table to describe the results you discovered about your own personally identifiable information on the Internet. Search Engine Was personal information returned? (Yes or No) Dogpile.com Google.com InstantCheckmate.com AlltheInternet.com WhitePages.com Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Instructor Lab Manual ZabaSearch.com Your local government Web site Facebook LinkedIn Twitter 2. Was there enough personal information returned that......

Words: 435 - Pages: 2

Lab2

...Lab #2 - Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _______EM200_________________________________________ Student Name: _______________________Lorena Agreda_________________________ Instructor Name: __Professor Noura Abbas______________________________________ Lab Due Date: ___02/23/15_________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings. Lab Assessment Questions & Answers 1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application. Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts and detect what operating system and services are running on them, and all without privileged access. Zenmap, and similar tools, are typically used during the scanning and vulnerability phase of the ethical hacking process. 2. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the ethical hacking......

Words: 334 - Pages: 2

Nt1330 Lab2

...Lab 2 worksheet CONFIGURING DNS AND DHCP THIS LAB CONTAINS THE FOLLOWING EXERCISES: Exercise 2.1 Designing a DNS Namespace Exercise 2.2 Creating a Zone Exercise 2.3 Creating Domains Exercise 2.4 Creating Resource Records Exercise 2.5 Creating a Scope Exercise 2.6 Confirming DHCP Server Functionality Exercise 2.7 Configuring DHCP Reservations Workstation Reset: Returning to Baseline Estimated lab time: 100 minutes |Exercise 2.1 |Designing a DNS Namespace | |Overview |You have been tasked with creating a test DNS namespace structure for your organization. Your first | | |task is to design that namespace by specifying appropriate domain and host names for the computers in| | |the division. | |Completion time |15 minutes | 2. In the diagram provided in Figure 2-1, write both the domain names and the fully qualified domain names that you have selected for the computers in the appropriate spaces. Figure 2-1 |Exercise 2.2 |Creating a Zone ......

Words: 782 - Pages: 4

Lab2 Openvas Report

...Scan Report May 18, 2015 Summary This document reports on the results of an automatic security scan. The scan started at Mon May 18 01:32:30 2015 UTC and ended at Mon May 18 01:58:59 2015 UTC. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider the advice given in each description, in order to rectify the issue. Contents 1 Result Overview 2 2 Results per Host 2.1 172.30.0.7 . . . . . . . . . . . . . . . . 2.1.1 High ms-wbt-server (3389/tcp) 2.1.2 Low ms-wbt-server (3389/tcp) 2.1.3 Log ms-wbt-server (3389/tcp) . 2.1.4 Log general/CPE-T . . . . . . 2.1.5 Log general/HOST-T . . . . . 2.1.6 Log general/tcp . . . . . . . . . 2.1.7 Log ssh (22/tcp) . . . . . . . . 2.2 172.30.0.11 . . . . . . . . . . . . . . . 2.2.1 High ms-wbt-server (3389/tcp) 2.2.2 Medium general/tcp . . . . . . 2.2.3 Medium http (80/tcp) . . . . . 2.2.4 Low ms-wbt-server (3389/tcp) 2.2.5 Low http (80/tcp) . . . . . . . 2.2.6 Log ms-wbt-server (3389/tcp) . 2.2.7 Log general/tcp . . . . . . . . . 2.2.8 Log http (80/tcp) . . . . . . . 2.2.9 Log general/CPE-T . . . . . . 2.2.10 Log general/HOST-T . . . . . 2.2.11 Log general/icmp . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 12489 - Pages: 50

Lab2

...Lab #2 – Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings. Lab Assessment Questions & Answers 1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application. Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts and detect what operating system and services are running on them, and all without privileged access. Zenmap, and similar tools, are typically used during the scanning and vulnerability phase of the ethical hacking process. It 2. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the......

Words: 474 - Pages: 2

Sci103 Lab2

...Name: Tracie Loggins Date: 9/6/15 Instructor’s Name: Assignment: SCI103 Phase 3 Lab Report Title: Soil Infiltration and Runoff Instructions: Enter the Virtual Lab and gather the information needed to complete the report from the field. Please type your answers. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Field Research Section 1: Gather the following information from field research while in the Phase 3 lab environment. Notice that each site you visit has a distinctly different surface, which could affect runoff. |One Inch of Rainfall | | | |Shallow water infiltration |Deep water infiltration |Runoff water |Evaporation water | |Vegetation |25% |25% |10% |40% | |Mountain |10% |5% |60% |25% | |Bare soil |20% |15% |35% |30% | Section 2: One inch of rainfall deposits 144 cubic inches (0.623 gallons) of water per square foot of surface area. Use the following formula to calculate the amount of water after one inch of......

Words: 610 - Pages: 3

Lab2

...This assessment is about the identification of I/O ports and devices linked to a computer. It is easy to accidentally unplug an I/O device. If you do, knowledge of the ports and the devices that connect to them will help you correctly reconnect the device. Required Setup and Tools In this laboratory, you need to: * Look at the outside of a desktop or notebook computer. * Access to the Internet for research. Recommended Procedures Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 2. Label the appropriate names to the ports and adaptors given below. mouse mouse Parallel port Parallel port Ethernet Ethernet usb usb Vga port Vga port Hdmi port Hdmi port 1/8 inch mini jack audio 1/8 inch mini jack audio Usb port Usb port Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot. Examples: SD micro SD micro Micro drive Micro drive Memory Stick Memory Stick Compact Flash Compact Flash Secure Digital Secure Digital Task 3: Identify the Configuration Procedure 1. Identify the......

Words: 603 - Pages: 3