Free Essay

Css 200 Ip2-Lab

In: Computers and Technology

Submitted By thegil007
Words 1306
Pages 6
CSS200-1401B-01
Principals of Network Security
Instructor: Gregory Roby
Phase 2, Individual Project
Date: March 08, 2014
By: Gil Palacio

Lab #3
Overview:
In this Lab I am learning how to use the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application. This application is an open source tool that automates network exploration to perform several different types of security audit scans of large IP networks (LAB 3, CTU. 2014). SO here is what I gather while doing this Lab:
I added several IPs to putty in order to build information or to give information to the GUI that I am looking into. I copy pasted the two interfaces that are up,up in the 1st question from the Lab Assessment sheet of the putty profile created:
Interface Ethernet0/0 "", is up, line protocol is up Hardware is 88E6095, BW 100 Mbps Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps) Available but not configured via nameif MAC address c84c.7556.de9e, MTU not set IP address unassigned 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 L2 decode drops 0 switch ingress policy drops 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collisions, 0 deferred 0 lost carrier, 0 no carrier 0 rate limit drops 0 switch egress policy drops
Interface Ethernet0/1 "", is up, line protocol is up Hardware is 88E6095, BW 100 Mbps Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps) Available but not configured via nameif MAC address c84c.7556.de9f, MTU not set IP address unassigned 2054 packets input, 152961 bytes, 0 no buffer Received 4 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 L2 decode drops 2050 switch ingress policy drops 1 packets output, 64 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collisions, 0 deferred 0 lost carrier, 0 no carrier 0 rate limit drops 0 switch egress policy drops
The rest are down, down.
The 2nd question asks:
Explain both the information system security practitioner and hacker perspective of using a security scanning application such as Zenmap GUI (Nmap)?
Answer: the GUI gives you an advantage to look into ports that may be open, which can be a security breach and also an open door to hackers. BY checking if ports are open, the admin can close them and make sure security is restored. Here is how it would show in the GUI table: * PORT 22 TCP OPEN SSH OPEN SSH.5 . SP5 Debian (Protocol)
Question 3: how many test did your Intense Scan Definition Performed? List them all after reviewing the Scan Report?
The Intense Scan I took performed 5 Scans, from 36 Scripts that it loaded. Here is a Snap Picture:

Question 4: Describe what each of these test display within the Zenmap GUI (Nmap) scan report:
Each test performed against the IP I allocated. 172.30.0.1. the test shows what ports are open and the status of the interface.
Question 5: How many total IP Host (NOT counting Cisco device interfaces) did Zenmap GUI (Nmap) find on the network? This can be found in the topology icon and will give a bubble view of the hosts. In my topology, I have 6 host.
Lab # 4
Overview:
In this Lab, I will performed vulnerability assessments using Nessus, which is an application built specifically for network discovery of devices and the operating system and software running on them. Nessus performs remote scans and audits of UNIX, Windows, and network infrastructure and can perform a network discovery of devices, operating systems, applications, databases, and services running on those devices. Nessus detects any noncompliant host running applications such as peer-to-peer, spyware, or malware (worms, Trojan, etc..) are detected and identified, and is capable of scanning all ports on every device and issuing remediation strategy suggestions as require. 1. What is the purpose of defining a policy definition as a first step in performing a Nessus vulnerability scan? Nessus is an application built for network discovery of devices and the operating systems and software running on them. This is the policy definition of it. It is a free program that can be downloaded, but donations are accepted. It is also an open source program so people are constantly improving it. It has many features, but for this assignment, we will have it as a Lab to test out the IP 172.30.0.0/24

2. What 5 things can you configure as part of a vulnerability scan? You can configure audits, Data leakage, compliance priority, users, scan options and even plugins. We can also go with the main tabs: General, Credentials and Preferences. (I already wrote Plugins).

3. Explain how a security scanning application such as Nessus can be used by both the information systems security practitioner and hacker? Vulnerability scans performed from external hosted servers give the same perspective as an attacker. There are also terms used for these two types of people. “White Hats,” which are individuals that used their abilities to find vulnerabilities in systems and networks and then report them to the owner of the system so that they can be fixed. “Black Hats,” are the opposite. They are individuals that break into systems or networks that they are not authorized to use. They use Scanners and programs just like this one to maneuver and find ways to attack. Weaknesses and backdoors in order to penetrate.

4. How many test does the Nessus Lab #4 Nessus Scan performed? I had 6 IPs that were being scan. With a total amount of test of 261. Here is a Snap Shot :

5. Describe what each of these test display within the scan report details? The tests include the severity from high, medium or low. Scans and test also include, parameters that control technical aspects, timeouts, number of host, type of port scanner, policy checks, service detection scan settings, UNIX compliances and many other checks that can give vulnerabilities.

6. Briefly describe the process for identifying solutions to vulnerabilities uncover by Nessus scan. Answer: Shows details including, technical descriptions, references, solutions, details of risk factors, etc.. 7. How many total IP host (not counting Cisco device interfaces) did you find on the server farm Vlan using the Nessus Lab #4 Nessus Scan? 261 8. Fill in the following network documentation chart on the next page for Lab#4—Perform a Software Vulnerability Scan and Assessment with Nessus. Server farm Host Device | Type of Server | O/S & Version | Identified Vulnerability | Suggested Remediation | 172.30.0.1 | Linux Kernel on Debian 6.0 | | Defult password for root account | Get strong password or disable it. | 172.30.0.2 | Microsoft server 2003 | Nessus version : 4.2.2 (Build 9129) | Version needs to be update. | Update version to PHP 5.3.6 | 172.30.0.4 | Linux server on Ubunto 10.04 | Nessus version : 4.2.2 (Build 9129 | Update also. | Anything greater than or equal to 5.3.6 | 172.30.0.8 | Microsoft server 2003 service pack 2 | Nessus version : 4.2.2 (Build 9129) | ERROR: Your plugin feed has not been updated since 2011/7/12 | N/A | 172.30.0.9 | Linux server 2.6. Ibunto 10.4 (Lucid) | Nessus version : 4.2.2 (Build 9129) | ERROR: Your plugin feed has not been updated since 2011/7/12 | Need to updae | 172.30.0.200 | Linux server 2.6. Debian 6.0 (Squeeze) | Nessus version : 4.2.2 (Build 9129) | Host has password as “password” | Need stronger password. | Here are Screenshots to some of the Lab that I created successfully.…...

Similar Documents

Premium Essay

Gen 200

...Course Design Guide GEN/200 Version 2 Course Syllabus College of Humanities GEN/200 Version 2 Foundations for General Education and Professional Success Copyright © 2011, 2008 by University of Phoenix. All rights reserved. Course Description This general education course is designed to introduce the intentional learner to communication, collaboration, information utilization, critical thinking, problem solving, and professional competence and values. The course uses an interdisciplinary approach for the learner to develop personal academi c strategies in order to reach desired goals and achieve academic success . Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:   University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Ellis, D. (2011). Becoming a master student (13th ed.). Boston, MA: Wadsworth, Cengage Learning. All electronic materials are available on the student website. 1 Course Design Guide GEN/200 Version......

Words: 3013 - Pages: 13

Free Essay

Pros and Cons of Css Styles

...Pros and Cons of CSS Styles IT/237 – Intro to Web Design II CSS Styles Cascading Style Sheets (CSS) can be used in three different ways. These methods vary in where the code is written into the Web page, as well as properties of inheritance. The three different styles are as follows: inline, embedded, and external. Inline CSS The inline CSS method is no longer used extensively. Inline means exactly what the name implies. The CSS code is inserted into the tag to which it applies. This method works well for quick prototyping of a Web page, but is impractical in designing a large site. Because the CSS code only applies to the tag into which it was inserted, the designer must manually write any desired CSS code into each tag present. In addition to consuming large amounts of time, this method cannot be shared across pages. As a result, more bandwidth is required to load each page. In addition, inline CSS mixes page content with page presentation which can create issues with how the final product appears to the user. Embedded CSS was developed to alleviate some of these concerns. Embedded CSS Using the embedded CSS method, all CSS code is written into the head of the document. This method ensures that every tag of a specific type on a page will look the same. This creates uniform pages in which each <h1> heading looks the same, as well as any other tags. That said however, embedded CSS still shares the issue of being shared across pages. As a result, each page......

Words: 441 - Pages: 2

Free Essay

Html & Css

...HTML & CSS The content and its presentation Using two websites http://www.bbc.com/ and http://www.basf.com/group/corporate/en/, I am able observe that both sites present their content in a very good way although differently from one another given the nature of their businesses. Both sites have the ability to present their content in more than one language. The content and its presentation on the BBC websites leaves no doubt that it is a news portal. The homepage is displayed distinctively with a unique color from the rest of the pages. The other pages are also displayed with different but consistent colors throughout each particular page. Take for example the Sports page, its dominant and consistent color is yellow throughout the various sports like football, cricket, rugby, formula one and all the rest that are covered in the sports section of the BBC website. The weather page is blue in color. Likewise, the content on the BASF website also leave no doubt that it is a website for a chemical company dealing in various goods and service. The http://www.basf.com/group/corporate/en/ is displayed in a different but consistent color throughout the page every time it is accessed while still maintains the same look. This is a unique property of this page because no matter the change in the dominant color of the page, I was still able to know that I am visiting the BASF website each time the color changed. I think this is because of the consistency of the other properties of......

Words: 433 - Pages: 2

Free Essay

Crjs450-Ip2

...CRJS450-IP2 Name Class Date Professor CRJS450-IP2 The vocational aspects of the prison are essential to ensuring the prison population is provided with the necessary skills to make positive changes in their lives instead of continuing to engage in criminal behavior. In order to provide the inmate with the necessary rehabilitative services and programs the prison will need to develop safety measures to limit the risk to the prison inmates as well as o the prison staff. Inmates should be proved with a secure location in which to engage in rehabilitative service and programs in order to ensure they can focus on making improvements in their life instead of worrying about their safety. Close security prisons typically are comprised of single cells and divided into cellblocks, which may be in one building or multiple buildings (NCDPS, 2012). This provides greater protection for the inmate and staff members. The cells and prison gates are controlled by guards that are in secure control station. In the closed prison the rehabilitative services should also be contained with only the inmates participating in the program as well as guards present at the program or services to ensure better safety measures. The programs and services should be closely monitored as well by guards in the secure control station. In order to ensure the safety of the inmate attending vocational programs and services inmates should only be allowed out of their cells to work or......

Words: 709 - Pages: 3

Premium Essay

Scie207 Ip2

...ssignment: SCIE207 Phase 2 Lab Report Title: Animal and Plant Cell Structures Instructions: Your lab report will consist of the completed tables. Label each structure of the plant and animal cell with its description and function in the tables provided. When your lab report is complete, post it in Submitted Assignment files. 1. Animal Cell: Observe the diagram showing the components of an animal cell. Using the textbook and virtual library resources, fill in the following table: Animal Cell Number | Cell Structure | Description and Function | 1 |  Nuclear Pore | Passage of substance between nucleus & cytoplasm | 2 |  Chromatin (DNA) | Loose coils; | 3 |  Nucleolus | Made up of DNA; responsible for making ribosomes | 4 |  Nuclear envelope | Membranes surrounding nucleus | 5 |  Nucleus | Large circle shape; control all cell activity | 6 |  Centriole | Made of microtubules; to organize | 7 |  Intermediate filaments | Consist of several ropelike proteins & they work with microtubules to support the cell | 8 |  Plasma membrane | Contain & protect contents, regulate passage in/out of cell | 9 |  Flagellum | To move in a whiplike motion to propel a cell through its environment | 10 |  Cytoplasm | Inside of cell wall; | 11 |  Rough endoplasmic reticulum | Filled with ribosomes; responsible for shipping and making proteins | 12 |  Ribosome | | 13 |  Lysosome | Sac; Digest/recycle particles | 14 |  Microtubules | Made......

Words: 511 - Pages: 3

Free Essay

Labs

...Tissues The Integumentary System 35 43 The Cell: Transport Mechanisms and Permeability–Wet Lab Classification of Covering and Lining Membranes 49 Overview of the Skeleton: Classification and Structure of Bones and Cartilages 53 The Axial Skeleton The Fetal Skeleton 59 67 81 87 93 103 77 The Appendicular Skeleton Articulations and Body Movements Microscopic Anatomy and Organization of Skeletal Muscle Gross Anatomy of the Muscular System Histology of Nervous Tissue 113 119 125 Exercise 16A Skeletal Muscle Physiology: Frogs and Human Subjects Exercise 18A Neurophysiology of Nerve Impulses: Wet Lab Gross Anatomy of the Brain and Cranial Nerves Electroencephalography Human Reflex Physiology General Sensation 153 157 167 177 173 Special Senses: Vision 133 Spinal Cord, Spinal Nerves, and the Autonomic Nervous System 145 137 Special Senses: Hearing and Equilibrium Special Senses: Olfaction and Taste Functional Anatomy of the Endocrine Glands iii Exercise 28A Role of Thyroid Hormone, Pituitary Hormone, Insulin, and Epinephrine: Wet Lab 183 Exercise 29A Blood Exercise 30 Exercise 31 Exercise 32 189 199 205 209 Anatomy of the Heart Conduction System of the Heart and Electrocardiography Anatomy of Blood Vessels Exercise 33A Human Cardiovascular Physiology: Blood Pressure and Pulse Determinations 217 Exercise 34A Frog Cardiovascular Physiology: Wet Lab Exercise 36 Exercise 38 Exercise 40 Exercise 42 Exercise 43 Exercise 44 Exercise 45 Exercise......

Words: 120457 - Pages: 482

Free Essay

Css Assignment

...CSS Assignment Question1 Download the assignment files from class web-site. You will find HTML file and screen-capture images. Look at the HTML code which you downloaded. Write CSS to decorate the HTML code according to the conditions below, so the HTML will looks like the screen-capture images. <Conditions> 1. Write CSS code as an external file. 2. Use CSS to design the page. Don’t use HTML to decorate it. 3. You are allowed to edit HTML file, but don’t change it too much. (HINT: Editing the heading of the HTML code will be needed to link to the external CSS file.) 4. HINT: Inheriting will help you to make your code smart. 5. In your CSS code, all the properties and values must have aim. For example, if there is a property which is NOT applied in the HTML, it’s NO GOOD. We don’t need unnecessary “space”. Question 2 Make your own web-site according to the conditions below. Finish this before the 27th June lecture. <Conditions> * Your web-site must have more than 3 pages. All the pages have to be linked to each other. * The design for each pages have to be united. Make it smart, make it beautiful. (Hint: Use one same external CSS file for the design.) * Use CSS to design the page. Don’t use HTML to decorate it. * Use 10 or more properties in your CSS code. You can write any properties include which we didn’t see in the lecture. * In your CSS code, all the properties and values must have aim. For example, if......

Words: 504 - Pages: 3

Free Essay

Pros and Cons of Css Styles

...It237 week 2 Pros and cons of Css Styles There are many pros and cons of the cascading style sheets and three different ways that they are used there is in line external and imbedded. The inline method is not really practical because of the consumption of bandwidth that it takes to display each code on each page because on the inline style the code requires web developers to apply this CSS code to each tag be applied this would require developers to have to apply the code so many times that it will take up a lot of time to write. The separation of markup rom CSS presentation is not optimal with an inline style this is the inline style applied to heading The external CSS is another type of style sheet and this was more practical for updating many documents at one time. Another pro about the external CIA says is that your style information can be cashed by the browser so you will not have to write it into individual tags. The cons that I found with the external style sheets is that in some circumstances when import was used it will render the flash with slow environments here’s an example of an external style sheet Body {font-size: medium; Font-family: Serif; Background-color: black; Color: white;} #page {background-color: white; Color: black; Padding: 1em;} H1 {font-size: xx-large; Font-family: San- Serriff; Color: black; Text-align: center; Border-bottom: solid 4px orange;} P {text-indent: 1em; Text-align: justify; 1in-height: ......

Words: 395 - Pages: 2

Free Essay

Essay for Css

...GOVT Collage University Faisalabad | 3.26/4.0 CGPA | B.Sc(Comp,Math,Eco)2010-2012 | Collage of Advanced Scientific Techniques (CAST) Sahiwal (BZU) | 417/800 | FSc(Pre-Engineering)2008-2010 | G.C Sahiwal (Multan Board) | 619/1100 | Matriculation(Bio Group)2006-2008 | G.M.C.H School Sadar Gogera(Lahore Board) | 555/850 | N.I.C : 35302-7339014-1 Academic Qualification Degree Projects * Book Store System (HTML 5,CSS,JavaScipt) * Student Exam Record Management System Using File Handling (OOP in C++) * Daewoo Bus Service Management System (DBMS Oracle) * Memory Management Data Structure (DSA& AOA using C++) * Book Store and management system(Asp.net C# ) * Game Flip Flop(WPF C#) * Crime Logger System(FYP) (Still Working) * Hand OCR(A.I using MATLAB) * Masters & Masters( Still Working using Oracle 11g) Working Skills In Programming Language/Tools * C++ * Java * C# * HTML * CSS * JavaScipt * Android * JQuery * Ajax * Rational Rose * MS Project * Visio * Eclipse * Visisiol Studio * Matlab Communications Skill * Good Communication skills in English. * Good Understanding and picking Power. * Self Motivate and energetic Reference * Will be provided on demands...

Words: 269 - Pages: 2

Premium Essay

Its 200 Chapter 2

...Lab 2 Tori Ramsey Purdue University Calumet ITS 200 Ethics & Legal Issues in Information Technology Mr. Daniel R. O’Day October 12, 2015 Lab 2 Lab two focuses on information about IT professionals and IT users and common ethical issues they face. This lab will help me with any future issues I may come across during my career whether it be with other employees in the company I work for or peers that are in facing an issue that goes against the IT professional codes of ethics. Part One: “What Would You Do?” – Situation 1 Even though my relationship with my old roommate is important to me, I would not be able to put in a good word or get his resume into the “right hands.” I would be lying at my job (a place that I worked hard to even get into) and that could get me into a lot of trouble if the company realized that he does not actually have the knowledge he says he does. Here’s exactly what happened. My old college roommate got let go from his job and has asked me to help him become an employee at the company I work for. I told him that I have no problem putting in a good word and getting his resume in the “right hands” but then I saw his resume. The problem is that he greatly exaggerated pretty much everything single thing on his resume and expects me to not tell my boss that he actually does not have the knowledge he says he does so that he could get the job. There are a lot of people who can be put into harms way if I were to lie for my old......

Words: 1298 - Pages: 6

Free Essay

Labs

...Sonia Graham Normal Lab Values   | REFERENCE RANGE | SI REFERENCE INTERVALS | BLOOD, PLASMA, SERUM | | | Alanine aminotransferase (ALT) | 8-20 U/L | 8-20 U/L | Amylase, serum | 25-125 U/L | 25-125 U/L | Aspartate aminotransferase (AST) | 8-20 U/L | 8-20 U/L | Bilirubin, serum (adult) Total // Direct | 0.1-1.0 mg/dL // 0.0-0.3 mg/dL | 2-17 µ mol/L // 0-5 µ mol/L | Calcium, serum (Total) | 8.4-10.2 mg/dL | 2.1-2.8 mmol/L | Cholesterol, serum | < 200 mg/dL | < 5.2 mmol/L | Cortisol, serum | 0800 h: 5-23 µ g/dL // 1600 h: 3-15 µ g/dL | 138-635 nmol/L // 82-413 nmol/L | | 2000 h: ≤ 50% of 0800 h | Fraction of 0800 h: ≤ 0.50 | Creatine kinase, serum (at 30 ° C) ambulatory | Male: 25-90 U/L | 25-90 U/L | | Female: 10-70 U/L | 10-70 U/L | Creatinine, serum | 0.6-1.2 mg/dL | 53-106 µ mol/L | Electrolytes, serum | Sodium | 135-145 mEq/L | 136-145 mmol/L | Chloride | 95-105 mEq/L | 95-105 mmol/L | Potassium | 3.5-5.0 mEq/L | 3.5-5.0 mmol/L | Bicarbonate | 22-28 mEq/L | 22-28 mmol/L | Magnesium | 1.5-2.0 mEq/L | 1.5-2.0 mmol/L | Gases, arterial blood (room air) | pH | 7.35-7.45 | [H + ] 36-44 nmol/L | PCO 2 | 33-45 mm Hg | 4.4-5.9 kPa | PO 2 | 75-105 mm Hg | 10.0-14.0 kPa | Glucose, serum | Fasting: 70-110 mg/dL | 3.8-6.1 mmol / L | | 2-h postprandial: < 120 mg/dL | < 6.6 mmol/L | Growth hormone - arginine stimulation | Fasting: < 5 ng/mL | < 5 µ g/L | | provocative stimuli: 7 ng/mL | > 7 µ g/L | Immunoglobulins, serum |...

Words: 635 - Pages: 3

Premium Essay

Ip2 Business Law

...filed several more directives, staying the arbitration proceedings. At no time in all of this did Ferrer dispute the legitimacy of the arbitration. At this time the matter is in the hands of the arbitrator. * Discuss your opinion on the outcome of the case. Do you agree with the court’s decision? No, I would have cited with Preston in the very beginning, due to the wording of the original contract. And at the same time, I find it strange that no one had noticed that Ferrer, did not want to stop the contract, but he just did not want to pay Preston what he is owed. I wonder how Ferrer would rule, if this had come up in his courtroom. * Additionally, to help prepare for the Phase 4 and 5 IP (review the assignment for details), briefly (200 words) define a contractual concern related to the business you would like to start. * In opening a new type of toy store, that allows the children or adults to play with the items, before purchasing it. The toys are just an example for the real toy, so the customer can figure out if the toy/game is right for them. The difference in this new toy store, is that you can create a one of a kind toy/game, you pick out what you want the toy to have or the game to look like, and can even put your name on it. It will be kind of like “Build-A-Bear”, except there are so many different types of toys then just a bear. If you or someone likes a sports team, you can put your name and the name of the team on the same item, you can purchase a......

Words: 1401 - Pages: 6

Premium Essay

Snhu It-200 Milestone 2

...ANONYMOUS IT-200 Milestone Two Southern New Hampshire University Networking: Swagger Distribution’s networking illustration is showing a wired networking system for the company. As the diagram shows, the companies system is most important in the computer room. This is where most of the company’s connection begins. The internet, which is the WAN (Wide Area Network) is the beginning to the LAN (Local Area Network). This starts with the WAN coming into the computer room’s T1 Demarcation Router. The T1 Demarcation Router is then connected to the Main Router which has a connection to the Firewall as well as the Ethernet Switch. The Ethernet Switch then has a Fiber Optic cable connecting to the warehouse Remote Ethernet Switch. This allows the connectivity from the Remote Ethernet Switch to be connected to the PC’s in the shipping office. Going back to the Ethernet Switch, it is also connected to a Cross Patch Panel from which an Ethernet Drop is made allowing the data to be accessed from the offices. It is important for the company to have access to all resources throughout the company. Having these connections allows it to do so. The key aspects to the network consists of Routers, Switches, Firewall, Servers, and PC’s. Amongst these, the Routers direct the data in which direction it needs to go while the Switches are forwarding the information to the devices that it is intended to go to. The Firewall is allowing certain information to be processed through to help protect......

Words: 1209 - Pages: 5

Free Essay

Mtl 200 Lab #2

...5) An x-ray diffraction analysis of a crystal is made with a molybdenum target (λ = 0.711A°). If one of the interplanar spacings is 1.82A°, what is the angle of diffraction for this particular set of planes (assuming first order diffraction). n=1 d=1.82A° λ=0.711A° θ= ? nλ=2dhklsinθ θ=sin-11x0.7112x1.82 θ=11.3° 6) Sodium metal crystallizes in a body-centered cubic arrangement where the length of one edge of the unit cell is 4.24A. What is the closest distance between centres of adjacent sodium atoms? d=4.24A°x3 4 d=1.84A° 7) A crime investigator in a forensic sciences laboratory wishes to identify the makeup of some material evidence. He suspects that the material is actually a mixture of two pure substances. Outline a method by which you think these two substances might be identified. A great way for the crime investigator to identify the makeup of the material evidence would be to use x-ray diffraction. Every crystalline material in the world has its own diffraction pattern unique to one another, which would cause for the best solution to the problem encountered by the crime investigator. Once the material is illuminated with monochromatic X-rays, the atomic lattice of the sample causes the x-ray beam to be diffracted to specific angles. Once completed the use of Bragg’s law allows us to identify the atomic spacing of the mystery material and from there we can compare the unknown material to a list of known materials in order to discover the......

Words: 284 - Pages: 2

Premium Essay

Css Description Types

...CSS Description Types Tommy Tinsley IT/237 May 16, 2012 Adam Moore CSS Description Types INTRODUCTION Cascading Style Sheets or CSS are created to allow developers to separate the design from the content. This allows HTML to do the markup of the content without developers worrying about the layout. CSS are separated into one of three categories; external, internal, and inline CSS, each has advantages and disadvantages. INLINE CSS Inline CSS are applied in the middle of the HTML code and only apply to the line it is inserted into. This type of style sheet also contains the highest priority and will override any other CSS that is in place for that individual line. It is quick and easy to use Inline CSS and developers do not have to create a new document or edit CSS in the head of the document. However, the ease of Inline CSS is also its problem. If using this CSS only every single line will have to be edited. Inline CSS cannot perform complex styles like style the visited, active, or link color of an anchor tag. INTERNAL CSS <html> <head>  <title>Internal Style Sheet Example</title>  <style>   <!--     body { background: #C9F1C5 }     h1 { color: #54B24B; font: bold 14px Verdana, Arial, Helvetica }     p { font: 12px Verdana, Arial, Helvetica }   -->  </style> </head> <body>  <h1>Page With an Internal Style Sheet</h1>  <p>This page contains style definitions at the top......

Words: 507 - Pages: 3