Lab 7 Exercise 40

In: Science

Submitted By sflor07
Words 863
Pages 4
Lab # 7

Exercise 40

Reviewing Your Knowledge
A. Embryonic Development
1. Gamete
2. Morula
3. Uterine Tube
4. Implantation
5. Day 6
6. Chorionic Villi
7. Blastocyst
8. Zona Pellucida
9. Decidua Basalis
10. Amniotic Sac
11. Amnion
12. Two
13. One
14. Chorion
15. Three
16. Placenta
17. Secondary Oocyte
18. Spermatoza
19. endometrium
20. Zygote
21. Ectododerm
22. Endoderm
23. Mesoderm

B. Fetal Development
1. Amnion
2. week 9 to week 38
3. week 9
4. week 8
5. 12,20
6. 16,24
7. 20,38
Using Your Knowledge
A. Human Development
1. These enzymes are used by the sperm to create an opening in the corona radiata, zona pellucida, and plasma membrane of the oocyte for the sperm to pass through
2. An ectopic pregnancy in the uterine tube can occur if there is blockage in the uterine tube which would allow sperm to pass into the uterine tube, but not allow the oocyte, zygote or anything larger to enter the uterus. Implantation of the blastocyst occurs in the wall of the uterine tube. An ectopic pregnancy in the pelvic cavity can occur if the ovulated oocyte does not enter the uterine tube and is fertilized by the sperm in the pelvic cavity. Implantation of the blastocyst can occur on an ovary, the cervix or another organ in the abdominal pelvic cavity.
3. Skin and hypodermis, abdominal wall muscles, uterus, placenta.
4. Fetal cells in amniotic fluid are derived from ectoderm (epithelial cells from skin) and endoderm (epithelial cells from the lining of the digestive tract, lungs, and bladder).
5. Chorionic villi cells develop from trophoblast cells.
6. Alcohol is lipid soluble and can therefore diffuse through cell membranes of maternal placenta capillaries to enter fetal capillaries.
7. HCG is secreted by the chorion into maternal blood. This hormone travels through the circulatory system and stimulates the corpus…...

Similar Documents

Week 7 Exercise

...Week 7 Exercise As an entrepreneur I would be very concerned about the amount of power that investors would have in my company. This legally binding document states that not only will the investors own a certain percentage of the company, but are given a set number of seats on the board of the company. The investors should definitely make there money back and should definitely have equity in the company but I would argue that they shouldn’t have as much control within the company in respects to making business decisions. The investors who are giving so much to this company should be concerned about their investment being squandered. If they are giving millions of dollars to a company, they have to make sure that the company is profitable and that they will see a return on their investment. The only way to do this is by having board members who have a say in what goes on in the everyday operations of the company. The investors should also be concerned about the events that will take place should the company fail or go out of business. In the event that the company’s assets are liquidated, there has to be language in the clause that clarifies how much the investors will receive since they are providing most of the funds used for the business. Both the investors and the owners of the company should be worried about the direction of the company and who controls that direction. Even with owning the company, the owners have to give a say to the investors......

Words: 337 - Pages: 2

Lab 7

...encrypt your hard drives content in order to secure it. 3. Name 2 different types of encryption supported by GPG for your key? The MD5 and Sha1 type of hashing encryption are supported by GPG. 4. What happens when you sign and trust a new key to your keychain? A new key is created to include the private and public key based on how the new key was created. 5. If a user sends you his public key will he be able to decrypt your encrypted messages once you import and sign his key? Both parties need to have each other private keys in order to be able to encrypt and decrypt all messages that is exchange among themselves. 6. What are the similarities between an MD5 hash and a fingerprint? They both insert a fingerprint to the data. 7. How would you encrypt a webserver and the pages it serves up? By setting the web server to redirect it’s web traffic to SSL hence encrypting all conversations between server and host in relation to the web traffic. 8. Why is hashing all database inputs not considered encryption of the database? What value does hashing database entries from server to client? Hashing the input entries of a database is not considered encryption because the data in the database is still in a readable. Hash appends to the data as the fingerprint ensuring data integrity is still there....

Words: 291 - Pages: 2

Lab 7

...IS3445 Security Strategies for Web Applications and Social Networking Lab 7 Assessment 05/10/14 1. How does Skipfish categorize findings in the scan report? As high risk flaws, medium risk flaws, and low issue scans 2. Which tool used in the lab is considered a static analysis tool? Explain what is referred to by static code analysis. RATS, because the running of static code analysis tools that attempt to highlight possible vulnerabilities within ‘static’ (non-running) source code. 3. What possible high risk vulnerabilities did the Rats tool find in the DVWA application source code? Allow system commands to execute. 4. Did the static analysis tool find all the potential security flaws in the application? Yes, although such tools like these would automatically find security flaws with high degree of confidence that what it found was a flaw. 5. What is black box testing on a web site or web application? They’re designed to threat the application as an “unknown entity”; therefore, no knowledge of the tiers is provided. 6. Explain the Skipfish command in detail: ./skipfish-o/var/scans/is308lab.org –A admin:password –d3 –b I –X logout.jsp –r200000 http://www.is308lab.org This is a standard, authenticated scan of a well-designed and self-contained site. 7. During the manual code review, what is noticed about high.php to make it less likely to vicitimize users with XSS reflection and why is it considered more secure? Because when a php is at......

Words: 379 - Pages: 2

Lab 7

...forwarding on the fly (without rebooting the system), where the setting is changed instantly; the result will not be preserved after rebooting the system. 5. If you wanted to limit the number of files that a user can open simultaneously on the Fedora Linux Server to a maximum of 1, what is the command syntax you need to enable in the Linux Kernel? su -c 'sysctl -w fs.file-max=1 ' 6. What is the best way to make a system-wide permanent change to the kernel to enable syncookies? Step 1 = Open the /etc/sysctl.conf file in text editor. Step 2 = Find the directive net.ipv4.tcp_syscookies by using the directive net.ipv4.tcp_syscookies = 0 Step 3 = Change the directive's value by using the directive net.ipv4.tcp_syncookies = 1 Save and exit 7. Given a system that has been freshly installed your boss wants you to make sure it is up to date and locked down at the Kernel level. What steps would you take to verify what modules are loaded into the Kernel and how would you go about locking them down? To verify what modules are loaded into the Kernel = cat /proc/modules To lock them down = $ /etc/init.d/sshd stop 8. What would you enable to set the Kernel to debug mode? Why would someone choose to enable this? Have the kernel running under the control of gcb from the beginning by putting 'debug' on the command line. In order to see the IRQ process during start up, in case you want to modify something (eg. module that is not needed). 9. What is the relation between......

Words: 473 - Pages: 2

Exercise 40

...October 27, 2013 EXERCISE 40 Questions to be Graded 1. According to the “Introduction,” what categories were reported to be statistically significant? The introductory paragraph of the article shows that the three groups in income, working status, and education, health status of the adult and child, and the utilization of health care are statistically significant. 2. In Table 1, is the No. In household reported as statistically significant among the three groups (uninsured, Medicaid, and privately insured)? Provide a rationale for your answer. The results in table 1 suggest that the number of households with a magnitude of 3.79 is statistically insignificant. The reason behind this is that there is no sign mentioned on the magnitude. This means that the significant value for this magnitude would be greater than the level of significance mentioned in the article. 3. Should the null hypothesis for Marital Status (%) be rejected? Provide a rationale for your answer. The result in table 1 suggests that the null hypothesis for the Martial status should be rejected. As the magnitude of X2 i.e. 3.79 is insignificant. Insignificant results indicate that the null hypotheses are supported or accepted. 4. How many null hypotheses were rejected in the Salsberry (2003) study? Provide a rationale for your answer. Six of the overall null hypotheses were rejected since six X2 values were significant, as indicated in Table 1. Significant results indicate that the...

Words: 549 - Pages: 3

Lab Exercise

...LABORATORY EXERCISE #1 Carbon Dioxide Emissions from Automobiles   The reason we focus on CO2 is that emission of this gas changes the climate.  Natural emission of CO2 is much greater than that produced by humans.  The natural carbon cycle in nature absorbs much of the CO2 produced.  However, vegetation and oceans only absorb about 40% of CO2 produced.  In addition, human activities such as livestock production add significantly to the production of both CO2 and methane.  So what are some of the numbers?   CO2 released by consumption of vegetation by animals and microbes – 220 gigatonnes of CO2/year CO2 released by respiration of vegetation – another 220 gigatonnes of CO2/year CO2 released by the oceans – 332 gigatonnes of CO2/year CO2 released by human activities – 29 gigatonnes of CO2/year   Offset – the absorption of CO2 by plants (450 gigatonnes/year) and the oceans (338 gigatonnes/year) for a total of 788 gigatonnes/year.  What this tells us is that vegetation produces about 440 gigatonnes and absorbs about 450 gigatonnes.  The oceans produce 332 gigatonnes and absorb 338 gigatonnes.  Considering variations from year to year, this produces a rough balance.  Adding 17.5 gigatonnes/year through human activities is the real concern because this is not absorbed by natural processes and we have to consider the cumulative effect.        We hear a lot about carbon dioxide emissions from everyday activities.  Where does all this CO2 come from?  It all starts with......

Words: 710 - Pages: 3

Lab 7

...September 25, 2014 Lab 2 Design Infrastructure Access Controls for a Network Diagram Lab 2 Answers 1. To check it there I any malware, updates where it be made, and to know if any other viruses are the system or application 2. help to cut down storage and backup cost, to meet legal regulatory requirements for retrieving specific information within a set timeframe. Data strategies are different types and volume. 3. Have backup/ restore for the patch management 4. Networking monitoring allows real-time communication to take place on a data path that’s established and does change. Performances monitoring is circuit-switched networks known for stability and reliability with industry standards, it alarms the network engineers of new attack protocols. It also helps secure IT infrastructure be increasing storage needs 5. I think passwords and PIN are required for multi-factor authentication 6. Systems/Application domain because attackers will target that first. 7. Network-based firewall is a computer network firewall operating at the application layer protocol stack. Hose-based firewall is monitoring any application input, output, or systems services calls are made from. I put in the implementation, the firewall will block out malware and it let me know when the firewall needs to be updated. 8. Consuming Entering Using All 3 controls use permission called authorization which gives users right to go on a domain if need be 9. Basic setting 40-bit,......

Words: 323 - Pages: 2

Lab 7

...Lab #3 – Assessment Worksheet Data Gathering and Footprinting on a Targeted Web Site Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview The first phase of hacking is the footprinting phase, which is designed to passively gain information about a target. In this lab, you performed technical research against three Web domains using Internet search tools. You collected public domain information about an organization using the Google search engine to uncover information available on the Internet. Finally, you recorded the information you uncovered in a research paper, describing how this information can make an organization vulnerable to hackers. Lab Assessment Questions & Answers 1. What information can you obtain by using the WHOIS tool contained within Sam Spade? 2. Besides the WHOIS utility covered in this lab, what other functions did you discover are possible with the Sam Spade utility? 3. What is the purpose of the tracert command? What useful information does the trace route tool provide? How can this information be used to attack the targeted website? 4. Is Sam Spade an intrusive tool? What is your perspective on the use of a freeware utility such as Sam Spade? 5. By its......

Words: 341 - Pages: 2

Hsa525 - Week 7 Exercises

...*Assignment Exercise 15–1: Budgeting Select an organization: either from the Case Studies in Chapters 27–28 or from one of the Mini-Case Studies in Chapters 29–31. Chapter 27 Case Study: Strategic Financial Planning in Long-Term Care John Maxwell, CEO of Seabury Nursing Center, a not-for-profit long-term care organization located in suburban Connecticut, had just emerged from a board of directors meeting. He was contemplating the instructions he had received from the board’s executive committee to assess the financial feasibility of adding a home care program to the Center’s array of services. Seabury’s current services consist of two levels of inpatient care, chronic care, and sub-acute units, and a senior citizens’ apartment complex financed in part by the Federal Department of Housing and Urban Development. In keeping with its mission, Seabury has a reputation of providing personalized, high-quality, and compassionate care across all levels of its continuum. The CEO and his executive team agreed to meet the following week to plan the next steps. 1. Using the organization above, create a budget for the next fiscal year. Set out the details of all assumptions you needed in order to build this budget. 2. Use the “Checklist for Building a Budget” (Exhibit 15–2) and critique your own budget. Exhibit 15–2 Checklist for Building a Budget 1. What is the proposed volume for the new budget period? 2. What is the appropriate inflow (revenues) and......

Words: 705 - Pages: 3

Exercise Physiology Lab

...Exercise Physiology Lab Lab Questions: Q 1) Which human body system's activity was most affected by exercise? Explain why you think this was the case. A 1) The Human body system's activity that was most affected by exercise was the circulatory system. It was the circulatory system because it was the system that increased the most after exercise. I think this is the case because it had to work the most and it had the most effect on the body. Q 2) Which human body system's activity was least affected by exercise? Explain why you think this is the case. A 2) The human body system's activity that was least affected by exercise was the muscular system. It was the muscular system because it only increased by 9% after exercise. I think this is the case because it didn't have a lasting effect on the body. Q 3) On a separate sheet of paper, please type an essay fully explaining how all of the following concepts are related to each other. Include the necessary equations, name any body systems involved. Effectively, create a story linking all of these terms together. • amount of glucose usage • oxygen intake () • heart rate () • rate of breathing () • number of repetitions of a certain muscular-moving exercise • muscle cramping • rate of ATP production () • carbon Dioxide output () A 3) When you Exercise you notice several things about your body. You breathe heavier and faster, you take in more oxygen and let out more carbon dioxide, your heart beats faster, your......

Words: 613 - Pages: 3

Lab Exercise

...I0059 Laboratory Exercise Loading and Unloading Movie Clips Objectives: At the end of the exercise, the students should be able to:   load and unload Movie Clips, and create instances of movie clips on the stage. Materials:  Computer with Windows XP Service Pack 2 or higher installed with Adobe Flash Professional CS5.5 Procedures: 1. Open Adobe Flash CS4 application. 2. Create a Flash File ActionScript 3.0. 3. Click Insert > New Symbol and set the following: a. Name: jetX b. Type: Movie Clip 4. On the first layer draw a rectangle using the Rectangle tool ( a. Stroke Color: #000000 b. Fill Color: #CCCCCC c. Width: 106px d. Height: 15px 5. Add a new layer by clicking the Add Layer button (). 6. Click on the Line tool ( a diagonal line. ) with the following properties: ) and press the key while dragging the pointer over the stage to draw 7. Select the line and click on the Free Transform tool ( ) and change the angle of the line. 8. Click the Select tool ( ) and click on the line. 9. Right-click on the line and select Copy > Paste in Place. 10. With the new line selected, click Modify > Transform > Flip Vertical to flip the line. 11. Use the Select tool ( ) to position the line so as to form the tip of the triangle. 12. Draw a vertical line to close the gap and to create a triangle. 13. Click Layer 2 and click Modify > Combine > Union. 14. Click the Paint Bucket tool ( ) and set the Fill color to #CCCCCC. 15.......

Words: 1270 - Pages: 6

Lab 7

...Justice Ross Physiology Lab Dr. Xu 2 March 2016 Frog Skeletal Muscle Lab Introduction A biologist by the name Jan Swammerdam performed the first experiments on muscle physiology between 1661 and 1665. Swammerdam demonstrated that an isolated frog muscle can contract if the sciatic nerve is irritated with a metal object. Almost a century later, a physician by the name Luigi Galvani demonstrated that frog muscle responds to electrical currents. In the late 1840s, either Carlo Matteucci or Carl Ludwig attributed to the invention of the kymograph, which is illustrated as a rotating drum powered by a clockwork motor. The invention of the kymograph changed experimental physiology by allowing muscle contractions, and other actions, to be recorded and analyzed for the first time ever. Muscle cells, or muscle fibers, are defined as the basic unit of a muscle. Therefore, complete muscles are constructed from bundles of muscle fibers, but there are no gap junctions between adjacent cells so each fiber performs independently. Myofibrils establish an ordered structure for single muscle fibers. Every myofibril is comprised of actin and myosin. Actin and myosin are contractile proteins that can slide past each other when Ca2+ and ATP are present. A motor unit is described as a single motor neuron and all of its innervating muscle fibers. Like nerve tissue, muscle fibers produce an all-or-none response to a stimulus, generating a twitch. A single motor neuron supplies numerous......

Words: 1350 - Pages: 6

Itt Lab 7 Lab Doc

...© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #7 - Assessment Worksheet Using Encryption to Enhance Confidentiality and Integrity Course Name and Number: _____________________________________________________ john schenberger Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you learned how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You used Kleopatra, the certificate management component of GPG4Win, to generate both a public and private key as both a sender and a receiver. You used the sender’s keys to encrypt a file, sent it to the receiver, and decrypted it using the receiver’s copy of the keys. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public key, private key, or both? The public key is the only key that I will share with another person as part of the handshake in order of the encryption take place. 2. What does Kleopatra allow you to do once it is installed? Kleopatra allow you to encrypted messages, files and text with a private key. 3. What key type was used to create the certificate on Kleopatra? What other types of encryption key......

Words: 285 - Pages: 2

Lab 7

...Laboratory 7: Security Basics December 1, 2014 Lab 7: Security Basics Task 1: Procedure 1. Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Locate an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zonelabs Zone-Alarm firewall is an example of a software firewall. a. Cisco RV082 Dual WAN VPN Router i. Dual Fast Ethernet WAN ports for load balancing and/or business continuity ii. Built-in 8-port Fast Ethernet switch iii. Strong security iv. High capacity VPN capabilities v. Optional cloud-based web security service vi. Support for Small Business QuickVPN software b. Linksys WRT54GS Wireless i. G Broadband Router with SpeedBooster IEEE 802.3/3u, IEEE 802.11b/g ii. VPN Pass Through iii. Stateful Packet Inspection (SPI) Firewall, Internet Policy Wi-Fi Protected Access 2 (WPA2), WEP, Wireless MAC Filtering Task 2: Procedure 1. By 2010 the number of different known viruses numbered over 4 million. Many companies produce anti-virus programs to help protect your computer against these threats. Some of the companies are Panda, Norton, McAfee, AVG, and Kaspersky. Which of these companies provide free versions of their software? Which ones provide trial versions? a. Free versions i. AVG b. Trial versions i. Panda ii. Norton iii. McAfee iv. AVG v. Kaspersky 2. Viruses and......

Words: 1291 - Pages: 6

Bsop Week 7 Lab

...Week 7 Lab Step 1: Number of Trucks in Queue | | Question 1: For each of the four work team sizes, calculate the expected number of trucks waiting in the queue to be unloaded. Size of team | Number of trucks in queue | 2 | 3.2 | 3 | .5 | 4 | .27 | 5 | .12 | Step 2: Expected Time in Queue | | Question 2: For each of the four work team sizes, calculate the expected time in the queue; that is, the expected time that a truck has to wait in line to be unloaded. Size of team | Expected time in queue | 2 | .8 hrs | 3 | .125 hrs | 4 | .067 hrs | 5 | .030 hrs | Step 3: Immediate Unload Probability | | Question 3: For each of the four work team sizes, what is the probability that a truck cannot be unloaded immediately? Size of team | Probability that truck must wait | 2 | 80% | 3 | 50% | 4 | 40% | 5 | 30% | Step 4: Lowest-Cost Team | | Question 4: Which of the four work team sizes results in the lowest cost to Wayne? Size of team | Total cost | 2 | $268.00 | 3 | $102.00 | 4 | $96.00 | 5 | $95.32 | Step 5: Faster Forklift Rental | | Question 5: Wayne is also considering rental of a forklift to use in truck unloading. A team of only two would be needed, but the hourly cost would be $38 per hour ($28 for the workers and $10 for the forklift). The two workers could unload a truck in five minutes. Should Wayne rent the forklift? With a two-person crew and a forklift the cost will be $38 per hour. Based on the lowest......

Words: 289 - Pages: 2