Coursework Equipment List • Boiling tubes (8) I will use these because this is where I will mix both the sodium carbonate and the strontium nitrate in order to form the precipitate. I need 8 because I am going to add 8 different amounts of strontium nitrate (1-8cm³) to the 8cm³of sodium carbonate. • Measuring cylinder (1) I will use this to measure the 8cm³ of sodium carbonate and the varying amounts of strontium nitrate to put into the test tubes. • Sodium Carbonate (enough to fill 8 boiling tubes with 8cm³/64cm³) This is what I will mix with the varying amounts of Strontium nitrate to form the precipitate. • Strontium Nitrate (enough to fill 8 boiling tubes with your varying amounts/36cm³) This is what I will mix with the sodium carbonate in order to form my precipitate. • Test Tube Rack …show more content…
If this does occur remove any contaminated clothing and rinse the skin and clothing thoroughly. • Do not inhale chemicals as they can be poisonous. If this does occur take the person away from the substance and take them to a hospital immediately. Method To test my hypothesis, I will add varying amounts of Strontium Nitrate (1-8cm³, adding an extra 1cm³ each time) to 8cm³ of Sodium Nitrate in order to form a white precipitate. I have chosen to use this scale of strontium nitrate because it will give me more results so the graph will be more accurate. I will measure the precipitate formed with a ruler in millimetres. I have decided to measure this in millimetres because it is a more accurate measurement so I will be able to compare them easily and more precisely. 1. Place 8 boiling tubes in a boiling tube rack and label them 1-8. 2. Add 8cm³ of sodium carbonate to each tube using a measuring cylinder. 3. Measure out the strontium nitrate for each boiling tube and add it (boiling tube 1 contains 1cm³, test tube 2 contains 2cm³ and so on). 4. Leave the boiling tubes for 1 hour to allow the precipitate formed to
• Describing Property – The initial term that would have to be given prominence in the search warrant, is describing the property to be searched. In the present case, it is computer and it shall be identified and described. Such a description would require that details be given that the computer model is "serial number: AL1002001; model: XYZ2" and it has been logged as an evidence in relation to the case against Miranda. Further inclusion has to be made of the fact that it is presently "stored at the Anywhere Police Department located at 123 Anywhere Street, Anywhere, VA 12345". • Data related to computer – The second term that needs to be considered in the search warrant is the data which can stored and removed from a digital media.
Assessment 3 – Assignment 1 Student Name: John Matanisiga Student ID No: S11124727 1. The difference between these wireless encryption is that WEP is wired equivalent privacy, a default procedure for wired security networks, WPA is an upgrade from WEP, and it is a wireless protected access to networks, whereas WPA2 is modernized into a more secure Wi-Fi from WPA. 2. With Static addressing, a computer (or other device) is configured to always use the same IP address, whereas dynamic addressing, the IP address can change periodically and is managed by a centralized network service.
2.21 PESTICIDES Manahan (19..) discusses pesticides as water pollutants. DDT was introduced after World War II which accelerated pesticide use. Manahan (19..) states that by the mid-1990s agricultural use of pesticides was over 300 million kg per year and millions more kg of pesticides were used in non-agricultural applications. Manahan: Insecticides such as diazinon, carbaryl and chlorpyifos are most commonly found in water.
Pour a sufficient amount of room-temperature water (about 16 oz) into a large glass. 2. Add a tablespoon of salt to the water and stir well. 3. Drop an Alka-Seltzer tablet in an empty water bottle.
When i catch a player doing something they shouldnt be doing i will warn them to stop and if they continue i will contact the server owner and tell them that something needs to be done to stop this player from doing whatever it was that they were doing. If i cant contact the owner at the time i will contact other helpers to help me solve the
If you think your phone is secure, it is still vulnerable to pilfer your data. Now a day’s hacker does not need physical access to the phone. They can infect your device with the virus or steal your personal information using malicious applications remotely. You can keep away your phone from hackers by taking the 10-smartphone security steps. Step 01:
To do the temperature and dissolved oxygen tests, stick the probe in the water, and it will show numbers. One will be the dissolved oxygen in ppm (parts per million) and the other will be the temperature of the water. To do the pH test, stick the pH paper in the water and compare the color it turns to the scale. To test nitrates, put clear water in a container and dirty water in another, and put powder in them. Shake them and then compare the color they turn to the scale.
Step 2: Mix both test tubes , shake gently and time the reaction. Step 3: The same step as procedure 1, and step 3 which is to record the observed color step 4: use the palette/color chart to help you identify the observations you make. Safety precautions: Pull your hair back Safety eye goggles Closed toe
In the round-bottom flask (100 mL), we placed p-aminobenzoic acid (1.2 g) and ethanol (12 mL). We swirled the mixture until the solid dissolved completely. We used Pasteur pipet to add concentrated sulfuric acid (1.0 mL) to the flask. We added boiling stone and assembled the reflux. Then, we did reflux for 75 minutes.
TELE 5330 – DATA NETWORKING ASSIGNMENT #2 Name: Prashanth Reddy Edunuri Grade (1) Most applications that use peer-to-peer communication also employs client server communication for some portion of functionality as decentralized peer-to-peer networks have numerous compensations over old-fashioned client-server networks. This system endorsed files to be questioned and shared between users, devoid of a central directory, and as a result shielded the network from lawful issues of individual users. By decentralizing resources, P2P networks have been able to virtually exclude expenses allied with a centralized infrastructure.
• ADVANCED DIPLOMA IN ELECTRICAL POWER ENGINEERING…....... (EIT), Eng INSTITUTE OF TECH 2017 • APPRENTICE TRAINING ELECTRICIAN……………………...……………………… Feb 2001 - Feb 2005 • NATIONAL CERTIFICATE IN ELECTRICAL POWER ENGINEERING................. GWERU POLYTECHNIC - 2001 • NASHVILLE HIGH SCHOOL ZIMBABWE 6 O Levels…………..……………………………….. 1990-1994 • Cert III in ESI - POWER SYSTEMS DISTRIBUTION OVERHEAD QUALIFICATION
We use various PH level and different millimeters of pipets to fill up the test tubes according to a table that specified the amount each solution to be put in each test tube. After we have followed the procedures accordingly. We then poured the mixtures into a cuvette, which we later placed into the spectrometer and collected the data. We repeated this process for the rest of the paired tubes and saved the collected data on the desktop which we use for the graph.
Weighed 1 gram of NaC2H3O2 and mixed it with ionized water. Boiled 12 mL of 1.0M Acetic Acid added into a beaker containing the sodium carbonate on a hot plate until all the liquid is evaporated
7) Test tube four contains 7 mL of distilled water and 3 mL of CoCl2. The fifth had 7 mL of distilled water and 3 mL of CoCl2. 8) Test tube five contains 6 mL of distilled water and 4 mL of CoCl2. 9) Test tube six contains 5 mL of distilled water and 5 mL of CoCl2. 10) After all of the test tubes are prepared, they will be put into cuvettes.
Do the same for the other test tubes. Let the test tubes not be disturbed for about 3- 4 mins. Then add the Amylase solution to the Starch solution and start the stopwatch (immediately). After every 1 min take one drop from the test tubes and place then in the test plate that were