Wednesday, December 25, 2019

What the In-Crowd Wont Tell You About Persuasion Essay Topics

What the In-Crowd Won't Tell You About Persuasion Essay Topics New Questions About Persuasion Essay Topics Once you have gathered all of them together, it'll be an excellent concept to analyze them a bit to help the reader make the correct decisions. Clearly, you ought not purposely select a topic that will bore your audience. You still have to make an outstanding bit of writing. So, the best method to compose an amazing persuasive essay is to discover a theme you're familiarized with and wish to share your experience with the reader. An argumentative paper is part of the persuasion. At precisely the same time, it's a wonderful persuasive essay idea. Deciding on the correct topic for a persuasive speech is occasionally not such an easy issue to do as it might seem. You will need to set up facts, possess the confidence and demonstrate the very clear evidence of your private viewpoint to certain phenomenon. There are lots of theories about how to compose such texts and you'll be able to say that all of them have something which is going to be the truth. Prior exposure or knowledge about a specific subject provides better hindsight which may bring far better arguments on the issue. All arguments in persuasive essay ought to be backed up with dependable and trustworthy evidence. Educated people ought to be asked to volunteer as literacy tutors. Unlike topics for middle school or higher school, excellent college topics are somewhat more challenging to discover. All individuals ought to be allowed to receive free high education. You have to know all parts of financial topics when you choose them. Inspiration to make your own advertising or media argumentative essay topics isn't tough to discover. Make certain there are enough online sources on this issue you've chosen. The search for a very good topic for your psychology essay can be quite frustrating should you not understand where to get started. What You Should Do About Persuasion Essay Topics Starting in the Next Four Minutes Bear in mind which you're attempting to make your audience except a brand-new vision of the issue. At length, bear in mind that a huge portion of being effective in persuasion is the capacity to attract your audience's emotions. Make certain you're really interested in the problem, because otherwise you will have no confidence, which is a signific ant aspect when convincing somebody. If you can select the problem all on your own, it's possible to develop the issue of interest! Introducing Persuasion Essay Topics Use what you read to assist you create some search terms, and to assist you choose your own position. To choose which subject you're likely to discuss, it's crucial to see the complete collection of good persuasive speech topics from the specific area of study. Figure out which of the topics, you currently have a fairly good background on which will make it possible for you to have a relative edge. Do not become scared by them, as it only appears to be difficult, while in practice you will secure a really effortless job, where you just have to consider the topic that you are likely to choose from the range of different persuasive essay topics. If you're thinking about how to compose a persuasive essay, you should know that writing an essay is a complicated approach. In general, you can observe that writing a pe rsuasive essay isn't a brain surgery. Sometimes easy persuasive essay topics are the proper things, for the reason that they are simple to comprehend. So locating the greatest persuasive essay topics is important. There are several intriguing topics that could be become a persuasive essay if you take the opportunity to think about doing it. Students with good attendance has to be rewarded.

Tuesday, December 17, 2019

The Call For Racial Discrimination - 1475 Words

â€Å"I say to you, quite frankly, that the time for racial discrimination is over.† Is a statement that most people can get behind in today’s world, where news of racial injustice sprouts up seemingly every day from across the globe. The call for equality in the United States has been around since its genesis as a colony, with different eras finding various cases of success. Such examples could include: the abolition of slavery, the legalization of interracial marriage or the desegregation of public schools. Even with these cases, and many others, standing tall as marks of progress, our country could use further reform in the education department. It has become apparent, through much research, that desegregating schools by law doesn’t clean†¦show more content†¦It was not difficult to see the disparities in quality between services intended for use by whites versus those intended for blacks. Even with the apparent prejudice caused by the court decision, it would not be until 1954, fifty-eight years later, that segregation would be declared unconstitutional, with the court case of Brown v. Board of Education of Topeka. Unfortunately, it would take more than that to change our stubborn views. Only three years following the repeal, an incident in Little Rock, Arkansas occurred, where federal troops had to be sent in order to enforce this law and allow nine black students to enroll in an all-white high school, in relative safety. These events have shaped the education system into the intellectual labyrinth that, supposedly, guides and prepares our youth for the real world. Now that we have covered the path that led us here, we must see how our battered past still has a lasting impression on students of the 21st century. First, and foremost, schools that have a majority-minority student population usually have fewer and/or less quality resources than those that are mostly populated by white students (Hammond). This ties in with the fac t that these schools operate in the inner cities, which is inhabited by low-income, minority families who have decreased property taxes that aren’t funneled into their schools, further expanding the funding gap between school districts (Hammond). Accordingly, these urbanShow MoreRelatedRacial Discrimination And Its Effects On People And Society1653 Words   |  7 PagesRacial discrimination has many effects on people and the society, and these effects are mostly negative. In To Kill a Mockingbird, Harper Lee, the author, demonstrates racial discrimination and its effects through Tom Robinson s case. Tom Robinson is accused of raping and beating Mayella, and Atticus Finch is the man who steps up to defend this innocent man in the town of Maycomb, where everyone was decided from racial prejudice. In the three following sources, Montgomery Boycott, White PeopleRead MoreEssay on Discrimination and Liberty1183 Words   |  5 PagesDiscrimination and Liberty How much should we care if people discriminate? In answering this question, maybe its a good idea to say what we mean by discrimination. The most internally consistent definition is that discrimination is the act of choice. Thus, discrimination is a necessary fact of life - people do and must choose. When one selects a university to attend, he must non-select other universities - in a word, he must discriminate. When a mate is chosen, there is discrimination againstRead MoreMartin Luther King Jr.1581 Words   |  7 Pagesdiscriminated against and judged unfairly. According to the U.S Equal Employment Opportunity Commission, racial discrimination is the act of treating someone differently or unfairly because of race (â€Å"Race/Color Discrimination†). Martin Luther King Jr. believed that all people should be treated the same regardless of ethnicity. Therefore, American society should care about racial discrimination because the rate of African-Americans in jail is much higher than whites, innocent African-Americans haveRead MoreRacial Inequality And Discrimination Is A Major Factor853 Words   |  4 Pages Racial inequality and discrimination is a major factor that is still present in America’s society today. Considering the fact that America’s history of racial complications is still an issue in today’s society. Minorities (African American, Asian Americans, Hispanics/Latinos) which is accounted for almost half of the population if combined, are the ones that face discrimination the most, typically everywhere they go and especially in the workforce. They are not treated as equally as everyone elseRead MoreRacism : A Theological Reflection1580 Words   |  7 Pagesidea of solidarity, one of seven principals of Catholic Social Teaching; preaching for a single human family despite any national, racial, ethnic, economic, or ideological differences. Accepting or remaining silent when presented with an act of racial discrimination is eq ually as damaging as committing the act itself, as it contributes to an environment tolerant of racial prejudices. The Catholic church and its followers have a duty to acknowledge racism to its fullest extent and provide resolutionRead MoreThe Prevalence of Racial Tension Around the World1025 Words   |  5 PagesToday, there is racial tension all around the world. Racial tension means the feeling that exists when people do not trust and be aggressive to each other. In Malaysia, racial tension has deepened recently. The Indian government has released an advisory for its foreign students that studying in Australia which showed that racial tension appeared around the White and Indian. Racial tension between the Han and Uighur communities in Xinjiang, China was enhanced in July 2009. There are several factorsRead MoreAs One Ventures Out Into The World To Seek Employment There1083 Words   |  5 Pagesdiscuss the implications of discrimination pertaining to the low-wage labor market based on the research findings within the article, Discrimination in a Low-Wage Labor Market: A Field Experiment. Thesis The liberalization of racial equality within the workplace came into fruition with the passage of the 1964 Civil Rights Act. Conversely, there are major disparities that persist today within the labor market. To understand this matter the article, Discrimination in a Low-Wage Labor Market:Read MoreRacial Discrimination in America1439 Words   |  6 PagesDate: August 16, 2010 Racial Discrimination in America Abstract The framers that wrote the Declaration of Independence intended for this country to be founded on the rights of Life, Liberty, and the Pursuit of Happiness. To an extent, this has been true, but our country still has a long way to go. Unless American society chooses to change their mindset and their way of thinking, then this country will never advance and there will continue to be racial discrimination in every aspect of our dailyRead MoreRacial Inequality And Gender Inequality889 Words   |  4 PagesIn today s world discrimination is a racial inequality when it come to different races in the United states. Discrimination has been around for years and have created a social inequality , economic crises and have lowered individuals into a group known as the â€Å" racial minorities â€Å".Racial minorities can be classified as older people , women , immigrants and young men and women. Women from the early 1600’s to today s women have been discriminated against for years. Women have never had the sameRead MoreRacial Profiling And Discrimination By Claudia Rankine s Citizen : An American Lyric Essay1366 Words   |  6 PagesRacial profiling and discrimination is an underlining theme in Claudia Rankine’s Citizen: An American Lyric. The author uses everyday encounters to expose the harsh reality African American people live. Rankine’s perspective on racism is applicable to years dating from 1860 and to present day occurrences. Discrimination against African Americans is a continuing problem. Although slavery does not exist today, African Americans continually grieve the agony their ancestors faced throughout the Civil

Monday, December 9, 2019

The Computer Paradigm Cloud Computing

Question: Describe about Cloud Computing? Answer: Cloud Computing Introduction to Cloud Computing The computer paradigm is known as Cloud computing, where the huge systems pool are connected in networks that are public or private, to give dynamically scalable application infrastructure, storage of file and data. With the arrival of this technology, the computation cost, storage content and application and delivery is decreased considerably. Cloud computing is the practical method to experience benefits of cost those are direct and it has potential for data center transformation from the set-up of capital-intensive to the environment that is variable priced. The thought of cloud computing is found on the very fundamental principal of reusability of capabilities of IT. Cloud services examples contain storage of online file, networking sites those are social, applications of online business and webmail. (Meinel, 2009) 2.1.2 Service Architecture Essentially, 3 service types can get from the provider of cloud service. Infrastructure as a service- This service provider tolerates all the servers cost, back-ups, storage and equipment of networking equipment. Platform as a service- This service provider only gives a solutions stack or a platform for the users. It supports the saving of users investment on software and hardware. Software as a service- This service provider will provide the users the service so that they can use their software, particularly any type of software applications. Deployment Models With the majority of organizations which are pointing on cloud leveraging in order to cut the expenditure from capital and control of the operating costs, there is insistent raise in business for adoption of cloud. There are mainly 4 models for cloud deployment, which are described below with best business scenarios to opt each one. These models got recommendation from the NIST (National Institute of Standards and Technology). (Westphall, 2010) The Private Cloud In this model it doesnt carry much in terms of efficiency of cost: it is comparable to managing, building and its own infrastructure. Thus, it brings the value that is tremendous from the security point of view. Throughout their primary adaptation to cloud, most of the organizations countenance challenges and have concerns that are related to security of data. The Public Cloud This deployment model represents hosting of true cloud. In this model, infrastructure and services are given to a variety of clients. The example of public cloud is Google. In this service we can be giving the vendor free of charge or on basis of license policy which is pay-per-user. For the business requirements this model is the best suitable wherein it is needed to handle spikes of load, SaaS applications hosting, testing the applications and explore interim developing of infrastructure. The Hybrid Cloud In this model businesses will get help for taking benefit of data hosting and secured applications on the private cloud, whereas still enjoying benefits of cost by maintaining shared applications and data on public cloud. We can use this model for cloud bursting and handling, which refers to the scenario where the existing cloud infrastructure that is private is not capable to support load spikes and needs the fallback choice to handle the load. The Community Cloud In the model of community deployment, the infrastructure of cloud is shared by various organizations with the similar compliance considerations and policy. This supports further to decrease costs as compared to the private cloud, as it will be shared by bigger group. Several government of state-level departments needing access to the similar data that is relating to local information or population related to the infrastructure, like electrical stations, roads, hospitals, etc., can exploit the cloud community to help data and applications. (Canonico, 2010) Intrusion Detection System Introduction to Intrusion Detection System Intrusion system of detection plays a significant role in perseverance and security of system for active defense alongside attacks of intruder hostile for any organization of IT and business. IDS execution in computing of cloud needs a approach of virtualization-based, scalable and efficient. In computing of cloud, user application and data is hosted on service providers of cloud has cloud user and remote servers the incomplete control over its resources and data. In few cases, the IDS administration in cloud turns into the cloud provider responsibility. Service Architecture We initiate the CIDSS (Cloud Intrusion Detection System Service) to conquer the significant challenge of maintaining the client protected from attacks of cyber. It is considered based on service model of software for security of any of the Cloud based user. Intrusion Detection Service Agent: This is the light weight agent, single reason equipment - dedicated software or hardware - integrated within the network of user to collect essential data. Cloud Computer Service Component: In this agent it collects messages. It formats all the messages and send them to IDSC as per grouping constrains described for the messages. (Boncheva, 2007) Intrusion Detection Service Component: This is answerable for the intrusion detection. Below are 4 sub components which are playing main rule in the IDSC. Collector: Collector is answerable for reading all data that is received by CCSC, items selected for interest, and forwarding to the suitable analysis engine. Analysis Engine: This is the sophisticated decision and mechanism for pattern matching. It analysis data that came from collector and it matches it to known activity patterns stored in signature database. Event Publisher: This is the standardized interface to give the unified view of outcome report for the users as analysis engine would be an independent procedure which can be executed using IDS. (Mell, 2001) Deployment Models An IDS is collected of numerous components: Security events will generated by Sensors. Monitor events and alerts console and control all the sensors. Central Engine records events that are logged by sensors in the database and use the system of rules to produce alerts from received security events. Based on objective that are protected or the source of information, IDS can be confidential into Intrusion Detection System of Host-based and Intrusion Detection System of Network-based. (Wespi, 1999) Host-Based Intrusion Detection System: This was primary type of software of intrusion detection to be considered, with the unique system of target being the computer mainframe where interaction outside was uncommon. In addition the advantages obtained when exploiting this IDS model, there are few drawbacks, which depress deploying IDS Host-based: IDSs Host-based are harder to handle, as data must be managed and configured for each host monitored. Since the sources of data and the engines analysis for IDSs Host-based exist in the host targeted by attacks, the IDS can be disabled and attacked as part of attack. IDSs Host-based use the resources of computing of the hosts they are examining, consequently inflicting the cost performance on monitored systems. Network-Based Intrusion Detection System: This focus further greatly on network than the precise host. This IDS attacks detects by analyzing and capturing packets of network. (Lockhart, 2007) IDS implementation in Private Cloud Environment Giving security in Environment of Cloud needs more than authentication of user with digital certificates or passwords and its data transmission confidentiality. We can execute Intrusion Detection in 3 ways as clarify below Traditional Host based IDS: The primary choice is the traditional detection system of host intrusion (HIDS). HIDS will be used on VM, as well as the hypervisor/host. The HIDS on VM could be monitored, supported and deployed by user. The HIDS on hypervisor should be accountability of provider. (Goscinski, 2011) Traditional Network based IDS: The second choice is the traditional detection system of network intrusion (NIDS). This kind of deployment is very useful in detecting few attacks on the hypervisor and VMs. It does, though, have numerous drawbacks. The primary one is that it will not support when it comes to attacks within the network of virtual that runs completely within hypervisor. Secondly, it has few inadequate visibilities into host itself. Hypervisor based IDS: The third choice would be the use of a system of intrusion detection which runs at the layer of hypervisor but is not exactingly the HIDS for hypervisor. One of the promising technologies in this area is the use of VM introspection. This type of IDS allows you to monitor and analyze communications between VMs, between hypervisor and VM and within the hypervisor based virtual network. The advantage of hypervisor-based ID is the availability of information, as it can see basically every. (Grance, 2009) Conclusion Computing of Cloud is the paradigm shift in which computing it is moved away from computers that are personal and still the single application server of an enterprise to the cloud of computers. The cloud is the server pool that is virtualized which can give the unusual resources of computing of their clients. Users of this system need only be concerned with the computing service being asked for. In this paper we mainly concentrate on Analysis of Intrusion Detection System (IDS) For Cloud Computing. The concept is still evolving, and new methodologies are nowadays considered to belong to cloud computing. The main advantage in using virtualization in IDS is the isolation of the monitored environment, providing an added layer of security and preventing threats having access to user information or to disable protection in the underlying system. (Heikkurinen, 2005) References: [1] S. Roschke, F. Cheng, and C. Meinel, 2009, Intrusion detection in the cloud, Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing. IEEE, 2009, pp. 729734. [2] K. Vieira, A. Schulter, C. Westphall, and C. Westphall, 2010, Intrusion detection for grid and cloud computing, It Professional, vol. 12, no. 4, pp. 3843,. [3] C. Mazzariello, R. Bifulco, and R. Canonico, 2010, Integrating a network ids into an open source cloud computing environment. [4] V. Marinova-Boncheva, 2007, A short survey of intrusion detection systems, vol. 58, pp. 2330. [5] R. Bace and P. Mell, 2001, Intrusion detection systems, US Dept. of Commerce, Technology Administration, National Institute of Standards and Technology. [6] H. Debar, M. Dacier, and A. Wespi, 1999, Towards a taxonomy of intrusion-detection systems, Computer Networks, vol. 31, no. 8, pp. 805822. [7] A. Lockhart, 2007, Network security hacks, ser. Hacks series. [8] R. Buyya, J. Broberg, and A. Goscinski, 2011, Cloud Computing Principles and Paradigms, vol. 81. [9] P. Mell and T. Grance, 2009, The nist definition of cloud computing, National Institute of Standards and Technology, vol. 53, no. 6. [10] S. Subashini and V. Kavitha, 2011, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1 11. [11] L. Youseff, M. Butrico, and D. Da Silva, 2008, Toward a unified ontology of cloud computing, in Grid Computing Environments Workshop, GCE08, pp. 1 10. [12] F. Gagliardi, B. Jones, F. Grey, M. Bgin, and M. Heikkurinen, 2005, Building an infrastructure for scientific grid computing: status and goals of the egee project, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 363, no. 1833, p. 1729.

Sunday, December 1, 2019

Light microscope lab report Essay Example

Light microscope lab report Paper Then we observed under different magnification powers a certain number of specimens such as, Letter e, threads, and Hay infusion. The results were observed and recorded for the different specimens and it came out to be the higher the magnification the lesser the microscopic field. Introduction: One of the most important instruments in anatomy and physiology is the compound light microscope. The general principle of the microscopy is that the shorter the wavelength of light used in the instrument, the greater the resolution. In the light microscopy, the lenses are arranged so that the images of objects too small to be seen with the naked eye can become highly magnified, so the apparent size can be increased, and their minute detail can be revealed. In this lab we observed the parts of the light microscopy, we identified each part and learned its functions , we also examined a few specimens under different magnifications using different objective lenses, for each specimen we started using the scanning objective then the low-power objective ending with the high- ewer objective in order to get higher magnification. We viewed the samples and made drawings of them Method: We carefully carried the microscope from the cabinet to the desk by placing one hand around the arm and the other firmly under the base. Then using the coarse adjustment knob we rose the body tube to its highest fixed position. Then we placed the slide on the stage , Starting with the letter e sample we started using the scanning objective to observe the sample and then made drawings of it, then we switched to the low-power objective, we used the fine adjustment knob to complete the focusing . After observing letter e under low-power magnification we switched to the high-power objective while assuring that the illumination is at its Max . Drawings were made for each of the samples under each different objectives. For the threads sample, the cheek cells and the hay infusion specimen, the previous steps were done the same. Results : the results for this experiment are the following : under scanning objective : -for the letter e sample the image came out to be flipped under scanning resolution figure (1). Deer low-power objective: we saw more resolution and more details the microscopic field decreased and got smaller as we increased the magnification. Figure (2) Under high-power objective: Only part of letter e showed The microscopic field decreased The resolution increased Figure (3) For the thread slides : we got the same results as the letter e under different magnifications . Under scanning objective: Multiple threads were seen together Figure (a) when we focused on th e red thread the other two got blurry were able to focus through depth. The specimen Figure (b) The microscopic field decreased drastically and we were not able to see the different threads any more For the Hay infusion specimen: Under scanning objective we saw the specimen swimming around the hay We altered the light intensity to view organisms We learned how to prepare a wet mount Figure (c) For the cheek cells : After scrubbing inside the mouth to get a human cheek cells, we observed the cheek cells under different objectives, we also can used chemical dyes to enhance the vision of the cheek cells. We will write a custom essay sample on Light microscope lab report specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Light microscope lab report specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Light microscope lab report specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Figure (d) Discussion: Using the light microscope we were able to observe the little details for each of the samples under different magnifications , we came out with that the higher the magnification the smaller the microscopic field gets, and as we increase resolution we can see more details in the specimens. What give the microscope its ability to go through the little details is its power microscopic lenses, for each light microscope it has two sets of lenses the ocular lenses which has lox magnification power and the objective lenses which they can reach up to xx signification power, so whenever we view something under the light microscope we get magnification from both lenses , for example : under high- power objective we get magnification of total 10 x 40 = 400 times bigger of the original sample . E also were able to know that under different depth of the specimen we are able to focus on certain part of them using the fine adjustment knob. In some cases not all sample could be seen under the microscope because some of them are colorless so we add chemical dyes to get a better vision. Conclusion : In this lab we learned the parts and the proper use of the light microscope, and we were able to view the interception of images through the microscope, and we learned the The concept of ma gnification. Light microscope lab report Essay Example Light microscope lab report Paper Then we observed under different magnification powers a certain number of specimens such as, Letter e, threads, and Hay infusion. The results were observed and recorded for the different specimens and it came out to be the higher the magnification the lesser the microscopic field. Introduction: One of the most important instruments in anatomy and physiology is the compound light microscope. The general principle of the microscopy is that the shorter the wavelength of light used in the instrument, the greater the resolution. In the light microscopy, the lenses are arranged so that the images of objects too small to be seen with the naked eye can become highly magnified, so the apparent size can be increased, and their minute detail can be revealed. In this lab we observed the parts of the light microscopy, we identified each part and learned its functions , we also examined a few specimens under different magnifications using different objective lenses, for each specimen we started using the scanning objective then the low-power objective ending with the high- ewer objective in order to get higher magnification. We viewed the samples and made drawings of them Method: We carefully carried the microscope from the cabinet to the desk by placing one hand around the arm and the other firmly under the base. Then using the coarse adjustment knob we rose the body tube to its highest fixed position. Then we placed the slide on the stage , Starting with the letter e sample we started using the scanning objective to observe the sample and then made drawings of it, then we switched to the low-power objective, we used the fine adjustment knob to complete the focusing . After observing letter e under low-power magnification we switched to the high-power objective while assuring that the illumination is at its Max . Drawings were made for each of the samples under each different objectives. For the threads sample, the cheek cells and the hay infusion specimen, the previous steps were done the same. Results : the results for this experiment are the following : under scanning objective : -for the letter e sample the image came out to be flipped under scanning resolution figure (1). Deer low-power objective: we saw more resolution and more details the microscopic field decreased and got smaller as we increased the magnification. Figure (2) Under high-power objective: Only part of letter e showed The microscopic field decreased The resolution increased Figure (3) For the thread slides : we got the same results as the letter e under different magnifications . Under scanning objective: Multiple threads were seen together Figure (a) when we focused on th e red thread the other two got blurry were able to focus through depth. The specimen Figure (b) The microscopic field decreased drastically and we were not able to see the different threads any more For the Hay infusion specimen: Under scanning objective we saw the specimen swimming around the hay We altered the light intensity to view organisms We learned how to prepare a wet mount Figure (c) For the cheek cells : After scrubbing inside the mouth to get a human cheek cells, we observed the cheek cells under different objectives, we also can used chemical dyes to enhance the vision of the cheek cells. We will write a custom essay sample on Light microscope lab report specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Light microscope lab report specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Light microscope lab report specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Figure (d) Discussion: Using the light microscope we were able to observe the little details for each of the samples under different magnifications , we came out with that the higher the magnification the smaller the microscopic field gets, and as we increase resolution we can see more details in the specimens. What give the microscope its ability to go through the little details is its power microscopic lenses, for each light microscope it has two sets of lenses the ocular lenses which has lox magnification power and the objective lenses which they can reach up to xx signification power, so whenever we view something under the light microscope we get magnification from both lenses , for example : under high- power objective we get magnification of total 10 x 40 = 400 times bigger of the original sample . E also were able to know that under different depth of the specimen we are able to focus on certain part of them using the fine adjustment knob. In some cases not all sample could be seen under the microscope because some of them are colorless so we add chemical dyes to get a better vision. Conclusion : In this lab we learned the parts and the proper use of the light microscope, and we were able to view the interception of images through the microscope, and we learned the The concept of ma gnification.