×
Log in to StudySoup
Get Full Access to Chemistry - 8 Edition - Chapter 14 - Problem 61
Join StudySoup for FREE
Get Full Access to Chemistry - 8 Edition - Chapter 14 - Problem 61

Already have an account? Login here
×
Reset your password

Solved: What are the major species present in 0.250 M

Chemistry | 8th Edition | ISBN: 9780547125329 | Authors: Steven S. Zumdahl ISBN: 9780547125329 153

Solution for problem 61 Chapter 14

Chemistry | 8th Edition

  • Textbook Solutions
  • 2901 Step-by-step solutions solved by professors and subject experts
  • Get 24/7 help from StudySoup virtual teaching assistants
Chemistry | 8th Edition | ISBN: 9780547125329 | Authors: Steven S. Zumdahl

Chemistry | 8th Edition

4 5 1 281 Reviews
31
4
Problem 61

What are the major species present in 0.250 M solutions of each of the following acids? Calculate the pH of each of these solutions. a. HNO2 b. CH3CO2H (HC2H3O2

Step-by-Step Solution:
Step 1 of 3

CALS 002/085 Exam 3 Study Guide 1 & 2. Security Risk Assessment o Assets  something you value o Threats  something that could damage or destroy your asset o Types  Qualitative  Informed opinions regarding assets and threats  Quantitative  Assigning money values to assets  Using formula to calculate change and cost of expected loss  Example: Your hardware and data  Flash drives  Phones  Laptops  Etc.  All things left behind in places  Example: University research  Data security for UVM research 3. Threats to Hardware, Software and Data  Physical hazards  Water  Electrical surge  Etc.  Hardware failure  Software failure  User error  Loss or destruction (physical and digital)  Outside attacks  Removal or destruction (physical and digital) 4. Actions to secure Hardware, Software and Data o Keep protective measures up-to-date  Surge protectors  Wires  Software  Etc. o Organize and back-up systems and data  Flashdrives  Webfiles o Use locks and keys  Actual locks  Encryptions 5. Cyber Crime Threats (video) http://blog.ted.com/6-basic-tips-for-better-online-security-from-ted-speaker- james-lyne/  80% of websites are affected—a lot of them are small businesses 6. Steps to Protect Yourself from Cyber Crime (video)  6 Steps According to James  Update system and application software  Have strong passwords  Be suspicious  Keep backups  Make sure you run basic security controls  Make sure you look up best practice for devices other than just your PC 7. Passwords  What UVM recommends o Use strong passwords  At least 8 characters, mix of characters  Upper/lower case  Numbers  Symbols  Phrases or long sentences if possible  Don’t use the same password twice  Use two-step authentication whenever it’s available 8. System Updates  Keep protective measures up to date regarding software updates on your computer  Mac and Microsoft 9. Encrypting Drives  Use locks and keys to secure your data (actual locks and encryption)  Encryption Software Applications o Apple FileVault o Microsoft BitLocker 10. Two Step Authentication  Something the user:  Knows o Password o Personal ID # o Pin # o Answer to a question  Has o Authenticator device o Card o Cell phone  Is o Biometrics o Fingerprint reader on the iphone from the 5s to 6s 11. Sharing Information Online and IP Address  Protect Data o If you have Wi-Fi, make sure there’s a strong password o Avoid sharing a network with people that you don’t trust o If you use public Wi-Fi, use a VPN to encrypt your packets or only share your information on websites that use HTTPS  IP Address = Internet Protocol Address o # assigned to a device 12. Use of ICT in the Job Search and Application Process  How is ICT used during the job application process o Networking  Process in which you gather and exchange information with contacts who can help you focus your career planning and develop a network to uncover the hidden job market o Search  Online databases  Career events and fairs listed online  Online job advertisements  Etc. o Material Development  Materials  Cover letter  Resume  List of references  Productivity software applications used  Word processing  Spreadsheets  Formatting  No template  Pre-designed template (stock)  Pre- designed template (manipulated)  Self designed template o Storage  Documents  Spreadsheets  File folders  Major issues with data storage  Losing specific experiences and descriptions  Losing cover letter, resume, references (either completely or versions of them) o Communication  In person  Phone  Online form  Mail  Email  What’s the message you’re sending Be specific o Submission o Display ICT Skills 13. Transmission of Application Materials o Submission  Paper  Get card stock—better than normal paper  Electronic  Website form  Email o In body or attachment o Follow job posting submission instructions o If there’s no instruction, then use PDF format to avoid formatting issues o Save PDFs so they can be easily IDed 14. Troubleshooting o There will always be tech issues o Give yourself enough time to resolve these problems o No single person has the answer to every tech problem o If you run into a problem, chances are many people have had the same issue o Sometimes problems cant be fixed, they can only be resolved with “work arounds”  Steps to Dealing with a Technology Problem o Identify the problem o Isolate the issue o Search for information on the issue o Develop a plan to resolve the issue o Implement the plan o Record the steps and results (Documentation) o Seek help if needed 15 & 16. HTTP and HTTPS o HTTP vs. HTTPS  Hyper Text Transfer Protocol (HTTP)  Hyper Text Transfer Protocol Secure (HTTPS)  Uses HTTP and Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols  What is SSL/TLS o Technology used to create an encrypted link between web client and server  Security o HTTP provides no security guarantees o Threats = eavesdropping, providing false information o HTTPS provides  Server authentication  Data confidentiality  Data integrity  Why is HTTPS not used everywhere o Time (takes times to transfer from HTTP  HTTPS o Money 17. 3D Printing o 3D Printer = process of making a physical object from a digital file, typically by laying down many successive layers of material  *video* Implications of 3D printing  3D printer in VT = Generator 18. E-waste and Secure Disposal o E-waste  Discarded electronic appliances such as mobile phones, computers and TVs o *video* Digital Debris o Data remains on hard drive even after you:  Delete  Reformat o Study—only 9% had been properly sanitized and properly removed o Securely empty your trash o Options  Physical destruction of the hard drive  Secure wipe of the hard drive 19. Basics of Citing and Referencing  Citing One Author (Rousey, 2015)  Citing Two Authors (Rousey & Holm, 2015)  Citing Three or More Authors o First Citation: (Rousey, Holm, & Namajunas, 2015) o All Subsequent Citations: (Rousey et al., 2015) 20. Citing and Referencing Electronic Sources  Article from an online periodical o Same guidelines as printed  Online Scholarly journal article (citing DOIs) o Use alpha-numerical string as opposed to a URL  Online periodical with no DOI o Use URL instead  Database o APA says not necessary to cite o Provide print info  Electronic books o Point readers to where they can find it if it’s not easily accessible o Include DOIs if you can

Step 2 of 3

Chapter 14, Problem 61 is Solved
Step 3 of 3

Textbook: Chemistry
Edition: 8
Author: Steven S. Zumdahl
ISBN: 9780547125329

Other solutions

People also purchased

Related chapters

Unlock Textbook Solution

Enter your email below to unlock your verified solution to:

Solved: What are the major species present in 0.250 M