×
Log in to StudySoup
Get Full Access to Chemistry: The Central Science - 13 Edition - Chapter 5 - Problem 40e
Join StudySoup for FREE
Get Full Access to Chemistry: The Central Science - 13 Edition - Chapter 5 - Problem 40e

Already have an account? Login here
×
Reset your password

Enthalpy (Sections)The decomposition of Ca(OH)2(s) into

Chemistry: The Central Science | 13th Edition | ISBN: 9780321910417 | Authors: Theodore E. Brown; H. Eugene LeMay; Bruce E. Bursten; Catherine Murphy; Patrick Woodward; Matthew E. Stoltzfus ISBN: 9780321910417 77

Solution for problem 40E Chapter 5

Chemistry: The Central Science | 13th Edition

  • Textbook Solutions
  • 2901 Step-by-step solutions solved by professors and subject experts
  • Get 24/7 help from StudySoup virtual teaching assistants
Chemistry: The Central Science | 13th Edition | ISBN: 9780321910417 | Authors: Theodore E. Brown; H. Eugene LeMay; Bruce E. Bursten; Catherine Murphy; Patrick Woodward; Matthew E. Stoltzfus

Chemistry: The Central Science | 13th Edition

4 5 1 352 Reviews
22
1
Problem 40E

Enthalpy (Sections)

The decomposition of Ca(OH)2(s) into CaO(s) and H20(g) at constant pressure requires the addition of 109 kJ of heat per mole of Ca(OH)2. (a) Write a balanced thermochemical equation for the reaction, (b) Draw an enthalpy diagram for the reaction.

Step-by-Step Solution:
Step 1 of 3

CALS 002/085 Exam 3 Study Guide 1 & 2. Security Risk Assessment o Assets  something you value o Threats  something that could damage or destroy your asset o Types  Qualitative  Informed opinions regarding assets and threats  Quantitative  Assigning money values to assets  Using formula to calculate change and cost of expected loss  Example: Your hardware and data  Flash drives  Phones  Laptops  Etc.  All things left behind in places  Example: University research  Data security for UVM research 3. Threats to Hardware, Software and Data  Physical hazards  Water  Electrical surge  Etc.  Hardware failure  Software failure  User error  Loss or destruction (physical and digital)  Outside attacks  Removal or destruction (physical and digital) 4. Actions to secure Hardware, Software and Data o Keep protective measures up-to-date  Surge protectors  Wires  Software  Etc. o Organize and back-up systems and data  Flashdrives  Webfiles o Use locks and keys  Actual locks  Encryptions 5. Cyber Crime Threats (video) http://blog.ted.com/6-basic-tips-for-better-online-security-from-ted-speaker- james-lyne/  80% of websites are affected—a lot of them are small businesses 6. Steps to Protect Yourself from Cyber Crime (video)  6 Steps According to James  Update system and application software  Have strong passwords  Be suspicious  Keep backups  Make sure you run basic security controls  Make sure you look up best practice for devices other than just your PC 7. Passwords  What UVM recommends o Use strong passwords  At least 8 characters, mix of characters  Upper/lower case  Numbers  Symbols  Phrases or long sentences if possible  Don’t use the same password twice  Use two-step authentication whenever it’s available 8. System Updates  Keep protective measures up to date regarding software updates on your computer  Mac and Microsoft 9. Encrypting Drives  Use locks and keys to secure your data (actual locks and encryption)  Encryption Software Applications o Apple FileVault o Microsoft BitLocker 10. Two Step Authentication  Something the user:  Knows o Password o Personal ID # o Pin # o Answer to a question  Has o Authenticator device o Card o Cell phone  Is o Biometrics o Fingerprint reader on the iphone from the 5s to 6s 11. Sharing Information Online and IP Address  Protect Data o If you have Wi-Fi, make sure there’s a strong password o Avoid sharing a network with people that you don’t trust o If you use public Wi-Fi, use a VPN to encrypt your packets or only share your information on websites that use HTTPS  IP Address = Internet Protocol Address o # assigned to a device 12. Use of ICT in the Job Search and Application Process  How is ICT used during the job application process o Networking  Process in which you gather and exchange information with contacts who can help you focus your career planning and develop a network to uncover the hidden job market o Search  Online databases  Career events and fairs listed online  Online job advertisements  Etc. o Material Development  Materials  Cover letter  Resume  List of references  Productivity software applications used  Word processing  Spreadsheets  Formatting  No template  Pre-designed template (stock)  Pre- designed template (manipulated)  Self designed template o Storage  Documents  Spreadsheets  File folders  Major issues with data storage  Losing specific experiences and descriptions  Losing cover letter, resume, references (either completely or versions of them) o Communication  In person  Phone  Online form  Mail  Email  What’s the message you’re sending Be specific o Submission o Display ICT Skills 13. Transmission of Application Materials o Submission  Paper  Get card stock—better than normal paper  Electronic  Website form  Email o In body or attachment o Follow job posting submission instructions o If there’s no instruction, then use PDF format to avoid formatting issues o Save PDFs so they can be easily IDed 14. Troubleshooting o There will always be tech issues o Give yourself enough time to resolve these problems o No single person has the answer to every tech problem o If you run into a problem, chances are many people have had the same issue o Sometimes problems cant be fixed, they can only be resolved with “work arounds”  Steps to Dealing with a Technology Problem o Identify the problem o Isolate the issue o Search for information on the issue o Develop a plan to resolve the issue o Implement the plan o Record the steps and results (Documentation) o Seek help if needed 15 & 16. HTTP and HTTPS o HTTP vs. HTTPS  Hyper Text Transfer Protocol (HTTP)  Hyper Text Transfer Protocol Secure (HTTPS)  Uses HTTP and Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols  What is SSL/TLS o Technology used to create an encrypted link between web client and server  Security o HTTP provides no security guarantees o Threats = eavesdropping, providing false information o HTTPS provides  Server authentication  Data confidentiality  Data integrity  Why is HTTPS not used everywhere o Time (takes times to transfer from HTTP  HTTPS o Money 17. 3D Printing o 3D Printer = process of making a physical object from a digital file, typically by laying down many successive layers of material  *video* Implications of 3D printing  3D printer in VT = Generator 18. E-waste and Secure Disposal o E-waste  Discarded electronic appliances such as mobile phones, computers and TVs o *video* Digital Debris o Data remains on hard drive even after you:  Delete  Reformat o Study—only 9% had been properly sanitized and properly removed o Securely empty your trash o Options  Physical destruction of the hard drive  Secure wipe of the hard drive 19. Basics of Citing and Referencing  Citing One Author (Rousey, 2015)  Citing Two Authors (Rousey & Holm, 2015)  Citing Three or More Authors o First Citation: (Rousey, Holm, & Namajunas, 2015) o All Subsequent Citations: (Rousey et al., 2015) 20. Citing and Referencing Electronic Sources  Article from an online periodical o Same guidelines as printed  Online Scholarly journal article (citing DOIs) o Use alpha-numerical string as opposed to a URL  Online periodical with no DOI o Use URL instead  Database o APA says not necessary to cite o Provide print info  Electronic books o Point readers to where they can find it if it’s not easily accessible o Include DOIs if you can

Step 2 of 3

Chapter 5, Problem 40E is Solved
Step 3 of 3

Textbook: Chemistry: The Central Science
Edition: 13
Author: Theodore E. Brown; H. Eugene LeMay; Bruce E. Bursten; Catherine Murphy; Patrick Woodward; Matthew E. Stoltzfus
ISBN: 9780321910417

Chemistry: The Central Science was written by and is associated to the ISBN: 9780321910417. This full solution covers the following key subjects: . This expansive textbook survival guide covers 305 chapters, and 6352 solutions. Since the solution to 40E from 5 chapter was answered, more than 328 students have viewed the full step-by-step answer. The answer to “Enthalpy (Sections)The decomposition of Ca(OH)2(s) into CaO(s) and H20(g) at constant pressure requires the addition of 109 kJ of heat per mole of Ca(OH)2. (a) Write a balanced thermochemical equation for the reaction, (b) Draw an enthalpy diagram for the reaction.” is broken down into a number of easy to follow steps, and 41 words. The full step-by-step solution to problem: 40E from chapter: 5 was answered by , our top Chemistry solution expert on 09/04/17, 09:30PM. This textbook survival guide was created for the textbook: Chemistry: The Central Science, edition: 13.

Other solutions

People also purchased

Related chapters

Unlock Textbook Solution

Enter your email below to unlock your verified solution to:

Enthalpy (Sections)The decomposition of Ca(OH)2(s) into