Need chemistry help with a 5 problem work sheet
User Generated
checyrtvey
Science
Description
Unformatted Attachment Preview
3.(15pts) In each case, find the missing AH. (kJ/mole)
(a)(10pts) If 4 B(s) + 3 O2(g) > 2 B203(s)
then (i) 1/2 B2O3(s) ------> B(s) + 3/4 O2(g)
----
AH = -2509.1 kJ/mol
ΔΗ° = ?
(ii) 16 B(s) + 12 02(g) ----> 8 B203 (s)
ΔΗ, = ?
(b) (5pts) If P(s) + 3 O2(g)
and P4(s) + 5 O2(g)
> P406 (s)
> P4010(s)
AH = -1640.1 kJ/mol
AH = - 2940.1 kJ/mol
then P406(s) + 2 O2(g)
> P4010(s)
AH = ?
4. (14 pts) Calculate AHxn° for the reaction N2H4(1) + O2(g)
N2(g) + 2H2O(1)
given the following data:
2NH3(g) + 3N2O(g) 4N2(g) + 3H2O(1)
N2O(g) + 3H2(g) = N2H4(1) + H2O(1)
2NH3(g) + (1/2) O2(g) N2H4(1) + H2O(1)
H2(g) + (1/2) O2(g) H2O(1)
AHxnº= -1010 kJ/mole
AH = -317 kJ/mole
AHA = -143 kJ/mole
AHAD = -286 kJ/mole
=
5. (15 pts)
Consider the following reaction
P4(s) + 6 Cl2(g) ----> 4 PC13(s)
AH (kJ/mole)=-1280 kJ/mole
If 18.00 grams of P4 react with 42.60 g of Cl2(g) how much heat will be liberated? All
calculations must be shown. A guess is not sufficient. Hint: What is the limiting reagent?
(Gen. Chem I. Homework #6 (continued)
6.(15 pts) The space shuttle orbiter utilized the oxidation of methyl hydrazine by
dinitrogentetroxide for propulsion. The balanced reaction is
5N2O4(1) + 4N H3CH3(1)
12H2O(g) + 9N2(g) + 4CO2(g)
Calculate AH for the reaction.
In addition to tables in your book you will need the following data:
N2H3CH3 (1) AH = 54.0 kJ/mole
N204(1)
AH = -20.0 kJ/mole
7.(10 pts) Consider two Styrofoam coffee cups. If cup #1 contains 128.0 mL of water at 88.0 °C and cup #2
contains 59.6 mL of water at 18.5 °C, what is the final temperature, in °C, when the contents of cup
#1 are poured into cup #2? Ignore the heat capacity of the cup. Assume that the density of water is
1.00 g/mL.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
4 pages
H688 Enzymes
Enzymes are some of the most important catalyst especially in chemical reactions and found in the living organisms. There ...
H688 Enzymes
Enzymes are some of the most important catalyst especially in chemical reactions and found in the living organisms. There are therefore essential for ...
METR 112 Mission College Geology Questions
Define "radiative forcing" in your own words.undefined2. Why is the ozone layer beneficial for humans? At what altitude is ...
METR 112 Mission College Geology Questions
Define "radiative forcing" in your own words.undefined2. Why is the ozone layer beneficial for humans? At what altitude is it found?undefined3. Why did ozone depletion become an important topic in the 1970's and 1980's?undefined4. Explain the direct and indirect effects of aerosols.undefined5. Give 5 examples of aerosols. For each, provide a source and the sign of the radiative forcing.undefined6. Which radiative forcing term has the largest magnitude? Comment on the significance.
SNHU Global Rain Algorithm Cipher Code
At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting compan ...
SNHU Global Rain Algorithm Cipher Code
At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings, retirement, investments, and insurance for their patrons.As an important step in Artemis Financial’s desire to modernize its operations and as a crucial part of the success of their custom software, they want to implement and apply the most current and effective software security. Artemis Financial has a public web interface and is seeking Global Rain’s expertise in taking steps to protect their client data and financial information.Specifically, Artemis Financial is seeking to add a file verification step to their web application to ensure secure communications. When the web application is used to transfer data, they will need a data verification step in the form of a checksum. You have been asked to take their current software application and add secure communication mechanisms to meet their software security requirements. You will deliver a production quality integrated application that includes secure coding protocols.DirectionsYou are tasked with examining Artemis Financial’s software to address any security vulnerabilities. This will require you to refactor the code base to add functionality to meet software security requirements for Artemis Financial’s application. Specifically, you will need to follow the steps outlined below to facilitate your findings, address and remedy all areas, and document your work in the Practices for Secure Software Report.Algorithm Cipher: Review the scenario and the Supporting Materials. Determine an appropriate encryption algorithm cipher to deploy given the security vulnerabilities, justifying your reasoning. In your Practices for Secure Software Report, be sure to address the following:Provide a brief, high-level overview of the encryption algorithm cipher.Discuss the hash functions and bit levels of the cipher.Explain the use of random numbers, symmetric vs non-symmetric keys, and so on.Describe the history and current state of encryption algorithms.Certificate Generation: Generate appropriate self-signed certificates using the Java Keytool, which is used through the command line.To demonstrate that the keys were effectively generated, export your certificates (CER file) and submit a screenshot of the CER file in your Practices for Secure Software Report.Deploy Cipher: Refactor the code and use security libraries to deploy and implement the encryption algorithm cipher to the software application. Verify this additional functionality with a checksum.Include a screenshot of the checksum verification in your Practices for Secure Software Report. The screenshot must show your name and a unique data string that has been created.Secure Communications: In the application.properties file, refactor the code to convert HTTP to the HTTPS protocol. Compile and run the refactored code. Then once the server is running, you can verify secure communication by typing https://localhost:8443/hash in a new browser to demonstrate that the secure communication works successfully.Provide a screenshot of the web browser that shows a secure webpage and include it in your Practices for Secure Software Report.Secondary Testing: Complete a secondary static testing of the refactored code using the dependency check tool provided below to ensure code complies with software security enhancements. You only need to focus on the code you have added as part of the refactoring. Complete the dependency check and review the output to ensure you did not introduce additional security vulnerabilities.Include (1) a screenshot of the refactored code executed without errors and (2) a screenshot of the report of the output from the dependency check static tester in your Practices for Secure Software Report.Functional Testing: Identify syntactical, logical, and security vulnerabilities for the software application by manually reviewing code.Complete this functional testing and include a screenshot of the refactored code executed without errors in your Practices for Secure Software Report.What if I receive errors or new vulnerabilities?You will need to iterate on your design and refactored code, address vulnerabilities, and retest until no new vulnerabilities are found.Summary: Discuss how the code has been refactored and how it complies with security testing protocols. In the summary of your Practices for Secure Software Report, be sure to address the following:Refer to the Vulnerability Assessment Process Flow Diagram and highlight the areas of security that you addressed by refactoring the code.Discuss your process for adding layers of security to the software application and the value that security adds to the company’s overall wellbeing.Point out best practices for maintaining the current security of the software application to your customer.What to SubmitTo complete this project, you must submit the following:Practices for Secure Software ReportUse the template provided and submit one comprehensive report of the steps you have taken to increase the layers of security in Artemis Financial’s software application. You will also submit the zipped project files that contain the refactored code. See below for more information. Include details about the code files being “attachments” to the completed report.CS 305 Project Two Refactored Code Base.zipRefactor the code provided in the Supporting Materials section. Be sure to zip the refactored code into one zipped project folder that contains all files associated with Artemis Financial’s software application. Submit the zipped project folder in addition to the Practices for Secure Software Report. Include details about the code files being “attachments” to the completed report.
chemistry 2
hey i have a lab due in couple of hours the 2 files down below should be filled properly and submitted back to me the only ...
chemistry 2
hey i have a lab due in couple of hours the 2 files down below should be filled properly and submitted back to me the only chalenge here is the time because i need it asap
CSU W6 Build Your Own Weather Station Essay
For this week’s lab, you will build a backyard weather station that you will use to collect at least five days’ worth ...
CSU W6 Build Your Own Weather Station Essay
For this week’s lab, you will build a backyard weather station that you will use to collect at least five days’ worth of measurements (see Module 7 lab). The instructions for building most of the weather instruments are located here: https://aamboceanservice.blob.core.windows.net/oceanservice-prod/education/for_fun/BuildyourownWeatherStation.pdf (Links to an external site.). Directions for a do-it-yourself thermometer are found here: https://www.scientificamerican.com/article/measure-up-with-a-homemade-thermometer/ (Links to an external site.). Following the instructions provided, construct a barometer and a thermometer, along with at least one of the other four possible instruments (hygrometer, wind vane, anemometer, rain gauge). When constructing your thermometer, please complete the calibration step, which will require a store-bought one (listed as optional in the instructions).Take a digital photograph of each instrument that you construct. Include in your photo a strip of paper with your name and the date on it. These photographs will be part of your lab report for this week.In addition to the weather instrument photos, for your Week Six Lab Report, submit a short essay covering every weather instrument in turn: thermometer, hygrometer, barometer, wind vane, anemometer, rain gauge (even the ones you did not build).For each one, provide a brief history behind it; discuss what it measures; explain how your instrument works; and explain what information it provides about current and potential future weather conditions. Follow APA formatting guidelines
Saber College Immune System Discussion
Read the following scenario. Upon completion, answer the questions.
One beautiful warm day in June, you are on a pi ...
Saber College Immune System Discussion
Read the following scenario. Upon completion, answer the questions.
One beautiful warm day in June, you are on a picnic and are stung on your finger by a bee. Although it hurt a little, you are soon enjoying the early summer day. The next morning you wake up to find that your finger is swollen, quite stiff, red, and warmer than the rest of your fingers. In addition, you seem to have a bit of a fever.
Discuss which parts of the immune system seem to be activated
Explain which classic responses to injury you experienced
Explain which cytokines and cell types were probably most responsible for many of your symptoms.
Assignment Expectations for Grading:
1. Demonstration of critical thinking, scholarship, and ability to connect and apply the material
2. Comprehensiveness and completeness of your responses
3. Adherence to the written instructions
4. Spelling and grammar
Similar Content
describe a future product from flora, biology homework help
write a one page about a future product from flora...
CHEM 120 MERAMER Physical Quantity Lab Report
EXPERIMENT: DENSITY
Question
What determines if an object will sink or float in water? How is the mass of an object relate...
electrostatics physics
An uncharged molecule of DNA (deoxyribonucleicacid) is 2.17 µm long. The endsof the molecule become singly ionized so tha...
The Family of Planets (Introduction to Astronomy)
Like siblings, the planets of our solar system have similarities, but also distinct differences. The terrestrial planets a...
ALEKS final objective
Hi, Can you help me do the final objective test which worth 50 marks. you have done entire pie for me so I think it would ...
CHEM 1121 APSU Electrolytic an Electrochemical Cell & Atomic Mass Lab Report
Write a post lab discussion on Electrolytic Analysis of Copper...
Biology Terms
1. 5' – Five prime is used to designate the number of carbon atoms in the sugar-ring of the 2. 3' – Three prime also i...
Effect of Mobile Phones on Life
Little's Theorem-Little's Theorem (sometimes called Little's Law) is a statement of what was a "folk theorem" in operation...
Tutor 1 5 1 .edited
Greetings to all. I'm looking forward to continuing my educational briefings to the board to assist them in performing a R...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
4 pages
H688 Enzymes
Enzymes are some of the most important catalyst especially in chemical reactions and found in the living organisms. There ...
H688 Enzymes
Enzymes are some of the most important catalyst especially in chemical reactions and found in the living organisms. There are therefore essential for ...
METR 112 Mission College Geology Questions
Define "radiative forcing" in your own words.undefined2. Why is the ozone layer beneficial for humans? At what altitude is ...
METR 112 Mission College Geology Questions
Define "radiative forcing" in your own words.undefined2. Why is the ozone layer beneficial for humans? At what altitude is it found?undefined3. Why did ozone depletion become an important topic in the 1970's and 1980's?undefined4. Explain the direct and indirect effects of aerosols.undefined5. Give 5 examples of aerosols. For each, provide a source and the sign of the radiative forcing.undefined6. Which radiative forcing term has the largest magnitude? Comment on the significance.
SNHU Global Rain Algorithm Cipher Code
At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting compan ...
SNHU Global Rain Algorithm Cipher Code
At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings, retirement, investments, and insurance for their patrons.As an important step in Artemis Financial’s desire to modernize its operations and as a crucial part of the success of their custom software, they want to implement and apply the most current and effective software security. Artemis Financial has a public web interface and is seeking Global Rain’s expertise in taking steps to protect their client data and financial information.Specifically, Artemis Financial is seeking to add a file verification step to their web application to ensure secure communications. When the web application is used to transfer data, they will need a data verification step in the form of a checksum. You have been asked to take their current software application and add secure communication mechanisms to meet their software security requirements. You will deliver a production quality integrated application that includes secure coding protocols.DirectionsYou are tasked with examining Artemis Financial’s software to address any security vulnerabilities. This will require you to refactor the code base to add functionality to meet software security requirements for Artemis Financial’s application. Specifically, you will need to follow the steps outlined below to facilitate your findings, address and remedy all areas, and document your work in the Practices for Secure Software Report.Algorithm Cipher: Review the scenario and the Supporting Materials. Determine an appropriate encryption algorithm cipher to deploy given the security vulnerabilities, justifying your reasoning. In your Practices for Secure Software Report, be sure to address the following:Provide a brief, high-level overview of the encryption algorithm cipher.Discuss the hash functions and bit levels of the cipher.Explain the use of random numbers, symmetric vs non-symmetric keys, and so on.Describe the history and current state of encryption algorithms.Certificate Generation: Generate appropriate self-signed certificates using the Java Keytool, which is used through the command line.To demonstrate that the keys were effectively generated, export your certificates (CER file) and submit a screenshot of the CER file in your Practices for Secure Software Report.Deploy Cipher: Refactor the code and use security libraries to deploy and implement the encryption algorithm cipher to the software application. Verify this additional functionality with a checksum.Include a screenshot of the checksum verification in your Practices for Secure Software Report. The screenshot must show your name and a unique data string that has been created.Secure Communications: In the application.properties file, refactor the code to convert HTTP to the HTTPS protocol. Compile and run the refactored code. Then once the server is running, you can verify secure communication by typing https://localhost:8443/hash in a new browser to demonstrate that the secure communication works successfully.Provide a screenshot of the web browser that shows a secure webpage and include it in your Practices for Secure Software Report.Secondary Testing: Complete a secondary static testing of the refactored code using the dependency check tool provided below to ensure code complies with software security enhancements. You only need to focus on the code you have added as part of the refactoring. Complete the dependency check and review the output to ensure you did not introduce additional security vulnerabilities.Include (1) a screenshot of the refactored code executed without errors and (2) a screenshot of the report of the output from the dependency check static tester in your Practices for Secure Software Report.Functional Testing: Identify syntactical, logical, and security vulnerabilities for the software application by manually reviewing code.Complete this functional testing and include a screenshot of the refactored code executed without errors in your Practices for Secure Software Report.What if I receive errors or new vulnerabilities?You will need to iterate on your design and refactored code, address vulnerabilities, and retest until no new vulnerabilities are found.Summary: Discuss how the code has been refactored and how it complies with security testing protocols. In the summary of your Practices for Secure Software Report, be sure to address the following:Refer to the Vulnerability Assessment Process Flow Diagram and highlight the areas of security that you addressed by refactoring the code.Discuss your process for adding layers of security to the software application and the value that security adds to the company’s overall wellbeing.Point out best practices for maintaining the current security of the software application to your customer.What to SubmitTo complete this project, you must submit the following:Practices for Secure Software ReportUse the template provided and submit one comprehensive report of the steps you have taken to increase the layers of security in Artemis Financial’s software application. You will also submit the zipped project files that contain the refactored code. See below for more information. Include details about the code files being “attachments” to the completed report.CS 305 Project Two Refactored Code Base.zipRefactor the code provided in the Supporting Materials section. Be sure to zip the refactored code into one zipped project folder that contains all files associated with Artemis Financial’s software application. Submit the zipped project folder in addition to the Practices for Secure Software Report. Include details about the code files being “attachments” to the completed report.
chemistry 2
hey i have a lab due in couple of hours the 2 files down below should be filled properly and submitted back to me the only ...
chemistry 2
hey i have a lab due in couple of hours the 2 files down below should be filled properly and submitted back to me the only chalenge here is the time because i need it asap
CSU W6 Build Your Own Weather Station Essay
For this week’s lab, you will build a backyard weather station that you will use to collect at least five days’ worth ...
CSU W6 Build Your Own Weather Station Essay
For this week’s lab, you will build a backyard weather station that you will use to collect at least five days’ worth of measurements (see Module 7 lab). The instructions for building most of the weather instruments are located here: https://aamboceanservice.blob.core.windows.net/oceanservice-prod/education/for_fun/BuildyourownWeatherStation.pdf (Links to an external site.). Directions for a do-it-yourself thermometer are found here: https://www.scientificamerican.com/article/measure-up-with-a-homemade-thermometer/ (Links to an external site.). Following the instructions provided, construct a barometer and a thermometer, along with at least one of the other four possible instruments (hygrometer, wind vane, anemometer, rain gauge). When constructing your thermometer, please complete the calibration step, which will require a store-bought one (listed as optional in the instructions).Take a digital photograph of each instrument that you construct. Include in your photo a strip of paper with your name and the date on it. These photographs will be part of your lab report for this week.In addition to the weather instrument photos, for your Week Six Lab Report, submit a short essay covering every weather instrument in turn: thermometer, hygrometer, barometer, wind vane, anemometer, rain gauge (even the ones you did not build).For each one, provide a brief history behind it; discuss what it measures; explain how your instrument works; and explain what information it provides about current and potential future weather conditions. Follow APA formatting guidelines
Saber College Immune System Discussion
Read the following scenario. Upon completion, answer the questions.
One beautiful warm day in June, you are on a pi ...
Saber College Immune System Discussion
Read the following scenario. Upon completion, answer the questions.
One beautiful warm day in June, you are on a picnic and are stung on your finger by a bee. Although it hurt a little, you are soon enjoying the early summer day. The next morning you wake up to find that your finger is swollen, quite stiff, red, and warmer than the rest of your fingers. In addition, you seem to have a bit of a fever.
Discuss which parts of the immune system seem to be activated
Explain which classic responses to injury you experienced
Explain which cytokines and cell types were probably most responsible for many of your symptoms.
Assignment Expectations for Grading:
1. Demonstration of critical thinking, scholarship, and ability to connect and apply the material
2. Comprehensiveness and completeness of your responses
3. Adherence to the written instructions
4. Spelling and grammar
Earn money selling
your Study Documents