Jump to content

encipher

Senior Members
  • Posts

    157
  • Joined

  • Last visited

Posts posted by encipher

  1. If I understood you properly, what you are trying to do is not feasable, the oxygen and hydrogen combust at a much higher rate than the electrolysis that produces the gases. Now if you want to store them and burn them later thats another story.

     

    "given the power I can get out of a wall outlet."

     

    Electrolyzing using a wall outlet is not a good idea since its very dangerous and you run a risk of getting electricuted. There is no specific requirement in terms of amps or volage, but the time it takes to electrolyze a given amount is directly related to the amps supplied. and using the faraday constant you can calculate how much time it will take to generate n moles of gas.

  2. The quantum numbers describe various properties of the orbitals of an atom.

     

    The first being the principle quantum number

     

    It has integral values. (1, 2, 3 etc..) This is related to the size and energy of the orbital. The bigger the integer, the larger the size and the greater the energy of the orbital. This is because the electrons are farther away and less rightly bound to the nucleus.

     

    The second is the angular momentum quantum number (the 'l' )

    this has a value from 0 to n - 1 where the principle quantum number is n. This value is related to the shape of the atomic orbitals. This quantum number usually has a letter assigned to each integer. 0 being S, 1 being P, 2 being d etc..

     

    The thrid is the magnetic quantum number (the ml)

    this basically has interger values between l and -l (l being the angular momentum quantum number) and this is related to the orientation of the orbital relative to the other orbitals in the atom.

     

    A simpler way would be:

     

    S orbitals take 2 electrons

    P orbitals take 6 electrons

    D orbitals take 10 electrons

     

    now divide those numbers by half and you have the number of orbitals in each energy level. This is because each orbital can take 2 electrons.

     

    Now one more thing which you would probably have to know is the electron spin (ms) (the fourth quantum number). It is always either +1/2 or -1/2 and it won't be nessicary to know wether is +1/2 and -1/2.. all you have to know is if there are two electrons in an orbital then assign the first a value of potitive 1/2 and the other negative 1/2.

     

    Now regarding Beryllium (Be) it would be [HE] 2s^2. The four quantum numbers would be: (2, 0, 0, 1/2)

  3. There is a very simple pattern to the valence electron configurations of elements in the periodic table:

     

    ch07_fill.jpg

     

    Now, to begin with.. the 1A and 2A (alklai & alklai earth metals) groups are all have S orbital valence electrons. Now to determine that.. count down to the element you want. Lets say Potassium. It is four 'blocks' down, so thats 4, and because its in the 1A group. its S.. so now its 4S.. and because its the first in the first column it has 1 valence electron. So its 4S1. Now anothe example from lets say the P orbitals.. Nitrogen. Its 2 rows down. so thats 2. Its in the 'p' section (From the periodic table above) so its 2P.. its 3 across.. so its 2P3. Its a very simple pattern and you should get the hang of it very quickly. Good luck on the test!

  4. The H3O+ ion is in all water, commonly known as the hydronium ion. It is what is measured when the PH of a solution is calculated. It is what gives solutions its acidity, as opposed to OH- which gives alkalinity. Hydronium is just a water molecule with an extra H+ ion, just like OH- is a water molecule missing and H+ ion. Acids in water give off H+ ions which bond with the water molecules to form hydronium, since H+ cannot exist in a solution on its own AFAIK. When you see [H+] its a common 'abbreviation' of the actual hydronium ion.

  5. The application will be gone! When you try to open Internet Explorer from any shortcut' date=' you will just keep getting various error messages. Yes, the .dll files and registry entries will still be there, but the application itself will not.

     

    The only other way you will be able to browse the Internet is by using explorer.exe or another browser, such as Firefox. You will not be able to access Internet Explorer anymore, and it will not have any other harmful affects to your computer except for the programs that require Internet Explorer.[/quote']

     

    Simlple analysis and logic shows that the internet explorer executable is just an entry point to the real work that goes on. iexplore.exe is only 96kb.. thats one indication. If the program is loaded in a debugger it can be traced that it relies primarily on C:\WINDOWS\system32\browseui.dll, C:\WINDOWS\system32\browselc.dll and C:\WINDOWS\system32\mshtml.dll just for starters. And looking at the properties of those dlls you notice:

     

    Description: Shell Browser UI Library

     

    for the broswer user interface dlls... and

     

    Description: Microsoft ® HTML Viewer

     

    for the mshtml dll

     

    Which clearly indicates that it's all taking place inside the application extentions and not the main executable. And since those are part of the shell and windows's system, they cannot be removed. If you analyze explorer.exe when you browse the web you will get the same results.

  6. The arp command is very useful for making static entries when you are on an untrusted network and wish to prevent man in the middle attacks.

     

    You can also use the local arp table to discover hosts on a network. Say if you ping sweep a subnet and some machines don't respond due to firewall' date=' they [i']will[/i] appear in the arp table :)

     

    Yeah, I do that all the time when I'm on a new network =\

    Of course ARP has its uses, so does everything else, but people dont usually go straight for ARP when looking for hosts on a network, and if someone is going to pingsweep a subnet then he/ she is looking for trouble.

  7. Disabling IE is not the same as removing IE, and it can't be disabled properly either without interfering with other functionality. Its PART of windows, and if nessicary, I can show to anyone who understands ASM well, why it is so.

     

    As for the browser in explorer, you are wrong. It is using Internet explorer's rendering engine. It's application extentions.. which IS integrated into windows. So saying they they are different is wrong. THAT is what's called integration. Its internet explorer Integrated into windows. Try checking user agent. I'm pretty sure it wont say "explorer". Thats becuase its not

  8. Try entering a web address in explorer. It will automatically start browsing. THAT is IE. Now IE can be disabled etc.. but it can't be removed. Its built into windows. Email M$ if you arent convinced. Not to mention that if you try and delete IE and all it's files and registry entries etc.. your system will be screwed up.

  9. you need IE for security updates.

     

    ergo' date=' removing IE actually lowers your PC's security.

     

    Annoyingly.

     

    You could allways remove permission for IE to access the internet in your firewall, and manually allow it every month when you update.[/quote']

     

    No, removing IE will not lower the PC's security. It CANNOT be removed, so you can't say that it would lower the security if removed.

  10. It is impossible to remove Internet Explorer. Not because of its difficulty, but because it is an intergrated part of the windows shell. Don't bother, IE CANNOT be removed. Period.

  11. That would be associating the IP address 192.168.0.7 with the MAC address 00-aa-00-62-c6-09. If that wasn't already your IP, it would be like changing it. Note that if you are on a network that uses DHCP to assign IP addresses it will not work or if any IP has been assigned to your network card. ARP.exe is pretty much useless except for diagnostics.

  12. Ok, first off, symantec products aren't all that good. If you want a real good anti-virus, go with Kaspersky. Secondly, it sounds like the trojan hooked into the windows LSP chain and has debug privleges. What I would do is boot into safe mode, load the services (start -> run, then type "services.msc") and disable all services you don't recognize. Then you need to remove the application from the LSP chain. How you do that is up to you. I would also kill the executable and delete it at this point (or send it to me and i can take a look at it). If you still cant kill it.. i would boot up a windows installation CD and choose repair mode. You will get a command prompt (After selecting that option) rename the exe and restart your pc.. and boot it up. I'd suggest you try some good anti-spyware / adware programs like Spybot Search & Destroy. Before you do any of this make sure you are completely aware of what you are doing sine messing with LSP chains can seriously mess up your system. Same goes with services. Good luck!

     

    Edit: Oh, and about why firewalls are so easy to hijack. Software based firewalls are fairly easy to, thats because once you get the trojan / virus onto your comptuer and its running on ring 0 / kernel level.. it has control over everything and can "take over" (system wide API hooks) anything it wants to. It's fairly common in the more advanced viruses and trojans these days. You have Microsoft to thank for this, windows is very unsecure. Oh and if you use internet explorer, stop and switch over to Firefox or Opera, even if you dont like either one of them. This is because IE is intergrated into the windows shell, which in itself is a VERY BIG security issue. (this is aside from the fact that IE is loaded with bugs and security holes). I'm not saying that firefox or Opera are bug free, they arent.. but there are much more secure than IE will ever be.

  13. ARP (Address resolution protocol) is used to find out a host's mac address when only the ip address is known. It's mainly used to identify the MAC addresses based on IP and when two computers on a LAN communicate with each other. It's basically a protocol used in routing and communication between systems on a same network. Now 'hackers' use a technique commonly known as ARP poisoning or ARP spoofing to listen in on other computers' traffic. This type of attack sends false (spoofed) ARP packets to a LAN which has its mac address defined for a bunch of IP addresses. (To fool the switch/router) So it will receive the traffic on the network for the designated IP addresses it spoofs. This type of attack is a MITM attack (Man in the middle ). All the traffic that goes to a computer(s) goes through the computer you are spoofing from. Now in order to do this you must already have access to a computer inside the network. Another common method to acheive the same goal is MAC address flooding. A computer floods a router's MAC table until it overloads its memory. At that point the fail-safe mechanism of the switch / router kicks in. It 'drops' down to a layer 1 system (ie. hub) and broadcasts all the incoming/outgoing traffic to all hosts on the network. Newer hardware has built-in systems to prevent such attacks. I will not go into specifics of how each one works because there are enough script kiddies as it is. Hope this helped!

  14. Hi,

     

    I was doing some experiments with wax and now that I'm done I want to clean everything up. Problem is my beakers are coated with wax and its a pain to get the stuff off. I tried scraping it and heating it. I can't seem to find a way to get the beaker clean of that stuff. Anyone know a solvent that can dissolve wax? or an effecient method of cleaning up my glassware?

     

    Thanks

     

    Edit: Oh yeah, It's candle wax in case it matters.

  15. Ksp can actually contain terms for the concentration of solids' date=' its just they are defined as 1 and then usually left out.

     

    As for the eqm of solid and aqueous salt, it does actually exist, its just that you only need a infinitesimal amount of precipitate to set up the eqm as the solid automatically attains its defined concentration of 1. Thus there is no observable precipitate[/quote']

     

     

    Meaning the solid has no effect on the solubility of the salt. No matter what you do, removing or adding solid will not cause the equilibrium to shift either way since Ksp is directly related to the molar solubility of the salt.

  16. Removing the solid from the solution will not do anything. The equilibrium constant does not contain solids. The Ksp would be as follows: Ksp = [Pb2+][sO42-] Therefore if solid is added or removed, it will not affect the amount of dissolved salt in the solution (given that it is already saturated)

  17. Hi,

     

    Why do different metals react in odd ways with different acids, example:

     

    Zn + HNO3 ---> Zn(NO3)2 + NO2 + H2O

     

    Zn + H2SO4 ==> ZnSO4 + H2

     

    Zn + HCl ----> ZnCl2 + H2

     

    Why does HNO3 give off NO2 gas when reacting with zinc instead of all the NO3- anions going towards making the salt?

     

    Now looking at another reaction:

     

    Cu + H2SO4 ==> CuSO4 + SO2 + H2O

     

    In this reaction Sulfur Dioxide is formed. What's the reason behind this? Again why doesnt all of the SO4 go towards making a salt?

     

    Thanks

     

    I

  18. 1)

    Equation: N2 + 3H2 ---> 2NH3

     

    Problem: What volume of NH3 is produced if 25.0g of N2 is reacted with an excess of H2?

     

     

    Since there is excess H2 then the limiting reactant will be the N2. Therefore the amount of NH3 produced is based on how much N2 gas there is, in this case 25 grams. The calculations begin as follows:

    stoichiometry2du.jpg

     

    How Only at STP can you multiply by 22.43 L/mol. If you are not at STP then you MUST use the formula PV = nRT, Where P is the pressure in atm, V is the volume in Liters, n is the number of moles, R is the constant (.0821 for atm) and T is the temperature in kelvin.

     

    Now that I showed you how to do this one, you should be able to do the other.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.