Monday, February 17, 2020

Topics in Physical Chemistry Essay Example | Topics and Well Written Essays - 3750 words

Topics in Physical Chemistry - Essay Example The understanding of chemical equilibrium has also advanced by different research studies thereby bringing new knowledge. Through exploration of different studies on the topic, this paper presents current study from peer reviewed journals and how research advance the studies in chemical equilibrium and its application. The use of computer simulations in the study of simple and long chain chemical reactions has also beenexplored. Finally, the paper explores the law of thermodynamics and how it applies to chemical equilibrium. Introduction Chemical reactions involve reactants and interacting under certain conditions to produce a product. It refers to the process of transforming a set of chemical compounds or substances to another or others with totally different identities. It involves the changes of the position of electrons with regards to formation or breaking of the bonds while the original elements always remain the same. Since there is no change in the original elements present, a chemical reaction can always be represented by an equation. Reagents or reactants are the initial substances that participate in a chemical reaction thus during a chemical reaction, there is always a change. This is because the new products exhibit different properties. New products may have differences with regard to physical, biological or chemical properties depending on the nature of chemical reaction. Chemical reaction equation must have the starting materials (reactants), conditions for reaction, intermediate products and finally the end products. However, there are certain chemical reactions that are very simple and do not need to pass through the intermediate product in order to get to the final product. In a chemical equation, we may have two different types of chemical reaction as well. Chemical reaction that takes place according to concentration and temperature at a specific rate is called non spontaneous while one that require no other conditions except thermal energy is known as spontaneous. This principle forms the basis of calculating the rate of reaction as well as managing it. In this respect, non spontaneous reaction is very slow and thus requires an additional energy or catalyst to increase its rate. Objective of the Study The objective of this study is to explore different literature and explore the current studies in chemical equilibrium. This paper aims at exploring studies in academic journals mainly focusing on equilibrium constant and its application in different industries. Chemical Reaction Chemical reactions can be well illustrated by chemical equations. Chemical equations consist of two or more reactants on the left side and the resultant products of that particular reaction on the right side. An arrow at the middle of the equation always represents the direction of reaction which can be either to the right or to the left depending on the conditions. It is therefore important to note that most chemical reactions are reversible r eactions. This is often represented by a double arrow which points on the both sides. The meaning of this is that products can also produce reactants depending on the concentrations and certain conditions. aA + bB cC + dD Irreversible reactions aA + bB cC + dD Reversible reactions The above equations shows the basic principle of a chemical reaction where A and B substances react to produce C and D substances. However, a, b, c and d

Monday, February 3, 2020

Mal-Adapted Essay Example | Topics and Well Written Essays - 1000 words

Mal-Adapted - Essay Example The mentioned contributions, however, are not exhaustive and are only intended to demonstrate the extent to which IT has become an integral part of corporate life and the business process. At the same time, however, IT functions as an organization's primary area of vulnerability as it is through their malicious use that attackers can infest an organization's system with viruses, worms, spyware and countless other types of malware (Gold, 2001; Rhode-Ousley, Bragg and Strassberg, 2003; Chen, Thompson and Elder, 2005). In light of dependency versus vulnerability, therefore, it is incumbent upon organization's and business entities to institute such protections as would shield the entity from such attacks. Sometimes, however, whether intentional or unintentional, the attack may come from within. Discussing the extent of my organization's vulnerability to malware with the head of the network and ICT department, I learnt that the company had been subjected to several attacks in the past, two of which were quite serious and, both caused by the activities of employees. As the head of the ICT department remarked as a prelude to his description of the attacks, two years ago and, in the wake of an external attacks which bordered on the catastrophic, the organization made a substantial investment in network security. At the department's recommendation, the organization's leadership consented to the implementation of third generation IA technologies which focused on in-depth defense. As explained by Liu, Yu, and Jing (2005, p. 112) this type of IA embraces all of as "(a) boundary controllers, such as firewalls and access control, (b) intrusion detection and (c) threat/attack/intrusion response." Upon the implementation of the defined system, the general assumption was that the organ ization was immune to external attacks and to malware. This, as evidenced by later events, was an erroneous assumption. The source of the first malware infestation suffered by the organization following the implementation of the defense in depth IA system, came from the Research an Development Department. The ICT department had initially recommended the securitization of the network against direct downloads from the internet, even at the explicit request and consent of users. The R&D department had vehemently argued against this, emphasizing that were such a security procedure to be implemented, their work would be literally brought to a standstill. The argument presented was persuasive and, therefore, the R&D department maintained the mentioned privilege. Less than two months following the implementation of the system, complaints regarding adware and spam email which contained malicious attachments, remained high, to the extent that it seemed as if the defense in depth system installed was ineffectual. Indeed, the department remained as engaged as ever in the removal of adware and in dealing with malicious spam. Needless to say, the cost of wasted time and effort was substantial since, as the employees whom I discussed this event with recalled, attempting to access the internet was futile. Pop-ups and constant redirections from addresses initially requested simply meant that getting any work done was a monumental task in itself. The ICT department, as the head informed me, determined to trace the source as the possibility of the installed system being ineffectual simply defied logic. As the