Free Essay

Chemistry

In:

Submitted By mohdabu1989
Words 4683
Pages 19
White hat hackers are the ethical, legal hackers (2002). Companies pay them to find holes in software or networks and fix the problems. The difference between white hat hackers and black hat hackers is that white hats have permission to carry out their attacks on a company to fix the problems. (2) A majority of company owners say that white hat protection is the only true way to ensue security in their businesses. White hats use the same programs and knowledge as black hats do. They usually stay in the cyber underworld to keep updated on attacks and information.

Black hat hackers are the most rare and elite of all the hacker groups. Most are connected with criminal activities, such as espionage. (2001) Not all hackers labeled black hat hackers are connected with criminal activities in real life. There are many "old school" hackers considered black hat. They are the ones that are usually from the 1960's and use the word hacker with honor and freedom. (Quinter 2) Most of these hackers do not have a negative intent they are usually programs from Stanford or MIT. They have good ethics and believe in open source and fixing flaws in programming.

Most black hat hackers are criminals and are very powerful. (Glenn 8) Political and personal revenge is a major motivating factor in becoming a true black hat hacker, but the most elite hackers go for the money. Industrial espionage is one of the best paid jobs for a hacker. A typical espionage attacks takes about three weeks and they usually pull in a million dollars a job. Black hats are good at what they do and usually don't get caught. Around 90% of companies reported at least one attack in the last year. Three-fourths of them reported some kind of financial loss because of the attacks, and 19% reported ten or more attacks.

Hacking Research Paper
Hacking

Describe a negative aspect of ICT’s impact on the information society. Describe how ICT has brought this about and what society is has done in response to it.

Abstract

Hacking has been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize those effects.

Different issues regarding hacking are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found.

The society response to hacking attacks lacks till this moment the ability to stop or completely prevent attacks from happening because as long as security tools are developed, more sophisticated hacking attacks are invented. That’s why we should start to think about hacker’s psychology as the main way to prevent and stop attacks by understanding their needs or desires.

Introduction

The Oxford English Dictionary defines hacking as “cut or chop roughly; mangle: cut (one’s way)”… to its present definition as “gain unauthorized access (to data in a computer)”. Banks (1997:11) defines hacking as “something that boring mainframe computer operators did to improve performance and battle boredom.” Here banks focuses on boredom as the reason of hacking. A more technical definition of hacking according to Digital Guards data base (2001) is “unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network.” Darlington (2001) believes hacking is not limited to accessing data or information but also includes an attack on the privacy of all people. Almost all different opinions agree on the illegality of hacking.

On the other hand the word hacker is the agent of hack or hacking and it was defined as a person who enjoys accessing files whether for fun, imposing power or the interest related to the accessed files or data according to Taylor (1999). While Marotta (in Taylor, 1993) has a negative view of the hacker as a data lord, a barbarian who takes what he wants. Himanen (2001) defines hacker as any person who performs illegal actions whether they were related to computer or not which means the usage of a device apart from its functionality. Seems hacking according to Himanen is related to any illegal or unauthorized action. Seebach (1999) finds hacker as a person who feels delighted and full of joy when being able to access a system and break the security utilities but Himanen (2001) doesn’t consider hacker as a thief. This definition looks at the hacker as a normal person who is only practicing his knowledge and ability to access what he wants. Williams (2002) goes in the same direction and finds hacker as a knowledgeable person who never stops reading and exploring new technology for the sake of improving himself and might perform illegal actions but his first priority is to look and search for more knowledge. Digital Guards data base (2001) gives the hacker a definition of “a person who enjoys exploring the details of computers and how to stretch their capabilities”.

Clear from the definitions mentioned above that there is a controversy that encounters the judgment and definition of hacking, controversy aroused because it’s hard to decide exactly what the aim is behind hacking or how to know the mentality of the hacker. That’s why the ethics and motivation of hackers should be paid attention and discussed then understanding the hacker will be much easier.

Who is the Hacker?

Hacker is part of the society, a computer professional who wants to use technology for his own benefit Taylor (1999). Seems hackers are experts and professional people who were behind the technology we are enjoying at the moment but at no time and suddenly they began to think about their interests and benefits they can achieve from what they invented. Levy (in Taylor, 1999) described hackers in regard to the history; she divided the life history of hackers into three generations: the first generation of hacking was made of experts of computer programming who never stopped improving their skills then misuse them, the second generation was made of computer hardware developers who found hacking and accessing data and information for free as an appealing idea while the third generation included developers of games architecture. Recently the fourth generation includes any person who has a computer and some knowledge of programming.

Pipkin (1997) classification of hackers depends on the functionality, in other words the classification depends on the way hacker interacts with what is being hacked. Hackers were classified into three different types; the first type is called In-house hacker. In-house hacker is an employee who is responsible of operating and maintaining the system, who interacts immediately with the system as programmer or data entry employee and is aware of all the system security capabilities and gaps and should be the guard of the system but for different motivations he hacks the system and gets what he needs betraying all the trust given to him, the second type is called super hacker who doesn’t interact with the system but at the same time monitors the system on daily basis and has an eye on what is going on and what type of data is entered at what time then depending on the entries he decides the moment he should get these information and retrieve them for personal motivations while the third type is called professional hacker and this hacker is very strong and capable of getting any type of data, he has the ability of persuading the user or the operator to provide him with the needed information by programming tricks or user friendly screens and this kind of hackers often gets unique training specially when being used in military tasks as what happened in the cold war.

Randall et al. (2000) focus on another type of hackers related to organizations and business, this hacker can be a company’s competitor, who is interested in business statistics or future plans. Hacking such information is beneficial to other companies so that they can change their plans in accordance to what was hacked and try to build strategies that cause failure and damage to others. This leads us to analyze and study the motivations and the thoughts of hackers and the reason behind performing illegal activities.

Motivations behind Hacking

The motivations behind hacking are an issue that is discussed heavily due to the importance of understanding the hacker’s psychology and the fuel that encourages him/her to perform such illegal activities, also because hackers view about what they are doing is far different from our views as victims Furnell (2002). Taylor (1999) found that hacking is motivated by the desire of imposing power and improving knowledge, searching for convenience rather than making money. It’s a matter of self convenience and satisfaction so that’s why motivations differ from one hacker to another but they all share the feel of addiction, curiosity and the need to impose their power while Levy ( in Taylor, 1999) discussed the role of own thoughts and ethics in motivating the hacker; she believes that hacker thoughts were the main motivator, the thoughts focused on the freedom of information which means that information should be easily accessed by all people at any time, but since regulations and security tools limited accessibility and began to interfere with the freedom of information, hackers helped people to return back their right of instant access of any source of information. After seventeen years Selwyn and Gorard (2001) proved levy right and found that hackers do believe that knowledge and information should be shared and there is no need for information owning because accessing information is one of the basic rights people should have. Himanen (2001) believes that the thought of information sharing was the reason behind the failure and bankruptcy of many companies that were the target of many hacking attacks in the name of information sharing and defending the community rights. Sterling (2004) believes that information should be shared but with mentioning who is the owner and with the permission of doing that because knowledge should be spread away and not to be limited or restricted and hacking is not the proper way of doing this.

Pipkin (1997) on the other hand reveals the challenging part of the hacker’s personality as the biggest motivation; this means that the hacker feels the joy and excitement when hacking systems that are provided with the almost perfect security tools. Randall et al. (2000) see the excitement as the major reason while Banks (1997) relates hacking to finding jobs which means if hackers were caught breaking into the system, the hacked system owners will offer the hacker highly paid job just for the sake of protecting their system from other intruders. Crucial paradigm (2003) includes that money had never been a motivator but in some cases hackers look for money because that will enable them to create unreal online shopping sites to collect payment details or to gain entry to servers displaying credit cards details.

Motivations behind hacking are difficult to capture because it’s related to each hacker way of thinking or belief or sometimes the type of hack is used as an excuse for the illegal activity as what Pipkin (1997:8) stated “there are many hackers who don’t consider themselves criminals because they are not stealing money, credit cards, computer hardware, or anything made of atoms. Rather, they are only making copies of software and data and utilizing computer resources”. And also Thomas and Loader (2000) showed the result of a study done by asking different people about differences between hackers. The majority responded that hackers are not alike and they differ so much from each other since their motivations are different while Furnell (2002) judged hackers depending on the harm they cause whatever was their motivation, because hacking is a disease and should be removed so that the effect of hacker attacks will be minimized.

Types of attack

Pipkin (1997) lists a number of hacking attacks that are most commonly used in breaking system and causing disruption and damage for services. These attacks can be summarized as following:
1. Software Theft: means software will be hacked by producing illegal copies and selling them without the permission of the owner. This will result in bankruptcy and failure to companies that spend millions developing and creating software that will be sold later on with the cheapest prices in an unauthorized way.
2. Theft of business secrets: means that trading and business information are stolen for the benefit of other companies.
3. Theft of information: means that all types of information and data are stolen for a particular benefit or self motivation.
4. Denial of service: means that hacker will break into a system and disable different operations and cancel all account so that all users won’t be able to access their own information.
5. Terrorism: known as information terrorism and occurs when dataflow is disrupted causing the system to break down and stop providing services for a period of time.

On the other hand Crucial paradigm (2003) talks specifically about forms and techniques of computer and network attacks and summarize them in five points as following:
1. Distributed denial of service attacks: means that the system crashes or stops working for a period of time due to flood of messages or requests.
2. Trojan horse: software installed on computer systems and treated as another software. It shuts down the system or allows you to hack other people. It enables others to enter your system or sets itself when triggered.
3. Viruses: most commonly used, the procedure of viruses is to spread and repeat itself then destroy or attack the system.
4. Websites: use known security holes to track your web browser and then perform harmful activities.
5. Worms: used for hacking big systems. It uses all available resources to cause overload to the system and difficulty to function.

Talking about attacks leads us to the question of what are the characteristics of them. Taylor (1999) listed the main characteristics of hacking attacks in three points:
1. Simplicity: means that the attack should be simple in appearance but the effects are impressive and the results will be as pleasing to the hacker as what he planned for. It means that do your job in a smart and easy way.
2. Mastery: the methods used in hacking contain sophisticated knowledge which is difficult for anyone to understand. The reason behind mastery is to make sure that the hacker is the only one who can solve the problem being caused.
3. Illicitness: means that the act is against all rules and laws.

Hacking should be halted and stopped. To know how to stop it we should know the reason behind the birth of hack, and to know why to stop it we should know the consequences and effects of hacking.

ICT and the birth of Hacking

Randall et al. (2000:15) state that “as long as there have been computers, there have been hackers”. It’s clear here that the birth of computer technology helped in the birth of hackers and computer psychos. Since internet and computer technology had spread away and became available to different people around the globe, information crime including hacking appeared as an enormous problem due to professionals or experts who realized the benefit of information for their own use.

ICT development was so fast and provided different facilities and services in a short span of time, but at the same time ICT helped in building hacking environments because the speed of ICT development and improvement was not matched with the speed of information security technologies development, so it allowed hackers to feel free in doing what they want Taylor (1999). It was ICT failure to provide high quality security technology that encouraged people who turned to be hackers to access information in unauthorized way without the fear of being caught.

Furnell (2002:190) stated that “hackers have established their own communities on the internet”. That’s because internet provides cheap access to everyone enabling the occurrence of illegal activities. According to Chakrabarti and Manimaran (2002) ICT should have provided security features to protect their findings and inventions then think about how to develop them. This means that ICT major problem that it was so fascinated by the fast development and ignored or totally forgot to protect and save the earlier inventions, this helped hackers to break into systems gaining benefit from security gaps and weaknesses.

Thomas and Loader (2000) believe that the development of ICT played a big role in building a hacking community, not only because ICT development is faster than security development, but also because ICT provided new chances and opportunities of hacking by including different and huge information data bases that are appealing to any person, this encouraged hackers to begin their illegal actions helped by the lack of capable security infrastructure.

Effects on Society

Hacking effects can be categorized into three types; effects on individuals, organizations, economy and effects on countries. The most important issue to recognize is that victims are the only ones who feel the threat and effects of hacking attacks, and our duty is to inform other people about the danger of hacking to be cautious and alert which helps in preventing hacking attacks from happening Furnell (2002). The effects are as following:
1. Effects on individuals: according to Banks (1997) there are cases where individual information is sold and used for bad purposes like using their accounts. While Seo (2001) focuses on the psychology of individuals after being hacked and that they will always have the fear of being monitored when accessing internet and information, added to that the privacy of users can be easily penetrated. According to Thomas and Loader (2000) credit card details and passwords can be stolen causing financial damage to individuals added to that computer systems can be hacked causing the machine to stop working as usual or stealing your data. These effects will cause frustration and fear to individuals when using ICT.
2. Effects on organizations and economy: hacking is said to have cost the global economy an estimated $1.2 Billion Niccolai (2000). Hacking caused and still causing till the moment bankruptcy to plenty of companies, that’s because companies are being hacked plenty of times which leads to the loss of customer confidence or belief in the security capabilities of the company Furnell (2002). Banks (1997) believes that companies are a main target for hackers who break into their systems to steal trade information or customer’s payment details. Pipkin (1997) focuses on denial of service and the effects on companies. The company server will be broken due to huge traffic causing customer frustration and hurt the company reputation. Same for software theft that causes bankruptcy to companies which spend millions to develop and create software that sadly later on is stolen and copied for cheap prices. The main problem is that some companies hire or use hackers to break into other competitor systems to steal precious information Randall et al. (2000). Thomas and Loader (2000) discuss the effect of hacking on E-commerce. Web sites for online selling are being hacked for the sake of getting customer and company information which then used for nefarious purposes.
3. Effects on countries: since we are living in information society where all our daily activities are controlled by technology, there will be a great damage if a vital system was broken by hacking attacks. Breaking main system might result in collapse of countries Banks (1997). Ninemsn ( 2004) shows that north Korea is training 600 hackers to begin cyber attacks against United States, Japan and south Korea to gather military intelligence. This kind of attacks to computer systems aim to steal vital information of countries decisions regarding foreign policies and strategies, this results in causing countries to reconsider their policies that were taken after long analysis, it might also cause disturbance due to the attack of precious and top secret information. CNET (2001) states that “FBI agents downloaded data from two Russian-based computers. The hacking was done to help their investigation and track information on internet crimes and breaking bank networks. This approach caused a lot of controversy and opened the door for other countries to hack different systems and retrieve any source of data using the excuse of tracking criminals which might lead to destroying the principle of information owning and security and then turn the world into a mess and open the door to a new cold war.

Society response (solutions)

The war against hacking is a continuous battle that has a starting point with no end at all. The world is using a variety of methods either to halt attacks or minimize their effects on different perspectives. McClure et al. (2003) found that the best way to minimize the effect of attacks or even avoid them is by building a well educated computer user who can gain benefit from different security techniques in the war against hacking. While Randall et al. (2000) believe that the first step to allocate hacking activities should be by applying information security policies, and that’s what Pipikin (1997) stated and confirmed that nowadays policies are running in a large number of organizations, these policies imply that all employees should sign a workplace behavior sheet specially the ones dealing with sensitive data and information that must be kept secret. According to those policies any employee who is caught guilty and participating in information theft or hacking will be questioned and further sanctions are applied. Furnell (2002) has a negative opinion and blames policies and restrictions for the limitation of what we can do online. Randall et al. (2000) suggest that companies are making a big mistake by waiting for the attack to happen then when it’s too late they reconsider their security techniques. Furnell (2002) suggests that companies are making a big mistake by hiding the attacks on their system and should inform authorities about any incident to help in tracking hackers and intruders.

Regarding security software, different opinions agree that there is no total security and the more sophisticated security tools are invented the more technical hacking attacks are applied, that’s because as what Banks (1997) stated that hacking is a big field with no limitations, and hackers are inventing new techniques in a rate faster than security utilities. Server pipeline (2004) states that even with the availability of security tools, it’s hard to fill all holes. Furnell (2002) also blames computer users for the inefficiency of security tools, he stated that having a security software is not a solution by itself, users should realize that they need those tools and should learn how and when to use them.

Furnell (2002) suggests that hacking will never fade away but it can be managed if precautions are taken, and Randall et al. (2000:499) said that “there will never be total security”. And till this moment we are suffering from hacking attacks almost on daily basis and the only thing we can do is to minimize their effects and rarely prevent them from happening.

Conclusion

Hackers are responsible of the huge development in computer and internet technology, but these days we consider them as thieves and intruders who penetrated our own privacy and used the achievements they were behind for their own benefit.

Hackers have different opinions and motivations. However, they all share the spirit of challenge and always trying to prove their capabilities of doing what all believe is impossible maybe because they were mistreated, or doubts surrounded their abilities and past achievements. Hackers believe that information should be shared and they fight against information owning.

Effects that hacking caused and still causing to the society can’t be ignored. Hacking nowadays is taking new phases and the danger is increasing because we are now living in a society that runs by ICT, and any attack to the ICT especially in advanced countries will cause vital consequences.

ICT still lacks a powerful security tools that are capable of tracking, catching hackers, and protecting computer systems from their attacks. My own view is that the best way to protect ICT from hackers is to study their psychology and try to understand their way of thinking, because hackers are human beings, who have two sides; evil and good, and they used to show their good side but suddenly they turned to be evil. The reasons which caused the transformation from good to evil individuals should be studied and given the highest priority in the war against hackers because since we put our hands on the cause, we can fix it to reach for better effects.

Bibliography

1. Banks, Michael A. (1997), Web psychos, stalkers, and pranksters: How to protect yourself online, Arizona (USA), The Coriolis group.
2. Chakrabati, Anirban and Manimaran, G. (2002), Internet infrastructure security: A Taxonomy, IEEE Network, November/December 2002, P.13.
3. CNET (2001), FBI “hack” raises global security concerns [online]. Available from: http://news.com.com/FBI+%22hack%22+raises+global+security+concerns/2100-1001_3-256811.html [Accessed 14th December 2004].
4. Crucial paradigm (2003), Hacking attacks-How and Why [online], Crucial paradigm. Available from: http://www.crucialparadigm.com/resources/tutorials/website-web-page-site-optimization/hacking-attacks-how-and-why.php [Accessed 7th December 2004].
5. Darlington, Roger. (2001) Crime on the net [online], United Kingdom, Darlington, Roger. Available from: http://www.rogerdarlington.co.uk/crimeonthenet.html [Accessed 4th December 2004].
6. Digital Guards data base (2001), Glossary [online]. Available from: http://www.digitalguards.com/Glossary.htm [Accessed 10th December 2004].
7. Furnell, Steven. (2002), Cybercrime: Vandalizing the information society, Boston; London: Addison-Wesley.
8. Himanen, Pekka. (2001), The hacker ethic and the spirit of information age, Great Britain, Secker & Warburg.
9. Levy, S. (1984), Hacker: Heroes of the computer revolution, New York: Bantam Doubleday dell. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge.
10. Marotta, M.E. (1993), ‘online with the super hacker’. Available from: http://www.kzsu.stanford.edu.uwi/post/mercury.html. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge.
11. McClure, Stuart. Et al. (2003), Hacking exposed: Network security secrets & solutions, Fourth edition, Berkley, California (USA), McGraw-Hill/Osborne.
12. Niccolai, James.(2000), Analyst puts hacker damage at $ 1.2 billion. Available from: http://archive.infoworld.com/articles/ic/xml/00/02/10/000210icyankees.xml [Accessed 7th December 2004].
13. Ninemsn (2004), North Korea ‘has 600 computer hackers’ [online], [national Nine news]. [SCI Tech news]. Available from: http://news.ninemsn.com.au/article.aspx?id=19653 [Accessed 10th December 2004].
14. Oxford English Dictionary. (1995), Concise, 9th edition. Oxford.oup.
15. Pipkin, Donald L. (1997), Halting the hacker: A practical guide to computer security, United States of America, Prentice Hall.
16. Randall, Nichols K. et al. (2000), Defending your digital assets: Against hackers, crackers, spies and thieves, United States of America, McGraw-Hill.
17. Seebach, Peter. (1999), Care and feeding of your hacker [online], Seebach, Peter. Available from: http://web.demigod.org/~zak/geek/hack.shtml [Accessed 6th December 2004].
18. Selwyn, Neil and Gorard, Stephen. (2001), 101 key ideas in information technology, United Kingdom: United States of America: Hodder and Stoughton-McGraw-Hill.
19. Seo, Jung.U. (2001), Toward the global information society opportunities and challenges [online], [minister of science and technology, Republic of Korea]. Available from: http://web.ptc.org/library/proceedings/ptc2001/plenary/seo.html [Accessed 10th December 2004].
20. Server pipeline (2004), Simulated hacker attacks [online], Server pipeline, Available from: http://www.nwc.serverpipeline.com/trends/trends_archive/46200228 [Accessed 15th December 2004].
21. Sterling, Bruce. (2004), The hacker crackdown: (Law and disorder on the electronic frontier), McLean, Virginia (USA), Indypublish.com.
22. Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge.
23. Thomas, Douglas and Loader, Brian D (eds.) (2000), Cybercrime: Law enforcement, security and surveillance in the information age, London: Routledge.
24. Williams, Sam. (2002), Free as in freedom: Richard Stallman’s crusade for software, Farnham, Sebastopol, California: O’Reilly.

Similar Documents

Premium Essay

Chemistry

...It is widely agreed upon that Dmitri Mendeleev is the father of the periodic table of elements that we are all familiar with today. That is at least debatable considering Lothar Meyer came up with a very similar table to Mendeleev’s. The crucial difference between these two is Dmitri’s was to get his widely published before Meyer, thus earning him the credit for developing the table. Before they were able to even assemble elements into an orderly manner, some important things had to happen first. Before it would be possible to even group elements together in an organized way, there, of course, had to be enough elements discovered to populate such a table. Many elemts have been known since thousands of years ago. The first scientific discovery of an element was the discovery of phosphorous in 1649 by Henning Brand. For 200 years following his discovery, science acquired a vast knowledge of elements and their properties. There were so many different elements, it was determined there must be a way to separate them into groups, if only for the sake of convenience. The earliest attempt to divide elements into gases, metals, non-metals, and earths was made by Antoine Lavoisier. For many years after his organization attempt, scientists all over the world began to learn about elements and how certain ones were similar to others. They used this information to make their own version of how they should be grouped together. It was eventually recognized that there should be a universal...

Words: 407 - Pages: 2

Premium Essay

Chemistry

...Chem 200 (8/28) * Chapter 1 and 2 homework ( paper) turn in next week (wed) pg 217 in lab manual * Quiz 1 in discussion sections next week * Connect homework is live -chapter 1 and 2 due sept 6 * Know common elements and ions-lab manual/syllabus pages 14-16 * Read Chapters for exams Notes Errors in measurements * Radom error: all measurements have some level of random error they can be either positive( measure more than you actually do ) or negative errors( measure less then you usually do ) * Systematic error: always the same direction (either positive or negative) Precision and Accuracy * Precision : how reproducible each measurement is , how close each measurement is to the other measurements * Accuracy : how close the measured values are to the true value. Temperature Conversions (on the exam) Chemical Language * Elements (Na,Cl)- letters of the language * Chemical Formulas (NaCl)- words of the language Water Vs. Hydrogen Peroxide (on the exam) * The use of Hydrogen peroxide: nuclear, bomb, bleach hair,etc * Molecular formula : water: H2O, Hydrogen Peroxide : H2o2 * Empirical Formula: water HO, Hydrogen peroxide: HO * Structural Formula : water HOH, hydrogen peroxide: HOOH quetion: how many atoms of carbon, hydrogen, and oxygen are present in a single molucule of citric acid C3H5O(CO2H)3 Carbon: 6 Hydrogen :8 Oxygen: 7 Chemical Bonding * Bonds form between atoms when they share electrons *...

Words: 1057 - Pages: 5

Free Essay

Chemistry

...The chemistry of perming & rebonding Some of us have naturally curly hair but want it straightened; others have it naturally straight but want it curly. But whatever the style you like to wear, there's chemistry involved in it! The structure of hair Hair is made mostly of a protein called keratin, which is also present in nails. In hair, keratin molecules are arranged in straight bundles. These bundles are held together by disulphide bonds (-S-S-), which give strength to the hair. Disulphide bonds are made by the amino acid called cysteine. The cysteine of one keratin molecule forms a disulphide bond with the cysteine of the neighbouring keratin molecule. The more disulphide bonds there are in a strand of hair, the straighter it is. Ammonium thioglycolate: the perm salt Ammonium thioglycolate (HSCH2CO2NH4) is a compound that can break disulphide bonds. This is because it contains a thiol group (-SH). The thiol group replaces one of the sulphur atoms in the disulphide bond, like this: Keratin-S-S-keratin + 2HS-CH2CO2NH4 --> -HO2CH2CS-SCH2CO2H + 2NH3 + 2HS-keratin When the disulphide bond is broken, the keratin bundles come apart, and hair is weakened. Ammonium thioglycolate is therefore used widely in beauty parlours when customers want their hair re-styled. However, if you use too much of it, or if the reaction is left for too long, you could end up going bald. So do not, ever, try it at home! If you have watched the film Legally Blonde, you'll have seen Reese Witherspoon (acting...

Words: 7009 - Pages: 29

Free Essay

Chemistry

...Some stuff to take note in chemistry IONIC Equations * You have an equation * Split only the aqueous parts * Leave solid, liquid and gas * Cancel out the products that remain the same as he reactants * These are called spectator ions * Methods for preparation of salts * Precipitation * Titration * Uses of salts * Food: Flavoruings, fillers etc * Fertilizers: Ammonium Nitrate (NH4NO3), Potassium Nitrate (KNO3) * Industrial: Modifying properties of cement mixtures, paint formulations, fillers in plastics, inks, medical industry * aHarvesHh ccscHarvesting sea salts, via evaporation, we know it’s a salt cos when you remove the metal and add h , you getan acid * the saltsttttttTHe salts are formed when the H of an acid is replaced by a metal * NaOH + H2So4 -->2NaOH + H2SO4 Na2SO4 + 2H2O * Oxides OosdoidikcxzjOxides and hydroxides are not salts * SoCcCCCCos when you replace the Metal with H, you get H2O =/= Acid * However, water can be considered an acid, sometimes * Nitrates | * All soluble | * Sulfates | * All soluble except clb (calcium lead barium) | * | * Mnemonics: Chinese language b | * Chloride | * All soluble except lms (lead, mercury, silver | * | * Learning management system, | * Carbonate | * All insouluble except spa (sodium, potassium, ammonium) | * | * Science practical assessment | * Precipitation: Prepare insoluble salt: 2 aqueous...

Words: 479 - Pages: 2

Free Essay

Chemistry

...Name: College ID: Thomas Edison State College General Chemistry I (CHE-111) Section no.: Semester and year: Written Assignment 3: Mass Relationships for Compounds Answer all assigned questions and problems, and show all work. 1. How many atoms are there in 5.10 moles of sulfur (S)? (6 points) 1 mole= 6.02 x 1023atoms 5.10 = (Reference: Chang 3.13) 2. How many moles of calcium (Ca) atoms are there in 77.4 g of Ca? (6 points) No of moles = mass of compound/ molar mass of compound (Reference: Chang 3.15 3. What is the mass in grams of 1.00 × 1012 lead (Pb) atoms? (8 points) Mass in grams = no of atoms x molar mass of compound / Avogadro’s number (Reference: Chang 3.19) 4. Describe how you would determine the isotopic abundance of an element from its mass spectrum. (6 points) (Reference: Chang 3.32) The mass spectrometer separates isotopes on the basis of their charge-to-mass ratio providing a spectrum with a number of peaks. Each peak represents an isotope. The mass of each isotope is determined from the magnitude of its deflection on a spectrum whereas the abundance of each isotope is given by the area of the peak. 5. Cinnamic alcohol is used mainly in perfumery, particularly in soaps and cosmetics. Its molecular formula is C9H10O. a. Calculate the percent composition by mass of C, H, and O in cinnamic alcohol. (8 points) b. How many molecules of cinnamic alcohol are contained in a sample of mass...

Words: 778 - Pages: 4

Premium Essay

Chemistry

...Ohler 1 Kyle Hardenbrook Chemistry CP October 16, 2014 It was not right for what I did in chemistry class today. Swinging my apron between my legs and making weird noises is a safety caution. If someone was walking by me swinging my apron I could have knocked something out of their hand and made them drop the item. It could have been glass or a specific chemical that was dangerous and caused more injury towards someone. It was extremely immature and I let my energy get to the best of my actions today in chemistry. Proper actions should be mature and not act like a fool and try to get people’s attention and make them laugh. Being the class clown is nothing to be happy about. If I would have causes an accident then their project could have been jeopardized which means their grade is jeopardized. I don’t want to be responsible for affecting someone’s grade because of my immature acts. If I were to knock something over and it was hazardous I could have a possibility of injuring someone. Chemicals are nothing to mess around with and that’s why you should never mess around in a lab. If I were to hurt someone it could mean being in the hospital and if I were responsible for having someone in the emergency room and to pay for someone’s bills I would feel absolutely horrible. Being immature in lab and having fun is nothing to joke about. You need to be 100% serious or else you are endangering other people around your own...

Words: 265 - Pages: 2

Premium Essay

Chemistry

...Universiti Tunku Abdul Rahman, Faculty of Science Session : Jan 2015 Subject : UDEC1134 Chemistry Laboratory I Course : Bachelor of Science (Hons) Chemistry Year/Sem : Year 1 T1, T2 & T3 Unit Coordinator : Dr Chee Swee Yong Lecturers : Ms Chang Chew Cheen, Dr Chee Swee Yong, Dr Lim Tuck Meng, Dr Sim Yoke Leng |Lab group |Lab A |Lab B | |Venue |D012A |D012B | |Monday @ 9.00 am – 11.30 am |P5 |P1 | |Monday @ 3.00 pm – 5.30 pm |P2 |P3 | |Wednesday @ 9.00 am – 11.30 am |P3 |P4 | |Wednesday @ 3.00 pm – 5.30 pm |P1 |P2 | |Thursday @ 3.00 pm – 5.30 pm |P4 |P5 | |Week |Experiment |Lab group |Lecturer | |1 |Briefing by HoD |Lab A/ Lab B |Dr Sim KM | | |Expt 1: Investigating...

Words: 463 - Pages: 2

Free Essay

Chemistry

...Freezing Point Depression 4-5: Freezing Point Depression If you dissolve a substance such as ordinary table salt (NaCl) in water, the freezing point of the water will decrease relative to the freezing point of the pure water. This property is used to melt the snow or ice on roads during the winter or to make homemade ice cream. In this assignment, you will dissolve a sample of NaCl in water, add some ice, and then measure the freezing point depression. 1. Start Virtual ChemLab, select Colligative Properties, and select Freezing Point Depression from the list of assignments. The lab will open in the Calorimetry laboratory with a beaker containing 45.00 g of ice and a coffee cup calorimeter on the lab bench. A sample of sodium chloride (NaCl) will also be on the balance. 2. Click on the Lab Book to open it. Record the mass of the sodium chloride in the data table. If it is too small to read, click on the Balance area to zoom in, record the mass, and then return to the laboratory. 3. 100 mL of water is already in the calorimeter. Use the density of water at 25o C (0.998 g/mL) to determine the mass from the volume and record it in the data table. Make certain the stirrer is On (you should be able to see the shaft rotating). In the thermometer window, click Save to begin recording data in the lab book. Allow 20-30 seconds to obtain a baseline temperature of the water. Click the clock on the wall labeled Accelerate to accelerate...

Words: 640 - Pages: 3

Premium Essay

Chemistry

...NAME: AKINWANDE OLUFISAYO PARNTNER: COURTNEY DATE: JULY 8TH 2014. ALDOL CONDENSATION TO MAKE VANILIDENEACCETONE. DATA: REACTION: TABLE 1: DATA FROM EXPERIMENT | Vanillin | Acetone | Vanillindeneacetone | Chemical formula | C8H803 | C3H60 | C11H1203 | Molecular weight | 152.25 g/mol | 58.08 g/mol | 192.21g/mol | Density (g/cm3) | 1.06 | 0.788 | | Amount used | | | | Total moles | | | | Theoretical yield | | | | Percentage yield | | | | TABLE 2: DATA FROM EXPERIMENT: REAGENTS | Sodium Hydroxide | Hydrochloric Acid | Chemical formula | NaOH | HCl | Molecular weight | 39.997 g/mol | 36.46 | Denisty | 2.13 | 1.18 | Amount used | 3mL | 7mL | Total moles | 0.i598 | 0.227 | TABLE 3 : IR SPECTRUM Peaks (cm-1) | Functional group | 3699.8 | OH group | 3267.6 | Alkene | 1634.79 | Aromatic | CALCULATIONS: Total moles of Vanillin = 0.5g/152.15 = 0.0033 moles of vanillin. Total moles of acetone = (4mL * 0.788)/ 158.08 = 0.0199 moles of Acetone. Theoretical yields: Vanillin = 0.5g * 1mole * 1mole * 192.21 = 0.632g 152.15 1mole 1mole Acetone = 4ml * 0.788 * 1mole * 1mole * 192.21 = 3.832g 1mole 158.08 1mole 1mole Therefore, vanillin is the limiting...

Words: 487 - Pages: 2

Free Essay

Chemistry

...Name___________________________________ Period____________________________ Date____________ pH/pOH Worksheet H3O+ Molarity to pH 1. Determine the pH of a 0.00118 M solution of HBr. 2. What is the pH of a solution that has a hydronium ion concentration of 1.0 M? 3. What is the pH of a 2.0 M solution of HCl, assuming the acid remains 100% ionized? 4. What is the theoretical pH of a 10. M solution of HCl? OH Molarity to pH 5. What is the pH of a solution with the following hydroxide ion concentrations? a. 1 × 10-5 M b. 5 × 10-8 M c. 2.90 × 10-11 M 6. Calculate the pH of the solution which is prepared by dissolving 32.7 g of sodium hydroxide in 2.50 L of water. OH Molarity to H3O+ Molarity 7. The hydroxide ion concentration of an aqueous solution is 6.4 × 10-5 M. What is the hydronium ion concentration? 8. The hydroxide ion concentration of an aqueous solution is 3.71 × 10-10 M. What is the hydronium ion concentration? Mixed Review 9. Calculate the H3O+ and OH concentrations in a 7.50 × 10-4 M solution of HNO3, a strong acid. 10. What are the pOH and hydroxide ion concentration of a solution with a pH of 8.92? 11. A solution is prepared by dissolving 3.50 g of sodium hydroxide in water and adding water until the total volume of the solution is 2.50 L. What are the hydronium and hydroxide ion concentrations? 12. If 1.00 L of a potassium hydroxide solution with a pH of 12.90 is diluted to 2.00 L...

Words: 383 - Pages: 2

Free Essay

Chemistry

...University of Phoenix Material Week 4 Exercises Prepare written answers to the following exercises: 1. Imagine that you are an environmental scientist. Working in collaboration with a university chemist, you were able to determine from mass spectrometry that four elements exist in your soil samples. They are Se, Sn, Pb, and Cd. You need to determine which elements will most likely combine with oxygen to produce oxides that are present in your sample. To do so, refer to the periodic table to determine the electron configuration and ionization energy of each element. This will show the number of valence electrons for each element. • What are the electron configurations for Se, Sn, Pb, and Cd? Selenium=[Ar]3d 10 4s2 4p4, Tin=[Kr]4d10 5s2 5p2, Lead=[Xe]4f14 5d10 6s2 6p2, Cadmium=[Kr]4d10 5s2 • What are the valence electrons for Se, Sn, Pb, and Cd? Selenium=Valence 6, Tin=Valence 4, Lead=Valence 4, Cadmium=Valence 2 • Rank the elements in increasing ionization energy. Selenium=941.2045, 2973.7, 4144, 6590, 7880, 14990 kj/mol. Cadmium=867.8, 1631.4, 3616 kj/mol, Lead=715.6, 1450.5, 3081.5, 4083, 6640 kj/mol. Tin=708.6, 1411.8, 2943, 3930.3, 7456 kj/mol • Which element will form oxides? Lead. 2. Imagine that, as an employee of a pharmaceutical company, you are working on an H-K-ATPase. It is the enzyme that pumps acid into the stomach to help in digestion. You are trying to determine whether a compound will fit inside the pocket of...

Words: 512 - Pages: 3

Free Essay

Chemistry

...Determination of Chemical formula Joseph Kelly, Anthony Crespi and Darrian Saddler, Wake Technical Community College July 13, 2015 CHM CHM 151 section 4103 Purpose: his las was used to separate the compound into its constituent elements that will help to determine the different molar ratios. Method: The experiment is conducted according to the published procedure in General Chemistry I: CHM 151 Laboratory Experiments, Wake Technical Community College, summer 2014, pp.70-74. Get an analytical balance and zero it to begin this experiment. Then weigh out one gram of copper chloride hydrate use the evaporating dish to weigh this substance. After that, record the mass of the substance. Use a hot plate to heat the evaporating dish and use the temperature to control the crackling noise. Make sure that there are no clumps, so use a stirring rod if necessary. After color change has taken place and the substance is done heating, then reweigh the substance, but be sure to zero out the balance before doing so. Then record weight. Add 20 ml of deionized water to change the substance to bluish green. Then place the aluminum coil wire in the solution fully submerged and occasionally knock off any copper particles on the wire with the glass stirring rod, this will allow the process to be completed quicker. A Buchner funnel was used to filter the water from the copper and then heated until dry. Data: Item | Mass (g) | Evaporating dish | 52.1795 | Evaporating dish + Salt | 53.1904...

Words: 516 - Pages: 3

Premium Essay

Chemistry

...States of Matter Gases, liquids and solids are all made up of microscopic particles, but the behaviors of these particles differ in the three phases. The following figure illustrates the microscopic differences. | | | Microscopic view of a gas. | Microscopic view of a liquid. | Microscopic view of a solid. | Note that: * Particles in a: * gas are well separated with no regular arrangement. * liquid are close together with no regular arrangement. * solid are tightly packed, usually in a regular pattern. * Particles in a: * gas vibrate and move freely at high speeds. * liquid vibrate, move about, and slide past each other. * solid vibrate (jiggle) but generally do not move from place to place. Liquids and solids are often referred to as condensed phases because the particles are very close together. The following table summarizes properties of gases, liquids, and solids and identifies the microscopic behavior responsible for each property. Some Characteristics of Gases, Liquids and Solids and the Microscopic Explanation for the Behavior | gas | liquid | solid | assumes the shape and volume of its container particles can move past one another | assumes the shape of the part of the container which it occupies  particles can move/slide past one another | retains a fixed volume and shape  rigid - particles locked into place | compressible  lots of free space between particles | not easily compressible  little...

Words: 2336 - Pages: 10

Free Essay

Chemistry

...Cp8, Coordination Compound, Synthesis & Product Yield Observation, Description & Questions 1. Compound 1 was initially a light blue color. After adding the oxalic acid and heating it changed to a yellow color. Once the saturated potassium oxalate solution was added it changed to a red color. Once most of the hydrogen peroxide was added it changed colors again to murky brown. Finally it changed to a green color after the solution was brought to a boil and more oxalic acid was added. Compound 3 were crystals that of the same green color. 2. We started with: 10.000 g Fe(NH4)2(SO4)2 • 6 H2O / 392.14 g/mol = .02550 mol. We ended with 6.557 g K3Fe(C2O4)3 • 3 H2O / 491.24 g/mol = .01335 mol. .01335 mol / .02550 mol * 100% = 52.35% yield. 3. If the yield had been greater than 100% percent the likely reason would be that some liquid from the washing process hadn’t been allowed enough time to dry and caused the final weight measurement to be off. 4. Since the yield of the final solid crystals was about half of the starting amount it is likely because the solution didn’t have enough time to completely form into the solid compound. Also, in there may have been a limiting reagent that wasn’t taken into consideration. 5. Charge on iron in reagent I (Fe(NH4)2(SO4)2 • 6 H2O) = 2+ 6. Charge on iron in product III (K3Fe(C2O4)3 • 3 H2O) = 3+ 7. K3Fe(C2O4)3 • 3 H2O = potassium trioxalatoferrate(III)...

Words: 260 - Pages: 2

Free Essay

Chemistry

...TITLE OF EXPERIMENT: EXTRACTION WITH ACID AND ALKALINE OBJECTIVES: 1) Performed on acid-alkaline extraction 2) Learned to recovered benzoic acid and p-dichlorobenzene from its mixture using acid-alkaline extraction method 3) Determine the percent recovery of benzoic acid and p-dichlorobenzene 4) Determine the melting point of recovered benzoic acid and p-dichlorobenzene INTRODUCTION: Extraction involves dissolving a compound or compounds either from a solid into a liqiud or from a solution into another liquid. An acid-alkaline extraction is also known as a form of liquid-liquid extraction. Extraction is a procedure to separate compounds based on their relative solubility in two different immiscible solutions. Two layers are formed when the mixture are separated. The upper layer contains a low dense solvent. Basically in most of the extraction, one of the solvent used would be water as an aqueous solution and the other would be an organic solvent that is insoluble in water. The choice of organic solvent must be volatile so it can easily by removed by evaporation when forming crystals. The cleanest separations of organic compounds can be performed by using acid or alkaline solutions which can convert the compound to be extracted to a water-soluble and ether insoluble salt. Phenolic compounds undergo similar salt formation with sodium hydroxide solution. Hence, sodium hydroxide solution can be used to extract a carboxylic acid or phenolic compound from its solution...

Words: 2143 - Pages: 9