Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Chemistry concepts and calculations

117302 questions • Page 1938 / 2347

We (2 developers) are developing a cakephp app that is running on a remote serve
We (2 developers) are developing a cakephp app that is running on a remote server. In NetBeans we both have project set up as "PHP application from remote server". The problem is …
We (a group of scientists) plan to co-author an open, online book. The idea is t
We (a group of scientists) plan to co-author an open, online book. The idea is to collaboratively write an ebook hosted on a website, which is open for the public to read and comm…
We (and the JS SO chat room) had a talk with @rlemon some days ago about his Lit
We (and the JS SO chat room) had a talk with @rlemon some days ago about his Little-XHR library about error handling. Basically, we wanted to decide which error handling pattern s…
We administer a Java web application from an external supplier where we have acc
We administer a Java web application from an external supplier where we have access to the source code. The user is able to provide an external URL which is stored in a database a…
We all can read news about \"Hardware trojans\" (it has grown in the recent few
We all can read news about "Hardware trojans" (it has grown in the recent few years..). But my question is: Besides the network card, could there be any HW trojan that can cause a…
We all have definitely used typedefs and #defines one time or the other. Today w
We all have definitely used typedefs and #defines one time or the other. Today while working with them, I started pondering on a thing. Consider the below 2 situations to use int …
We all have opinions about what is morally right and wrong. By definition, ethic
We all have opinions about what is morally right and wrong. By definition, ethics is the study of moral reasoning. In an Ethics class we learn more about different explanations of…
We all know about how Digital Signing works. I just have some questions about vu
We all know about how Digital Signing works. I just have some questions about vulnerability risk. At first, As I know, the Signature and the Data are separated and we can split th…
We all know that Hydrogen molecules (H2) and Oxygen molecules (O2) combine into
We all know that Hydrogen molecules (H2) and Oxygen molecules (O2) combine into water. We can express this as follows: H2 + O2 ? H2O This is called an unbalanced chemical equation…
We all know that carbohydrate cannot be synthesized from \"fat\" in the diet --
We all know that carbohydrate cannot be synthesized from "fat" in the diet -- whereas, "fat" (triacylglycerols) certainly can be synthesized from carb (!). More accurately, carboh…
We allow 4 gb space per employee in outlook mail exchange, beyond that the user
We allow 4 gb space per employee in outlook mail exchange, beyond that the user has to create a pst file . That is the policy. We have given admin rights to all employees since th…
We already have SSL session resumption enabled using a session cache. Based on a
We already have SSL session resumption enabled using a session cache. Based on an in-house performance report, enabling Session Resumption using Session Tickets is recommended. Is…
We are a cell tower services start up. I\'m looking for web-based software that
We are a cell tower services start up. I'm looking for web-based software that our workers on the field can login to and record cell site visits, crew inventories, detailed inform…
We are a non profit and have been hosting an online site that accepts payments.
We are a non profit and have been hosting an online site that accepts payments. It has been getting enough exposure now that we want to put an EV SSL certificate on the site. The …
We are a small company and process less than 500 Credit Card transactions each y
We are a small company and process less than 500 Credit Card transactions each year so we fall under Level 4 category merchants. The company heads wants to make sure that we are P…
We are a small startup. One of our products is a B2B web service, accessible thr
We are a small startup. One of our products is a B2B web service, accessible through its https://service.example.com canonical URL. For testing purposes, that service also runs on…
We are about to start a game website. We need some extensible web software, whic
We are about to start a game website. We need some extensible web software, which could handle as many as possible of the following: Blog. Users & user profiles. Public forum …
We are all familiar with ferromagnetism or the magnetic behavior of substances s
We are all familiar with ferromagnetism or the magnetic behavior of substances such as iron, nickel, and cobalt. These materials align the magnetic moments of their own atoms with…
We are all familiar with the general principles of operation of an internal comb
We are all familiar with the general principles of operation of an internal combustion engine: the combustion of fuel drives out the piston. It is possible to imagine engines that…
We are all familiar with the general principles of operation of an internal comb
We are all familiar with the general principles of operation of an internal combustion engine: the combustion of fuel drives out the piston. It is possible to imagine engines that…
We are all familiar with the general principles of operation of an internal comb
We are all familiar with the general principles of operation of an internal combustion engine: the combustion of fuel drives out the piston. It is possible to imagine engines that…
We are asked to estimate the molarity of an unknoown acid folowing 2 experimenta
We are asked to estimate the molarity of an unknoown acid folowing 2 experimental titrations and their respective color end points. in the quick trial we titrated 25.0mL of the un…
We are attempting to implement a development environment using virtualization fo
We are attempting to implement a development environment using virtualization for a small team of 4 developers within an enterprise organization. This would allow us to set up sep…
We are being asked to prepare a hypothetical experiment - \"Prepare an experimen
We are being asked to prepare a hypothetical experiment - "Prepare an experimental plan that would determine the activation energy of the reaction between crystal violet and sodiu…
We are building a large, modular application that is intended to run across mult
We are building a large, modular application that is intended to run across multiple processors. I need to develop a method to estimate how long it will take to run all of the fun…
We are building a web interface to a tiered membership system, which will interf
We are building a web interface to a tiered membership system, which will interface with a third-party CRM web service for the creation and management of accounts. The web service…
We are building and environment where mostly open source and trial versions woul
We are building and environment where mostly open source and trial versions would be used first before we purchase any product. I need your recommendation on the tools required to…
We are continually revamping our front end developer test that we do in-house af
We are continually revamping our front end developer test that we do in-house after a candidate has passed an online test. The online test has questions such as: How does a for lo…
We are currently deciding on a consistent naming convention across a site with m
We are currently deciding on a consistent naming convention across a site with multiple web applications. Historically, I've been an advocate of the 'lowercase all the letters!' w…
We are currently having accounts compromised at a substantially high rate. Some
We are currently having accounts compromised at a substantially high rate. Some in the organization believe that our password complexity requirements is enough to thwart brute for…
We are currently using EasyRSA and OpenSSL to manage our user VPN certificates f
We are currently using EasyRSA and OpenSSL to manage our user VPN certificates for OpenVPN. The process we have in place currently is: - User generates a CSR on their laptop and s…
We are deploying and upkeeping web-sites to different customers. Normally we wai
We are deploying and upkeeping web-sites to different customers. Normally we wait for newest changes to stabilize, then tag subversion version as release, and install than version…
We are designing a website/web application where we hope to to achieve high user
We are designing a website/web application where we hope to to achieve high user counts and, in general, lots of use. More specifically, we intend to be using PHP as the programmi…
We are developing a web-based, commercial point-of-sale application. We\'d like
We are developing a web-based, commercial point-of-sale application. We'd like the same web site to work well on an Ipad as well a desktop browsers. We're looking for a web framew…
We are discussing on building a web application where (as per clients requiremen
We are discussing on building a web application where (as per clients requirement), there will be relatively large data (60,000 items) to be shown as tree view. Let's assume each …
We are doing a lab about solid and liquid flammability of two unknown solids and
We are doing a lab about solid and liquid flammability of two unknown solids and one unknown liquid. We placed the samples on a crucible lid and held it over a bunsen burner.The u…
We are doing an experiment with Ascorbic Acid (Vitamin C) C6H6O6, i\'m assuming
We are doing an experiment with Ascorbic Acid (Vitamin C) C6H6O6, i'm assuming these are all combustion reactions or? Ascorbic Acid Dehydroascorbic Acid A: Reaction of iodate with…
We are doing some refactoring to a 20 years old legacy codebase, and I\'m having
We are doing some refactoring to a 20 years old legacy codebase, and I'm having a discussion with my colleague about the comments format in the code (plsql, java). There is no a d…
We are given an array of integers where all elements are between 0-9. have to st
We are given an array of integers where all elements are between 0-9. have to start from the 1st position and reach end in minimum no of moves such that we can from an index i mov…
We are given the following data box above and are asked to determine the Molarit
We are given the following data box above and are asked to determine the Molarity of phosphoric acid Additonal info, We pipeted 5.00 mL of 0.1M Phosphoric Acid into the beaker and…
We are going to combine structs, strings, and command line arguments to create a
We are going to combine structs, strings, and command line arguments to create a name/age sorting program. You will not be using scanf in this program. You will be having your use…
We are going to compare a lineweaver-Burk plot for regular kinetics and competit
We are going to compare a lineweaver-Burk plot for regular kinetics and competitive inhibition. a. We showed in class [E]_Total = [E] + [ES] + [EI] and since we have equilibrium k…
We are going to develop a program that will handle a Golfer and his scores. The
We are going to develop a program that will handle a Golfer and his scores. The program will be comprised of three classes: a Golfer class that will manage all the golfer's scores…
We are going to look at how the radial velocity method can be used to determine
We are going to look at how the radial velocity method can be used to determine the mass of a planet. The observations that get made look at two things: the wobble of the star (it…
We are going to re-write the card shuffling script again, this time copy the scr
We are going to re-write the card shuffling script again, this time copy the script, obj12.pl, as obj13-2.pl. Remove the code that does the shuffling and include it as another fun…
We are going to trace the following program, i.e. simulate in your head how it w
We are going to trace the following program, i.e. simulate in your head how it would execute on a computer. To help you, a trace table is provided for you to fill. For each “execu…
We are going to work the calculation of the pH of a buffer prepared by mixing a
We are going to work the calculation of the pH of a buffer prepared by mixing a strong base with a weak acid. We want you to see all the steps of this type of problem in one place…
We are going to work the calculation of the pH of a buffer prepared by mixing a
We are going to work the calculation of the pH of a buffer prepared by mixing a strong base with a weak acid. We want you to see all the steps of this type of problem in one place…
We are implementing searchable encryption techniques proposed by Song et al in J
We are implementing searchable encryption techniques proposed by Song et al in Java for a paper[1]. The schemes need a Stream Cipher for achieving search over encrypted data. The …
We are in a process of redesigning our product code in such a way so as to suppo
We are in a process of redesigning our product code in such a way so as to support multitenancy. Currently the implementation is such that one product deployment caters to only on…