Sunday, December 29, 2019
Everything You Need to Know About Plastics
Every day, people use plastics in various applications. Over the last 50 to 60 years, the uses for plastic have expanded to infiltrate virtually every aspect of life. Because of how versatile the material is, and how affordable it can be, it has taken the place of other products including wood and metals. The properties of the various types of plastics make it beneficial for manufacturers to use. Consumers like it because it is easy to use, lightweight and easy to maintain. Types of Plastics Overall, there are about 45 unique types of plastics and each type has dozens of different variations. Manufacturers can change the physical structure just slightly to benefit the application for which they are using it. When manufacturers change or modify things like the molecular weight distribution, the density, or the melt indices, they alter the effectiveness and create plastics with many specific properties - and therefore many different uses. Two Plastic Categories There are two main types of plastics: thermoset plastics and thermoplastics. Breaking these down further, you can see the everyday uses of each type. With thermoset plastics, the plastic will hold its shape long term once it has cooled to room temperature and hardened thoroughly. This type of plastic cannot return to its original form - it cannot be melted down into its original form. Epoxy resins and polyurethanes are some examples of this type of thermosetting plastic. It is commonly used in tires, auto parts, and composites. The second category is thermoplastics. Here, you have more flexibility and versatility. Because it will return to its original form when heated, these plastics are commonly used in various applications. They can be made into films, fibers, and other forms. Specific Types of Plastics Below are some of the specific types of plastics and how they are in use today. Consider their chemical properties and benefits, too: PET or Polyethylene terephthalate - This plastic is ideal for food storage and water bottles. It is commonly used for things like storage bags, too. It does not leach into the food, but is sturdy and can be drawn into fibers or films. PVC or Polyvinyl Chloride - It is brittle but stabilizers are added to it. This makes it a softer plastic thats easy to mold into various shapes. It is commonly used in plumbing applications because of its durability. Polystyrene - Commonly known as Styrofoam, it is one of the less ideal options today for environmental reasons. However, it is very lightweight, easy to mold and it works as an insulator. That is why it is heavily used in furniture, cabinetry, glasses and other impact-resistant surfaces. It is also commonly added with a blowing agent to create foam insulation. Polyvinylidene Chloride (PVC) - Commonly known as Saran, this plastic is used in wraps to cover food. It is impermeable to odors from food and can be drawn into various films. Polytetrafluoroethylene - A growing popular choice is this plastic also known as Teflon. First manufactured by DuPont in 1938, it is a heat-resistant form of plastic. It is very stable and strong and is unlikely to be damaged by chemicals. Moreover, it creates a surface that is almost frictionless. This is why it is used in various cookware (nothing sticks to it) and in tubing,Ã plumbing tapes, and in waterproof coating products. Polypropylene - Commonly called just PP, this plastic has various forms. However, it has uses in many applications including tubes, car trims, and bags. Polyethylene - Also known as HDPE or LDPE, it is one of the most common forms of plastics. New formations of it make it possible for this plastic to be flat. Its initial uses were for electrical wires but it is now found in many disposable products, including gloves and garbage bags. It is also used in other film applications such as wraps, as well as in bottles. The use of plastics every day is more commonplace than many might think. By making small changes to these chemicals, new and versatile solutions are obtained.
Saturday, December 21, 2019
Justification of the Canadian Participation in the Boer...
Justification of the Canadian Participation in the Boer War The storm of war never comes alone, as it bring along extreme tragedy. ââ¬Å"In 1899, the whole country was electrified when heard about the Imperial request from Britain.â⬠[1] The Britain requested Canadians for help to defeat Boers in South Africa. This was the opportunity for Canada to demonstrate its importance in the British Empire and share in its military responsibilities but the ââ¬Å"Canadian Prime Minister, Sir Wilfred Laurier, did not believe that Canada should be involved, but he faced growing agitation in English.â⬠[2] Ultimately, the final decision, without any approval of Parliament[3] was to support the Imperial request. This wasâ⬠¦show more contentâ⬠¦For Britain, the discrimination of these British people was their major cause of the war. On 11 October, 1989 Boers declared war on Britain.[6] Britain now needed more soldiers. They asked Canadians for help as they were getting ââ¬Å"free menâ⬠from Canada. French Canadian often said ââ¬Å" The British had created this problem, and the commitment of Canadian troops to fight a ââ¬Å"Britishâ⬠war would set a dangerous precedent.â⬠[7] The lives of British soldierââ¬â¢s were avoided to be on line as they could choose to use up the ââ¬Å"free menâ⬠that they could easily get from the reliable colonies. In fact, the Britain was using Canada just for their own good. Moreover, Canada certainly had no issues with the Boers that they needed to go to war. In the past, Canadians and Boers show no major conflicts. So, Canada definitely should not go to war against Boers. The soldiers were also slowly losing trust and faith on the British Empire as they were just following orders by Britain and losing their own reputation. In addition, Canadian government was forced against their will to participate in this South African war. They did not want to disturb the Britain-Canada relationships. All in all, CanadianShow MoreRelatedRemebering Vimy Essay2496 Words à |à 10 Pagesdepictions of the ââ¬Å"noble savageâ⬠or a red-clad, horse-riding Mountie patrolling the northern nation, Canadians have a knack for creating a mythical element to their past. Deconstructing national myths has become a burgeoning field of academic inquiry as evidenced by monographs such as Daniel Francisââ¬â¢ in his book National Dreams: Myth, Memory, and Canadian History. A central event in the Canadian consciousness, with much national sentiment attached to it, is that of Vimy Ridge. On April 9, 2007 overRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words à |à 656 Pages Agricultural and Pastoral Societies in Ancient and Classical History Jack Metzgar, Striking Steel: Solidarity Remembered Janis Appier, Policing Women: The Sexual Politics of Law Enforcement and the LAPD Allen Hunter, ed., Rethinking the Cold War Eric Foner, ed., The New American History. Revised and Expanded Edition E SSAYS ON _ T WENTIETH- C ENTURY H ISTORY Edited by Michael Adas for the American Historical Association TEMPLE UNIVERSITY PRESS PHILADELPHIA Temple
Friday, December 13, 2019
A Wireless Communication Free Essays
5G is a wireless communication and it is updated version from 4G, but it has higher speed reach to 10Gbps. : 1GThe first generation appeared in the early 1980s. Its data rate is 4. We will write a custom essay sample on A Wireless Communication or any similar topic only for you Order Now 2 kbps. It has a lot of flaws Like :Store and listen to voice calls through a third party[1].: 2GThe second generation emerged in the late 1990s. Its data rate reaches 64 kbps. It has many features such as: long battery life for low-power radio signals and many services such as SMS and e-mail[1].:3GThis generation emerged in late 2000. It transmits data at up to 2 Mbps. It has been improved in an unconventional way to maintain and provide quality services. One of its advantages is that it has many amenities such as global roaming and sound quality but requires more power compared to the second generation[1].3.75G:LTE and the worldwide microwave interface Access (WIMAX) is the future of mobile data services. LTE and WIMAX constant has the ability to providing facilities for a large number of users to access a wide range of high speed services Such as on-demand video, and peer-to-peer file sharing Composite Web Services. It also allows operators to manage their network in a very homogeneous manner and provide better coverage while improving it to perform at a lower cost[1].4G:The fourth generation is generally referred to as the scion of 3G and second generation standards. It transfers amenities such as voice, data, and multimedia to subscribersEverywhere and at higher data rates than in previous generations[1].What is 5G ?5G is a combination or amalgamation of all previous Generations that are 2G, 3G, 4G and Wi-Fi with higher capabilities in terms of coverage and reliability. It converges these technologies to increase number of devices and calls and promises in providing higher coverage, availability and M2M service[2]. How to cite A Wireless Communication, Papers
Thursday, December 5, 2019
Acceptance and Adoption of Continuous Research â⬠MyAssignmenthelp
Question: Discuss about the Acceptance and Adoption of Continuous Research. Answer: Introduction: In the case under consideration, after reviewing the information, the equipment group has been linked to the manufacturing software and computer aided design which do not get any support from supplier- provided antivirus protection and security. Thus the entire system as a whole is deeply subjected to corruption risk. The risk of corruption occurs when there is the loss of relevant data fed into the system. As a result the company may face several problems (Zadek, Evans and Pruzan 2013). A single supplier is involved in providing the LAN facilities as well as purchasing the information technology related equipment. This is understood by reviewing the system further. It can also be said that only one person provides the services and also maintains the security files. Due to increasing chances of fraud, no sort of segregation or demarcation of duties has been allowed by the company. As an example, it can be stated that, Mr. Tony Lee has access to all the individual accounts. Thus, it is possible for him to make changes to the accounting system amounts in relation to the payments when the company owes him due to the facilities and the IT supplies he provides. Security controls are bound to be hampered when a number of people use the same password. Problems arise when a majority of the personnel use a particular password. In cases of fraud, the blame or the confrontation passes from employee to employee but does not lead to a valuable solution. It should also be understood that in such cases even the accounting clerk has access to the highly confidential information of the company. The clerk can easily leak out the valuable information to the competitors of the particular company in the industry. The accounting clerk can also carry out fraudulent transactions for his benefit or for the benefit of other parties (Scapens 2012). Again, the supervisors also use similar passwords for time sheet data entering. There has been no limitation to the authorisation of the access in the entire system. It is highly probable for the supervisors to easily change the time sheet data of different departments by using the same password. Although there have been a differentiation or segregation of duties in the accounting system possible by the individual passwords provided to the accounting staff. This has been done for word processing but the staff still use a single password for the entry of data. There is also the possibility of conducting frauds on behalf of other employees by the use of a common password and account, which is hugely detrimental for the company. The detection of fraudulent transactions in such cases is extremely difficult and a challenging task (Davidson, Desai and Gerard 2013). Backup data maintenance: According to the framework of internal control, backup files or harm copy format of data should be kept out of the surroundings of the office to ensure protection of the valuable documents from the risk of loss or damage of some sort. There might be the possibility of occurrence of any natural disaster or any mishap in the office and in such cases the backup to the valuable data will be maintained in some secure place outside the office. Tiffanys Office stores the backup data of the MTI in the form of tapes. There is the possibility of easy alteration of the data stored as backup. This can be accompanied by alterations in the accounting software. In such cases, even reconciliation of the information cannot help the fraud to be detected. For hiding the fraudulent activities, the setup of explosion activities in the office premises can lead to the loss of backup data also. In connection to the analysis of the past statement, it can be said that, in several situations in the past, there has been the loss of backup files but even after informing the concerned authorities, no real action has been taken by them (Bell and Griffin 2012). It can be inferred from the provided information that there is the existence of a healthy relationship between the supervisors George and Tiffany. The company provides the supervisors will several additional facilities including the provision of microcomputers to facilitate the work from home possibility as well as help them meet the deadlines of production for important and big customers of the organisation. The company system is extremely effective where the supervisors have the facility of being mobile in their nature of work and they are not bound to work only in the office. The issue of huge concern is the security of the office system. The security of the office system has been identically copied in the microcomputers (Vasarhelyi et al. 2012). The probability of the companys strengths and weaknesses being disclosed to the industry competitors is huge and of great concern. The data need to be protected from the risk of disclosure. In case the computer system has been stolen, the party involved in theft can easily access the data of the company. Even the tasks, which are confidential, like the quotations or designs are accessible. The microcomputers being remote can be taken anywhere and the confidential data accessed (Richardson 2012). Attendance and calculation of the office hours require an efficient and easy system and hence the use of the employee plastic card is ideal. The card can be easily linked to the accounting processes accounts and time sheets making it effective. In the office, at MTI, the system of the card has been implemented where the employees can swipe their individual cards both while entering as well as leaving the office. The card system however needs a careful monitoring by the gatekeepers or the guards in the office to prevent any fake entries or fraudulent activities. It is possible that the employees use other cards to fake the entry of those employees into the office who are absent. Any unauthorised person can conduct prohibited activities in the working area by using the card. People involved in any criminal or fraudulent activities can access the office data. The systems of costing and the employee card has been linked. Scanning of relevant information has been done by a laser pen.. Des pite these facilities and services, the presence of manual monitoring is of utmost importance to prevent any sort of numerical errors and frauds and to facilitate the costing services (Ivers et al. 2012). Accounting and administrative staff: To avoid the work evaluation or monitoring by the same individual the segregation of the duties has been recommended by the authorities. It is natural for the employees to feel hesitant in finding faults in their own tasks or work. In case the accounting system of MTI is considered, tasks involved with the entering of a high volume of data, the accounting department requires the help of at least two admin staff members. The staff members are also involved with the filing activities and the reconciliation of the data with the related documents (Kogan et al. 2014). The errors done by the members will not be corrected by the admin staff when they reconcile the documents with the annual documents. Successively the system will have errors and they will be automatically forwarded in the successive steps. Thus the final steps will contain errors in the data entry as well as the mistakes are bound to be forwarded and it will lead to the assumption that mistakes have not been recognised corre ctly by members of the office staff (Andress 2014). The process and activities of accounting point to the fact that Tiffany and George is extremely dependent on a particular employee Isabel, involved in the accounting and purchasing process at MTI. The number of linked activities has been performed by this particular employee Isabel as it has been found. Despite her origin being in a different country and being not really trained in the accounting activities, she was appreciated for her quality of work and a positive relation with the suppliers (Ng, Harrison and Akroyd 2013). However there is the possibility of Isabel being involved in fraudulent activities and providing extra benefits to the suppliers and involved in the fraud coordination of supplies. It is also possible that Isabel is a secret member of another company which is a competitor and is employed with the task of providing all significant and confidential information to her company. She may also be working in order to supply material of desired quality and price to the company. Louis has provided the information regarding the server crash of the company and the system of accounting should be connected with a solo server with which other systems are also attached. In this case, it is possible for the other departments to access the information thus leading to fraud (Johnson et al. 2014). Substantive Procedures for work in Progress Inventory: It needs to be ensured that the procedure in the balance of progress and inventory which is shown in the year end must be connected to the orders that have been obtained at the time of the MTI reporting period. Due to this, the dates on those orders, which are put into the spreadsheet, need to be checked and reconciled, ensured if they are at par with the time span or not. It should be ensured that all job orders and the sequential numbering related to the work orders in progress during the reporting period should be entered in the system. This should be done to confirm the completeness of all the orders. To assure the existence of inventory, there should be a physical counting of the numbers of the jobs, which are entered into the spreadsheet. This is done to facilitate identification of items being added without having any sort of physical existence. Apart from this the assertion of completeness can also be audited with the help of this system, along with the identification of items which cannot be recognized in the spreadsheet. A sample of orders require to be selected for the reconciliation of the physical quantity of those items which are produced as well as the orders which the customers receive as mentioned in the spreadsheet. The existence as well as the assertions of completeness can be attained with the help of this reconciliation procedure. There are two types of inventory in the hands of the company, including the individual components as well as the raw materials. The ownership of the said items should be verified by understanding and analysing the documents, which are related to the GRNs or purchase invoices. Going by the system the completion percentage has been recognised as per the task number, which have been done for each of the job orders. A physical examination of the sample of the items should be executed for the checking the accuracy of the percentage of completion. The review of the physical completion and items of reconciliation should be done with those mentioned in the spreadsheet. Complex manufacturing processes involve tasks, which are performed simultaneously. There lies a difficulty in obtaining an accurate percentage in case of difficult and complicated manufacturing processes. In such cases however, the services of the expert can also be utilized. Depending on the information provided by George and Tiffany, the information available need to be explained clearly to check the practical implications as well as its reliability. The different factors on which the multiple cases have been computed need to be reviewed. This facilitates fulfilment of the assertion of valuation. In order to check the measurement assertion and accuracy there needs to be a recalculation of the items which constitute the sample. The materials, which are used, for every order as well as the hours of labour in the selected sample need to be identified. The multiple factor needs to be changed as well to calculate the overall amount to reconcile with that written in the spreadsheet (Griffith, Hammersley and Kadous 2015). The invoices of the suppliers obtained in reality require to be verified and reconciled to the different changes performed in the system of costing. In situations where there are varied prices for similar material in different months, the utility as well as the allocation of the costing method of inventory should be recognized and the accuracy of the orders as well as work in progress inventory should be checked. This particular procedure helps in the fulfilment of allocation assertion. The external confirmations related to the invoice detail and the costs and quantity should be obtained. The data entered into the time sheet and the number of hours worked by the employees in reality should be reconciled. Any further checking requires the manual sheet to be obtained from the managers to review any dissimilarity regarding the number of hours worked and the attendance. Moreover, the number of cards issued as well as the employee number mentioned in the spreadsheet requires to be reconciled and the inspection of the outcomes should also be done. Advance paid by the customers: The customers who pay advance against the material under the billing process need to be identified and inspection of the connected items should be conducted to verify that the customer owned material is not added in the spreadsheet as work in progress. Starting at the beginning to the billing order, an audit trail is needed to be performed in order to analyse all the supported documents and also to reconcile. The completeness, accuracy, existence and also the measurement assertion in the work in progress section should be identified. The formula Isabel used to recalculate the final value of work in progress to be given in the balance sheet should be used. The corrections should also be incorporated and inspected in the formula for reconciliation of the calculated amount. During the inspection of the physical counts and inventory movements of the inventory in transit the reporting period has to be identified. The present reporting period is related to the inventory and the rewards need to be transferred, it should be shown in the year end. The reconciliation of the selling price of the orders with their actual cost is done to identify the orders whose cost have exceeded the selling price. The damaged inventory also needs to be examined physically and the value also needs to be obtained through the market. Damaged goods should also be identified by physical inspection. References: Andress, J., 2014.The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress. Bell, T.B. and Griffin, J.B., 2012. Commentary on auditing high-uncertainty fair value estimates.Auditing: A Journal of Practice Theory,31(1), pp.147-155. Davidson, B.I., Desai, N.K. and Gerard, G.J., 2013. The effect of continuous auditing on the relationship between internal audit sourcing and the external auditor's reliance on the internal audit function.Journal of Information Systems,27(1), pp.41-59. Griffith, E.E., Hammersley, J.S. and Kadous, K., 2015. Audits of complex estimates as verification of management numbers: How institutional pressures shape practice.Contemporary Accounting Research,32(3), pp.833-863. Ivers, N., Jamtvedt, G., Flottorp, S., Young, J.M., Odgaard?Jensen, J., French, S.D., O'Brien, M.A., Johansen, M., Grimshaw, J. and Oxman, A.D., 2012. Audit and feedback: effects on professional practice and healthcare outcomes.The Cochrane Library. Johnson, D.M., Friedrich, N.G., Walser, B.J. and Warner, R.D., Bank Of America Corporation, 2014.Facility maintenance and management system. U.S. Patent 8,645,495. Kogan, A., Alles, M.G., Vasarhelyi, M.A. and Wu, J., 2014. Design and evaluation of a continuous data level auditing system.Auditing: A Journal of Practice Theory,33(4), pp.221-245. Ng, F., A. Harrison, J. and Akroyd, C., 2013. A revenue management perspective of management accounting practice in small businesses.Meditari Accountancy Research,21(2), pp.92-116. Richardson, A.J., 2012. Paradigms, theory and management accounting practice: A comment on Parker (forthcoming)Qualitative management accounting research: Assessing deliverables and relevance.Critical Perspectives on Accounting,23(1), pp.83-88. Scapens, R.W., 2012. How important is practice-relevant management accounting research?.Qualitative Research in Accounting Management,9(3). Vasarhelyi, M.A., Alles, M., Kuenkaikaew, S. and Littley, J., 2012. The acceptance and adoption of continuous auditing by internal auditors: A micro analysis.International Journal of Accounting Information Systems,13(3), pp.267-281. Zadek, S., Evans, R. and Pruzan, P., 2013.Building corporate accountability: Emerging practice in social and ethical accounting and auditing. Routledge.
Thursday, November 28, 2019
11 Facts You Should Know about Halloween
11 Facts You Should Know about Halloween The U.S. is a society of consumers, and an economy based primarily on consumer spending, so its no surprise that Halloween is celebrated inà consumerist ways. Lets take a look at some interesting facts about Halloween consumption, with data fromà National Retail Federations Halloween Headquarters, and consider what they mean from a sociological perspective. 171 million Americans- more than half the entire national population- will celebrate Halloween in 2016.Halloween is the nations third favorite holiday, but second favorite for those between the ages of 18-34. It isà less popular with older folks, and more popular among women than men,à according to a 2011 Harris Interactive poll.Not just for kids,à Halloween is an important holiday for adults too. Nearly half the adult population will dress in costume for the occasion.Total U.S. spending for Halloween 2016 is expected to reach 8.4 billion dollarsan increase of more than 3 billion dollars since 2007. That includes $3.1 billion spent on costumes, $2.5 billion on candy, andà $2.4 billion on decorations.The average person will spend about $83 celebrating Halloween.About a third of all adults will throw or attend a Halloween party.One in five adults will visit a haunted house.Sixteen percent will dress their pets in costume.In 2016 costume choices among adults differ by age brack et. Among Millennials, Batman characters take the number one spot, followed by witch, animal, Marvel or DC superhero, and vampire. The number one costume among older adults is a witch, followed by pirate, political costume, vampire, and then Batman character. Action and superhero characters are the top choice for children in 2016, followed by princess, animal, Batman character, and Star Wars character.Pumpkin wins the top spot for pets, followed by hot dog, bumble bee, lion, Star Wars character, and devil. So, what does all this mean, sociologically speaking? Halloween is clearly a very important holiday in the U.S. We can see this in not only the patterns in participation and spendingà but in what people do to celebrate the holiday. Early sociologist Ãâ°mile Durkheim observed that rituals are occasions upon which people in a culture or society come together to reaffirm their values, beliefs, and morals. By participating in rituals together, we activate and reaffirm our collective consciencethe sum of those beliefs and ideas we share in common,à that take on a life and force of their own due to their collective nature. In celebration of Halloween, those rituals include dressing in costume, trick-or-treating, throwing and attending costume parties, decorating homes,à and going to haunted houses. This raises the question of what values, beliefs, and morals are reaffirmed through our mass participation in these rituals. Halloween costumes in the U.S. have evolved away from the holidays social origins as taunts and mocking of death, and toward popular culture. Sure, witch is a popular costume for women, and zombies and vampires are also in the top ten, but the variations of them trend more toward sexy than scary or evocative of death. So, it would be false to conclude that the rituals affirm values and beliefs of Christianity and Paganism. They point instead toà the importance placed on having fun and beingà sexy in our society. But, what also stands out to this sociologist is the consumerist nature of the holiday and the rituals. The primary thing we do to celebrate Halloween is buy stuff. Yes, we go out and get together and have fun, but none of that happens without first shopping and spending moneya collective 8.4 billion dollars. Halloween, like other consumerist holidays (Christmas, Valentines Day, Easter, Fathers Day and Mothers Day), is an occasion upon which we reaffirm the importance of consuming in order to fit in with the norms of society. Thinking back to Mikhail Bakhtins description of medieval carnivale in Europe as a release valve for the tensions that arise in a highly stratified society, we could also surmise that Halloween serves a similar function in the U.S. today. Currently economic inequality and poverty are at their greatest in the nations history. We are faced with an incessant onslaught of terrible news about global climate change, war, violence, discrimination and injustice,à and disease. In the midst of this, Halloween presents an attractive opportunity to take off our own identity, put on another, shake off our cares and concerns, and exist as someone else for an evening or two. Ironically, we may be further exacerbating the problems we face in the process, by perpetuating the hypersexualization of women and racism via costume, andà by handing our hard-earned money over to already wealthy corporations that exploit laborers and the environment to bring all the Halloween goods to us. But we sure have fun doing it.
Sunday, November 24, 2019
The final product Essay Example
The final product Essay Example The final product Paper The final product Paper Abstract: In this experiment three Werner complexes, hexaamminecobalt(III) chloride, pentaamminechlorocobalt(III) chloride and hexaamminenickel(II) chloride were synthesized so their structural formula could be examined through magnetic susceptibility, electronic conductance measurements and the analysis of free chloride in the two cobalt complexes through titrations of silver nitrate. Cobalt (III) coordination compounds usually only form in low spin, octahedral complexes where the all t2g are paired leaving all the eg unpaired; whereas nickel(II) complexes are usually formed in the high spin state1. Through these analytical methods, it was found that: hexaamminecobalt(III) chloride has three free chloride ions to form the complex [Co(NH3)6]Cl3, in the low-spin state. Pentaamminechlorocobalt(III) chloride and hexaamminenickel(II) chloride both have two free chlorine ions to form the complexes [Co(NH3)5Cl]Cl2 and [Ni(NH3)6]Cl2 respectively. As expected, pentaamminechlorocobalt(III) chloride has a low spin electron arrangement, and hexaamminenickel(II) chloride is in a high spin state. Introduction: Alfred Werner was the first to discover the structure for coordination compound in 1893, thus they were given the name Werner Complexes. For this research he was given the Nobel Prize in 1913. Werner complexes are complex ions that contain a transition metal in the center, which is surrounded by anionic or neutral ligands. 2 The metal in this case acts as a Lewis acid (electron pair accepting) and the anionic ligands act as a Lewis base (electron pair donating). Using pentaamminechlorocobalt(III) chloride, Co(NH3)3Cl3, as an example, there are four possible structures depending on how the ligands are arranged. [Co(NH3)3Cl3] + 3NH3 In this case, all the chlorine anions are bound directly to the cobalt metal, and three neutral amine molecules are present somewhere else in the crystal lattice [Co(NH3)4Cl2]+ + Cl- + 2NH3 Here, two chlorines are directly bound to the cobalt metal with two neutral non boding amine molecules. There is also one free chlorine anion to balance the charge of the cobalt complex. [Co(NH3)5Cl]2+ + 2Cl- + NH3 The third possible arrangement is where there is one chlorine attached to the central cobalt with a single amine molecule elsewhere in the lattice. Again, there are two free chloride ions to balance the charge [Co(NH3)5]3+ + 3Cl- Finally, the cobalt complex can be arranged with just the amine ligands directly bound to it in a square pyramidal geometry instead of a more stable octahedral geometry seen in the other three complexes. This leaves the three chlorine anions non-bonded, and counterbalancing the 3+ charge from the complex. To find the actual arrangement and geometry of the three complexes, conductance measurements, magnetic susceptibility and free chloride ions through titrations can be measured and analyzed. Electronic conductance measurements helps determine the amount of chloride ions not attached to the metal. This is possible because when dissolving a salt in water, the molecule separates into cations and anions, each which can conduct electricity. The conductance measured can be compared to a literature reference of how many total ions correspond to the value. With this, logically dividing the charges between the cations and anions present will help determine the overall structure of the molecule. The second technique for determining the amount of ions present in a Werner complex is magnetic susceptibility. With finding the magnetic susceptibility using a magnetic susceptibility of a compound, one can calculate whether the compound is paramagnetic or diamagnetic. If the mass magnetic susceptibility, ? g, is negative, then the compound is diamagnetic; however, if ? g is positive, then the compound is paramagnetic. The apparatus used for this experiment is a Evans/Johnson Mathey Magnetic Susceptibility Balance. The last technique used was titrating a sample with silver nitrate. Since the three samples contain chloride ions, titrating it with silver nitrate would precipitate silver chloride, which is very insoluble. Based on the volume of silver nitrate used to reach the end point, one can calculate the amount of silver chloride precipitated. The amount of silver chloride precipitated is also the amount of free chloride ions in the mixture. Comparing the ratio of moles of silver nitrate used to the moles of analyte in the mixture will show the amount of non-bonding chlorine present. Procedure and observations: Synthesis of hexaamminecobalt(III) chloride: The synthesis was started by adding cobalt(II) chloride hexahydrate(4. 690g) and ammonium chloride (2.946g) to water(5mL) which formed a purple solution from the original red/pink powder. This solution was heated up and turned dark blue once it was all dissolved. Activating charcoal was then added as a catalyst the solution was then black with a slight blue tint. Afterwards, concentrated ammonia (9. 8mL) was added to the mixture. This created a very dark red solution, but upon setting, the color eventually faded to yellow with a bit of red in it. With this, the solution was then cooled in a tab water bath and hydrogen peroxide (10. 0mL, 6%) was added and heated to 65 degrees Celsius for 17 minutes. To crystallize, the solution was then places in another tap water bath, proceeded by an ice water bath. The brown crystals were then filtered by vacuum filtration and transferred to another beaker containing concentrated hydrochloric acid (2. 1mL) and water (41. 0mL). After all the crystals were dissolved, they were filtered by gravity filtration and washed with water (1. 7mL). The red/gold filtrate was collected, and another portion of concentrated hydrochloric acid(5. 2mL) was added. The filtrate was then cooled on ice to crystallize once more. Upon cooling, the solution turned bright orange. The sides of the erlenmeyer flask had to be scratched vigorously to help induce the production of crystals. Finally, the crystals were filtered once more by vacuum filtration, and dried between two pieces of large filter paper. The final product were bright orange crystals(0. 123g) at a 2. 36% yield. Synthesis of pentaamminechlorocobalt(III) chloride: To start the synthesis, solid ammonium chloride (7. 560g) was added to a beaker containing ammonia (44. 6mL, 14M). While stirring, finely powdered cobalt(II) chloride hexahydrate (7. 465g) was slowly added.
Thursday, November 21, 2019
Kant, Hegel, and Nietzsche Essay Example | Topics and Well Written Essays - 750 words
Kant, Hegel, and Nietzsche - Essay Example Georg Wilhem Friedrich Hegel in his philosophy of world history expounds on the different types of history. The first is original history, which refers to the written historical account of the period in question (Hegel, Wood & Nisbet 1991). Reflective history is the second type, which is written after a certain period, based on the reflective thought and is laden with interpretation. Lastly, there is philosophic history, which tries to rationally interpret history. Through philosophic history, Hegel observes that world history is not guided by Godââ¬â¢s plan rather it is through a rational process (Hegel, Wood & Nisbet, 1991). He expounds this in his Reason rules of history, which states that reason rules the world. Hegelââ¬â¢s philosophical history is based on that assumption; reason rules the world. Friedrich Nietzsche in his philosophy of history tries to explain, ââ¬Å"how things become what they areâ⬠. His concern with history arises with its recording and emphasis by people who claim to represent the past. He opposes Hegelââ¬â¢s method of systemizing history and his adoption of teological themes (Mencken, 1993). In his opinion, history should be wholesome for future generations and its sole purpose is to influence the next generations. This purpose is not a choice rather it is a demand. Nietzsche is of the opinion that ââ¬Å"the capacity to build a new future depends on our ability to see a fundamental continuity with the strengths of the pastâ⬠. Kantââ¬â¢s moral theory states that freedom is not defined by the absence of law but being bound to laws one makes for himself (HoÃËffe, 1994). His moral theory further states that rational human wills have freedom, that is they are autonomous. Freedom, according to Kant is autonomy where individuals lay their own laws that guide their actions. His view on individual freedom as being autonomous is derived from the
Subscribe to:
Posts (Atom)