Sunday, December 29, 2019

Chemical Composition of Table Salt

Table salt is one of the most common household chemicals. Table salt is 97% to 99%  sodium chloride, NaCl.  Pure sodium chloride is an ionic crystal solid. However, other compounds are present in table salt, depending on its source or additives that may be included before packaging.  In its pure form, sodium chloride is white. Table salt may be white or may have a faint purple or blue tinge from impurities. Sea salt may be dull brown or gray. Unpurified rock salt may occur in any color, depending on its chemistry. Where Does Salt Come From? One of the main sources of table salt is the mineral halite or rock salt. Halite is mined. The minerals in mined salt give it a chemical composition and flavor unique to its origin. Rock salt commonly is purified from mined halite, since halite occurs with other minerals, including some that are considered toxic. Native rock salt is sold for human consumption, but the chemical composition is not constant and there may be health risks from some of the impurities, which can be up to 15% of the mass of the product. Another common source of table salt is evaporated sea water or sea salt. Sea salt consists mainly of sodium chloride, with trace amounts of magnesium and calcium chlorides and sulfates, algae, sediments, and bacteria. These substances impart a complex flavor to sea salt. Depending on its source, sea salt may contain pollutants found associated with the water source. Also, additives may be mixed in with sea salt, mainly to make it flow more freely. Whether the salt source is halite or the sea, the products contain comparable amounts of sodium, by weight. In other words, using the same amount of sea salt rather than halite (or vice versa) does not affect the amount of dietary sodium you get from it. Additives to Salt Natural salt already contains a variety of chemicals. When it is processed into table salt, it may also contain additives. One of the most common additives is  iodine in the form of potassium iodide, sodium iodide, or sodium iodate. Iodized salt may also contain dextrose (a sugar) to stabilize the iodine. Iodine deficiency is considered the biggest preventable cause of intellectual disability, once known as mental retardation. Salt is iodized to help prevent cretinism in children as well as hypothyroidism and goiter in adults. In some countries, iodine is routinely added to salt (iodized salt) and products that do not contain this additive may be labeled uniodized salt. Uniodized salt has not had any chemicals removed from it; rather, this means supplemental iodine has not been added. Another common additive to table salt is sodium fluoride. Fluoride is added to help prevent tooth decay. This additive is more common in countries that dont fluoridate water. Doubly-fortified salt contains iron salts and iodide. Ferrous fumarate is the usual source of iron, which is added to help prevent iron-deficiency  anemia. Another additive may be folic acid (vitamin B9). Folic acid or folicin is added to help prevent neural tube defects and anemia in developing infants. This type of salt may be used by pregnant women to help prevent common birth defects. Folicin-enriched salt has a yellowish color from the vitamin. Anti-caking agents may be added to salt to prevent the grains from sticking together. Any of the following chemicals are common: Calcium aluminosilicateCalcium carbonateCalcium silicateFatty acid salts (acid salts)Magnesium carbonateMagnesium oxideSilicon dioxideSodium aluminosilicateSodium ferrocyanide or yellow prussiate of sodaTricalcium phosphate

Saturday, December 21, 2019

Cyber Crime Case - 1458 Words

We know incidents may occur at any time every organization should be ready to attack the incident quickly. Cyber crime which are increasing at faster rate should be controlled to protect the organization, CSIRT is the pillar for any organization should act effectively in responding. As many other developing countries, the internet usage in Colombia has also increased rapidly. The Government of Colombia want to develop CSIRT called ColCERT to secure their organizations. In Colombia use communication technologies has increased significantly, this raised the countrys level of exposure to cyber threats. According to sources the number of Internet users doubled between 2008 and 2010. This ColCERT monitors all the activities helps the†¦show more content†¦CIRTISI Col-CSIRT El CSIRT Colombiano CSIRT-CCIT ANALYSIS The aim of the document is deal with cyber threats and protect the information of citizens. Despite the existence of governmental, private, and civil-society initiatives to counter the impact of such threats, an appropriate approach needed to be implemented by Colombia. At present, Colombia is one of a number of countries that do not have a national cybersecurity and cyberdefense strategy that includes an organizational system and a legal and institutional framework. Columbia has not yet implemented a national CSIRT or CERT. The increasing number of Internet users, as well as the strong dependence of Colombias critical infrastructure on electronic media and the considerable rise in the number of cybersecurity incidents and crimes have highlighted the countrys high vulnerability to cyber threats, such as use of the Internet for terrorist purposes, sabotage of public services, espionage, and theft, among others. The CSIRT should be efficient, precise, and automated data analysis. In developing CSIRT we need to consider †¢ How to prepare and store your data †¢ How to give your operation authority and clarity with a solid logging policy †¢ What metadata is and why you should care about it †¢ How to develop and structure incident detection logic into your own playbook Properly developing incident response methods and practices requires a solid plan and aShow MoreRelatedTaking a Look at Cyber Crime680 Words   |  3 Pagesnature of the tool used in committing the crime (Hull and Sivanesar, 2013, p 98). Computer users across the globe are facing threat, due to the rise in cases of cyber crime, and this is necessitating the intervention of the government through enactment of policies that govern the usage of computer technology. According to Richardson (2008, p 3), cyber crime has grown to catastrophic levels thus posing a challenge to global security. Consequently, besides cyber crime affecting the security of individualRead MoreWhat Is Cyber Crime?1424 Words   |  6 PagesWHAT IS CYBER CRIME? Crime is a common word that we always heard in this globalization era. Crimes refer to any violation of law or the commission of an act forbidden by law. Crime and criminality have been associated with man since long time ago. There are different strategies practices by different countries to contend with crime. It is depending on their extent and nature. It can be concluded that a nation with high index of crime cases cannot grow or develop well. This is because crime is theRead MoreCyber Crime As A Key Risk For Regulated Firm1504 Words   |  7 Pages Cyber-crime as a key risk for regulated firm Delegate ID number : 3733017 November 2014 The term cyber-crime describes criminal activity involving computer and internet in committing a crime. Generally it can be divided to two manners: It can target the machine itself, where the purpose of crime would be to gain access to important data stored on the machine, which could be used to obtain gain. It can also use the machine as a tool to commit other type of crime in more traditional understandingRead MoreThe Complexities of Prosecuting Cyber Crime Essay650 Words   |  3 PagesCyber crime and traditional crime have similar identifiable traits when criminal activity is the outcome. The goal of any criminal is to cause harm, threat steal, extortion, to name a few with intent to harm the public good. Local and state law prosecutes traditional crimes through the state attorney. The prosecutor represents the people(entity) of the state. The defendant or the entity charged must prove to the state, by reasonable doubt, their innocent’s of the charges. IndividualsRead MoreCyber Crimes And The Crime1153 Words   |  5 Pagesevolve with the trends in crime throughout history. Unfortunately for Law Enforcement, they are always on the back end of that and are often behind for months before being able to counteract. Cyber crimes are no different. Cyber Crimes are a n ew and always developing form of crime that bases its entire agenda from taking advantage of its victims over the internet. Law Enforcement s job is to assess and work to stop these crimes but it s not that easy. These cyber crimes are heavily in the favorRead MoreCyber Bullying Is Harmful Than Traditional Bullying1512 Words   |  7 PagesCyber-bullying involves the use of technology to cause distress, harm, and torture to the victim. This involves sending abusive or intimidating messages, emails, and pictures through the use of several technological avenues. Traditional bullying involves physical aggression to a victim through using abusive verbal language and physical beating. Cyber- bullying seems to have surpassed traditional bullying because of the increased advance in the world of technology. Most bullies have turned to technologyRead MoreThe Issue Of Cyber Crimes Essay1673 Words   |  7 PagesJurisdiction is one of the main issues on account of cyber crimes because of the extremely inclusive nature of the cyber crimes. With the constantly developing arm of the internet the territorial concept appears to vanish. New Methods for resolution of dispute should offer route to the traditional techniques. Accordingly, the Information Technology Act, 2000 is quiet on these issues. In spite of the fact that S. 75 accommodates extra territorial operations of this law, yet they could be significantRead MoreCyber Bullying Has Become A Significant Problem Among Teenagers1583 Words   |  7 Pagesâ€Å"Cyber bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm.† I believe this quote significantly summarizes the cowards who take advantage of others through the power of electronics. Verbal bullying has always happened in schools, but cyber bullying has become a significant problem amongst teenagers. Electronic access to social media outlets such as facebook, twitter, vine and snapchat, has made it easy for people to bullyRead MoreThe Article On Cyber Crime Laws772 Words   |  4 Pages I read the article What Makes cyber crime laws so difficult to enforces by Deb Shinder of the Tech Republic . The article talks about why it is so hard to control cyber crime and enf orce laws that will help prevent and protect people from cyber crime. The article starts about talking about how at first when the internet got mainstream it was not regulated at all, but over the coming years we have passed law that regulate things that you can do on the internet. Even though weRead MoreThe Australian Competition And Commission V Vassallo795 Words   |  4 PagesCyber Crime The Australian Competition and Commission v Vassallo (2009) The Australian Competition and Commission v Vassallo (2009) case depicts the affects of cyber crime on individuals involved. Advances in technology have enabled new ways to commit fraud online. Criminals are using new and complex techniques to commit fraud which often result in financial loss towards individuals. The two respondents in the case, Leanne Rita Vassallo and Aaron David Smith had sold medical eBooks through the

Friday, December 13, 2019

People Become Overly Dependent on Technology Free Essays

Environmental pollution and methods for treatment Pollution is the introduction of contaminates into the natural environment that cause adverse change , pollution can taken the form of chemical substances or energy such as noise , heat and light. The components of pollution can be either foreign substances, enrrgies or natural occurring contaminates . pollution is often classed as point source or non point source pollution. We will write a custom essay sample on People Become Overly Dependent on Technology or any similar topic only for you Order Now The BlackSmith issues an annual list of the world’s worst ploouted places . n the 2007 issues the ten top nominess are located in Azerbaijan, China, India, Peru, Russia, Ukraine, Zambia. There are forms of pollution , which surround us from all directions . Firstly, Air pollution :- the release of chemicals and particulates into the atmosphere common gaseous pollutants include carbon monoxide, sulfur dioxide, chlorofluoro carbons and nitrogen oxides produced by industry and motor vehicles . photochemical ozone and smog are created as nitrogen oxides and hydrocarbons react to sunlight . econdly, light pollution :- include light trespass, over –illumination and astronomical interference . Thirdly, noise pollution :- which encompasses road way noise, air craft noise, industrial noise as well as high – industrial sonar. Fourthly, visual pollution:- which can refer to the presence of over head power lines , motor way bill boards , scarred landforms ( as form strip mi ning) ,open storage of trash, municipal solid waste or space debris . ifthly, water pollution:- by the discharge of untreated sewage , release of waste and contaminates into surface waters, discharges of untreated domestic sewage, and chemical contaminates into surface runoff flowing to surface waters . finally, thermal pollution:- is temperature change in natural water bodies caused by human influence , such as use of water as coolant in a power plant, also radio active contaminates resulting from 20th century activities in atomic physics , such as nuclear power generation and nuclear weapon research , manufacture and deployment. Effects of pollution on human health , adverse air quality can kill many organisms including humans , ozone pollution can cause respiratory disease, cardiovascular disease , throat inflammation, chest pains and congestion, water pollution causes approximately 14,000 deaths per day, mostly due to contaminates of drinking water by untreated seage in developing countries. An estimated 700 million Indians have no access to a proper toilet and 1,000 Indian children die of diarrhoeal sickness every day, Nearly 500 million Chinese lack access to safe drinking water , 656,000 people die prematurely each year in china because of air pollution . In India , air pollution is believed to cause 527,700 fatalities a year , studies have estimated that the number of people killed annually in the us could be cover 50,000. Oil spills can cause skin irritations and rashes. Noise pollution induces hearing loss, high blood pressure, stress and sleep disturbance. Mercury has been linked to developmental deficits in children and neurologic symptoms. Older people are majorly expose to disease induced by air pollution. Those with heart or lung disorders are under additional risk. Children and infants are also at serious risk. Lead and other heavy metals have been shown to cause neurological problems. Chemicals and radioactive substance can cause cancer and as well as birth defect. How to cite People Become Overly Dependent on Technology, Essay examples