الثلاثاء، 30 ديسمبر 2014

Bring the power of the Dropbox Platform to your business


Today we’re excited to announce the new Dropbox for Business API, which extends the power of the Dropbox Platform to help companies seamlessly integrate Dropbox for Business into their core IT processes.
Already 100,000 companies rely on Dropbox for Business to securely store and share even their most important company information, including major organizations like Hyatt, News Corp, and MIT. Many of them also use the Dropbox Platform — which offers integrations with more than 300,000 apps — to support custom workflows.
The API builds on the power of the Dropbox Platform by giving developers access to the team-level functionality of Dropbox for Business, empowering admins to deploy and manage business-critical applications for their team. It’s especially useful for enterprise customers, as Dropbox for Business now fits even more seamlessly into their existing third-party solutions.
Through the new API and our industry-leading launch partners, companies can enable:
  • eDiscovery & legal hold: Integrations with services like Guidance and Nuix enable secure search, as well as the ability to collect and preserve electronically stored information (ESI) in Dropbox for Business accounts — making it possible for admins to easily respond to litigation, arbitration, and regulatory investigations.
  • Security information and event management (SIEM) and analytics: With integrations like Splunk, Domo, and General Audit Tool, it’s easy for Dropbox for Business admins to oversee employee activity and manage sensitive data, so IT can have even more visibility and control.
  • Data loss prevention (DLP): Integrations with services like CirroSecure, CloudLock, Elastica, Netskope, and Skyhigh Networks provide enterprise-class DLP, auditing and compliance functionality, and easy management of sensitive data stored in Dropbox for Business.
  • Digital rights management (DRM): With partnerships like Dell Data Protection, nCrypted Cloud, and Sookasa, companies in highly regulated industries can add additional client-side encryption and decryption for company data stored in Dropbox for Business accounts.
  • Identity management & single sign-on (SSO): External identity providers like Active Directory keep Dropbox for Business teams authenticated in a scalable way. Integrations are available through solutions like Centrify, Meldium, Microsoft Azure AD, Okta, OneLogin, and Ping Identity.
  • Data migration and on-premises backup: Easily transfer large amounts of data between locations and secure sensitive information with on-site data backup from services like Mover and SkySync.
  • Custom workflows enhanced by Dropbox: We provide the tools to build in-house apps that integrate Dropbox into your business processes. Several Dropbox for Business customers are already leveraging the Dropbox Platform to enhance their internal workflows, and services like IBM WebSphere Cast Iron make it even easier to drag and drop connections to dozens of other enterprise systems.
“Dropbox is currently leading the pack of file sync and share vendors by a considerable margin, taking 44% of the current market share in our October market survey,” said Alan Pelz-Sharpe, Research Director at 451 Research. “The new API is a good step for Dropbox’s continued move into the enterprise, as it facilitates broader integrations with important business processes.”
Many customers have also told us how powerful it is for Dropbox to integrate with the best-in-class solutions they already use.
“As a global reseller of Dropbox for Business, our sales team has found great reception from our customers as the solution enables collaboration in a really simple way while giving IT the necessary business-level control,” said Brett Hansen, executive director of end user computing software at Dell. “We’re very excited about how the Dropbox for Business API will now enable some of the most important use cases for our joint customers.”

But companies aren’t the only ones benefitting from the new Dropbox for Business API — developers can use it to extend the reach of their apps. Check out developer blog for more information.

الاثنين، 29 ديسمبر 2014

A faster, more flexible GitHub Enterprise



Today, we’re releasing an all-new GitHub Enterprise designed to make it even easier for developers and businesses around the world to use GitHub at work.

Now available on Amazon Web Services (AWS)

Since GitHub Enterprise launched in 2011, AWS's popularity has grown. Many companies want to host code in their AWS-powered cloud and with good reason. Using AWS reduces hardware costs, provides immediate access to a highly scalable infrastructure, and addresses a wide variety of compliance standards, from healthcare's HIPAA standards to government's FedRAMP. And now you can run GitHub Enterprise on AWS too!

Infrastructure improvements, high availability, & backups

We've rewritten the infrastructure behind GitHub Enterprise, improving stability and redundancy regardless of how you choose to deploy it. Some highlights:
  • GitHub Enterprise now utilizes Ubuntu 12.04 LTS, taking advantage of long-term updates and security fixes for the base components provided by Ubuntu.
  • Online backup utilities give you a number of advanced capabilities for backing up and restoring your data. With these utilities your appliance doesn't need to be put in maintenance mode for the duration of the backup run, meaning there's no downtime for your development team.
  • Achieving redundancy with GitHub Enterprise is much easier. With replication mode enabled, you can configure a second, identical instance (failover with warm standby) to jump into action should anything happen to your primary instance.

SAML support & security audit log

With our improved organization audit log, admins can now see a running list of events as they're generated across each organization and search for specific activities performed by users. This data provides your company with better security insights and gives you the ability to audit account, team, and repository access over time as needed.


We've also added support for SAML, including OneLogin, PingIdentity, Okta, and Shibboleth. Single sign-on with these identity providers allows you to manage your organization's users from one place or manage app access for groups of users at a time, rather than individually.

...and more!

This release also includes a number of features to help your company build and ship high-quality software, including:
To see a full list of features, check out the release notes for GitHub Enterprise 2.0.0.

Give GitHub Enterprise a whirl

If you're an existing GitHub Enterprise customer, you can download the latest release from the Enterprise website. If you want to give GitHub Enterprise a try, you can start a 45-day free trial on AWS or VMware.

Come visit us at AWS re:Invent

We’ll be demoing the all-new GitHub Enterprise this week at AWS re:Invent in Las Vegas. Stop by booth #1229 to say hi, check out this release in action, and grab some stickers and other great stuff. If you're attending re:Invent and would like a more in depth look at how this release of GitHub Enterprise might help your company, sign up for a meeting with our GitHub Enterprise sales team.

Nuevo integrante y Fin de Año Infobyte Fest

El 2014 fue un año memorable para la Industria donde vulnerabilidades en servicios críticos fueron sin duda protagonistas, por otro lado un número de Empresas se vieron expuestas mediante la publicación de sus datos más sensibles; el reciente caso de Sony Pictures que está en boca de todos es un buen recordatorio.

infobyte-logopared.jpg

Cada año la industria de la seguridad informática crece a pasos agigantados, y este año no fue la excepción. Actualmente, las empresas se ven obligadas a exponer sus datos más sensibles para poder competir en el mercado flexible y cambiante que exige Internet. La velocidad y el Time to Market desafía a las mismas generando riesgos en la adecuada implementación de controles y seguridad con la que deben contar estos datos.


Con mayor frecuencia las empresas son víctimas de ataques en forma escandalosa causando pérdidas económicas y un impacto residente en la imagen de la marca.
Conocer el nivel de seguridad, las amenazas que se encuentran expuestas y el impacto que las mismas pueden causar es el camino mitigante para estos días.

Infobyte acompaña este crecimiento directamente proporcional a la industria gracias al equipo formado por grandes profesionales que dedican diariamente su esfuerzo en buscar la excelencia en la ejecución de sus tareas. Investigar acerca de nuevas vulnerabilidades, capacitarse y trabajar en procesos de mejora continua nos permite llevar al siguiente nivel los resultados de nuestros clientes.

Durante el 2014 logramos crecer como equipo, continuamos desarrollando Faraday, visitamos las principales conferencias de seguridad, organizamos los 10 años de la Ekoparty, expusimos frente al público más exigente y lanzamos PictureMe.

Durante diciembre festejamos un año de gran dedicación que nos permitió continuar creciendo y así estar preparados en los desafíos del próximos año.

Por último le dimos la bienvenida a Martin Tartarelli, nuestro nuevo Chief Operations Officer quien se sumó al equipo de trabajo y estará liderando el equipo de Red Team Services así como también llevando adelante diferentes proyectos durante 2015. Martin nos expresó que en Infobyte encontró el gran desafío que estaba buscando. Anteriormente Martín trabajó en la industria de servicios financieros liderando proyectos de Networking, desarrollo seguro de aplicaciones y gestión de equipos de respuesta a incidentes.

Les deseamos un Feliz 2015


الأحد، 28 ديسمبر 2014

Infobyte Highlights and Announcements

2014 was without a doubt a memorable year for the IT security community. A wide range of vulnerabilities were found in a number of critical services. Additionally, a number of companies were exposed with critical security breaches; the recent Sony case will serve as a reminder for years to come.

infobyte-logopared.jpg
Every year technology grows by leaps and bounds and 2014 was no exception. The increasing ubiquity of basically being connected at all times (whether it be your tablet, phone or fridge), helps further blur the lines between work/life (think; having banking information on company servers, expense accounts mixed with personal credit cards, etc). Additionally, with developers stressing getting products out fast on the market. Not to mention the rise of cloud computing, new digital payment options and big data, there has been to say the least A lot of big changes for IT companies and employees this year.  While these changes can reap huge rewards for an organization, they also unfortunately pose new threats and challenges for the security infrastructure and policies of an organization.

As we saw in the news time and time again, an IT attack is not just an inconvenience for an organization but can cause major harm including the loss of sensitive information, property and lasting damage to your brand. Even in the best case scenario -which for many it wasn´t-, it can still be a major headache for employees and managers alike requiring damage control.

With these new tech trends, Infobyte with their experienced and diverse technical team is on the front lines of defending your organization from today´s and tomorrow´s threats. 

Whether it be new research, innovative trainings or outstanding services we are constantly striving for excellent results for our clients as well as being able to contribute to the community at large.

2014 for Infobyte was also a year of change as the company grew significantly. We stayed busy as always, continuing working on Faraday, attending the major security conferences, organizing the massive Ekoparty 10 and launching PictureMe.

Also, we were able to welcome on board Martin Tartarelli, our new Chief Operations Officer. Martín will be in charge of Red Team Services as well as developing a number of different projects for 2015. Martín said Infobyte was the kind of challenge he was looking for and was excited to work with such a dynamic team. Before coming to Infobyte, Martín was the Head of Information Security Engineering for one of the largest ATM networks in Latin America.

Finally, during the month of December we were able to celebrate and look back on a successful year filled with challenges and growth. We are looking forward to an even better 2015 with new opportunities.


We wish you a healthy and happy New Years and a great 2015!

Fighting patent trolls with the LOT Network

GitHub is joining the LOT Network, an open patent-licensing program designed to reduce patent litigation.

The rising threat of patent trolls

Some claim that software patents are essential to motivate us to innovate. In reality, the patent system suffers from a negative side effect—the patent troll. Patent trolls, or Patent Assertion Entities (PAEs), abuse patents to threaten your projects to the point that you either shut them down or pay the PAE to move along (if you can afford to do so).
As the data shows, trolls have been filing lawsuits in record numbers, and open-source software is far from immune: The Linux Kernel, Git, and many other open source projects have all been accused of patent infringement.


Because of the economics of patent trolling, trolls usually target the most successful and innovative projects, which means those that many in our community contribute to. While we support the public initiatives to change patent policy at a legislative level, many of them have suffered roadblocks. So, while GitHub continues to support those initiatives, we are joining our peers to work together to shield our community from the threat of trolls and offer our users more immediate protection.

How the LOT Network works

LOT ("License on Transfer") is an important step towards incapacitating patent trolls. Here’s how LOT works: when any member of the LOT network sells a patent to a troll, or when a patent troll grabs hold of any member's patent by any other way, every other LOT member immediately receives a license to that patent. As LOT grows and more patents enter its network, fewer will remain for trolls to loot, which will ultimately result with trolls scratching their heads and rethinking the viability of their business model.

Open sourcing the LOT agreement

In addition to joining the network, we are now hosting the LOT agreement as an open source, CC-BY project. This means you can now access the LOT agreement, gain inspiration, and replicate it for use in similar efforts to fight patent trolls. Most importantly, you can make LOT even better and stronger by submitting issues, forking, and creating pull requests with your ideas for modifications.

Join us!

How?
  1. Become a LOT project contributor and help us make the agreement tighter and better.
  2. Become a LOT member yourself, or lobby to get your company to be one. As more and more of us join, the space for trolls will get narrower and narrower.
So long, Trolls!

الجمعة، 26 ديسمبر 2014

Do You Know About Stackoverflow ?

History Of Stackoverflow

The website was created by Jeff Atwood and Joel Spolsky in 2008. On 31 July 2008, Jeff Atwood sent out invitations encouraging his subscribers to take part in the private beta of the new website, limiting its use to those willing to test out the new software. On 15 September 2008 it was announced the public beta version was in session and that the general public was now able to use it to seek assistance on programming related issues. The design of the Stack Overflow logo was decided by a voting process.



On 3 May 2010 it was announced that Stack Overflow had raised $6 million in venture capital from a group of investors led by Union Square Ventures.
A 2013 study has found that 77% of users only ask one question, 65% only answer one question, and only 8% of users answer more than 5 questions. As of 2011, 92% of the questions were answered, in a median time of 11 minutes. Since 2013, the Stack Exchange network software automatically deletes questions that meet certain criteria, including having no answers in a certain amount of time.

As of August 2012, 443,000 of the 1.3M registered users had answered at least one question, and of those, approximately 6,000 (0.46% of the total user count) had earned a reputation score greater than 5000. Reputation can be gained fastest by answering questions related to tags with lower expertise density, doing so promptly (in particular being the first one to answer a question), being active during off-peak hours, and contributing to diverse areas.

 Stack Overflow is written in ASP.NET 4 using the ASP.NET MVC (Model-View-Controller) framework, and Microsoft SQL Server for the database and the Dapper object-relational mapper used for data access. Unregistered users have access to most of the site's functionality, while users who sign in (for example, by using the OpenID service) can gain access to more functionality, such as establishing a profile and being able to earn reputation to allow functionality like re-tagging questions or voting to close a question.

The Stack Overflow team has recently begun the creation of an API for accessing the data contained on the other sites. Discussion on Stack Apps centers around the API, although users are encouraged to list apps and libraries developed for the API.

Improving GitHub's SSL setup

To keep GitHub as secure as possible for every user, we will remove RC4 support in our SSL configuration on github.com and in the GitHub API on January 5th 2015.
RC4 has a number of cryptographic weaknesses that may be exploited, impacting the security of your data. More details about these vulnerabilities are listed in the current IETF draft.
If you are using Internet Explorer on Windows XP, you will no longer be able to accessgithub.com once this change takes place. Windows XP only supports outdated SSL ciphers, is no longer supported by Microsoft, and contains a known critical security problem in its SSL implementation.
We strongly recommend that Windows XP users upgrade to a newer version of Windows. If this is not possible, you will need to use Chrome or Firefox to access GitHub on Windows XP. Thegit client available at git-scm.com still works on Windows XP.

الثلاثاء، 16 ديسمبر 2014

Faraday v1.0.7 release

Estamos muy contentos de anunciar Faraday v1.0.7. Después de varios meses de duro trabajo, finalmente publicamos la nueva versión!



Cambios que se realizaron UX/UI:
  • Crear/Editar/Borrar vulnerabilidades desde la UI
  • SSLCheck
  • Modificaciones en Status Report
  • ZSH UI muestra notificaciones y workspace activo
  • Shodan Plugin esta funcionando con la nueva API
  • Faraday ahora pide confirmación al salir, si tiene conflictos a resolver, se enumeraran
Corrección de errores:
  • Los filtros del Status Report ya están andando
  • Se abre el workspace activo en UI web
  • El icono de workspace de la interfaz de QT diferencia entre un workspace de couchdb y filesystem
  • Se corrigieron las fechas en UI Web, no mostraban la fecha exacta
  • En la edición de vulnerabilidad se agrego la severidad 'Critical'
  • Se arreglaron bugfixes que fueron reportados por usuarios

Se trabajó arduamente en el modo en el que los usuarios puedan generar una vulnerabilidad de forma sencilla y rápida.



El procedimiento para crear una vulnerabilidad en fácil, seleccionas el target, elegís que tipo de vulnerabilidad y su severidad, luego los demás campos, le das OK, y listo.
Algunos cambios que se introdujeron:
  • Más facilidad en la edición de vulnerabilidad
Seleccionando una vulnerabilidad se carga su contenido
  • Se agrego SSLCheck Plugin


Se integra un plugin a Faraday. Una herramienta para verificar errores de SSL/TLS en host remotos

Es un script de Python basado en OpenSSL, permite al usuario comprobar la configuración de un servidor SSL/TLS remoto. Las vulnerabilidades potenciales/reales se resaltan en rojo en el informe de análisis, que se pueden exportar en formato XML.

El procedimiento es el siguiente:
  1. Abrir faraday con el siguiente comando: ./faraday.py --dev-mode, para que se actualice la carpeta de plugins
  2. Ya con faraday abierto entras a la carpeta scripts (cd scripts)
  3. Ejecutas el comando ./sslcheck.py target (./sslcheck.py 192.168.10.254)
También podes ejecutar el comando hacia varios target y dominios, tenes que escribir los target separados por un espacio. 

./sslcheck.py 192.168.10.254 facebook.com www.google.com 192.168.10.168

  • Modificaciones en Status Report
    • Crear/Editar/Borrar vulnerabilidades
    • Filtros
    • Nuevos campos
    • Columnas variables


https://www.faradaysec.com/

Esperamos que les guste!

Faraday v1.0.7 Release


We´re happy to announce Faraday v1.0.7. After several months of hard work, finally we've been able to release the new version! Enjoy!



Changes made to the UX/UI:
  • Improved Vulnerability Edition usability, selecting a vulnerability will load it's content automatically.
  • ZSH UI now is showing notifications.
  • ZSH UI displays active workspaces.
  • Faraday now asks confirmation when exiting out. If you have pending conflicts to resolve it will show the number for each one.
  • Vulnerability creation is now supported in the status report.
  • Introducing SSLCheck, a tool for verifying bugs in SSL/TLS Certificates on remote hosts. This is integrated with Faraday as a plugin.
  • Shodan Plugin is now working with the new API.
  • Some cosmetic changes for the status report.
Bugfixes:
  • Sorting columns in the Status Report is running smoothly.
  • The Workspace icon is now based on the type of workspace being used.
  • Opening the reports in QT UI opens the active workspace.
  • UI Web dates fixes, we were showing dates with a off-by-one error.
  • Vulnerability edition was missing 'critical' severity.
  • Objects merge bugfixing
  • Metadata recursive save fix
We really tried to make it so the users would be able to generate a vulnerability without any hassle. 


The way to make a new vulnerability is easy. You select a target, you choose the type of vulnerability and the severity, after, you fill out the other parts, click OK and you´re good to go.
  • Made significantly easier for this vulnerability edition
Selecting a vulnerability uploads its content.
  • A SSLCheck Plugin was added

Also, we added a plugin for Faraday that is a tool to verify SSL/TLS errors for remote hosts. A Python script using code from OpenSSL, lets a user check the SSL/TLS remote server. The potential vulnerabilities (or the real ones) show up in red on the analysis report, that one can easily export to XML format.

Follow the steps below:
  1. Open Faraday using the following command./faraday.py --dev-mode, so that it refreshes the plugins folder
  2. Now that you Faraday open, go to scripts folder (cd scripts)
  3. Execute the command ./sslcheck.py target (./sslcheck.py 192.168.10.254)
Also, you can quickly run  the command for several targets and domains, the targets need to be written separately with a single space.

./sslcheck.py 192.168.10.254 facebook.com www.google.com 192.168.10.168
  • Some touchups made to the Status Report
    • Create/Edit/ Erase vulnerabilities
    • Filters
    • New fields
    • Changeable columns
https://www.faradaysec.com/

We hope you like it!

الخميس، 11 ديسمبر 2014

Champions League: Who can Arsenal face?

Arsenal will discover their Champions League last-16 opponents in Monday's draw for the knockout stage.

The Gunners finished second in Group D, and as a result will play one of the group winners in the next round.

However, they cannot face a team from their own association, therefore ruling out Chelsea, while they cannot be drawn against Borussia Dortmund after being paired with them in the group stage.

Arsenal's potential last-16 opponents are:

Atletico Madrid
Real Madrid
Monaco
Porto
Bayern Munich
Barcelona

Stay close to Arsenal.com for all the latest information about our last-16 opponents.

Source Arsenal.com

All the Facebook Shortcut Keys

Did you know has keyboard shortcut keys , here i present all of them to you:

Share it on Facebook

You can press these buttons on your keyboard to use Facebook faster.
  • j , k — Scroll between News Feed stories
  • p — Post a new status
  • l — Like or unlike the selected story
  • c — Comment on the selected story
  • s — Share the selected story
  • o — Open attachment of the selected story
  • enter — See More of the selected story
  • / — Search
  • q — Search chat contacts
  • ? — Show this help dialog

  • Shift + Alt + 0 — Help
  • Shift + Alt + 1 — Home
  • Shift + Alt + 2 — Timeline
  • Shift + Alt + 3 — Friends
  • Shift + Alt + 4 — Inbox
  • Shift + Alt + 5 — Notifications
  • Shift + Alt + 6 — Settings
  • Shift + Alt + 7 — Activity Log
  • Shift + Alt + 8 — About
  • Shift + Alt + 9 — Terms
  • Shift + Alt + m — New Message

Introduction to Open Source and Standards Question Paper End Smester Sem - 1 UPES



الأربعاء، 10 ديسمبر 2014

Pointers & Call by Reference + Call by value Simplified Explained Examples

 C Pointers Explained, Really
While I was in college, a friend of mine complained that he was confused while programming in C, struggling to learn the syntax for pointers.

He gave the example of something like: *x=**p++ being ugly and unreadable, with too many operations layered on each other, making it hard to tell what was happening.  He said he had done a bit of programming with assembly language, but he wasn't accustomed to the nuances of C.

I wrote the following explanation on our student message board, and I got a lot of good feedback.  Some people said that they had been programming in C for years, but not until they read my post did they finally understand pointers.  So here it is, unearthed from my backups and slightly edited.  I hope it helps someone again...


Message 1956 (8 left): Thu Jan 25 1990  2:44am
From: Bill! (easterb@ucscb)
Subject: Okay


Well, if you know assembly, you have a head start
on many of the cis freshpersons here.  You at least know
about memory maps:  RAM is a long long array of bytes.
It helped me to learn about pointers if I kept this in mind.
For some reason, books and instructors talking about
pointers want to overlook this.


When I have some code:

main()
{
int n;
int *p;


There is a place in my memory that looks like this:

           :
Address:   :
        |-----|
  0x5100|     |   n is an integer, one machine word big
        |-----|
  0x5104|     |   p is a pointer, also one word big
        |-----|
  0x5108|     |   other unused memory
        |-----|
           :
           :

Let's give these variables some values.
I set n to be the number 151.

        n = 151;

I set the pointer p to point to the integer n.

        p = &n;

That says, "the value of the variable p is assigned the
address of the variable n".

             :
Address:     :     Value at that address:
          |----|
  0x5100  | 151|  n
          |----|
  0x5104  |5100|  p
          |----|
  0x5108  |   ?|
          |----|
             :
             :

Now I want to print out the value of n, by two ways.

        printf("n is %d.\n", n);
        printf("n is %d.\n", *p);

The * operator says, "give me the object at the following address."
The object's type is the type that the pointer was declared as.
So, since we declared "int *p", the object pointed at will be
_assumed_ by C to be an int.  In this case, we were careful to
make this coincide with what we were pointing at.

Now I want to print out the memory address of n.

        printf("n is located at $%x.\n", &n);
        printf("n is located at $%x.\n", p);

The & operator says, "tell me the address where the following object
starts."  In this case, it is hex 5100 (I put a '$' before it, to
conform to the Assembly notation I am used to).
Notice the _value_ of p is an address.

Hm.  Does p have an address?  Sure.  It is a variable, and all
variables have their own address.  The address of p is hex 5104.

        printf("p is located at $%x.\n", &p);

Here we are taking the address of a pointer variable,

using the & operator.

main()
{
char name[] = "Bill";
char *p;
int *q;

Now we have an array to play with.  Here's how memory looks now:

        |---|
 0x5100 |'B'|  "name" is an address constant that has value hex 5100
        |---|
 0x5101 |'i'|  char: 1 byte
        |---|
 0x5102 |'l'|  char: 1 byte
        |---|
 0x5103 |'l'|  char: 1 byte
        |---|
 0x5104 |\0 |  char: 1 byte
        |---|
 0x5105 |   |  p is a pointer: 1 word
        |---|
 0x5109 |   |  q is a pointer: 1 word
        |---|

        p = name;

We set p to the value of name.  Now p has value hex 5100 too.
We can use the * dereferencing operator on p, and get the
character 'B' as a result.

Now what happens if I do this:

        ++p;

The pointer p is incremented.  What value does it have now?
Hex 5101.  Pretty simple.

Now let's try something irresponsible:

        q = name;

But q is a pointer to int!  If we dereference q, it will take
the word (typically 4 bytes) beginning at address "name" (which
is hex 5100) and try to convert it to an int.  'B', 'i', 'l', 'l'
converted to an int will be some large number, dependant on the
bit-ordering algorithm on your machine's architecture.  On ucscb,
it becomes 1114205292.  (to see how, line up the binary representation
of the ascii values for those 4 characters, and then run the 32 bits
together, and convert that resultant binary number as an integer.)

What we have just seen here is a key issue of pointers that I
mentioned earlier:  C assumes that what they are pointing at
is an object of the type that the pointer was designed to point at.
It is up to the programmer to make sure this happens correctly.

        ++q;

The int pointer is incremented.  What value does it have now?
Hex 5104.  Huh?!?  The answer is simple if you accept the above
paragraph.  It gets incremented by the size of the object it
_thinks_ it is pointing at.  It's an int pointer, so incrementing
it makes it advance a number of bytes equal to the size of an int.

Now print the dereferenced value of q (i.e. the value of the object
q is pointing to).  Well, it's pointing at a null byte, and then
the first 3 bytes of the char *p.  Now we're all messed up.
Nice going.  Try to convert _that_ to an integer representation.
Well actually, C will do it happily.  But it'll be another weird

number.


main()
{
int n;

        n = 151;
        f(n);
}

f(x)
int x;
{
        printf("%d.\n", x);
}

Here is a simple program that passes an int "by value".
That is, it copies the value of n into the new variable x!

        |---|
 0x5100 |151|  n is an integer
        |---|
 0x5104 |151|  x is another integer
        |---|

When we mention x, we are using the value at location 5104,
and we can change it, read it, whatever, and it won't affect n,
the int at location 5100.

But what if we want to have f() modify the value and then
have that new value be available in main()?  C does this by
passing the variable "by reference".

main()
{
int n;

        n = 151;
        f(&n);
}

f(x)
int *x;
{
        printf("%d.\n", *x);
        *x = 451;
}

Pass the _address_ of n, and declare x as a _pointer_ to int.
Actually, this is still passing by value, but the value being
passed is the address, not the number.

        |----|
 0x5100 | 151|  n is an integer
        |----|
 0x5104 |5100|  x is a pointer to int
        |----|

Now if f() when we make use of *x, we are referring to the
value at location 5100.  This is the location of n.
After the assignment "*x = 451;", this is what we have:

        |----|
 0x5100 | 451|  n is an integer
        |----|
 0x5104 |5100|  x is a pointer to int
        |----|

x still points to location 5100, but we have changed the value
of the object at that location.




Well, those are the basics.
You mentioned things like "*x=**p++" being ugly and unreadable.
Well, yeah, but here is a diagram that may help:

        |----|  here is a word in memory with initial value 0.
 0x5100 |   0|  no variable name

        |----|
 0x5104 |  12|  here is a value, a word in memory.  no variable name.
        |----|
 0x5108 |5104|  Here is an int pointer, pointing at the previous word.
        |----|
 0x511c |5108|  here is p, a pointer to int pointer.
        |----|
 0x5120 |5100|  here is x, a pointer.  guess where it's pointing.
        |----|

First let's see what p and x were declared as:
int *x;    /* pointer to int */
int **p;   /* pointer to pointer. 

              The subordinate pointer is a pointer to int.*/

You should know now what "*x" means.  It means, "the value of location 5100."

And you know what "*p" means, "the value of location 5108".
Now that value is another address!  Okay, let's dereference that
address: "**p" and we find (by the declaration) an int.

Now "*x = **p" looks like, "this int at 5100 gets the value of
that int at 5104."

And what does "**p++" mean?  Well, ++ binds tighter than *, so this
is equivalent to:  *( *( p++ ) )

Or, "pointer to pointer to int, and by the way, after we're done,
p has been incremented.  But we looked where it was pointing
before it got incremented, so we don't care.  Let the next statement
worry about it."





This content is copyright 2012 by Bill Karwin.  I'll share it under the terms of the Creative Commons License, Attribution-NonCommercial-ShareAlike 3.0 Unported.
http://creativecommons.org/licenses/by-nc-sa/3.0/


Source karwin.blogspot.in

الثلاثاء، 9 ديسمبر 2014

Thermochemistry Numericals Problems Solved Question Hess Law ,etc

Hess' Law of Constant Heat Summation
Using standard enthalpies of formation


Germain Henri Hess, in 1840, discovered a very useful principle which is named for him:
The enthalpy of a given chemical reaction is constant, regardless of the reaction happening in one step or many steps.
There is a second way to use Hess' Law and it is usually presented like this:
ΔH°rxn = Σ ΔH°f (products) minus Σ ΔH°f (reactants)
Here's another form in which you see this form of Hess' Law:
ΔH°rxn = Σ ΔH°f, products minus Σ ΔH°f, reactants
The "rxn" above is a common way to abbreviate "reaction." All it means is that we are discussing the enthalpy of a generic reaction, not any specific one. I'll explain the above equation using an example problem.

Problem #1: Calculate the standard enthalpy of combustion for the following reaction:
C2H5OH (l) + (7/2) O2 (g) ---> 2 CO2 (g) + 3 H2O (l)
Before launching into the solution, notice I used "standard enthalpy of combustion." This is a very common chemical reaction, to take something and combust (burn) it in oxygen. It is so common that the phrase "standard enthalpy of combustion" is used alot and is given this symbol: ΔH°comb.
The key to solving this problem is to have a table of standard enthalpies of formation handy. In case you missed it, look at the equation up near the top and see the subscripted f. What we are going to do is sum up all the product enthalpies of formation and then subtract the summed up reactant enthalpies of formation. Also, we need to have the equation balanced, so be sure to remember to check for that. Fractional coefficients are OK.
Like this:
ΔH°comb = [ 2 (-393.5) + 3 (-286) ] minus [ (-278) + (7/2) (0) ]
The boldfaced values are the coefficients and the other ones are the standard enthalpy of formation for the four substances involved. Since oxygen is an element in its standard state, its enthalpy of formation is zero.
Doing the math gives us ΔH°comb = -1367 kJ/mol of ethyl alcohol.
The ΔH°f values (-393.5, -286, -278 and zero) were looked up in a reference source. Textbooks which teach this topic will have an appendix of the values. Make sure you find it and figure out how to use it.
If you are not too clear on what the term "standard enthalpy of formation" means, please look here.

Problem #2: Calculate the standard enthalpy of combustion for the following reaction:
C6H12O6 (s) + 6 O2 (g) ---> 6 CO2 (g) + 6 H2O (l)
To solve this problem, we must know the following ΔH°f values:
C6H12O6 (s)-1275.0
O2 (g)zero
CO2 (g)-393.5
H2O (l)-285.8
All the above values have units of kJ/mol because these are standard values. All standard enthalpies have the unit kJ/mol.
As a brief reminder, here is the chemical reaction for the standard enthalpy of glucose:
6C(s, graphite) + 6H2(g) + 3O2(g) ---> C6H12O6(s)
Each standard enthalpy value is associated with a chemical reaction. The reaction will always form one mole of the target substance (glucose in the example) in its standard state. The target substance is always formed from elements in their respective standard states. Note how the standard state for carbon is graphite, not diamond or buckerministerfullerene.
Remember also that all elements in their standard state have an enthalpy of formation equal to zero.
The solution
ΔH°comb = [ 6 (-393.5) + 6 (-285.8) ] minus [ (-1275) + (6) (0) ]
The boldfaced values are the coefficients and the other ones are the standard enthalpy of formation for the four substances involved. Since oxygen is an element in its standard state, its enthalpy of formation is zero.
Doing the math gives us ΔH°comb = -2801 kJ/mol of glucose.

Problem #3: Calculate the standard enthalpy of formation for glucose, given the following values:
ΔH°comb, glucose = -2800.8 kJ/mol
ΔH°f, CO2 = -393.5
ΔH°f, H2O = -285.8
Solution:
-2800.8 = [ 6 (-393.5) + 6 (-285.8) ] minus [ (ΔH°f, glucose) + (6) (0) ]
Did you see what I did. All the enthalpies of formation are on the right-hand side and the ΔH°comb goes on the left-hand side.
By the way, this is a common test question. Be prepared.
Here's what happened:
1) First of all, this is the reaction we want an answer for:
6C(s, graphite) + 6H2(g) + 3O2(g) ---> C6H12O6(s)
We know this because the problem asks for the standard enthalpy of formation for glucose. The above chemical reaction IS the standard formation reaction for glucose. We want the enthalpy for it.
2) Here are the reactions to be added, in the manner of Hess' Law:
C6H12O6 (s) + 6 O2 (g) ---> 6 CO2 (g) + 6 H2O (l)
C(s, gr.) + O2(g) ---> CO2(g)
H2(g) + 1/2 O2(g) ---> H2O(l)
3) Flip the first reaction and multiply the other two by six. Then add the three reactions together. If you do it right, you should recover the reaction mentioned just above in (1).

Problem #4: Complete combustion of 1.00 mol of acetone (C3H6O) liberates 1790 kJ:
C3H6O (l) + 4 O2 (g) ---> 3 CO2 (g) + 3 H2O (l); ΔH°comb, acetone = -1790 kJ
Using this information together with the data below (values in kJ/mol), calculate the enthalpy of formation of acetone.
ΔH°f, O2: 0
ΔH°f, CO2: -393.5
ΔH°f, H2O: -285.83
Solution:
1) Hess' Law:
ΔH°rxn = Σ ΔH°f, products minus Σ ΔH°f, reactants
2) Sustitute values into equation:
-1790 = [ 3 (-393.5) + 3 (-285.83) ] minus [ (ΔH°f, acetone) + (4) (0) ] -1790 = -2037.99 - ΔH°f, acetone
247.99 = - ΔH°f, acetone
ΔH°f, acetone = -247.99 kJ/mol
To three sig figs, the value is -248 kJ/mol.

Problem #5: The standard enthalpy of formation of hexane can be determined indirectly. Calculate the standard enthalpy of formation of hexane using the enthalpies of combustion (in kJ/mol) given just below.
C6H14(l)-4163.0
C(s, gr.)-393.5
H2(g)-285.8
Before the solution is given, a bit of discussion: the enthalpy of combustion for hexane, carbon and hydrogen are these chemical equations:
C6H14(l) + (19/2)O2(g) ---> 6CO2(g) + 7H2O(l)
C(s, gr) + O2(g) ---> CO2(g)
H2(g) + (1/2)O2(g) ---> H2O(l)
To obtain the target reaction (see just below, in the solution), we must do the following:
a) reverse the first equation
b) multiply the second equation by 6
c) multiply the third equation by 7
By the way, the second equation (presented as the enthalpy of combustion of carbon) is also the equation for the formation of carbon dioxide. The third equation (presented as the combustion of hydrogen gas) is also the formation equation for water in its standard state (liquid). The moral of the story? Sometimes terms overlap. The -393.5 value is the enthalpy for the combustion of carbon. It is also the formation equation for carbon dioxide.
Last point: notice how the enthalpy of combustion focuses on the reactant while the standard enthalpy of formation focuses on the product.
Solution:
1) Write the equation for the formation of hexane:
6C(s) + 7H2(g) ---> C6H14(l)
Use Hess' Law:
ΔH°rxn = Σ ΔH°comb, products minus Σ ΔH°comb, reactants ΔH°rxn = [ (4136) ] minus [ (6) (-393.5) + (7) (-285.8) ]
ΔH°rxn = -198.6 kJ/mol
This question can also be found on Yahoo Answer's chemistry section.

Problem #6: Ammonia reacts with oxygen to form nitrogen dioxide and steam, as follows:
4 NH3(g) + 7 O2(g) ---> 4 NO2(g) + 6H2O(g)
Given the following standard enthalpies of formation (given in kJ/mol):
NH3(g)-45.90
NO2(g)+33.1
H2O(l) -241.83
calculate the enthalpy of the reaction.
Note that water is given as a gas. Normally, water as a liquid is used in problems. Not in this one.
Solution:
Use Hess' Law:
ΔH°rxn = [ (4) (+33.1) + (6) (-241.83) ] minus [ (4) (-45.90) + (7) (0) ] ΔH°rxn = -1134.98 kJ = -1135 kJ
Note that the units kJ/mol are NOT used.

Problem #7: The standard enthalpy change, ΔH°, for the thermal decomposition of silver nitrate according to the following equation is +78.67 kJ:
AgNO3(s) ---> AgNO2(s) + (1/2)O2(g)
The standard enthalpy of formation of AgNO3(s) is -123.02 kJ/mol. Calculate the standard enthalpy of formation of AgNO2(s)
Solution:
1) Let's write what we know:
AgNO3(s) ---> AgNO2(s) + (1/2)O2(g) ΔH° = +78.67 kJ Ag(s) + (1/2)N2(g) + (3/2)O2(g) ---> AgNO3(s) ΔH°f = -123.02 kJ
2) Let's write the formation equation for AgNO2(s):
Ag(s) + (1/2)N2(g) + O2(g) ---> AgNO2(s) ΔH°f = ???
3) Determine the unknown value by adding the two equations listed in step 1:
+78.67 kJ + (-123.02 kJ) = -44.35 kJ (this is the answer)
When the two equations are added together, the AgNO3(s) cancels out as does (1/2)O2(g) and we are left with the formation equation for AgNO2(s), the equation given in step 2.

Problem #8: Using standard enthalpies of formation, calculate the heat of combustion per mole of gaseous water formed during the complete combustion of ethane gas.
The enthalpies of formation needed are:
C2H6(g)-84.68
O2 (g)zero
CO2 (g)-393.5
H2O (g)-241.8
Solution:
1) The balanced equation for the combustion of C2H6 (ethane) is:
2C2H6 + 7O2 ---> 4CO2 + 6H2O
2) The enthalpy of the reaction is:
[sum of enthalpies of formation of products] minus [sum of enthalpies of formation of reactants] [(2 moles CO2)(-393.5 kJ/mole) + (6 moles H2O)(-241.8 kJ/mole)] - [(2 moles C2H6)(-84.68 kJ/mole) + (7 moles O2)(0 kJ/mole)]
-2238 kJ - (-169 kJ) = -2069 kJ
3) However, that's the heat produced when we make 6 moles of H2O(g). Therefore,
-2069 kJ / 6 moles H2O = -345 kJ / mole H2O

Problem #9: The ΔH for the following reaction equals -89 kJ:
IF7 + I2 ---> IF5 + 2IF
In addition, these two standard enthalpies of formation are known:
IF7 = -941 kJ
IF5 = -840 kJ
Determine the ΔHf° for IF.
Solution #1:
1) The enthalpy of the reaction is:
[sum of enthalpies of formation of products] minus [sum of enthalpies of formation of reactants]
2) Inserting values into the above, we find:
-89 = [(-840)(1) + (2x)] - [(-941)(1) + (0)(1)] -89 = 101 + 2x
2x = -190
x = -95 kJ
Solution #2:
1) Here are all three data reactions written out in equation form:
1/2 I2 + 7/2 F2 ---> IF7 ΔHf = -941 kJ
1/2 I2 + 5/2 F2 ---> IF5 ΔHf = -840 kJ
IF7 + I2 ---> IF5 + 2IF ΔH = -89 kJ
and here is the target equation:
1/2 I2 + 1/2 F2 ---> IF ΔHf = ?
2) What we need to do is add the three data equations together in such a way as to recover the target equation:
a) leave equation 1 untouched
b) flip eqation 2
c) leave equation 3 untouched.
3) The result of the above is this:
I2 + F2 ---> 2IF and
ΔH = -941 + (+840) + (-89) = -190 kJ
4) However, this is not the enthalpy of formation, since that value is always for one mole of the product. This is the answer:
ΔHf = -190 / 2 = -95 kJ

Problem #10: What is the enthalpy change for the following reaction?
SiCl4(l) + 2H2(g) ---> Si(s) + 4HCl(g)
Use the following standard enthalpies of formation:
SiCl4(l); -687 kJ mol¯1
HCl(g); -92 kJ mol¯1
Solution:
ΔH = [0 + 4(-92)] - [-687 + 2(0)] The zeros are the enthalpies for H2 and Si. These are elements in their standard sate and in that case, the enthalpy of formaton is always zero.
ΔH = +319 kJ

Bonus Problem: Given the following information:
ΔHfkJ/mol ΔHfkJ/mol
Li2O(s)597.9 Li+(aq)-278.5
Na2O(s)-416 Na+(aq)-240
K2O(s)-361 K+(aq)-251
CO(g)-110.5 CO2(g)-393.5
H2O(l)-286 OH¯(aq)-230
CCl4(l)-135 SiO2(s)-911
LiCl(s)-409 NaCl(s)-411
KCl(s)-436 Cl¯(aq)-167
Calculate ΔH for the following reaction:
2Li(s) + 2H2O(l) ---> 2LiOH(aq) + H2(g)
Solution:
1) The key is to see the meaning of 2LiOH(aq):
2LiOH(aq) ---> 2Li+(aq) + 2OH¯(aq)
2) That means that, in reality, we want the ΔH for this reaction:
2Li(s) + 2H2O(l) ---> 2Li+(aq) + 2OH¯(aq) + H2(g)
3) We need the following formation reactions:
Li(s) ---> Li+(aq) + e¯ ΔHf = -278.5 kJ/mol e¯ + 1/2H2(g) + 1/2O2(g) ---> OH¯(aq) ΔHf = -230 kJ/mol
4) Rewrite the revised target equation:
2Li(s) + 2H2O(l) ---> 2Li+(aq) + 2OH¯(aq) + H2(g)
5) Use Hess' Law utilizing the revised target equation:
ΔH = [(2) (-278.5) + (2) (-230) + (0)] - [(2) (0) + (2) (-286)] ΔH = -445kJ

Source ChemTeam.info

Awesome Troll #6


Awesome Troll #5


Awesome Troll #4


Awesome Troll #3

lol :)

Awesome Troll #2

Are you also annoyed by Candy Crush Requests

Awesome troll #1


الأربعاء، 3 ديسمبر 2014

Meaning of JARVIS in Iron Man

Bet you want to name your computer J.A.R.V.I.S too after reading this fact about  Iron Man

JARVIS stands for Just a rather very intelligent system .
Share for more.

UPES EVS Environment Objective ONLINE EXAM ANSWERS

You can find true and false for multiple choice questions , go to this link

 and for more LINK2

70.




    TRUE or FALSE: Asteroids are small rock masses, with no atmosphere, that orbit a star.

True

\

71.

TRUE or FALSE: Comets are like dirty snowballs that orbit the sun in highly elliptical orbits.

True


72.

TRUE or FALSE: When a meteorite collides with our atmosphere, it creates a streaking meteor which

results in an object found on Earth called a meteoroid.

False

73.

TRUE or FALSE: A popular theory says that the dinosaurs (and other species) became extinct by an

asteroid impact.

True

74.

TRUE or FALSE: People have never seen collisions of objects in our solar system.

False

75.

These objects are usually located between Mars and Jupiter.

(A) galaxies (B) meteors (C) asteroids (D) comets

C

76.

The following objects, found in the solar system, have impact craters. (A) moon (B) Mars (C) Earth

(D) all of the above

D

77.

The average meteor seen at night is about the size of a: (A) pea (B) car (C) football stadium (D)

mountain

A

78.

Asteroids kill an average of this many people per year. (A) 10,000 (B) 1,000 (C) 100 (D) zero

D

79.

Impact craters can be produced by: (A) meteorites (B) comets (C) asteroids (D) all of the above

D

80.

The number of objects in the solar system that cross paths with Earth’s orbit is about:

(A) a dozen (B) one hundred (C) none (D) thousands

D

81.

The next huge asteroid collision with Earth will occur in about:

(A) 10 years (B) 1,000 years (C) 1,000,000 years (D) no one knows

D

82.

TRUE or FALSE: The Greenhouse Effect and Global Warming are not the same.

True

83.

TRUE or FALSE: The Earth’s climate never changes.

False

84.

TRUE or FALSE: If the Earth’s climate changes, some species may become extinct.

True

85.

TRUE or FALSE: Most scientists are concerned about global warming

True

86.

TRUE or FALSE: Acid rain can kill plants, but not animals.

False

87.

TRUE or FALSE: The average temperature of the Earth’s atmosphere is rising.

True

88.

Which of the following is not a real phenomenon?

(A) acid snow (B) acid fog (C) acid rain (D) none of the above

D

89.

Which gas(es) can cause global warming? (A) carbon dioxide (B) methane (C) sulfur dioxide (D)

all of the above

D

90.

Which phenomenon is not a man-made problem? (A) greenhouse effect (B) global warming (C)

acid rain (D) ozone hole

A

91.

Which of the problems can you help reduce?

(A) all of the below (B) acid rain (C) global warming (D) air pollution

A

92.

TRUE or FALSE: Some wildfires are actually good for the overall health of a forest.

True

93.

TRUE or FALSE: Wildfires cannot contribute to acid rain and global warming.

False

94.

TRUE or FALSE: Given enough time, forests can recover from a devastating wildfire.

True

95.

Wildfires can be caused by: (A) all of the below (B) lightning (C) campers (D) arsonists

A

96.

Wildfires destroy this many acres of forest around the world each year: (A) dozens (B) hundreds

(C) thousands (D) millions

D

97.

Which weather condition can help fire fighters?

(A) high winds (B) high humidity (C) low humidity (D) cirrus cloud cover

B

98.

TRUE or FALSE: Landslides can ruin a mountain’s appearance, but never kill people or animals.

False

99.

TRUE or FALSE: Avalanches only occur in the coldest winter months.

False

100.

TRUE or FALSE: Avalanches can destroy homes, but move so slowly they can always be outrun.

False

101.

TRUE or FALSE: Killer floods only occur in steep mountain canyons.

False

102.

TRUE or FALSE: El Nino and La Nina, ocean currents in the Pacific, can cause floods and droughts.

True

103.

Floods are caused by: (A) all of the below (B) rivers (C) Tsunamis (D) breaking dams

A

104.

In America today, which of the following diseases is not a threat?

(A) cancer (B) flu (C) pneumonia (D) malaria (E) HIV

D

105.

On which continent is HIV most prevalent?

Africa

106.

What insects are the biggest culprits in carrying diseases?

(A) fly (B) mosquito (C) tick (D) All of the above

D

107.

A plague has which of the following characteristics:

(A) highly contagious (B) high mortality (C) immunization not available (D) all of the above

D

108.

TRUE or FALSE: In this century, it is impossible for us to experience a devastating plague.

False

109.

TRUE or FALSE: Most diseases are caused by microbes we cannot even see with our naked eye.

True

110.

Which natural disaster is most likely to affect your community?

Discuss

111.

Have you ever had a negative experience with a natural disaster?

Discuss

112.

If you could live anywhere on the planet to avoid a natural disaster, where would it be?

Open answer, there is no place

on earth that is safe from a











natural disaster

1. TRUE or FALSE: Hurricanes often form within larger tornadoes. False

 2. True or FALSE: Cold air overlying warm air is considered unstable and dangerous. True

3. TRUE of FALSE: Hailstones are usually one-layer balls of ice. False

4. TRUE or FALSE: Tornadoes forming over water are often called sea devils. False
 5. TRUE or FALSE: Decreasing hurricane wind speed is most likely accompanied by rising atmospheric pressure. True
6. TRUE or FALSE: Violent storms are often the result of cold air “bulldozing” into warmer air. True
 7. TRUE or FALSE: The most powerful tornadoes are rated F-4 on the Fujita scale. False
8. TRUE or FALSE: At around 35 degrees north latitude, hurricanes generally begin moving to the west. False
9. TRUE or FALSE: Air masses develop the temperature and air pressure of their source regions. True
10. TRUE or FALSE: The layer of the atmosphere where storms occur is the stratosphere. False 11. TRUE or FALSE: Cumulonimbus are the tallest clouds, and they usually bring nice weather. False 12. TRUE or FALSE: Cold fronts provide more clues and advance warning signs than warm fronts. False 13. TRUE or FALSE: Most deaths due to lightning occur when it is raining. False (More deaths have oc - curred from “dry” strikes. This could be because people are more likely to seek shelter when it is raining.) 14. Caves or overhanging rocks are good lightning shelters. False 15. The most important molecule in creating storms is: (A) DNA (B) C6H12O6 (C) H20 (D) NITROUS OXIDE C 16. Which is most likely to be associated with storm formation: (A) rising air (B) sinking air (C) high pressure (D) an anticyclone A 17. Hailstones form: (A) on top of tornadoes (B) as a result of convection within storms (C) as ice swirls horizontally around the bottom of clouds (D) from powerful lightning bolts B 18. In a hurricane (Northern Hemisphere), the winds blow mostly: (A) straight out from the center (B) up (C) clockwise (D) counter-clockwise D 19. Lightning: (A) is predictable (B) always travels downward (C) results from like charges repelling (D) is hotter than the surface of the sun D 20. Hurricanes are categorized into levels one through five based on: (A) their wind speed (B) their barometric pressure (C) both pressure and wind speed (D) storm surge height C 21. When the barometer drops, the weather will most likely: (A) drizzle (B) clear (C) snow (D) storm D 22. Weather scientists are officially called : (A) TV anchors (B) meteorologists (C) psychics (D) typhoons B 23. The most easily recognizable part of a tornado is called a ___________. Funnel 24. _________ means that a tornado is possible. A Tornado Watch 25. _________ means that a tornado has been seen. A Tornado Warning 26. The clear and calm center of a hurricane is called its _____. Eye 27. Large coastal waves caused by hurricanes are known as ________. A storm surge 28. The sound created by lightning is called __________. Thunder 29. The giant electric spark in a storm is called __________. Lightning 30. On average, how many people in the U.S. survive lightning strikes each year? An estimated 300 people are injured by lightning each year 31. Is lightning made of a flow of protons, electrons or neutrons? Electrons 32. How hot is a bolt of lightning? 50,000 degrees F- Hotter than the surface of the sun! 33. How far away from a storm cloud can lightning strike the ground? Up to 10 miles. That is also about the distance you can hear thunder. The rule is: if you can hear thunder, you are in range of a strike. 34. How many lightning strikes hit the ground each year in the United States? 20 million 35. What causes the most deaths each year: Hurricanes, tornadoes, or lightning? On average, in the U.S. lightning causes 66 deaths per year. This compares to an average 65 deaths due to tornadoes and 16 deaths due to hurricanes.

Does lightning travel down from clouds or up from the ground? In fact, some charge travels down from the cloud to the ground, but the largest movement of electric charge travels from the ground upward. This is called the “return stroke” and is respon - sible for the bright flash we see. 37. How far away from trees or tall objects should you be if caught in a lightning storm? At least twice as far away as the object is tall. The best shelter is indoors or in an automobile. 38. What should you do if there is no shelter available during a lightning storm? Squat low to the ground with your arms around your knees. The goal is to be as small as possible and to have as little body contact with the ground as possible, because after lightning strikes, it travels over and through the ground until it has dissipated. 39. On average, how many people in the U.S. survive lightning strikes each year? On average, the U.S. reports 300 injuries due to lightning strikes per year. Although they do not result in immediate death, these injuries are often devastating to the victims. 40. TRUE or FALSE: There is a definite relationship between plate tectonics and earthquakes. True 41. TRUE or FALSE: Earthquakes can now be predicted with great accuracy. False 42. TRUE or FALSE: Rising bubbles of magma produce volcanoes. True 43. TRUE or FALSE: Many natural disasters can be explained by the theory of plate tectonics. True 44. TRUE or FALSE: California will eventually fall into the ocean. False 45. TRUE or FALSE: The Himalaya mountains were created by the collision of India into Asia. True 46. True or FALSE: Luckily, earthquakes and volcanoes always strike places are not heavily populated. False 47. TRUE or FALSE: Volcanoes only occur on Earth. False 48. TRUE or FALSE: Earthquakes occur where the Earth’s crust breaks along a feature called a fault. True 49. TRUE or FALSE: The Earth’s crust is solid and cannot move. False 50. TRUE or FALSE: Earthquakes often occur where volcanoes erupt. True 51. TRUE or FALSE: Earthquakes and volcanoes are easy to predict. False 52. TRUE or FALSE: The most active zone of volcanoes, called the “Ring of Fire”, circles the Atlantic Ocean. False 53. Plate tectonics is: (A) a popular theory (B) a known scientific law (C) a huge mistake (D) a faulty hypothesis A 54. The continents are drifting about the rate of: (A) a speeding locomotive (B) a rather fast turtle (C) a weather front (D) a growing fingernail D 55. When thousands of earthquakes and volcanoes are plotted on a map, the distribution of them can best be described as: (A) one big cluster (B) a definite pattern (C) evenly scattered (D) random B 56. Which of the Earth’s features can be explained by the Theory of Plate Tectonics? (A) deep sea trenches (B) chains of volcanoes (C) mid-ocean ridges (D) all of the above D 57. A city famous for earthquakes is_________. San Francisco, Tokyo, etc. 58. The most famous fault in California is _____________. San Andreas Fault 59. An earthquake’s intensity or magnitude is compared using the __________Scale. Richter 60. TRUE or FALSE: Tidal waves should be called Tsunamis. True 61. TRUE or FALSE: Tsunamis can be caused by asteroid impacts. True 62. TRUE or FALSE: Tsunamis, or tidal waves, are caused by the Moon’s gravity. False 63. TRUE or FALSE: Tsunamis, in Japanese, means “harbor wave”. True 64. TRUE or FALSE: Tsunamis are always just one big wave. False 65. Tsunamis are created by: (A) earthquakes (B) under sea landslides (C) volcanic eruptions (D) all of the above D 66. In the open ocean, tsunamis are described by: (A) wave length (B) amplitude (C) speed (D) all of the above D 67. The death toll in the recent Indian Ocean tsunami is over_________. 150,000 68. Name three places on Earth that could experience a tsunami. Any coastal area near a fault underwater volcano, or meteor impact is vulnerable, i.e., islands and coasts in the vicinity of the ‘Ring of Fire’ in the Pacific Ocean. 69. TRUE or FALSE: Meteors are objects that reach the Earth’s atmosphere and burn up