Answer:
C₂H₄O₂ and NaC₂H₃O₂ are reactants.
Explanation:
Word equation:
Acetic acid + sodium acetate → sodium diacetate
Chemical equation:
C₂H₄O₂ + NaC₂H₃O₂ → C₄H₇NaO₄
This is a synthesis reaction in which simple reactants combine to form complex product.
This is also balanced chemical equation because there are equal number of atoms of all elements on both side of equation. Thus it follow the law of conservation of mass.
Law of conservation of mass:
According to the law of conservation mass, mass can neither be created nor destroyed in a chemical equation.
This law was given by french chemist Antoine Lavoisier in 1789. According to this law mass of reactant and mass of product must be equal, because masses are not created or destroyed in a chemical reaction.
<span>The theory general relativity was discovered by Albert Einstein </span>
Answer:
the electric field at Z = 12 cm is E = 9.68 × 10³ N/C = 9.68 kN/C
Explanation:
Given: radius of disk, R = 2.0 cm = 2 × 10⁻² cm, surface charge density,σ = 6.3 μC/m² = 6.3 × 10⁻⁶ C/m², distance on central axis, z = 12 cm = 12 × 10⁻² cm.
The electric field, E at a point on the central axis of a charged disk is given by E = σ/ε₀(
)
Substituting the values into the equation, it becomes
E = σ/ε₀(
) = 6.3 × 10⁻⁶/8.854 × 10⁻¹²(
) = 7.12 × 10⁵(
) = 7.12 × 10⁵(1 - 0.9864) = 7.12 × 10⁵ × 0.0136 = 0.0968 × 10⁵ = 9.68 × 10³ N/C = 9.68 kN/C
Therefore, the electric field at Z = 12 cm is E = 9.68 × 10³ N/C = 9.68 kN/C
Answer:
4Al203 + 9Fe -> 3Fe3O4 + 8Al
Amount of Al on reactant side: 8
Amount of Al on product side: 8
Amount of O on reactant side: 12
Amount of O on product side: 12
Amount of Fe on reactant side: 9
Amount of Fe on product side: 9
Answer:
Information Extortion.
Explanation:
Computer oriented crime also known as cyber crime that intentionally harm the victims. The complete data of the company or net banking information can be hacked easily by the cyber crime.
Different category of the threats are included in the cyber crime. The information extortion threat is the crime in which the hackers hack complete information and control the data of the victim. The criminal an black mail the victim regarding the hacked data.
Thus, the correct answer is information extortion.