1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
3 years ago
8

A 5.5 g sample of a substance contains only carbon and oxygen. Carbon makes up 35% of the mass of the substance. The rest is mad

e of oxygen. You are asked to determine the mass of oxygen in the sample. Which of the following expressions demonstrates a mathematical procedure to solve this problem using the proper order of operations?
((100 - 35)/100) x 5.5 grams =
100 - 35/100 x 5.5 grams =
100 - (35/100) x 5.5 grams =
Recall that to calculate a percent of an amount in grams means you have to convert the percent to a number and multiply by the amount in grams. For example, 50% means 50 out of 100, or 50 hundredths. So 50% of 10 grams is 0.50 times 10 grams. You need to take 0.50 and multiply it by 10 grams to determine 50% of 10 grams is 5.0. (50% and 10 grams are examples and not numbers for this problem.)
Computers and Technology
1 answer:
Alisiya [41]3 years ago
5 0

Answer:

((100-35)/100) x 5.5grams=3.575grams of oxygen

Explanation:

Since ha sample contains 35% carbon which means (100-35)=65% is oxygen in the sample. In order to calculate the mass of oxygen in the sample we have to find the 65% of 5.5g which means we have to multiply 65/100=0.65 with 5.5g i.e 0.65*5.5. so the mathematical expression we use will be:

((100-35)/100) x 5.5grams=3.575grams of oxygen

You might be interested in
Data that can be used to identity a single individual is known as
lys-0071 [83]

Answer:

Fingerprint Recognition

Explanation:

3 0
4 years ago
A desktop computer is not able to connect to a wireless network (WLAN). What are the step-by-step troubleshooting steps and proc
lara [203]

Answer:

  1. you should first check your hotspot connection and then if your pc is not connected so you can replace an aeroplane mode on your pc.
8 0
3 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
4 years ago
Read 2 more answers
Some technologies like vertical farming have a number of negative effects. Which is a negative outcome of this technology? A. In
Tanya [424]
<span>Vertical farming is the exercise of creating foodstuff and medication in sheer laden layers, vertically inclined exteriors and/or combined in other structures. The modern thoughts of vertical farming use indoor farming methods and controlled-environment agriculture (CEA) technology, where all environmental issues can be well-ordered. So knowing all of this, the negative outcome would be D.</span>
4 0
4 years ago
A Product Manager has been given responsibility for overseeing the development of a new software application that will be deploy
natima [27]

There are different software that has been developed today. The most time-saving and cost-effective way is to Design the application’s security features after the application’s initial build is complete.

Accenture is known for their work in improving business needs. They are constantly shifting to a new method of delivering information technology.

They are known to embed security into the product development life cycle helps secure the business and also keeping speed and assisting to remove friction.

Learn more about Accenture from

brainly.com/question/25737623

8 0
3 years ago
Other questions:
  • Pointers with classes a) A user-defined class named Timer has a constructor that takes two integer parameters to initialize hour
    14·1 answer
  • This solution will use an item quantity and a state code to calculate the total price of an item. The solution will calculate th
    10·1 answer
  • Sukant’s professor asks her to take over his online class while he is away because she is an effective digital communicator. Whi
    11·2 answers
  • Adding software to a digital device, or adding hardware components to a digital device is called _____ .
    13·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    12·1 answer
  • Many inventions have enabled us to use digital cameras. The biggest difference between traditional and digital cameras is that d
    10·1 answer
  • Given the class definition: class CreateDestroy { public: CreateDestroy() { cout &lt;&lt; "constructor called, "; } ~CreateDestr
    6·1 answer
  • 6.Which of the following statements illustrates a characteristic of a person's attitudes
    14·2 answers
  • Choose the correct statements about computer-programming languages. Choose all that apply.
    8·2 answers
  • Which staff member takes a set of plans and supervises their construction?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!