1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
2 years ago
14

What is the law of conservation on mass?

Chemistry
2 answers:
DerKrebs [107]2 years ago
6 0
<span>Mass in an isolated system is neither created nor destroyed by chemical reactions or physical transformations. The mass of the products in a chemical reaction must equal the mass of the reactants.</span>
OLga [1]2 years ago
4 0
Matter cannot be created nor destroyed but regrouped (recycled)
You might be interested in
A. 1.4 m<br> B.1.9m<br> C. 2.4m<br> D. 3.6m
jenyasd209 [6]
Apple the way to my hair and hair is so good and i and my friend are going to sleep at the house and i you can do to me and you can do it and i and you have a lot to do with me some time i to get a little sleep in my room and you have my sleep ritirieuwi u and the only reason
8 0
2 years ago
A 5 mole sample of liquid acetone is converted to a gas at 75.0°C. If 628 J are required to raise the temperature of the liquid
velikii [3]
The total energy required for this conversion is equivalent to the sum of the energies that are used. There are three steps:

1) Heating of liquid acetone
This used 628 J

2) Evaporation of acetone
This used 15.6 kJ or 15,600 J

3) Heating of acetone vapors
This used 712 J

Adding these quantities,

Total energy = 628 + 15,600 + 712

The total energy required was <span>16940 Joules of 16.94 kJ</span>
7 0
3 years ago
Name three machines which convert straight motion to circular motion.
fgiga [73]
A Grinder,A Mixer,A Car 
3 0
3 years ago
Network forensics might deal with what? Retrieving photos from a PC Analyzing text messages Investigating a data breach Defragme
balandron [24]

Answer:

Investigating a data breach

Explanation:

A data breach usually involves data exfiltration over a computer network. the other options involve data being stored on a device locally which isn't volatile data like text messages, photos or rearranging data in defragmentation all of which does not require a network.

8 0
2 years ago
126785033% Divided by 348675948849 = <br> what does it equal
meriva

Answer:

0.00000363618

could be wrong.

double check me someone or just trust me

(don't blame me if you get it wrong)

5 0
3 years ago
Other questions:
  • Item 4
    12·1 answer
  • Why is thermal energy produced not generally usable to do work
    6·2 answers
  • Places where the seafloor is forced under continental plates.
    14·2 answers
  • What is the purpose of subscripts in chemical formulas
    8·1 answer
  • What is the conecntration of Fe3 and the concentration of No3- present in the solution that result when 30.0 ml of 1.75M Fe(No3)
    10·1 answer
  • How are amphibians different from reptiles
    14·1 answer
  • Find the mass of 250.0mL of benezene. The density of benezene is 0.8765 g/mL
    15·2 answers
  • PLEASE HELP. WILL MARK BRAINLIEST SERIOUSLY CONFUSED HELLPPPP PLEASE
    7·1 answer
  • How are plant and animal structures similar?
    15·1 answer
  • Which of the following reactions will occur? question 10 options: ag hcl fe zn(no3)2 cu feso4 na hcl
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!