1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
13

5. The hazardous component in most antifreeze is _____, which is extremely toxic to humans and animals. A) Calcium Carbonate B)

Strychnine C) Ethylene glycol D) Carbon monoxide
Computers and Technology
2 answers:
frez [133]3 years ago
5 0

Answer: The answer is C:Ethylene glycol

The hazardous component in most antifreeze is ethylene glycol, which is extremely toxic to humans and animals.

Explanation:  Ethylene glycol refers to chemical used in industrial manufacturing applications and commercial applications. They are also ingredient in products like automotive antifreeze and coolant. They are used as raw materials in producing products like polyester fibers for clothes, pillow, upholstery, carpet and so on. Ethylene is important in so many ways. One of which is that, it keep the car engine from freezing during winter and also reduces overheating during summer.

Levart [38]3 years ago
4 0

The answer is C) Ethylene glycol

You might be interested in
First Computers and Technology question in 4 years..
g100num [7]

Answer:

In computer networking, a wireless access point, or more generally just access point, is a networking hardware device that allows other Wi-Fi devices to connect to a wired network

Explanation:

3 0
3 years ago
6. You and your friends take an awesome selfie, and you add your name and addresses to the picture. It is a good idea to share t
Trava [24]

Answer:

family and friends you trust

3 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
You can apply several different worksheet themes from which tab?
Nookie1986 [14]

page layout...... im not sure

6 0
4 years ago
Read 2 more answers
I am trying to make a flowgorithm chart for a dogs name, age, weight and when their weight is less than 50 OR more than 100 its
kumpel [21]

Answer:

i think it helps

Explanation:

sorry there was someone else rude as heck messaging and responding I couldn't see their screen name

what isig naame

oh okay

I have sent dm

i dont know your name there

5 0
2 years ago
Other questions:
  • In a paragraph of no less than 125 words, describe how you would insert a graph in your word-processing document.
    8·2 answers
  • A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-spe
    5·1 answer
  • Windows uses a graphical user interface (GUI), which means: a user can carry out commands by clicking, dragging, or otherwise ma
    6·1 answer
  • A security policy is a
    11·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    7·1 answer
  • The first idea for a communications network was called
    14·2 answers
  • Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas
    13·1 answer
  • In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors m
    5·1 answer
  • If you have limited means, you...?
    9·1 answer
  • The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addres
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!