Answer:
Simply identify what elements are in a compound
Explanation:
For example in NaCl we have sodium (Na) and Chlorine (Cl)
In order to do this you would need to recognise the symbols for a certain element: O for oxygen; N for nitrogen; H for hydrogen etc.
Answer:The structure of solids can be described as if they were three-dimensional analogs of a piece of wallpaper. Wallpaper has a regular repeating design that extends from one edge to the other. Crystals have a similar repeating design, but in this case the design extends in three dimensions from one edge of the solid to the other.
We can unambiguously describe a piece of wallpaper by specifying the size, shape, and contents of the simplest repeating unit in the design. We can describe a three-dimensional crystal by specifying the size, shape, and contents of the simplest repeating unit and the way these repeating units stack to form the crystal.
The simplest repeating unit in a crystal is called a unit cell. Each unit cell is defined in terms of lattice points--the points in space about which the particles are free to vibrate in a crystal.
Answer:
thermometer
Explanation:
The most important tool to use when collecting data relating to how thermal energy affects metals would be <u>the thermometer.</u>
The thermometer is an instrument used to measure temperatures and the temperature of a body is a measure of the amount of thermal energy present in the body.
<em>In order to obtain data relating to how thermal energy affects metals, the most important variable to take note of would be the thermal energy of the metals and this can only be done by the thermometer.</em>
Answer:
D. Acidic salt
Explanation:
Acidic salts:
Salts formed by incomplete neutralisation of poly-basic acids are called acidic salts. Such salts still contain one or more replaceable hydrogen atoms. These salts when neutralised by bases form normal salts.
Answer:
d. asteroids affected by Jupiter's gravity
Explanation:
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.