1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
3 years ago
14

Chemical reaction rates are proportional to a rate constant, k, which changes with temperature according to the Arrhenius equati

on
k=koe^-Q/RT for :
Q=8000 cal/mole
R=1.987 cal/mole K
ko=1200 min-1
Find the value of k for Temperature from 100K to 500K, in 50 degree increments. Create a table of your results.
Computers and Technology
1 answer:
Vanyuwa [196]3 years ago
7 0

Answer:

see answer below

Explanation:

the equation is given by

k=ko* e^(-Q/RT)

then replacing the known values

k=1200 min⁻¹ e^[-8000 cal/mole/ (1.987 cal/mole K *T)]

then replacing values of T every 50 K from 100 to 500 K we get the series of values

\left[\begin{array}{ccc}T&k\\100&3.924*10^{-15} min ^{-1} \\150&2.643*10^{-9} min ^{-1} \\200&2.17*10^{-6} min ^{-1} \\250&1.216*10^{-4} min ^{-1} \\300&1.781*10^{-3} min ^{-1} \\350&0.012 min ^{-1} \\400&0.051 min ^{-1} \\450&0.156 min ^{-1} \\500&0.382 min ^{-1} \end{array}\right]

You might be interested in
Which component is a part of the CPU of a computer
Marina CMI [18]
Is a piece of hardware that carries out the instructions of a computer program. It performs the basic arithmetical, logical, and input/output operations of a computer system.
Hope it helps!!
6 0
3 years ago
Read 2 more answers
write a java program using a do while loop to prompt the user to enter a password. The user should be prompted to enter the pass
Alex787 [66]
We can import Scanner from Java.utils.Scanner to pull in text entered in the console.

public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
String password = "";
do {
System.out.print("Enter your password: ");
password = sc.nextLine();
if(!password.equals("pals") {
System.out.println(\nIncorrect Password. Try again.");
}
} while(!password.equals("pals");
3 0
3 years ago
What provides access to the internet?
Sphinxa [80]
A router!
12345678901234567890
6 0
3 years ago
Maria works for MegaCorp, a large privately owned company specializing in sales of ball bearings. MegaCorp introduces filtering
ololo11 [35]

Answer:

No, because it would be generally free for private-sector employees by using filtering software to restrict access to some websites.

Explanation:

Maria working for the following Corporation, a major private-owned company that specializes throughout ball bearings production. That corporation establishes filtering software to restrict access to some of these sites linked to non-work, and also some sites with poπnographic images.

So, Maria could not challenge that policy lawfully, as private-sector employees are usually free to always use filtering software to restrict access to some of these Websites

3 0
3 years ago
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the s
liberstina [14]

<u>Normally windows end user can login 3 ways as follow:</u>

1. End user can Login as local account where user has not connected or even connected to local Area network LAN.

2. Next user can login into cloud accounts nothing but hot mail  accounts

3. Login to windows domain controller where end user should connect to LAN.

Purpose of installation of Windows domain controller with Active Directory is to keep trace and keep log history activities.

Due to windows domain controller with Active Directory end user desktop or laptop has control on software access also.

Every time when end user login on windows domain controller a small modified is executed whenever is required. It is not going effort the workstation performances.

Note: - Domain severs should be POWER on first.

5 0
4 years ago
Other questions:
  • Before responding to an e-mail from another student in an online course, a student should
    13·2 answers
  • What are the People that make the goods called
    14·1 answer
  • 1. Problem solving is
    13·1 answer
  • ______ is an example of unauthorized access to your computer or accounts.
    14·1 answer
  • A blank is a copy of one or more files that is made in case the original become lost or damaged
    7·1 answer
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • How are computers 35 years ago and how are they presently and how are they going to be in the next 35 years
    9·1 answer
  • What are Manuscript signs​
    8·1 answer
  • Where can a client identify the instant deposit options for their QuickBooks Payments account?
    5·1 answer
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!