1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
15

The molecule 2,2-diisopropylheptane is incorrectly named. what is the correct name?

Computers and Technology
1 answer:
pentagon [3]3 years ago
5 0
Isopropyl is: CH3 - CH - CH3
                                |

Heptane is: CH3 - CH2 - CH2 - CH2 - CH2 - CH2 - CH3

Then 2,2 isopropyl heptane is:

CH3 - CH - CH3
           |
CH3 - C - CH2 - CH2 - CH2 - CH2 - CH3
           |
CH3 - CH - CH3.

There you can count that the longest carbon chain has 8 carbon atoms.
So the right name is of an octane.

I will rearrange the chain to show the 8 carbon chain in a row:

           CH3   CH3
           |          |
CH3 - CH -   C - CH2 - CH2 - CH2 - CH2 - CH3
                      |
           CH3 - CH - CH3

Now, you can see that the right name is 3 isopropyl - 2, 3 dimethyl octane




You might be interested in
The United States Army retains a history of all equipment acquisition from approval of requirements through funding, authorizing
Mama L [17]

Answer:

A. data mart

Explanation:

Data mart refers to a structure for storing and retrieving data. Often times, the data mart is usually specific to a business line.

The data contained herein is also specific to a particular department and by so doing this facilitate easy isolation, use and development of the data.

The major advantage of creating data marts is for easy accessibility of data.

7 0
3 years ago
When you connect to an Access database, which entities are shown in the Navigator window?
Leni [432]

1DFASDFAASDASDFASDFADSFASFD

4 0
2 years ago
Read 2 more answers
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
3 years ago
Start
Crank

Answer:

N=5  key task decision start and end

Explanation:

8 0
2 years ago
Medium-term goals describe what you want your business to achieve (a) in ten years, (b) in terms of market share, (c) in two to
77julia77 [94]

The correct answer to this question is Choice C- in two to five years.

Your medium-term goals may build upon your short term goals. For example, your short term goal may be to save $1,000. Building upon this, your medium-term goal could be to save $5,000.

3 0
3 years ago
Other questions:
  • For C++ (please make sure it runs properly)
    14·1 answer
  • What port does rdp use by default and from what range of numbers should you select a private port number?
    15·1 answer
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement t
    6·2 answers
  • Which element is included in the shot breakdown storyboard? Which element is included in the shot breakdown storyboard?
    8·1 answer
  • The term integration mean?
    7·2 answers
  • What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
    11·1 answer
  • How should you schedule a meeting with someone in another time zone?
    7·1 answer
  • It would be at least two decades before some of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!