1. Na3PO4+Mg(NO3)2= NaNO3 + MgPO4
So this is not the answer.
2. Al+CuCl2= AlCl3+ Cu
So this is the answer.
3. Mg+O2= MgO2
So this is not an answer
4. Cl2+KI= KCl+I2
So this is also an answer
Hence B and C are answers
All matter is made up of particles called atoms and molecules (as opposed to being continuous or just including particles). On the following page, the idea is stated as one of four concepts in Dalton's theory: “All matter is composed of tiny, indivisible particles called atoms” (p. 158s).
Answer:
62.5 moles of O₂.
Explanation:
We'll begin by writing the balanced equation for the reaction. This is illustrated below:
2C₈H₁₈ + 25O₂ —> 16CO₂ + 18H₂O
From the balanced equation above,
2 moles of C₈H₁₈ reacted with 25 moles of O₂.
Finally, we shall determine the number of mole of O₂ needed to react with 5 moles of C₈H₁₈. This can be obtained as shown below:
From the balanced equation above,
2 moles of C₈H₁₈ reacted with 25 moles of O₂.
Therefore, 5 moles of C₈H₁₈ will react with = (5 × 25) / 2 = 62.5 moles of O₂.
Thus, 62.5 moles of O₂ is needed for the reaction.
First we have to find moles of C:
Molar mass of CO2:
12*1+16*2 = 44g/mol
(18.8 g CO2) / (44.00964 g CO2/mol) x (1 mol C/ 1 mol CO2) =0.427 mol C
Molar mass of H2O:
2*1+16 = 18g/mol
As there is 2 moles of H in H2O,
So,
<span>(6.75 g H2O) / (18.01532 g H2O/mol) x (2 mol H / 1 mol H2O) = 0.74mol H </span>
<span>Divide both number of moles by the smaller number of moles: </span>
<span>As Smaaler no moles is 0.427:
So,
Dividing both number os moles by 0.427 :
(0.427 mol C) / 0.427 = 1.000 </span>
<span>(0.74 mol H) / 0.427 = 1.733 </span>
<span>To achieve integer coefficients, multiply by 2, then round to the nearest whole numbers to find the empirical formula:
C = 1 * 2 = 2
H = 1.733 * 2 =3.466
So , the empirical formula is C2H3</span>
Answer: First of all planning is done to set the goals to how to test the target. then scanning is done. after that target is uncovered to see how the target exploits by the use of web application attacks. then analysis is done an tests of the penetration tests are compiled.
Explanation: