1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
12

_KOH + _Cu(CIO3)2 - __KCIO3 +_Cu(OH)2​

Computers and Technology
1 answer:
Lyrx [107]3 years ago
8 0
K- 1 x 2 =2
OH- 1 x 2 = 2
Cu- 2
(CIO3)- 6

K- 1 x 2= 2
OH- 2
Cu- 2
(CIO3)- 3 x2=6

2KOH+ Cu(CIO3)2 - 2KCIO3+ Cu(OH)2
You might be interested in
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
3 years ago
An array of strings , names , has been declared and initialized . write the statements needed to determine whether any of the th
OLEGan [10]
#Python

hasempty = False
for name in names:
   if ( not name ):
      hasempty = True
      break  # speed things up
3 0
3 years ago
Pressing the _____ key when entering title text in a placeholder creates a new paragraph. BACKSPACE SHIFT DELETE ENTER
Lunna [17]
Enter would create a new line, thus allowing you to enter a paragraph, on some applications you can use "Shift+Enter" if it is an IM application like Skype.
4 0
3 years ago
Which are examples of hardware? Select 3 options.
umka21 [38]

Answer: OS(Operating System), CPU, And The Program That you use to view email

6 0
3 years ago
Read 2 more answers
Cuál es la diferencia entre hackeo y crackeo
Sauron [17]

Answer: El hackeo es el proceso de intrusión en los sistemas informáticos sin autorización para acceder a ellos, con buenos o malos propósitos, el cracking es la misma práctica aunque con intención delictiva.

3 0
3 years ago
Other questions:
  • How should a cover letter begin?
    13·2 answers
  • Given that arrayIntValues [MAX_ROWS][MAX_COLUMNS] is a 2 dimensional array of positive integers, write a C++ function Even to fi
    15·1 answer
  • Write a method that take an integer array as a parameter and returns the sum of positive odd numbers and sum of positive even nu
    13·1 answer
  • Which of the following is an accurate statement? When the LOWER function is used in a SELECT clause, it will automatically store
    6·1 answer
  • According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-gra
    11·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • It is a SQL keyword that creates an autoincrementing field.
    5·1 answer
  • Strengths and weaknesses about esport
    10·1 answer
  • What are two different ways by which a laptop could utilize the cellular network connection of a mobile device
    15·1 answer
  • A file has TWo parts name them
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!