1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
13

A compound containing only C, H, and O, was extracted from the bark of the sassafras tree. The combustion of 81.7 mg produced 22

2 mg of CO2 and 45.4 mg of H2O. The molar mass of the compound was 162 g/mol. Determine its empirical and molecular formulas.
Computers and Technology
1 answer:
joja [24]3 years ago
3 0

Answer:

Empirical formula= C4H20

Molecular formula = C8H4O2

Explanation:

It is given that 81.7 mg produced 222 mg of CO2 and 45.4 mg of H2O.

Note:Molar mass of C = 12g/mol

Molar mass of CO2 = 44g/mol

Therefore mass of C in 222mg of CO2= 12/44*(0.222)

=0.0605g

Note: Molar mass of H=1g/mol

Molar mass of H2O=18g/mil

Therefore, mass of H in 45.4mg of H2O= 1/18*(0.0454)

=0.0025g

Therefore, Mass of O = 0.0817-0.0025-0.0605

=0.0187g

Divide through by the atomic mass:

C=0.0605/12=0.00504

H=0.002/1=0.002

O=0.0187/16=0.00117

Divide through by the smallest number

C=0.00504/0.00117 = 4.3 ; Approx 4

H=0.002/0.00117=1.7 ; Approx 2

O=0.00117/0.00117=1

The empirical formula= C4H20

To calculate Molecular formula, (C4H20)n = 162

((12*4)+(1*2)+16)n=162

66n=162

n=162/66=2.45 ; Approx 2

Molecular formula = C8H4O2

You might be interested in
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
3 years ago
Read 2 more answers
True/False: Each individual element of an array can be accessed by the array name and an element number, called a subscript. Tru
Dahasolnce [82]

Answer:

True

Explanation:

3 0
3 years ago
How Do You Make Some One Brainly-est I don't know how to exactly do it, it would be nice to know how to... So if anyone has time
Vesna [10]

You can only do it if there is two answers. the button will be where the Thanks button is.

You can also do it if there is only one answer but you have a to wait a week or two.

5 0
4 years ago
Read 2 more answers
If you set up a network in your home to share your internet connection with several laptops, what type of network have you creat
Alex_Xolod [135]

Answer:

P2P

Explanation:

Originally stood for "Peer to Peer." The "colleagues" are computers in a P2P network that are linked via the Web to each other. By having a central server, files can be exchanged directly among devices on the network. In other words, any machine on a Distributed system becomes both a file server and a client.

3 0
3 years ago
George is a specialist in security and protective services for a large security firm that has contracts at shopping malls nation
slava [35]

Answer: (D) He monitors alarms and cameras, interviews people, and designs security systems.

Explanation: A security and protective service employee would benefit in monitoring and designing security systems.

7 0
4 years ago
Other questions:
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    5·1 answer
  • It is important to keep a copy of your written plan and safety records off-site. A) True B) False
    6·2 answers
  • Which tool is used to create an interactive web application?
    15·1 answer
  • What are the two basic steps in communication
    9·1 answer
  • An administrator has noticed that GPO containing new update settings has not yet applied to one of the computers on the network.
    5·1 answer
  • alina is preparing to scan a microsoft sql server database server for open ports. what port should she expect to find supporting
    12·2 answers
  • Why was the cooper black font made?
    5·1 answer
  • Is this statement true or false?
    5·1 answer
  • What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?
    6·1 answer
  • What kind of animation is used in the powerpuff girls show??
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!