1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
3 years ago
9

Which source would be the most reliable to validate a claim?

Chemistry
1 answer:
Mekhanik [1.2K]3 years ago
4 0

Answer:

In general, print publications with authors and listed sources tend to be reliable because they provide sources which readers can verify. Likewise, Web postings with a .gov (posted by the United States government) are both current and reliable.

Explanation:

You might be interested in
Select The on that most applys<br><br><br> Will mark brainliest
zepelin [54]

Answer:

A and B

Explanation:

3 0
2 years ago
Discuss the shapes of s- orbitals, p-orbitals and d-orbitals.
timurjin [86]

The azimuthal quantum number (l) determines its orbital angular momentum and describes the shape of the orbital.

s-orbitals (for example 1s, 2s) are spherically symmetric around the nucleus of the atom.

p-orbitals are dumb-bell shaped. l = 0,1...n-1, when l = 1, that is p subshell.

d-orbitals are butterfly shaped.

3 0
2 years ago
When dipentyl ether is treated with HI, what type of reaction occurs? both SN1 and SN2 SN2 E1 SN1 E2
masha68 [24]

Answer:

SN2

Explanation:

The first step of ether cleavage is the protonation of the ether since ROH is a better leaving group than RO-.

The second step of the reaction may proceed by either SN1 or SN2 mechanism depending on the structure of the ether. Methyl and primary ethers react with HI by SN2 mechanism while tertiary ethers react with HI by SN1 mechanism. Secondary ethers react with HI by a mixture of both mechanisms.

Dipentyl ether is a primary ether hence when treated with HI, the reaction with HI proceeds by SN2 mechanism as explained above.

7 0
3 years ago
How will you ensure your server is protected from data hacks?<br>​
mario62 [17]
Close all network ports, filter those you can't block

Firewalls are used to filter network traffic and are available as standard system software on most operating systems. Limit the openings hackers have to your server.
4 0
2 years ago
Read 2 more answers
For lunch today, I ate an apple. What type of carbohydrate did I ingest?
mafiozo [28]

Answer:

Monosaccharide

Explanation:

Apples contain high levels of fructose, which is a monosaccharide.

8 0
3 years ago
Other questions:
  • A solution of HCl has mc012-1.jpg = 0.01 M. What is the pH of this solution?
    7·2 answers
  • What is the number of electrons shared in the multiple carbon-carbon bond in one molecule of 1-pentyne?
    12·1 answer
  • Which element is found in all the acids described in this section?
    10·1 answer
  • A substance is present in the gaseous state at room temperature. Which of the following best explains the probable position of t
    7·2 answers
  • The following questions pertain to a system contains 122 g CO(g) in a 0.400 L container at -71.2 degrees C.
    5·1 answer
  • Metals posses varying reduction potentials. Iron can reduce Cu+2 (aq) to copper metal. Silver can reduce Au+ (aq) to gold metal.
    8·1 answer
  • There are many lewis structures you could draw for sulfuric acid, h2so4 (each h is bonded to an o). part a what lewis structure(
    6·2 answers
  • The formation constant* of [M(CN) 4 ]2− is 7.70 × 10 16 , where M is a generic metal. A 0.150 mole quantity of M(NO3)2 is added
    13·1 answer
  • Oceń prawdziwość podanych informacji w układzie okresowym pierwiastki chemiczne są złożone według NIK to jących się liczbą atomo
    15·1 answer
  • Hat is used and produced in glycoloysis?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!