1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
3 years ago
11

The compound known as butylated hydroxytoluene, abbreviated as BHT, contains carbon, hydrogen, and oxygen. A 1.501 g sample of B

HT was combusted in an oxygen rich environment to produce 4.497 g of CO2(g) and 1.473 g of H2O(g). Insert subscripts below to appropriately display the empirical formula of BHT.
Computers and Technology
1 answer:
ad-work [718]3 years ago
7 0

Answer:

C15H24O

Explanation:

n(C) = 4.497 g/44g/mol = 0.1022

Mass of C = 0.1022 × 12 = 1.226 g

n(H) = 1.473g/18 g/mol = 0.0823 ×2 moles = 0.165 moles

Mass of H = 0.0823 × 2 ×1 = 0.165g

Mass of O= 1.501 -(1.226 + 0.165)

Mass of O= 0.11 g

Number of moles of O = 0.11g/16g/mol = 0.0069 moles

Dividing through by the lowest ratio;

0.1022/0.0069, 0.165/0.0069, 0.0069/0.0069

15, 24, 1

Hence the formula is;

C15H24O

You might be interested in
Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a
Rzqust [24]

in america we are free to say most of whatever we want in media becuase we have free speech here. in other countries, they don't have freedom of speech,and sometimes it also has to do with the political situation. like say in china, where teenagers arent allowed to use the internet for more than a certain amount of time,and arent allowed to talk to each other. thats becuase of the fact that that country is a communist country and the government wants much more control than in other countries.

6 0
2 years ago
In Windows 7/Vista, the information that establishes basic settings such as the location of the operating system and other key s
mel-nik [20]
Bios, This stores all of the computers start-up information. It tells the computer where to find the operation system inside the main storage and how to start it.

Hope this helps! :)
7 0
3 years ago
What is the function of the NOS? Select all that apply.
Zigmanuir [339]

Answer:

.network management

Explanation:

pls need brainliest

3 0
3 years ago
Read 2 more answers
Creating a map of your current knowledge is called __________.
poizon [28]

Answer:

D - Concept-mapping

Explanation:

3 0
3 years ago
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Other questions:
  • In order to use an object in a program, its class must be defined.
    9·1 answer
  • In real-world environments, risks and their direct consequences will most likely span across several domains. However, in the la
    12·1 answer
  • Each of the outcomes listed below is a result of executing the following script except for one. Which one? CREATE ROLE ExampleRo
    6·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    6·1 answer
  • Fire Tint, Inc., (FTI), applies tint to airplane canopies (front windows) manufactured by other companies. When the canopy manuf
    12·1 answer
  • PLEASE HELP. I’ll mark you BRAINLIST <br> Please read the comment under this question
    9·1 answer
  • Were can i watch unexpected free season 3
    9·1 answer
  • Magnetic video tape in a plastic casing is a?
    13·1 answer
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
  • What are 2 ways to send a message to your client when signed in as an accountant user?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!