1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
3 years ago
8

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Computers and Technology
2 answers:
jeyben [28]3 years ago
6 0

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

zlopas [31]3 years ago
3 0

Answer:

B

Explanation:

You might be interested in
You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes
Brut [27]

Answer: Open Reliability Monitor.

Explanation:

The simplest way to view this information is to open the reliability monitor.

The Reliability Monitor shows you the stability history of a system at a glance and also allows one to see the details of the events that has an effect on reliability on a daily basis.

The reliability and problem history chart which can be seen in the Reliability Monitor helps in keeping track of the overall health of the server on a daily basis.

4 0
3 years ago
What is the rate constant at 25.0 ∘c based on the data collected for trial b?
Alecsey [184]
<h2><u>Answer: </u></h2>

acetone + I2 + HCl ---> iodated acetone  

Equation:

rate = k * [acetone]^x * [I2]^y * [HCl]^z  

Once we know x, y, z, we can plug in any of the trials A->D and determine k  NOTE: We can't use run E because temperature has an effect on rate. E was run at a different temperature.

The first thing to note is that do NOT have concentrations. We have volumes at a given molarity.  

Table:  

.001M I2.. ..050M HCl.. .1.0M acetone.. .water.. temp..time.. total vol  

.. ....mL.. ... ... .. .mL.. .. ... .. .. mL.. .. .. .. ..mL.. ..°C.. .sec.. .. .. .L  

A.. ...5.. .. .. .. .. ..10.. .. .. .. .. ..10.. .. .. .. ..25.. .. .25.. .130.. .. 0.05  

B.. ..10.. .. .. ... .. 10.. .. .. ... .. .10.. .. .. ... ..20.. . .25.... 249.. ..0.05  

C.. . 10.. .. .. .. .. .20.. .. .. .... .. 10.. .. ... ... .10... ..25.. ..128... .0.05  

D.. . 10.. ... .. ... ..10.. .. ... .. ... 20.. .. .. .. .. 10.. .. 25.. ..131.. ..0.05  

E.. ..10.. ... .. ... ..10.. ... ... ... ..10.. ... .. ... .20.. .. 42.8.. .38.. ..0.05  

We can translate that into molarity in solution using this formula. (molarity pure ingredient * mL used / 1000 / total volume in liters)  

 

.. .. ..I2.. .... HCl.. acetone.. temp.. ..rxn time  

.. .. ..M.. .. ...M.. .... .M.. .... ..°C.. .. .. sec  

A.. 0.0001.. 0.01..... 0.2.. .... .25... .... .130  

B.. 0.0002.. 0.01.. .. 0.2.. .. .. 25.. .. .. .249  

C.. 0.0002.. 0.02.. .. 0.2.. .. .. 25.. .. .. .128  

D.. 0.0002.. 0.01.. .. 0.4.. .. . .25.. ... ...131  

E.. 0.0002.. 0.01.. .. 0.2.. . ....42.8.. .. .. 38  

From runs B and D, we can see that rate dropped by half .

As [I2] and [HCl] were held constant and [acetone] was doubled.  

This means x=-1 in this equation  

Rate = k * [acetone]⁻¹ * [I2]^y * [HCl]^z  

Rate = k * [I2]^y * [HCl]^z  

From runs A and B  

[I2] doubles  

[HCl] remains the same  

[acetone] remains the same  

rate doubles   as [I2] doubles, rate doubles  

y = 1   rate = k * [acetone]⁻¹ * [I2]¹ * [HCl]^z  

And from runs B and C, we can see that  , As [HC] doubles, (all else equal) the rate halves.

Z = -1  

Rate = k * [I2] / ([acetone] * [HCl])  

Rearranging  

k = rate * [acetone] * [HCl] / [I2]  

From any experimental run (A-D), we can calculate k.

using A to calc k... ..k = 2600 M²/sec  

using B to calc k... . k = 2490 M²/sec  

using C to calc k... . k = 2560 M²/sec  

using D to calc k... . k = 2620 M²/sec  

NOTE.. the problem statement said to use the data from run B to calc k.

Hence Final Answer:

k = 2490 M²/sec

4 0
3 years ago
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
3 years ago
Why am I constantly getting bombarded with brainly plus ads and how to fix this without paying for it?
Helga [31]

Answer:

there really is no way to fix it. I've tried everything everybody says sorry

8 0
3 years ago
Read 2 more answers
The conflict between the user’s goal for unfettered access to data and the security administrator’s goal to protect that data is
galben [10]
B it is access control
7 0
3 years ago
Other questions:
  • Which of the following is the best definition of a workplace policy?
    13·2 answers
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • Slicing can best be described as
    9·1 answer
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • Which of the following does NOT help a user navigate through a document?
    14·1 answer
  • Which one is not an operating system?1.mac 2.Microsoft office3.Iso.3.Android
    11·1 answer
  • Paul is a chemical engineer working with large storage tanks of chemicals. Working from home using a program on his computer, he
    5·1 answer
  • And, Or, Not are examples of:
    11·1 answer
  • 20 POINTS!!! I NEED HELPP
    6·2 answers
  • Which statement best describes what happens when a computer starts?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!