1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
15

Butane reacts with oxygen to produce carbon dioxide and water

Chemistry
1 answer:
Wittaler [7]3 years ago
4 0
What exactly are you looking for?
This is the balanced equation.
<span>2 C4H10g + 13 O2g ---> 8 CO2g + 10 H2Og</span>
You might be interested in
This step gives an investigation a specific direction or focus A.observation
frozen [14]
The correct answer is c hypothesis
5 0
3 years ago
Read 2 more answers
What is the Scientific<br> Method?
Doss [256]

Answer:

I just finished a unit on Scientific Method in my science class! Anyway, it's defined in the screenshots below. Hope this helps!

8 0
3 years ago
What did you include in your response?<br>check all that apply ​
erma4kov [3.2K]

Answer: i don't know

Explanation:

u gave no information on what you're asking

6 0
3 years ago
Write a balanced equation formed when the following elements react with oxygen:a)Zinc
Ainat [17]

Explanation:

a) when zinc burnt in oxygen.

2Zn + O2 -----∆-----> 2ZnO(black residue)

b) when carbon burnt in oxygen.

C+O2----∆---> CO2.

c) when sulphur burnt in oxygen.

S+O2-----∆-----> SO2.

d) when Calcium burnt in oxygen.

2Ca+O2-----∆-----> 2CaO(black residue)

e) when Magnesium burnt in oxygen.

2Mg+O2-----∆----> 2MgO.

f) when sodium burnt in oxygen.

4Na+O2----∆-----> 2Na2O.

hope all these reactions help you.

4 0
3 years ago
Blackmail threat of informational disclosure is an example of which threat category?
Rashid [163]

Answer:

Information Extortion.

Explanation:

Computer oriented crime also known as cyber crime that intentionally harm the victims. The complete data of the company or net banking information can be hacked easily by the cyber crime.

Different category of the threats are included in the cyber crime. The information extortion threat is the crime in which the hackers hack complete information and control the data of the victim. The criminal an black mail the victim regarding the hacked data.

Thus, the correct answer is information extortion.

6 0
3 years ago
Other questions:
  • using what you know about electron configurations explain the notion that elements in the same column in the periodic table have
    11·1 answer
  • Alpha decay _____ of an element.
    13·1 answer
  • Help please help help
    14·1 answer
  • How do scientsts determine is a newly found thing is dead or alive.
    9·1 answer
  • How many total atoms are in 0.920 g of P2O5?
    10·2 answers
  • 1. Draw a wave with a longer wavelength and the same amplitude as the wave shown. Then draw a second wave with a larger amplitud
    7·2 answers
  • A student is doing an experiment that stoichiometry says should produce 34.6 grams of product. The student actually makes 25.2 g
    9·1 answer
  • NEED QUICK
    13·2 answers
  • Present in a state where it molecules are far apart during a change of state it's molecules slow down which change of state has
    15·1 answer
  • how many moles are in 24.5g of sodium chloride? (please show work and in appropriate number of sig figs)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!