Redox/Oxidation lab with Metals and Halogens So basically we were testing different reactions and observing changes....

Redox/Oxidation lab with Metals and Halogens

So basically we were testing different reactions and observing changes. I want to know if my data has the "right" reactions, as the supplies used in the chemistry lab were contaminated a LOT by people who used pipettes wrong. So now I'm confused.

Part A:

Each tube had 1 mL of 6M HCl. Different pieces of metal were added in each tube. Here are my results:

Tube Metal Reaction
1 Mg bubbling
2 Fe none
3 Cu heat/steam
4 Zn bubbly
5 Sn steam (?)

Part B:

Each tube had 1 mL of a designated solution and then various metals added to them (separately)

Solution Reaction
Zinc Copper Iron Magnesium Tin
AgNO3 Foggy black none dissolved dissolved
Cu(SO4) None none red dissolved none
FeSO4 orange? none none fizzy(?) none
SnCl2 foggy? none none dissolved none
Zn(NO3)2 None none none none none

Part C:

1 mL of cyclohexane and a few mL of the element-saturated water were added to different tubes. Observing color on top and on bottom (they separated)

Br2 Cl2 I2
cyclohexane layer (top) violet clear violet
water layer (bottom) red clear red

Then comparing that with testing them with different stuff...

Part D:

1 mL of NaBr, NaI or NaCl was added to various tubes of 1 mL of either bromine, chlorine or iodine saturated water. Colors were observed as top color/bottom color:

NaBr NaCl NaI
Br2 N/A violet/red violet/red
Cl2 clear/clear N/A pink/yellow
I2 violet/red/orange violet/orange N/A

Then we're supposed to write net ionic equations for every reaction in the experiment. no idea how to do that so an example would be nice. Then we're supposed to devise an activity series of the metals (plus hydrogen) listed in order of decreasing activity.

For the halogens we're supposed to do an activity series in order of decreasing strength as oxidizing agents.

I know it's a lot to ask, but I just basically want someone who knows chemistry really well to tell me the proper reactions for this, I'm having trouble finding it online but i'll continue to search.

Thanks

In: Chemistry

CORAL LANGUAGE ONLY Write a function DrivingCost with parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the...

CORAL LANGUAGE ONLY

Write a function DrivingCost with parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar cost to drive those miles. All items are of type float.

Ex: If the function is called with 50 20.0 3.1599, the function returns 7.89975.

Define that function in a program whose inputs are the car's miles/gallon and the gas dollars/gallon (both floats). Output the gas cost for 10 miles, 50 miles, and 400 miles, by calling your DrivingCost function three times.

Ex: If the input is 20.0 3.1599, the output is:

1.57995 7.89975 63.198

Note: Small expression differences can yield small floating-point output differences due to computer rounding. Ex: (a + b)/3.0 is the same as a/3.0 + b/3.0 but output may differ slightly. Because our system tests programs by comparing output, please obey the following when writing your expression for this problem. In the DrivingCost function, use the variables in the following order to calculate the cost: drivenMiles, milesPerGallon, dollarsPerGallon.

In: Computer Science

do you believe, as bonilla-silva does, that convert forms of racism are widespread? why or why...

do you believe, as bonilla-silva does, that convert forms of racism are widespread? why or why not?

In: Psychology

A bicycle wheel has a diameter of 63.9 cm and a mass of 1.86 kg. Assume...

A bicycle wheel has a diameter of 63.9 cm and a mass of 1.86 kg. Assume that the wheel is a hoop with all of the mass concentrated on the outside radius. The bicycle is placed on a stationary stand and a resistive force of 123 N is applied tangent to the rim of the tire. (a) What force must be applied by a chain passing over a 8.96 cm diameter sprocket if the wheel is to attain an acceleration of 4.42 rad/s2? (b) What force is required if the chain shifts to a 5.50 cm diameter sprocket?

In: Physics

Cane Company manufactures two products called Alpha and Beta that sell for $150 and $110, respectively....

Cane Company manufactures two products called Alpha and Beta that sell for $150 and $110, respectively. Each product uses only one type of raw material that costs $5 per pound. The company has the capacity to annually produce 108,000 units of each product. Its average cost per unit for each product at this level of activity are given below:

Alpha Beta
Direct materials $ 30 $ 15
Direct labor 26 22
Variable manufacturing overhead 13 11
Traceable fixed manufacturing overhead 22 24
Variable selling expenses 18 14
Common fixed expenses 21 16
Total cost per unit $ 130 $ 102

The company considers its traceable fixed manufacturing overhead to be avoidable, whereas its common fixed expenses are unavoidable and have been allocated to products based on sales dollars.

Required:

1. What is the total amount of traceable fixed manufacturing overhead for each of the two products?

2. What is the company’s total amount of common fixed expenses?

3. Assume that Cane expects to produce and sell 86,000 Alphas during the current year. One of Cane's sales representatives has found a new customer who is willing to buy 16,000 additional Alphas for a price of $104 per unit. What is the financial advantage (disadvantage) of accepting the new customer's order?

5. Assume that Cane expects to produce and sell 101,000 Alphas during the current year. One of Cane's sales representatives has found a new customer who is willing to buy 16,000 additional Alphas for a price of $104 per unit; however pursuing this opportunity will decrease Alpha sales to regular customers by 9,000 units.

a. What is the financial advantage (disadvantage) of accepting the new customer’s order?

b. Based on your calculations above should the special order be accepted?

In: Accounting

What’s the cost of each component of capital and which need to be adjusted? What do...

  1. What’s the cost of each component of capital and which need to be adjusted?
    • What do the IRR and NPV tell us?
    • what it means for a stock to be in equilibrium?
    • what is a callable bond, when will a bond be called and how that helps/hurts an investor?

In: Finance

Answer the following questions 1) How does ASC 606 — Revenue From Contracts With Customers(new standard...

Answer the following questions

1) How does ASC 606 — Revenue From Contracts With Customers(new standard for revenue recognition) impact on debt to equity ratio and current ratio. Please explain in detail.

2)Provide why the following statement is false.Provide proper explanation

"Comparability across companies will be enhanced since ASC 606 provides clear rules, by industry, for when and how to recognise revenue"

In: Accounting

Project 7-6: Sales Tax Calculator Create a program that uses a separate module to calculate sales...

Project 7-6: Sales Tax Calculator

Create a program that uses a separate module to calculate sales tax and total after tax.

Create a c++ program using console.h and console.cpp files that uses a separate module to calculate sales tax and total after tax.

Console

Sales Tax Calculator

ENTER ITEMS (ENTER 0 TO END)

Cost of item: 35.99

Cost of item: 27.50

Cost of item: 19.59

Cost of item: 0

Total:           83.08

Sales tax:        4.98

Total after tax: 88.06

Again? (y/n): y

ENTER ITEMS (ENTER 0 TO END)

Cost of item: 152.50

Cost of item: 59.80

Cost of item: 0

Total:           212.30

Sales tax:        12.74

Total after tax: 225.04

Again? (y/n): n

Thanks, bye!

Specifications

  • The program should only accept numbers that are greater than 0.
  • Use the console.h and console.cpp files described in chapter 7 to validate user entries. That way, the user can’t crash the program by entering invalid data.
  • The sales tax rate should be 6% of the total.
  • Use a header file to declare two functions. One should accept the total of the items and return the tax amount. The other should accept the total of the items and return the total after tax has been added.
  • Use the implementation file for this header file to store the sales tax rate and the definitions for these two functions. These functions should round the results to two decimal places.
  • The output should display all monetary values with 2 decimal places.
  • The output should right align the numbers in the second column. This makes it easier to check whether the calculations are correct.

been added. • Use the implementation file for this header file to store the sales tax rate and the definitions for these two functions. These functions should round the results to two decimal places. • The output should display all monetary values with 2 decimal places. • The output should right align the numbers in the second column. This makes it easier to check whether the calculations are correct.

In: Computer Science

On June 30, Sharper Corporation’s stockholders' equity section of its balance sheet appears as follows before...

On June 30, Sharper Corporation’s stockholders' equity section of its balance sheet appears as follows before any stock dividend or split. Sharper declares and immediately distributes a 50% stock dividend.

Common stock—$10 par value, 120,000 shares authorized, 90,000 shares issued and outstanding $ 900,000
Paid-in capital in excess of par value, common stock 400,000
Retained earnings 760,000
Total stockholders’ equity $ 2,060,000

(1) Prepare the updated stockholders' equity section after the distribution is made.
(2) Compute the number of shares outstanding after the distribution is made.

In: Accounting

In this journal you are asked to take the role of a mayor or congressional representative...

In this journal you are asked to take the role of a mayor or congressional representative with a mandate to reduce energy consumption. You should describe ways in which government policy can encourage people to reduce energy consumption. Examples might include improving public transportation, instituting a tax , or providing a subsidy. For example. the city might build a subway system or institute a carpooling initiative. You should describe the feasibility of the initiative.

In: Other

Answer correctly the below 25 multiple questions on Software Development Security. Please I will appreciate the...

Answer correctly the below 25 multiple questions on Software Development Security. Please I will appreciate the Correct Answer ONLY

1. Which of the following correctly best describes an object-oriented database?

  1. When an application queries for data, it receives both the data and the procedure.
  2. It is structured similarly to a mesh network for redundancy and fast data retrieval.
  3. Subjects must have knowledge of the well-defined access path in order to access data.
  4. The relationships between data entities provide the framework for organizing data.

2. Fred has been told he needs to test a component of the new content management application under development to validate its data structure, logic, and boundary conditions. What type of testing should he carry out?

  1. Acceptance testing
  2. Regression testing
  3. Integration testing
  4. Unit testing

3. Which of the following is the best description of a component-based system development method?

  1. Components periodically revisit previous stages to update and verify design requirements
  2. Minimizes the use of arbitrary transfer control statements between components
  3. Uses independent and standardized modules that are assembled into serviceable programs
  4. Implemented in module-based scenarios requiring rapid adaptations to changing client requirements

4. There are many types of viruses that hackers can use to damage systems. Which of the following is not a correct description of a polymorphic virus?

  1. Intercepts antimalware's call to the operating system for file and system information
  2. Varies the sequence of its instructions using noise, a mutation engine, or random-number generator
  3. Can use different encryption schemes requiring different decryption routines
  4. Produces multiple varied copies of itself

5. Which of the following best describes the role of the Java Virtual Machine in the execution of Java applets?

  1. Converts the source code into bytecode and blocks the sandbox
  2. Converts the bytecode into machine-level code
  3. Operates only on specific processors within specific operating systems
  4. Develops the applets, which run in a user's browser

6. What type of database software integrity service guarantees that tuples are uniquely identified by primary key values?

  1. Concurrent integrity
  2. Referential integrity
  3. Entity integrity
  4. Semantic integrity

7. In computer programming, cohesion and coupling are used to describe modules of code. Which of the following is a favorable combination of cohesion and coupling?

  1. Low cohesion, low coupling
  2. High cohesion, high coupling
  3. Low cohesion, high coupling
  4. High cohesion, low coupling

8. Which of the following statements does not correctly describe SOAP and Remote Procedure Calls?

  1. SOAP was designed to overcome the compatibility and security issues associated with Remote Procedure Calls.
  2. Both SOAP and Remote Procedure Calls were created to enable application-layer communication.
  3. SOAP enables the use of Remote Procedure Calls for information exchange between applications over the Internet.
  4. HTTP was not designed to work with Remote Procedure Calls, but SOAP was designed to work with HTTP.

9. Which of the following is a correct description of the pros and cons associated with third-generation programming languages?

  1. The use of heuristics reduced programming effort, but the amount of manual coding for a specific task is usually more than the preceding generation.
  2. The use of syntax similar to human language reduced development time, but the language is resource intensive.
  3. The use of binary was extremely time consuming but resulted in fewer errors.
  4. The use of symbols reduced programming time, but the language required knowledge of machine architecture.

10. It can be very challenging for programmers to know what types of security should be built into the software that they create. The amount of vulnerabilities, threats, and risks involved with software development can seem endless. Which of the following describes the best first step for developers to take to identify the security controls that should be coded into a software project?

  1. Penetration testing
  2. Regression testing
  3. Threat modeling
  4. Attack surface analysis

11. Mary is creating malicious code that will steal a user's cookies by modifying the original client-side Java script. What type of cross-site scripting vulnerability is she exploiting?

  1. Second order
  2. DOM-based
  3. Persistent
  4. Nonpersistent

12. Of the following steps that describe the development of a botnet, which best describes the step that comes first?

  1. Infected server sends attack commands to the botnet.
  2. Spammer pays a hacker for use of a botnet.
  3. Controller server instructs infected systems to send spam to mail servers.
  4. Malicious code is sent out that has bot software as its payload.

13. Which of the following antimalware detection methods is the most recent to the industry and monitors suspicious code as it executes within the operating system?

  1. Behavior blocking
  2. Fingerprint detection
  3. Signature-based detection
  4. Heuristic detection

14. Which of the following describes object-oriented programming deferred commitment?

  1. Autonomous objects, which cooperate through exchanges of messages
  2. The internal components of an object can be refined without changing other parts of the system
  3. Object-oriented analysis, design, and modeling maps to business needs and solutions
  4. Other programs using same objects

15. __________________ provides a machine-readable description of the specific operations provided by a specific web service. ________________ provides a method for web services to be registered by service providers and located by service consumers.

  1. Web Services Description Language; Universal Description, Discovery and Integration
  2. Universal Description, Discovery and Integration; Web Services Description Language
  3. Web Services Description Language; Simple Object Access Protocol
  4. Simple Object Access Protocol; Universal Description, Discovery and Integration

16. Sally has found out that software programmers in her company are making changes to software components and uploading them to the main software repository without following version control or documenting their changes. This is causing a lot of confusion and has caused several teams to use the older versions. Which of the following would be the best solution for this situation?

  1. Software change control management
  2. Software escrow
  3. Software configuration management
  4. Software configuration management escrow

17. The approach of employing an integrated product team (IPT) for software development is designed to achieve which of the following objectives?

  1. Developing and testing software with fewer security flaws
  2. Developing and testing software with fewer defective features
  3. Developing and testing software that will be most profitable
  4. Developing and testing software best suited to the deployment environment

18. Which are the best reasons why a code versioning system (CVS) is an important part of a development infrastructure?

  1. It can ensure that code modifications are made according to corporate policies.
  2. It will document who made which changes to ensure accountability.
  3. It will reduce the cost of the development infrastructure.
  4. It can provide control over unauthorized access to proprietary code.
  1. i, ii, iv
  2. iii
  3. iii, iv
  4. All of the above

19. What is generally the safest, most secure way to acquire software?

  1. From a reputable vendor of proprietary software, once tested in the deployment environment
  2. Downloading very popular open-source software that has been inspected for bugs by a large and active community
  3. Downloading either proprietary or open-source software, but fuzzing it in a lab environment prior to deployment
  4. Downloading open-source software and deploying it only after the code base has been verified by cryptographic checksum

20. Cross-site scripting (XSS) is an application security vulnerability usually found in web applications. What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information?

  1. Persistent XSS vulnerability
  2. Nonpersistent XSS vulnerability
  3. Second-order vulnerability
  4. DOM-based vulnerability

21. Widgets, Inc.'s software development processes are documented, and the organization is capable of producing its own standard of software processes. Which of the following Capability Maturity Model Integration levels best describes Widgets, Inc.?

  1. Initial
  2. Repeatable
  3. Defined
  4. Managed

In: Computer Science

1. The activation energy of a certain reaction is 41.5kJ/mol . At 20 ?C , the...

1. The activation energy of a certain reaction is 41.5kJ/mol . At 20 ?C , the rate constant is 0.0110s?1. At what temperature in degrees Celsius would this reaction go twice as fast?

2. Given that the initial rate constant is 0.0110s?1 at an initial temperature of 20?C , what would the rate constant be at a temperature of 180?C for the same reaction described in Part 1?

In: Chemistry

Give TWO pieces of evidence that you've successfully made methyl salicylate. Remember when you cite TLC...

Give TWO pieces of evidence that you've successfully made methyl salicylate. Remember when you cite TLC data, you must refer to their spots by their Rf values.

In: Chemistry

Describe briefly the evolution of Craniata and Vertebrata.

Describe briefly the evolution of Craniata and Vertebrata.

In: Biology

How many grams are in a 0.10 mol sample of ethyl alcohol?

How many grams are in a 0.10 mol sample of ethyl alcohol?

In: Chemistry