answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
2 years ago
15

The molecule 2,2-diisopropylheptane is incorrectly named. what is the correct name?

Computers and Technology
1 answer:
pentagon [3]2 years ago
5 0
Isopropyl is: CH3 - CH - CH3
                                |

Heptane is: CH3 - CH2 - CH2 - CH2 - CH2 - CH2 - CH3

Then 2,2 isopropyl heptane is:

CH3 - CH - CH3
           |
CH3 - C - CH2 - CH2 - CH2 - CH2 - CH3
           |
CH3 - CH - CH3.

There you can count that the longest carbon chain has 8 carbon atoms.
So the right name is of an octane.

I will rearrange the chain to show the 8 carbon chain in a row:

           CH3   CH3
           |          |
CH3 - CH -   C - CH2 - CH2 - CH2 - CH2 - CH3
                      |
           CH3 - CH - CH3

Now, you can see that the right name is 3 isopropyl - 2, 3 dimethyl octane




You might be interested in
Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive of
inn [45]

Answer:

The answer is viruses

Explanation:

Because it is a harmful software hidden inside another  and usually performs a harmful action, such as destroying data.

4 0
2 years ago
Why is it important to back up data on a computer before you burn-in test the cpu?
katen-ka-za [31]
A burn-in test is a test which is usually performed on a system or component by running it for a long time in order to bring out any errors or system failures etc. 
While doing it on CPU the data must be backed up as any kind of error or failure may result in the loss of data, at time systems can be repaired to retrieve data but still there is no guarantee, backing up is the best option.
5 0
1 year ago
Use Excel to develop a regression model for the Consumer Food Database (using the "Excel Databases.xls" file on Blackboard) to p
m_a_m_a [10]

Answer:

Step 1 : Create an Indicator Variable for metro cities using formula mentioned in formula bar.

Step 2: Filter the Data on Metro cities i.e. select only those cities with Metro Indicator 1.

Step 3: Paste this filtered data to a new sheet.

Step 4: Go to Data - Data Analysis - Regression

Step 5: Enter the range of Y-variable and X-variable as shown. Select Output range and click on residuals. It will give you Output Summary and the Predicted Values along with Residuals

Please see attachment

5 0
2 years ago
Which of the following statements regarding critical paths is true? a. On a specific project, there can be multiple critical pat
iVinArrow [24]

Answer:

Option a

Explanation:

The Critical Path Method is the arrangement of booked exercises that decides the term of the task. These planned exercises must be performed if the venture is to be viewed as a triumph.

Therefore, options b, c, d and e can't be true because:

b. Activities in the Critical Path Method has no or zero slack.

c. The duration of the critical path in CPM determined on the basis of the latest activity and the earliest initiation.

d. The CPM method schedules the activity of the longest duration.

7 0
2 years ago
6. Write pseudo code that will perform the following. a) Read in 5 separate numbers. b) Calculate the average of the five number
Alex

Answer:

Pseudo CODE

a)

n= Input “Enter 5 integer value”

b)

sum=0.0

For loop with i ranging from 0 - 5

Inside loop sum=n[i]+sum

Outside loop avg= sum/5

Print avg

c)

small=n[0] # assume the first number in the list is smallest

large= n[0] # assume the first number in the list is largest

For loop with i ranging from 0 - 5

Inside loop if n[i]<small #if any another number is smaller than small(variable)

Inside if Then small=n[i]

Inside loop if n[i]>large # if any another number is larger than large(variable)

Inside if then large=n[i]

Print small

Print large

d)

print avg

print small

print large

8 0
2 years ago
Other questions:
  • The alternative to encapsulating security protocol (esp) is _________.
    10·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • For any element in keysList with a value greater than 50, print the corresponding value in itemsList, followed by a space. Ex: I
    8·1 answer
  • You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
    9·1 answer
  • Two-dimensional array indexes are listed as
    8·1 answer
  • Write a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less
    10·2 answers
  • In Section 8.5.4, we described a situation in which we prevent deadlock by ensuring that all locks are acquired in a certain ord
    11·1 answer
  • Jen is trying to discover if a motor has failed windings. What sort of test can she do.
    6·1 answer
  • Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school s
    11·1 answer
  • Prompt
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!