what are two drawbacks to turning spanning tree off and having multiple paths through the layer 2 switch network? (choose two.)

Answers

Answer 1

The two drawbacks to turning spanning tree off and having multiple paths through the Layer 2 switch network are:1. Broadcast frames are transmitted indefinitely and 2. The MAC address table becomes unstable

1. Broadcast frames are transmitted indefinitely: Without spanning tree, broadcast frames will continue to circulate endlessly through the network, leading to congestion and performance issues.

2. The MAC address table becomes unstable: With multiple paths, there is a risk of MAC address table instability. This is because the switch may receive frames from different paths that contain the same source MAC address. As a result, the switch may be unable to determine the correct forwarding port, leading to incorrect forwarding and network loops.

Learn more about  Spanning Tree Protocol.:https://brainly.com/question/31673821

#SPJ11

Your question is incomplete but probably the full question is:

What are two drawbacks to turning spanning tree off and having multiple paths through the Layer 2 switch network? (Choose two.)

The switch acts like a hub.

Port security becomes unstable.

The MAC address table becomes unstable.

Broadcast frames are transmitted indefinitely.

Port security shuts down all of the ports that have attached devices.


Related Questions

Phone directory applications using doubly linked list make a c++ prgram which perform all operations in it

Answers

A C++ program that implements a phone directory using a doubly linked list. The program allows you to perform operations such as adding a contact, deleting a contact, searching for a contact, and displaying the entire phone directory.

```cpp

#include <iostream>

#include <string>

using namespace std;

// Structure for a contact

struct Contact {

   string name;

   string phoneNumber;

   Contact* prev;

   Contact* next;

};

// Class for the phone directory

class PhoneDirectory {

private:

   Contact* head; // Pointer to the head of the list

public:

   PhoneDirectory() {

       head = nullptr;

   }

   // Function to add a contact to the phone directory

   void addContact(string name, string phoneNumber) {

       Contact* newContact = new Contact;

       newContact->name = name;

       newContact->phoneNumber = phoneNumber;

       newContact->prev = nullptr;

       newContact->next = nullptr;

       if (head == nullptr) {

           head = newContact;

       } else {

           Contact* temp = head;

           while (temp->next != nullptr) {

               temp = temp->next;

           }

           temp->next = newContact;

           newContact->prev = temp;

       }

       cout << "Contact added successfully!" << endl;

   }

   // Function to delete a contact from the phone directory

   void deleteContact(string name) {

       if (head == nullptr) {

           cout << "Phone directory is empty!" << endl;

           return;

       }

       Contact* temp = head;

       while (temp != nullptr) {

           if (temp->name == name) {

               if (temp == head) {

                   head = head->next;

                   if (head != nullptr) {

                       head->prev = nullptr;

                   }

               } else {

                   temp->prev->next = temp->next;

                   if (temp->next != nullptr) {

                       temp->next->prev = temp->prev;

                   }

               }

               delete temp;

               cout << "Contact deleted successfully!" << endl;

               return;

           }

           temp = temp->next;

       }

       cout << "Contact not found!" << endl;

   }

   // Function to search for a contact in the phone directory

   void searchContact(string name) {

       if (head == nullptr) {

           cout << "Phone directory is empty!" << endl;

           return;

       }

       Contact* temp = head;

       while (temp != nullptr) {

           if (temp->name == name) {

               cout << "Name: " << temp->name << endl;

               cout << "Phone Number: " << temp->phoneNumber << endl;

               return;

           }

           temp = temp->next;

       }

       cout << "Contact not found!" << endl;

   }

   // Function to display the entire phone directory

   void displayDirectory() {

       if (head == nullptr) {

           cout << "Phone directory is empty!" << endl;

           return;

       }

       Contact* temp = head;

       while (temp != nullptr) {

           cout << "Name: " << temp->name << endl;

           cout << "Phone Number: " << temp->phoneNumber << endl;

           cout << "------------------------" << endl;

           temp = temp->next;

       }

   }

};

int main() {

   PhoneDirectory directory;

   // Example usage

   directory.addContact("John Doe", "1234567890");

   directory.addContact("Jane Smith", "9876543210");

   directory.addContact("Alice Johnson", "5678901234");

   directory.displayDirectory();

   directory.searchContact("Jane Smith");

   directory.searchContact("Bob

Learn more about C++ program here:

https://brainly.com/question/30905580

#SPJ11

How are comments in a Java program treated by the compiler?


A) They are converted.

B) They are interpreted.

C) They are ignored.

D) They are coded.

Answers

Answer:

D) They are coded.

Explanation:

Java comments are notes in a Java code file that are ignored by the compiler and runtime engine. They are used to annotate the code in order to clarify its design and purpose. You can add an unlimited number of comments to a Java file, but there are some "best practices" to follow when using comments.

The answer is they are codee

which of the following combinations of keys is used as a short for saving a document on a computer

Answers

ctrl+s  

is used to save

Hope this helped

-scav

a router on the border of your network detects a packet with a source address from an internal client, but the packet was received on the internet-facing interface. which attack form is this an example of?

Answers

Attack form is this an example of spoofing.

What is Spoofing?

A common spoofing scenario occurs when an email is sent from a spoofed sender address and the recipient is asked to provide confidential information. Recipients are typically asked to click a link to log into their account and update their personal and financial information. Spoofing is a cybercrime that occurs when someone pretends to be a trusted contact or brand to gain access to sensitive personal information while impersonating a trusted person. Spoofing attacks copy identity, the appearance of a name brand, or the address of a trusted website.

Learn more about spoofing: https://brainly.com/question/23021587

#SPJ4

Which Excel IF function is not in the correct syntax?


= IF(A4<=250, 1, (IF(A4>250, 2, "MidPoint")))


= IF(B18=1, A18, 500-A18)


= IF(B18, A18, 500-A18)


= IF(A4<=250, 1, (IF(A4>250, 2, D5)))

Answers

The Excel IF function which is not in the correct syntax is: = IF(A4<=250, 1, (IF(A4>250, 2, D5))).

What is Microsoft Excel?

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., for analyzing and displaying spreadsheet documents by using rows and columns in a tabulated format.

The types of function in MS Excel.

In Microsoft Excel, there are different types of functions that are called predefined formulas and these include the following:

Average functionMinimum functionSum functionMaximum functionCount functionIF function

In this scenario, the Excel IF function which is not in the correct syntax is: = IF(A4<=250, 1, (IF(A4>250, 2, D5))) because A4 is referencing two different inequalities (values).

Read more on Excel formula here: brainly.com/question/26053797

#SPJ1

Similarities between master file and reference file

Answers

Explanation:

What is a master file?

A collection of records pertaining to one of the main subjects of an information system, such as customers, employees, products and vendors.

What is a reference file?

A reference file is a type of overlay

what characteristics do the 10.0.0.1/24, 172.16.0.2/24, and 192.168.0.3/24 ip addresses have in common? select three.

Answers

All use the same subnet mask of /24, which means they are part of a Class C network and have 24 bits of the IP address reserved for the network address.

The three IP addresses 10.0.0.1/24, 172.16.0.2/24, and 192.168.0.3/24 have the following characteristics in common:

They all use the same subnet mask of /24, which means they are part of a Class C network and have 24 bits of the IP address reserved for the network address.They are all private IP addresses, which means they are not routable on the public internet and are intended for use in private networks.They are all part of different IP address ranges reserved for private networks. The IP address 10.0.0.1/24 is part of the 10.0.0.0/8 range, the IP address 172.16.0.2/24 is part of the 172.16.0.0/12 range, and the IP address 192.168.0.3/24 is part of the 192.168.0.0/16 range.The private IP addresses, all class C IP addresses and all of them use a subnet mask of /24.

Learn more about IP addresses visit:

https://brainly.com/question/31026862

#SPJ11

When heating a substance a phrase change will start to occur when the kinetic energy of the particles is blink the attractive forces between the particles

Answers

Answer:

great enough to overcome.

Explanation:

Kinetic energy can be defined as an energy possessed by an object or body due to its motion.

Mathematically, kinetic energy is given by the formula;

Where, K.E represents kinetic energy measured in Joules.

M represents mass measured in kilograms.

V represents velocity measured in metres per seconds square.

A conductor can be defined as any material or object that allows the free flow of current or electrons (charge) in one or more directions in an electrical circuit. Some examples of a conductor are metals, copper, aluminum, graphite, etc.

When heating a substance, a phase change will start to occur when the kinetic energy of the particles is great enough to overcome the attractive forces between the particles.

Basically, the phase change includes solid, liquid and gas.

Dividends represent: Group of answer choices Resources of the company. Expenses of operating the company. Cash payments to stockholders. Amounts owed to creditors.

Answers

Dividends represent cash payments to stockholders. These are distributions of profits made by a company to its shareholders as a return on their investment.

They are usually paid out of the company's earnings and are a way for the company to share its financial success with its shareholders. Dividends are typically declared by the company's board of directors and can be paid regularly (such as quarterly or annually) or as a one-time special dividend. They are an important factor for investors considering the potential returns from holding a company's stock, and they can provide additional income to shareholders beyond any capital gains they may receive from selling their shares.

In summary, dividends are cash payments made by a company to its stockholders, representing a portion of the company's profits. These payments serve as a way to distribute financial rewards to shareholders and are an important consideration for investors looking for income from their investments.

Learn more about stockholders here:

https://brainly.com/question/18523103

#SPJ11

write a progam to add to simple number and stores into an array and finds their sum and average​

Answers

Here's a Java program that prompts the user to input two numbers, stores them in an array, calculates their sum and average, and outputs the results:

import java.util.Scanner;

public class AddNumbers {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       // Prompt the user to input two numbers

       System.out.print("Enter the first number: ");

       double num1 = input.nextDouble();

       System.out.print("Enter the second number: ");

       double num2 = input.nextDouble();

       // Store the numbers in an array

       double[] nums = {num1, num2};

       // Calculate the sum and average

       double sum = nums[0] + nums[1];

       double avg = sum / 2;

       // Output the results

       System.out.println("The sum of " + nums[0] + " and " + nums[1] + " is " + sum);

       System.out.println("The average of " + nums[0] + " and " + nums[1] + " is " + avg);

   }

}

This program uses a Scanner object to read in two numbers from the user. It then stores the numbers in an array, calculates their sum and average, and outputs the results to the console using System.out.println().

Note that this program assumes that the user will input valid numbers (i.e., doubles). If the user inputs something else, such as a string or an integer, the program will throw a java.util.InputMismatchException. To handle this exception, you could wrap the input.nextDouble() calls in a try-catch block.

Before a newly purchased software package is ready for use, it should undergo integration, system, volume, and user acceptance _____.

Answers

Before a newly purchased software package is ready for use, it should undergo integration, system, volume, and user acceptance testing. This ensures that the software can be successfully integrated into the existing system, can handle the required volume of data, and meets the needs and expectations of its intended users.

Explanation:

Before a newly purchased software package is ready for use, it should undergo integration, system, volume, and user acceptance testing. User acceptance testing (UAT) is carried out to ensure that the software package meets the end-users' requirements and expectations. This phase involves testing the software package in a real-world environment by end-users to identify any issues that were not identified during the previous phases. UAT helps ensure that the software package is user-friendly, intuitive, and meets the organization's business requirements.

In summary, integration, system, volume, and user acceptance testing are essential phases in ensuring that a newly purchased software package is ready for use. These testing phases help identify and resolve any issues with the software package before deployment, resulting in a smoother and more successful implementation.

To know more about User acceptance testing (UAT)  click here:

https://brainly.com/question/30641371

#SPJ11

Question #1
Multiple Select
Before you write a computer program, what can you use for planning? Select 2 options.
O pseudochart
O pseudocode
flowplan
flowcode
flowchart

Answers

Answer:

Pseudocode and flowchart.

Explanation:

I just got it correct.

the ote output instruction is . question 9 options: a) a retentive type output b) assigned either the (-(u)-) or the (-(l)-) output symbols c) not reset to a false state when the rung link to the left is false d) true (activated) if the rung link to the left is true

Answers

The OTE output instruction is true (activated) if the rung link to the left is true.

What is an OTE instruction?

An OTE instruction stands for Output Enable (OTE). The instruction turns on an output and holds it on for as long as a condition or rung is true. If the condition or rung is false, the output will turn off. The OTE instruction comes in two forms, normally open (NO) and normally closed (NC). The NO output symbol is the same as the output symbol in a contact instruction, whereas the NC symbol has a horizontal line drawn through it. The OTE output instruction can be assigned either the (-(u)-) or the (-(l)-) output symbols. Hence, option (b) is correct.

The OTE instruction is activated (turned on) if the rung link to the left is true. It is not reset to a false state when the rung link to the left is false. Therefore, option (d) is correct.

Learn more about output: https://brainly.com/question/27646651

#SPJ11

Which of the below would provide information using data-collection technology?

Buying a new shirt on an e-commerce site
Visiting a local art museum
Attending your friend's baseball game
Taking photos for the school's yearbook

Answers

The statement that would provide the information through the utilization of data-collection technology is as follows:

Buying a new shirt on an e-commerce site.

Thus, the correct option for this question is A.

What is meant by Data-collection technology?

Data-collection technology may be defined as a type of technology that significantly deals with the process of collecting data for use in business decision-making, strategic planning, research, and other purposes.

According to the context of this question, visiting a local art museum represents the collection of information in real form, while buying a new shirt on an e-commerce site is the collection of data and information in virtual form.

Other options like attending your friend's baseball game and taking photos for the school's yearbook do not involve any sort of technology based on data collection.

Therefore, the correct option for this question is A.

To learn more about Data collection technology, refer to the link:

https://brainly.com/question/25633523

#SPJ1

In the game Badland, how do you get to the next level?

A.
If you get close enough to the exit pipe, it sucks you up and spits you out in the next level.
B.
If you shoot enough enemies, you automatically advance to the next level.
C.
If you reach the end of the maze, you hear the sound of a bell and are taken to the next level.
D.
If you answer enough puzzles correctly, you advance to the next level.

Answers

In the game Badland, the  way a person get to the next level is option C: If you reach the end of the maze, you hear the sound of a bell and are taken to the next level.

What is the story of BADLAND game?

The story occurs throughout the span of two distinct days, at various times during each day's dawn, noon, dusk, and night. Giant egg-shaped robots start to emerge from the water and background and take over the forest as your character is soaring through this already quite scary environment.

Over 30 million people have played the side-scrolling action-adventure game BADLAND, which has won numerous awards. The physics-based gameplay in BADLAND has been hailed for being novel, as have the game's cunningly inventive stages and breathtakingly moody sounds and visuals.

Therefore, in playing this game, the player's controller in Badland is a mobile device's touchscreen. The player's Clone will be raised aloft and briefly become airborne by tapping anywhere on the screen.ult for In the game Badland, the way a person get to the next level.

Learn more about game from

https://brainly.com/question/908343
#SPJ1

Within a major students can choose to study a specific area within major. For example a journalism student may study military journalism or business journalism the specific area is called

Answers

Answer:

Specialization

Hope this helps!

Answer:

Specialization

Explanation:

what is excel in ibca

Answers

Answer:

Excel is mostly used for data storage. It also more or less has its own programming language within it for automation of data transfer and storage. It's used in a grid layout or what you'd see as a sheet.

I have taken IBCA (Intro to Business Computer Applications) but I'm surprised that you're taking excel in IBCA, perhaps just the basics I'm assuming. Completing IBCA should get you Microsoft certifications in Word and BCA will get you certifications in Powerpoint and Excel. If you pass of course.

What is the encoding technique called that is used to store negative numbers in the computer's memory

Answers

Answer:

The following “ encoding techniques “ can be used to “ store negative numbers in a computers memory: “ “ Signed magnitude representation (SMR).

Explanation:

hope it helps.!!

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

Do you ever wonder what types of media you will be using five years from now or when you graduate from college or a training program? How do you believe you will use digital media in your life?
You will include: a concept map showing your future uses for digital media (at least five) an explanation of each use a description of the use

Answers

Digital life is here to stay. The internet is use every single second of the day. We need our digital life today because during a pandemic we need online services such as for school and emergency services. We will always use the internet every day for the rest of our life.

45 points pls help


_______ refers to achieving synchronization of similar elements in a design.

45 points pls help_______ refers to achieving synchronization of similar elements in a design.

Answers

Harmony

Explanation:

Harmony is the unity of all the visual elements in a composition. It is often achieved through the use of repetition and simplicity. A principle of design that refers to a way of combining elements in involved ways to achieve intricate and complex relationships.

hope it helps you...

Chapter
2
SAFETY GUIDELINES
OBJECTIVES
1. Which of the following is a safety device?
(a) dashboard (b) steering wheel (c) seat
(d) seatbelt​

Answers

Answer:

Seatbelt

Explanation:

The seatbelt allows everyone in the car to remain safe and steady going at certain high miles per hour. None of the other options were made for safety only. Please name brainliest!!!

If you want to apply a rotation to a shape, which of the following motions
should you select from the Add Animation drop-down menu?

1. Wave

2. Wheel

3. Teeter

4. Spin

Help asap

Answers

Answer:

spin

Explanation:

hope this helps

Which technology is used as a demarcation point for fiber optics?

Answers

The technology used as a demarcation point for fiber optics is the Optical Network Terminal (ONT). The ONT is a device that converts the optical signal from the fiber optic cable into a format suitable for the customer's premises equipment, such as routers, computers, and telephones.

In fiber optic networks, the demarcation point is typically located at the point where the network provider's responsibility ends and the customer's responsibility begins. This demarcation point is often marked by a device called an optical network terminal (ONT) or optical line terminal (OLT). These devices serve as the interface between the fiber optic cable and the customer's network equipment, such as routers or modems. The ONT/OLT provides a physical demarcation point for troubleshooting and maintenance purposes, as well as a secure boundary between the provider's network and the customer's network.

Learn more about routers https://brainly.com/question/29869351

#SPJ11
 

What is the quickest way to change the format of a table?

Copy and paste the table into a new slide.
Use the Table option on the Insert tab of the ribbon.
Delete the table and recreate it using a preconfigured table type.
Use the Table Styles option on the Design tab of the Table Tools contextual tab.

Answers

Answer:

If you don't like the default table format, you can easily change it by selecting any of the inbuilt Table Styles on the Design tab. The Design tab is the starting point to work with Excel table styles. It appears under the Table Tools contextual tab, as soon as you click any cell within a table.

The format of the table can be changed with the selection of the design tab in the tool to format with the contextual tab.

How table tool design the table?

The design tab for the table helps in making the changes to the table with the change in the name, formatting, style and other characteristics of the table.

There has been the presence of the preconfigured table style in the Excel, and the quickest way to configure a table involves the development of the table with the contextual table tools in the design tab. Thus, option D is correct.

Learn more about table, here:

https://brainly.com/question/15858153

#SPJ2

a kernel is essentially free from race conditions when accessing kernel data structures (as only one process is active in the kernel at a time). a. preemptive b. macro c. micro d. nonpreemptive

Answers

In a nonpreemptive system, only one process is active in the kernel at a time, ensuring that no two processes simultaneously access and modify the same data structures.

So, the correct answer is D.

What's meant by kernel?

A kernel is the central part of an operating system that manages system resources and provides services to applications.

In a preemptive kernel, the kernel can be interrupted by higher priority processes, whereas in a nonpreemptive kernel, the kernel cannot be interrupted until it has finished its task.

A macro is a single instruction that expands into a sequence of instructions.

A micro is a small program or routine that performs a specific task.

In terms of the kernel being free from race conditions, this means that when accessing kernel data structures, only one process is active in the kernel at a time, ensuring that there are no conflicts or inconsistencies in the data.

This is an important feature for ensuring the stability and reliability of the operating system.

Learn more about kernel at

https://brainly.com/question/31084238

#SPJ11

the software that displays the resulting web pages is​

Answers

Answer:

web browser is the answer

Explanation:

The deliverable of the system _____________ phase is the set of technical system specification.

Answers

Answer:

the best answer is design

Anyone help me on this ?

Anyone help me on this ?

Answers

Answer:

The first one is Mobile Marketing Second Box is social media and the last is Search engine

Explanation:

Set the last data point (March Net Income) as a total. CIS 250 Practice 2-3: Excel Chapter 3 (2019v1)

Answers

Choose the cells that you want to turn into a table. Click Format as Table under the Styles group on the Home menu. Select the style you want to use by clicking it in the Table Styles gallery.

It is the true data generated from a measurement or investigation, and it can be displayed as a numerical data point, a statistical display, or a graph in a statistical or analytical context. A data point can simply be a number, word, or even actual object. The maximum and minimum values in the data set, the lower and upper quartiles, and the median make up a summary's five values. These values are shown collectively and in ascending order.

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

Other Questions
An investment of 1,500 is earning 7% interest each year how much investment will they make in one year A patient who has sustained a nondepressed skull fracture is admitted to the acute medical unit. Nursing care should include which of the following?A) Preparation for emergency craniotomyB) Watchful waiting and close monitoringC) Administration of inotropic drugsD) Fluid resuscitation help ASAP find the coordinates of the midpoint of the given segment given its endpoints are (-4,3) and (2,-1) What is the character trait in the blacksmith that Henry Wadsworth Longfellow focuses on in the first stanza of his poem, "The Village Blacksmith"? Longfellow focuses on the blacksmith's sense of humor. Longfellow focuses on the blacksmith's physical strength. Longfellow focuses on the blacksmith's bravery in battle. Longfellow focuses on the blacksmith's love of learning When you set something down on the ground, what kind of work are yourarms doing? Even though organizational behavior focuses on a small number of job attitudes, employees' satisfaction with their place of employment and its leadership has an impact on their loyalty. Match each example below to the job attitude category it best illustrates by dragging and dropping the example into the following table. Job Attitude Example Perceived organizational support Employees view work as an exchange rather than a moral obligation. Power distance Employees achieve higher levels of production because their jobs are interesting Employee engagement Management believes employees should be emotionally attached and not complain. Organizational commitment Employees believe the organization does not care about their cultural values. microsoft's bundling of personal computer operating systems with its web browser is an example of: group of answer choices none of the above environmental variables affected or changed by marketing activities environmental variables and changes in those variables over time, helping to determine the ultimate success or failure of marketing strategies an environmental force that can constrain other organization's ability to pursue certain marketing strategies or activities changes in the environment creating new marketing opportunities for an organization Which of the following problems can be most easily detected byreviewing the appropriateness of our client's year-end salescutoff?a. Substantial returns of merchandise sold on credit.b. Overestimat ASAP PLS1. In the stem of a plant that is bending toward the light, auxins are most concentrated in:1. the top surface of the leaves2. the bottom surface of the leaves3. the side of the stem facing the light4. the side of the stem away from the light2. Which organism has a distinct central nervous system?1. starfish2. jellyfish3. crayfish4. clam what is the administrative distance of internal bgp in a cisco network? A network administrator is analyzing the features that are supported by different first-hop router redundancy protocols. Which statement describes a feature that is associated with HSRP?HSRP uses active and standby routers.*HSRP is nonproprietary.It uses ICMP messages in order to assign the default gateway to hosts.It allows load balancing between a group of redundant routers. 6. what form of writing would an anthropologist need to understand to most be able to interpret written stories of mesopotamia? three main functions: neutralizing excess free radicals, shielding cells from their damaging effects, and helping to prevent disease Chik Chik Company showed the following balances at the end of its first year: Cash $ 6,000 Prepaid insurance 9,400 Accounts receivable 7,000 Accounts payable 5,600 Notes payable 8,400 Common stock 2,800 Dividends 1,400 Revenues 44,000 Expenses 35,000 What did Chik Chik Company show as total credits on its trial balance? The apparent reddening o flight from stars after its passage throught he interstellar medium is caused by? What is the percent composition of the following compounds?A sample is found to contain 40.7g of carbon, 12.3g of hydrogen, and 16.9g of oxygen.MgSO4What is the empirical formula for the following? (This is not a problem, just reduce the subscripts if possible)C12H22O11H2O2P4O10Calculate the empirical formula for the following compounds:75% C and 25% H40.92% C, 4.58% H, and 54.50% OCalculate the molecular formula for a compound with an empirical formula of CH2 and a molar mass of 70 g/mol.*Chapter 11:Balance the following equations.___ PbO2 ___ PbO + ___ O2___ Fe(OH)3 ___ Fe2O3 + ___ H2O___ (NH4)2CO3 ___ NH3 + ___ H2O + ___ CO2___ NaCl + ___ H2SO4 ___ Na2SO4 + ___ HCl___ C6H6 + ___ O2 ___ CO2 + ___ H2O___ Ca3P2 + ___ H2O ___ Ca(OH)2 + ___ PH3___ SrBr2 + ___ (NH4)2CO3 ___ SrCO3 + ___ NH4BrWrite the type of each reaction and predict the products. Be sure to balance the equation. (Hint: Zinc has a +2 charge.)___ Zn + ___ AgNO3 ___ Mg + ___ O2 ___ C2H6 + ___ O2 ___ H2C2O4 + ___ KOH ___ Ag2O *Chapter 12:What is conserved in a chemical reaction? (List 2)What unit should you think of when using coefficients?How many moles of oxygen are needed to make 14.7 moles of water?C2H4 + 3O2 2CO2 + 2H2OHow many moles of carbon dioxide are produced from 20.3 moles of C2H4?C2H4 + 3O2 2CO2 + 2H2OWhat are the 3 steps to a stoichiometry problem?What are the 3 conversion factors for a mole?How many grams of iodine are produced from 68.7L of carbon monoxide?I2O5 + 5CO 5CO2 + I2How many molecules of I2O5 are required to produce 3.41 mol of carbon dioxide?I2O5 + 5CO 5CO2 + I2If you start with 50g of copper (II) chloride and 50g of sodium nitrate, then how many moles of copper (II) nitrate will be produced? Identify the limiting and excess reagents.CuCl2 + 2NaNO3 Cu(NO3)2 + 2NaClA student reacts 1.3 mol of silver with 3.7 mol of sulfur, how many moles of silver (I) sulfide will be produced? Identify the limiting and excess reagents.2Ag + S Ag2SWhen 50g of chlorine reacts with potassium, 1.15 mol of potassium chloride is produced. What is the percent yield of the reaction?2K + Cl2 2KClWhen 275g of sodium chlorate decomposes, 80.11L of oxygen is produced. What is the percent yield of the reaction?2NaClO3 2NaCl + 3O2 which is a true statement? a. cash and cash equivalents are normally listed as a single cash amount on the balance sheet. b. cash and cash equivalents must be listed separately to obtain a line of credit. c. cash equivalents are listed separately from cash on the balance sheet. d. cash equivalents are listed under compensating balance on the balance sheet What is the name in a position called R 100 000 is deposited into an account now that pays interest at a rate of 9% p.a. so that an amount of money can be withdrawn from the account every six months in perpetuity starting one year from now. If it is decided to increase the value of the withdrawals, from the second withdrawal onwards, at a rate of 5% p.a., then the value of the first withdrawal (rounded to the nearest cent) made one year from now is equal to : Even when my back was turned to it, the idea of this strange face behind me, peering over my shoulder, was insufferable. how does the excerpt exemplify gothic fiction?