30
2071 Set D Q.No. 9 Write down the structure of secondary
haloalkane of C3H7X. What happen when the secondary
haloalkane is heated with Na in presence of dry ether? [1+1]
Identify the maior products A and B and
31​

Answers

Answer 1

Oeer is the only one that can make you want it and don't want you for a new thing or you want it for the sake reason it is a good time for


Related Questions

Secondary storage is also known as the ‘main memory’

Answers

Answer:

False

Explanation:

The main memory is called RAM (Random Access Memory). This is where all programs and variables in the computer live, and also it is the fastest storage.

Secondary storage would be your hard drive, USB, CD, floppy disk.

Part 2: East Pacific Ocean Profile Uncheck all of the boxes. Check the box next to the East Pacific Ocean Profile Line under the heading Profile lines. Then, double-click on the text for the East Pacifec Ocean Profile Line. This line goes from the Pacific Ocean to South America. Under the Edit menu and select 'Show Elevation Profile. Last, check the box next to Terrain in the preloaded Layers section. Position the mouse along the profile and the specific depth/elevation information is displayed. Use the mouse to pinpoint the location of sea-level near the South American coast. Question 5 Which is the MOST prominent feature in this profile? midiocean ridge deep ocran trench Question 6 Using the coloced lines displayed by the Present Plate Boundaries layer, what tyde of plate boundaries borders South Arverica? Gverent conversent transfonl Using figure 9.16 from your textbook, what three plates interact with this profile? North American Plate South American Plate African Plate Eurasian Plate Australian Plate Pacific Plate Cocos Plate Caribbean Plate Nazca Plate Filipino Plate: Scotia Plate Question B Tum on the USGS Earthquikes tyer - to view the data, be sure to be roomed in to an Eye At of 4000 kim or less. Describe the depth of eartheaskes that occur in the vicinity of the two plate boundaries are the earthuakes deep (300−800 km, intermedate (70−300kini and / or athallow (0-70 km)? ichoose all that apply'd dee(300−000in) intermedute 50.790 km that 10 io-rokes

Answers

The most prominent feature in the East Pacific Ocean Profile is the Mid-ocean ridge.Question 6The type of plate boundaries that borders South America are Transform plate boundaries.

The three plates that interact with the East Pacific Ocean Profile are the North American Plate, Pacific Plate, and South American Plate.

Question BThe depth of earthquakes that occur in the vicinity of the two plate boundaries are:Intermediate (70-300 km)Shallow (0-70 km)Therefore, the depth of earthquakes that occurs in the vicinity of the two plate boundaries are intermediate and shallow.

To know more about East Pacific Ocean visit:

brainly.com/question/33795142

#SPJ11


Need help! Brain list to anyone who responses quick.

Need help! Brain list to anyone who responses quick.

Answers

Detail loop tasks, also known as iterative tasks or repetitive tasks, serve the purpose of executing a specific set of instructions multiple times.

These tasks are designed to repeat a block of code or a series of actions until a certain condition is met or a specific number of iterations are completed.

The purpose of detail loop tasks can vary depending on the context and the specific requirements of the program or problem at hand. Some common purposes of detail loop tasks include:

Process large sets of data.Perform calculations or computations.Validate or filter data.Control program flow.User interaction and input handling.

Thus, the purpose of detail loop tasks is to automate repetitive operations, streamline data processing, control program flow, and handle user interactions efficiently.

For more details regarding data processing, visit:

https://brainly.com/question/30094947

#SPJ1

Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline. Remember that print() automatically adds a newline.

Answers

Answer:

In Python:

def print_popcorn_time(bag_ounces):

   if bag_ounces < 3:

       print("Too small")

   if bag_ounces > 10:

       print("Too large")

   else:

       print(str(6 * bag_ounces)+" seconds")

       

Explanation:

This defines the function

def print_popcorn_time(bag_ounces):

This checks if bag_ounces < 3

   if bag_ounces < 3:

If yes, it prints too small

       print("Too small")

This checks if bag_ounces > 10

   if bag_ounces > 10:

If yes, it prints too big

       print("Too large")

If otherwise,

   else:

Multiply bag_ounces by 6 and print the outcome

       print(str(6 * bag_ounces)+" seconds")

Answer:

Explanation:

def print_popcorn_time(bag_ounces):

  if bag_ounces < 3:

      print("Too small")

  elif bag_ounces > 10:

# Use of 'if' for this portion, will only yield a test aborted for secondary tests

      print("Too large")

  else:

      print(str(6 * bag_ounces)+" seconds")

user_ounces = int(input())

print_popcorn_time(user_ounces)

During which problem-solving and program design process is the divide-and-conquer approach used? *
a. flowcharting
b. problem definition
c. problem-partitioning
d. trace table construction

Answers

Answer:

Divide and Conquer is a recursive problem-solving approach which break a problem into smaller subproblems, recursively solve the subproblems, and finally combines the solutions to the subproblems to solve the original problem. This method usually allows us to reduce the time complexity to a large extent.

Explanation:

i dont actually know the answee my dad told me.

which popular programming language is well-known for executing its target programs on a virtual machine?

Answers

Answer: Java

Explanation: According to Quizlet it is.

Which statement supports the benefits of computer-aided design (CAD)?
Privacy is increased.
Designers do not have to be creative.
O Businesses have more control over their designers.
Time and materials are saved.

A. privacy is increased
B. designers do not have to be creative
C. businesses have more control over their designs
D. Time and materials are saved

Answers

Answer:

The correct statement that supports the benefits of computer-aided design (CAD) is "time and materials are saved."

Explanation:

CAD allows designers to create and modify designs quickly and easily using a computer, rather than having to create physical prototypes or drawings. This can significantly reduce the time and materials needed to create and revise designs, as changes can be made digitally rather than having to create new physical models or drawings.

Option A ("privacy is increased") is not a benefit of CAD.

Option B ("designers do not have to be creative") is incorrect because CAD does not replace the need for creativity and design skills.

Option C ("businesses have more control over their designs") is a potential benefit of CAD, but it is not the primary benefit of the technology.

Question 5 of 10
If you pay the balance of your credit card bill before the due date, how much
do you pay?
OA. The full amount that you owe
B. The minimum payment on your bill
C. The full amount you owe, plus a service fee
D. The full amount you owe, plus interest for the past month
SUBMIT

Answers

Answer:

b

explination.

By paying the credit card dues early, you will have an advantage over the others as the credit card issuer will report a lower balance to the credit bureaus. This will reflect in your credit report and you can have an edge over the others for a lower credit utilization ratio.

Presentation Priming Activity. Directions: Directions: Read the questions carefully. Write your answer on a separate sheet.
1. Share your personal insights about the word "Configuration".
2. How do you configure cellphone settings?
3. What are the things you consider in configuring your cellphone settings? Defend you answer?

pasagot plss. ​

Answers

Configuration  is the process of adjusting components or parameters of a device to meet desired behavior.

When configuring cellphone settings, the factors that come into consideration are:

a. Personal Preference

b. Usage and Functionality

c. Privacy and Security

What is Configuration?

Configuring software or technology involves personalizing settings to optimize functionality. Key to systems, software, hardware, networks & gadgets. Configs can range from simple to complex based on system flexibility.

To configure cellphone settings, access the settings menu for options and preferences adjustments. Steps may vary depending on the phone.

Learn more about  Configuration from

https://brainly.com/question/14114305

#SPJ4

what do raichle's default mode network and corbetta's ventral attentional network have in common?

Answers

Answer: voluntary deployment of attention and the reorientation to unexpected events

Explanation:

Raichle's Default Mode Network and Corbetta's Ventral Attentional Network both have in common that they are large-scale brain networks involved in cognitive processing and attentional functions.

They are both activated in the human brain when people are at rest and not involved in any specific task. The default mode network is involved in self-reflection, introspection, and mind-wandering. On the other hand, the ventral attentional network is responsible for detecting and reacting to sensory stimuli that have significant emotional, social, or motivational implications.

Both these networks have been associated with cognitive flexibility and creativity. They work together to coordinate human behavior and maintain a balance between internal and external stimuli.

Learn more about brain networks: https://brainly.com/question/29669975

#SPJ11

What is the function of WriteLine operation? (in small basic app)
1.to print each line of text on a same line
2. to print each line of text on a separate line
3. To show the text window
4. None of the above

Answers

Answer:

WriteLine ("If you just want a quick text, you can simply write it inside quotation marks.") TextWindow. WriteLine ("But, if you want a text, or value, to be repeated through the code, you may want a VARIABLE.")

TRUE/FALSE. among the considerations in evaluating an idps are the product's scalability, testing, support provisions, and ability to provide information on the source of attacks.

Answers

The statement, "Among the considerations in evaluating an IDPs are the product's scalability, testing, support provisions, and ability to provide information on the source of attacks" is True.

What are IDPs?

IDPs is a term that stands for Intrusion detection and prevention system. This package has the sole aim of storing and helping to manage the identities of users.

For the IDPs to be of the best standard, they must be scalable, be well tested to be sure that they are fool-proof, and they must also be able to support the provisions for which they are ideally made. Another important fact about IDPs is that they should lead to the origin of intrusion. So, the statement above is True.

Learn more about IDPs here:

https://brainly.com/question/28962475

#SPJ1

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

Marina requested a copy of her credit report in May 2019 and wants to request a second one in November 2019. What is true?

O She can; it is always free
She can, but she may have to pay for it
O She will not obtain it, a free copy can be requested every two years.
O She will not obtain it, the bureau sends it automatically once a year

Answers

Answer:

B. She can, but she may have to pay for it.

Explanation:

A credit report is a report that contains the credit history of an individual. A credit report is issued by Credit bureaus who have financial information of a person.

Credit bureaus issue one credit report for free every year. But if a person desires to issue a credit report more than once a year then he/she will have to pay a fee for it.

In the given scenario, Marina who has requested a copy of the credit report in May 2019, will have to pay a fee for a copy of the second credit report.

Therefore, option B is correct.

What is mainly the effect of the author mentioning the state of the union in the first line of the address?.

Answers

The author's reference of the status of the union in the first sentence of the message has the effect of "emphasizing the historic dimension of the catastrophe that transpired."

What is union?

A union is formed by workers who come together and utilize their collective strength to have a voice in the workplace. Workers can use their union to bargain with employers regarding salary, benefits, workplace health and safety, job training, and other work-related problems from a position of power. Unions have a significant role in the workplace. Their principal duties include acting as employee representatives in workplace issues and bargaining representatives during negotiations.

To know more about union,

https://brainly.com/question/749754?referrer=searchResults

#SPJ4

Can someone pls help me with this one?

Make three Flowcharts and complete them by hand for the three challenges below.


Challenge 1
Create a flowchart that takes two integer values from a user and evaluates and displays which one is the smallest value.

Challenge 2
Create a flowchart that asks the user to guess a random number populated by the program between 1 and 100. Use a logic flow arrow to create a loop that returns the user back into the program to continue guessing.

Challenge 3
Create a flowchart that asks the user for a number 10 separate times and adds all the numbers together. In the end, have the program display the sum.

Answers

Using the knowledge in computational language in python it is possible to write a code that Create a flowchart that asks the user to guess a random number populated by the program between 1 and 100.

Writting the code:

In this program it is possible to Create a flowchart that takes two integer values from a user and evaluates and displays which one is the smallest value.

import random

def main():

randomNumber = random.randint(0,100)

count =0

while True:

guess = input("Guess?")

if(guess == randomNumber):

count = count+1

print "Congratulations found guessed correct number and number of guesses are ",count

break

elif guess >100 or guess <0:

print "Input should be in between 0 and 100"

elif guess > randomNumber:

count = count+1

print "Too high, try again."

elif guess < randomNumber:

count = count+1

print "Too low, try again."

if __name__=='__main__':

main()

See more about python at brainly.com/question/18502436

#SPJ1

Can someone pls help me with this one?Make three Flowcharts and complete them by hand for the three challenges

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

No messages will ever be blocked from the user’s mailbox.
Messages can still be blocked at the server level.
Messages cannot be blocked at the network firewall.
Most obvious spam messages will still reach the client computer.

Answers

Answer:

The last one

Explanation I think it is D because all of the other answers are saying what happen if you filter it.

The majority of obvious spam messages will continue to reach the client's computer. The correct answer is D.

What is junk mail?

Email spam, also known as junk email, spam mail, or plainly spam, is an unrequested email sent in mass. The name is derived from a Monty Programming languages sketch that includes the name of a canned pork product is mentioned. Spam is pervasive, unavoidable, and monotonous.

Back out of the Folder or any message folders users are viewing to access the Mailboxes view. The Junk folder is located beneath the Drafts and Sent directories in the Mailboxes view.

The Junk Email Filter settings can be changed in the Junk E-mail Dialogue box. Click Junk in the Deactivate group on the Home tab, and then click Garbage E-mail Options.

Most obvious spam messages will still reach the client's computer. Then the correct option is D.

More about the junk mail link is given below.

https://brainly.com/question/28354330

#SPJ6

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

Given R=ABCDEFG and F = {CF-B, B+C, FB+E, CBEF, E-AG, FA-B,BG FE, BA-CG} The following is a minimal cover: O A. CFB, FBE, E-AG, FA+B, BAG B. (CFD, FBD, BED, BAD, BDG) Oc. CFB, BC, FBE, E-AG, FAB, BGF, BAG D. CFDBEAG

Answers

The correct minimal cover from the given options is:A. CFB, FBE, E-AG, FA+B, BAGIn a minimal cover, each functional dependency appears only once, and no redundant dependencies are present.

Let's analyze the options to find the minimal cover.Option A contains CFB, which is present in the original set of functional dependencies. FBE is also present, representing FB+E from the original set. E-AG represents E-AG from the original set. FA+B represents F+F-A+B from the original set. Finally, BAG represents BA-CG and BG-FE from the original setOption B (CFD, FBD, BED, BAD, BDG) is not a valid minimal cover because it includes additional dependencies that are not present in the original set.Option C includes CFB, BC (not present in the original set), FBE, E-AG, FAB (not present in the original set), BGF (not present in the original set), and BAG. It includes additional dependencies not present in the original set.

To learn more about  minimal   click on the link below:

brainly.com/question/31981344

#SPJ11







ID: A. Fill in the gaps with the appropriate words: A non-linearly training set in a given feature dimension can be made in another dimension, using a suitable

Answers

A non-linearly training set in a given feature dimension can be made in another dimension, using a suitable mapping function.

This is one of the important characteristics of a kernel. Kernel functions provide a way to map a set of data points into a higher-dimensional space in which the data is more easily separable. This makes it possible to use linear algorithms on non-linearly separable data, which is a common problem in machine learning.

Therefore, kernel functions are used to transform the input data from a low-dimensional space to a higher-dimensional space where the classification is easier. The kernel function computes the dot product of the data in the high-dimensional space without actually computing the coordinates of the data in that space.

To know about non-linearly visit:-

https://brainly.com/question/33318781

#SPJ11

In order for a computer to pass the ________, a human should have a conversation with it and not be able to tell if it was a machine or a human.

Answers

The test that a computer needs to pass after a human's conversation with it and not be able to tell if it was a machine or a human is; Turing Test

Test of Computers

The correct answer to the blank portion of the question is Turing test. This is because Turing Test is a test of a computer's ability to exhibit intelligent behavior that is equivalent to, or indistinguishable from, that of a human's behavior.

Finally, If the evaluator cannot reliably tell the computer from the human, the machine is said to have passed the test.

Read more about Test of Computer at; https://brainly.com/question/21283135

What is your most valued item you have in your house or apartment?

Answers

Answer:

my book collection and nintendo

Explanation:

What are the Key Process Areas for CNNi Level 2?

Answers

The Key Process Areas (KPAs) for CNNi Level 2 are as follows: 1. News-gathering 2. Storytelling 3. Delivery 4. Technical Production 5. Teamwork 6. Communication 7. Planning and Organization 8. Initiative 9. Professionalism 10. Personal Development

The Key Process Areas (KPAs) are general categories of abilities and accomplishments that all journalists at CNN International should have, regardless of their specialty or role. KPAs are intended to outline a range of abilities that a CNNi journalist should have at each level. The ten KPAs at Level 2, as previously noted, are News-gathering, Storytelling, Delivery, Technical Production, Teamwork, Communication, Planning and Organization, Initiative, Professionalism, and Personal Development.

KPAs, in general, are used to evaluate a journalist's professional growth and advancement potential. They represent a framework of anticipated behaviors and actions that journalists should demonstrate in order to advance to the next level.

Learn more about KPA's: https://brainly.com/question/9940533

#SPJ11

Which statement describes one of the responsibilities of a computer programmer?

A.
providing remote technical support to users
B.
installing, configuring, and monitoring network systems
C.
using computer-generated software to create special effects
D.
using coding languages to create software for retrieving data
E.
designing and implementing databases

Answers

Answer:

d i think

Explanation:

''/--//.I want a new account///.--/'''

Answers

Answer:

nice cause nice

Explanation:

it's nice due to you wanting a new account

Answer:

Instead of signing into this account, you can click on "sign up" and then create a new account..

Explanation:

If that doesn't work, then I'm sorry.

Have a great day, or night, wherever your at, and always know that I'm here if you need someone to talk to if something or someone is bothering you.

State the feature of a database management system that prints data in a specified format with a title.

Answers

Answer:

Data structuring

A DBMS is a database management system that is responsible for the software packages made for manipulating, retrieval, and managing the data in the DB.

DB generally manipulates the data itself on the basis of field names and file structure. It has multiuser access and provides a high level of security. It is a network database and network and has an object-oriented database.

Hence the format with a title would be data structuring.

Learn more about the database management system that prints.

brainly.com/question/22486925.

Branston is shopping for a laptop he can coordinate with his iphone. which laptop operating system should he choose?

Answers

Since Branston is shopping for a laptop he can coordinate with his iPhone, the laptop operating system which he should choose is: MacOS.

What is an operating system?

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between a computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

In Computer technology, some examples of an operating system on computers include the following:

QNX OSLinux OSOpenVMSMacOSMicrosoft Windows OSIBMSolarisVM

In this context, we can reasonably infer and logically deduce that the laptop operating system which Branston should choose is the Macintosh operating system (MacOS).

Read more on Mac operating system here: https://brainly.com/question/27255447

#SPJ1

!WILL GIVE BRAINLIEST!
Write a Python program that prompts the user for a word. If the word comes between the words apple
and pear alphabetically, print a message that tells the user that the word is valid, otherwise, tell
the user the word is out of range.

Answers

Answer:

word = input()

if word > "apple" and word < "pear":

   print("Word is valid.")

else:

   print("Word is out of range.")

que es power point es urgente pliss

Answers

Answer:

PowerPoint es un software de computadora creado por Microsoft que permite al usuario crear diapositivas con grabaciones, narraciones, transiciones y otras características para presentar información.

You want to create a new system account for a server program you’re installing. What option can you pass to useradd when creating the account to ensure that it’s created as a system account?

Answers

When creating the account, you can use the --system option to tell useradd to create it as a system account.

A program or utility that runs from the command line is known as a Linux command. An interface that accepts lines of text and converts them into instructions for your computer is known as a command line.

A graphical user interface (GUI) is simply a command-line program abstraction. For instance, a command is carried out every time you click the "X" to close a window. We can give the command you run options by using a flag.

Learn more about linux https://brainly.com/question/15122141

#SPJ4

The option that ensure that it’s created as a system account is system. The correct option is A.

What is system account?

A local system account is a user account created by an operating system during installation and used for purposes defined by the operating system.

User IDs for system accounts are frequently pre-defined (e.g. the root account in Linux.) The line between system and service accounts is sometimes blurred.

As the person is trying to create a new system account for a server program, System can help to pass to user end when creating the account to ensure that it’s created as a system account.

Thus, the correct option is A.

For more details regarding system account, visit:

https://brainly.com/question/14989055

#SPJ1

Your question seems incomplete, the missing options are:

A. --system

B. --nonuser

C. --sysaccount

D. --shared

E. --nohome

Other Questions
People who take 2 or more drugs at the same time are more vulnerable to nutrient-drug interactions.True/False What type of renewable resource does this power station use? thick opposite word please ansewr fast help please!| 2x^2 + 5x + 3 | > 0solve the inequality Pauline plots the numbers 4 1/3 and -51/8 on a number line. Explain how she can use the number line to determine which number is greater . Write an ineaquality to compare the bumbers Why is having genetic information packaged into chromosomes beneficial?. Read "The Lost Path" by Lois Bates. A boy named Eric was coming home from school. There were two ways that he could takeone was a path through the fields, and the other was a winding road. It was winter time, and there was snow on the ground. Eric chose the field path, for it was the shorter of the two, but he had not gone far when it began to snow very fast. The snow-flakes were so large, and fell so quickly, that there was very soon quite a thick carpet on the ground, and before long Eric found that he could not see the path, and he scarcely knew where he was. If he had only turned round just then, he could have seen his own footprints in the snow, and following them, would have got back to the road safely, but he did not want to do this, so he went on and on until he was lost entirely, and had not the least idea as to which was the way home. Then he determined to turn back, and try to reach the road, but where are his footprints? All covered up with snow. Eric felt ready to cry, but he struggled on as long as he could, and then a great drowsiness came over him, and he fell down in the snow. When Eric did not come home from school his parents became very anxious, and his father accompanied by the dog went out to seek him. First, he took the way by the road, then he came over the field-path, and the dog ran sniffing about in the snow, until he came to what looked like a white mound, and there was Eric half-buried in the snow. You can imagine how pleased the father was when he had his boy safe in his arms, and how gladly he carried him home, for if Eric had not been found quickly, he must have died.Match each theme from the story with the evidence from the text that supports it.Match Term DefinitionTaking short cuts isn't always the easiest path to success. Realizing your mistake sooner than later makes it easier to undo. A) If he had only turned round just then, he could have seen his own footprints in the snow, and following them, would have got back to the road safely, but he did not want to do this, so he went on and on until he was lost entirely, and had not the least idea as to which was the way home.B) First he took the way by the road, then he came over the field Gina is using Outlook in the default cached mode and is connected to an Exchange server. What is the default file type used to store a cached version of Ginas mailbox?a) PSTb) OSTc) MSGd) XML Please help me !!!! evaluate: complete the following equations 1 copper +zinc sulphate 2 potassium+ copper sulphate 3 magnesium +silver nitrate 4 iron + copper sulphate 5 zinc+ iron sulphate Typical cloud droplets are large enough to effectively scatter _____ wavelengths of visible radiation more or less equally. Exercise 1 Write s if the sentence is simple or c if it is compound.My little brother Jake got a toy in his breakfast-cereal box. The shapes below are mathematically similar.8 cm9 cm12 cmCalculate the length of side x. the narrator in the passage speaks from the point of view of an outsider who is nevertheless knowledgeable about the communitys history and practices answer a: an outsider who is nevertheless knowledgeable about the communitys history and practices a an all-knowing observer who understands all the characters deepest thoughts and feelings answer b: an all-knowing observer who understands all the characters deepest thoughts and feelings b a storyteller who invents an unbelievable story to entertain the community answer c: a storyteller who invents an unbelievable story to entertain the community c a central character whose trustworthiness the reader is invited to doubt answer d: a central character whose trustworthiness the reader is invited to doubt d a member of a community with insight into its people and their experiences What on your thoughts on this college personal statement? during the __________ stage, childrens use of symbolic thinking grows, mental reasoning emerges, and the use of concepts increases. In Act 5 of Romeo and Juliet, cite at least two examples of dramatic irony and two examples of foreshadowing 8) Name 5 organelles that are floating in the cytoplasm. (1) (2) (3) (4) (5) 9) What is the cytoplasm made from? 10) Is the cytoplasm a solute or solvent? 11) What causes cytoplasmic streaming? can someone help me with this ? an aqueous solution contains 0.390 m hydrofluoric acid. how many ml of 0.294 m sodium hydroxide would have to be added to 125 ml of this solution in order to prepare a buffer with a ph of 3.050? when was hurricane watch issued for harvey