Dr. Eidell October 24‚ 2014 Preparation and IR Analysis of 2-chloride-2-methylbutane Line Reaction Abstract The purpose of this experiment was to react 2-methyl-2-butanol with concentrated HCl in order to form 2-chloride-2-methylbutane. The hydrogen for the HCl make the -OH from the 2-methyl-2-butanol into a good leaving group because H2O is formed. The H2O leaves and Cl- is free to bond with the carbocation creating 2-chloride-2-methylbutane. The materials needed for the lab were an Erlenmeyer
Premium Hydrochloric acid Chemical reaction Chemistry
of opera? - 2. What famous literary works became the basis for Romantic operas? Chapter 35‚ p. 299 1. How did the traditional system of tonality break down in the early twentieth century and what replaced it? 2. How did composers change their approach to the orchestra in early twentieth-century music? How did they approach form? Chapter 36‚ p. 312 1. What elements made Stravinsky’s Rite of Spring shocking to its first audiences? Is it still shocking today? Chapter 39‚ p. 339 2. What qualities
Premium Opera Ludwig van Beethoven Wolfgang Amadeus Mozart
inspired narratives of Genesis 1 and 2? Of course there are. Many also scholars argue that Genesis 1:1-2:4a and Genesis 2:4b-25 are products of two different sources. It reflect different authors‚ different time periods‚ etc. It is further charged that the narratives contradict each other in several particulars. Genesis 1 and 2 provide accounts of what God did during creation. But these two chapters don’t seem to agree. It seem like Genesis 1:1-2:4a and Genesis 2:4b-2 are different from each other in
Premium God Bible Universe
Unit 2.2 Safeguarding the welfare of children and young people 1.1 Safeguarding Legislation and Policy On the following page is a leaflet which identifies national legislation for safeguarding the welfare of children and young people. The leaflet outlines the guidelines and policies put in place solely for the protection of children as well as procedures that are to be followed in the safeguarding and welfare of the young‚ while describing the roles of the various different agencies involved
Premium Abuse Bullying Psychological abuse
Solutions Guide: Please reword the answers to essay type parts so as to guarantee that your answer is an original. Do not submit as is EXERCISE 2-2 Acquisition Method The balance sheets of Petrello Company and Sanchez Company as of January 1‚ 2011‚ are presented below. On that date‚ after an extended period of negotiation‚ the two companies agreed to merge. To effect the merger‚ Petrello Company is to exchange its unissued common stock for all the outstanding shares of Sanchez Company in the
Premium Balance sheet Asset Generally Accepted Accounting Principles
Unit 2 Assignment 2 Global Limited has the reputation as one of the world’s leading providers of infrastructure information systems‚ software‚ and services around the world. Global’s clients range from world-wide enterprises to startup companies across all industry sectors‚ including financial services‚ manufacturing‚ transportation‚ and public services. Information is an organization’s most valuable asset‚ yet traditional security practices have either not provided adequate protection of information
Free Risk Management Information security
Theory in Action 2 Fast 2 Furious http://putlocker.tn/2-fast-2-furious/ In order for a director to make an audience feel in a certain way‚ the director would want to do certain things with the camera‚ editing‚ sound and by showing specific things (Mise-en-scene). I will be analysing these factors in the open sequence for the film ‘2 Fast 2 Furious’. Editing The film starts off with a group of guys and girls getting off the back of a truck in the middle of the night. At first glance I thought that
Premium Protagonist
An access control policy should be established‚ documented and periodically reviewed‚ based on business needs and external requirements. Access control policy and associated controls should take account of: - Security issues for particular data systems and information processing facilities‚ given business needs‚ anticipated threats and vulnerabilities; - Security issues for particular types of data‚ given business needs‚ anticipated threats and vulnerabilities; - Relevant legislative‚ regulatory
Premium Access control Authorization Computer security
Unit 202 – Safeguarding the Welfare of Children and Young People Outcome 1 Know about the legislation‚ guidelines‚ policies and procedures for safeguarding the welfare of children and young people including e-safety 1.1– There are legislations‚ guidelines‚ policies and procedures which cover the safeguarding and welfare of the young people within the setting I am working in. Examples of these include the Health and Safety policy‚ the Safeguarding/Child Protection policy and the Equal Opportunities
Free Childhood Abuse Mobile phone
Cyber Law Text & Cases Quiz 2 1. Cyberlaw | both a and c | 2. The Internet | is a network of computer networks. | 3. The Internet began in | 1969. | 4. The history of the Internet shows that(Points : 1) | user policy expressly prohibited commercial applications. | 5. The World Wide Web was developed in: 1) | 1991. | 6. The World Wide Web began at | CERN. | 7. The World Wide Web was developed and
Premium World Wide Web Supreme Court of the United States United States Constitution