subject

Step 1: H2(g) + ICI(9) HI(g) + HCl(9) (slow) Step 2: HI(g) +ICI(g) + HCl(9) + 12 (9) (fast)
The reaction is carried out at constant temperature inside a rigid container. Based on this mechanism, which of the following is the most likely reason for the different rates of step 1 and step 2 ?
(A) The only factor determining the rate of step 2 is the orientation of the HI and ICl polar molecules during a collision, but it has a negligible effect when H, and ICl molecules collide.
(B) The amount of energy required for a successful collision between H, and ICl is greater than the amount of energy required for a successful collision between HI and ICI.
(C) The fraction of molecules with enough energy to overcome the activation energy barrier is lower for HI and ICl than for H, and ICI.
(D) The frequency of collisions between H, and ICl is greater than the frequency of collisions between HI and ICI.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 18:30
The method of presentation refers to the planning process for the presentation. the information chosen for the presentation. how the presentation topic will be introduced. how the presentation will be delivered.
Answers: 1
question
Computers and Technology, 22.06.2019 04:30
Eye injuries usually occur as a result of all of the following things, except: a) proper machine operation b) battery explosion c) falling or flying debris d) electric welding arc
Answers: 2
question
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
question
Computers and Technology, 23.06.2019 19:30
Amitha writes up a one-page summary of a novel during her summer internship at a publishing company. when she reads over the page, she realizes she used the word “foreshadow” seven times, and she would like to reduce the repetition. which tool would best amitha solve this problem?
Answers: 3
You know the right answer?
Step 1: H2(g) + ICI(9) HI(g) + HCl(9) (slow) Step 2: HI(g) +ICI(g) + HCl(9) + 12 (9) (fast)
...
Questions
question
Mathematics, 28.07.2019 18:30
Questions on the website: 13722363