# You titrated an unknown acid with 0.0925 M NaOH, 0.6201g of the unknown acid was placed...

###### Question:

you titrated an unknown acid with 0.0925 M NaOH, 0.6201g of the unknown acid was placed into an Erlenmeyer flask with10 ml of water and 2-3 drops of phenolphthalein. It took 32.34ml of NaOH to reach the endpoint. What is the molecular weight and the pKa of the unknown acid?

#### Similar Solved Questions

##### Please read the following prompt carefully: "About 48% of all births result in a girl. Suppose...
Please read the following prompt carefully: "About 48% of all births result in a girl. Suppose a couple is planning to have three children." Determine the following values by rounding to the nearest indicated decimal place. Please type your solution in the text entry boxes provided. e. What ...
##### Marginal cost is defined as: the change in total costs from producing one more unit of output. the change in fixed c...
Marginal cost is defined as: the change in total costs from producing one more unit of output. the change in fixed cost from producing one more unit of output. total cost divided by total output. total variable cost divided by total output. The marginal cost curve often decreases at first and then s...
##### Which of the following is the name used to refer specifically to the required return on...
Which of the following is the name used to refer specifically to the required return on a bond Yield to maturity а. b. Capital gains yield Coupon rate Current yield Cost of equity C. d. е....
##### Required Information Problem 06.135 DEPENDENT MULTI-PART PROBLEM ASSIGN ALL PARTS NOTE: This is a multi-part question....
Required Information Problem 06.135 DEPENDENT MULTI-PART PROBLEM ASSIGN ALL PARTS NOTE: This is a multi-part question. Once an answer is submitted. you wll be unable to return to this part Two rods are connected by a sllder block as shown. Glven: MB 254 lb-In. MA 15 in. 15 in. Problem 06.135.b React...
##### What are three common encryption ciphers used to protect network communications and what are the capabilities...
What are three common encryption ciphers used to protect network communications and what are the capabilities that they offer?...
##### JAVA STRINGS AND CHARACTERS - USE SIMPLE CODING 1. Write a program that takes a string...
JAVA STRINGS AND CHARACTERS - USE SIMPLE CODING 1. Write a program that takes a string of someone's full name and prints it out last name first. You may use the available string manipulation methods. Example: "George Washington" "Washington, George" 2. Write a program that will t...
##### 1. Many species of worms (or helminthes) are parasitic to humans. One method of treatment for...
1. Many species of worms (or helminthes) are parasitic to humans. One method of treatment for worms is to take the drug levamisole. Levamisole is a drug that mimics (or acts the same as) acetylcholine for post- synaptic acetylcholine receptors at worm neuromuscular junctions. What happens to worm mu...