Skip to main content

THE GLOBAL SURGE OF ARTIFICIAL INTELLIGENCE

About Atoms & Law of Chemical Combition

                                ATOMS

Atoms are the tiny particles in the world, well everything is made up of matter, and the matter is made up of 'ATOMS'. Well, Atoms was discovered by Jonh Dalton. And also Jonh Dalton has conferred us six postulates of Atoms. 

                     Postulates Of Jonh Dalton

  • All matter is made of tiny particles called atoms, which participate in chemical reactions.
  • Atoms are indivisible particles, which can not be created or destroyed in a chemical reaction. 
  • The atom of a given element is identical in mass and chemical properties. 
  • Atoms of different elements have different masses and chemical properties.
  • Atoms combine in the ratio of small whole numbers to form compounds. 
  • The relative number is kinds of the atom are constant in a given compound. 

                 Law Of Chemical Combination

The Law of chemical combination was discovered by Lavoisier and Joseph L. Proust. And Law of Chemical combination has two parts 'LAW OF CONSERVATION OF MASS' and 'LAW OF CONSTANT or DEFINITE PROPORTION'. 

The Law of conservation of mass states that the mass can neither be created nor be destroyed in a chemical reaction.

The Law of constant or definite proportion states that "In a chemical substance the element should always be present in definite proportion by mass.

              Atomic Number & Mass Number

ATOMIC NUMBER states that the number of protons present in an atom determines the atomic number.

MASS NUMBER states that the mass of protons and neutrons which are present in the atom determines the mass number.   

Comments

Post a Comment

Popular posts from this blog

OVERVIEW OF ETHICAL HACKING

Ethical Hacking: Ethical hacking, also known as penetration testing or white-hat hacking, involves simulating cyberattacks on computer systems, networks, or applications with the permission of the owner to identify security vulnerabilities. Ethical hackers, often referred to as "white hat" hackers, use the same techniques and tools as malicious hackers (or "black hat" hackers) but do so with legitimate and lawful intent. Here are some key aspects of ethical hacking: 1. Authorization: Ethical hackers must obtain explicit authorization from the system or network owner before conducting any testing or security assessments. Unauthorized hacking is illegal and unethical. 2. Scope: Define the scope of the ethical hacking engagement clearly. This includes specifying what systems or networks are to be tested, the testing methods to be used, and the limitations of the testing. 3. Methodology: Ethical hackers use a systematic approach to identify vulnerabilities and weaknesse

OVERVIEW ON TECHNOLOGY

  Overview on Technology Technology Overview Technology refers to the application of scientific knowledge, engineering, and innovation to create tools, systems, and solutions that improve our lives, solve problems, and advance human civilization. It encompasses a wide range of fields and disciplines, each contributing to the development of new devices, processes, and capabilities. Key Elements of Technology: 1. Innovation: Technology is driven by innovation, the process of creating something new or significantly improving existing products, services, or processes. Innovation can result in breakthroughs that transform industries and society. 2. Science and Engineering: Technology draws heavily from scientific principles and engineering practices. Scientific research provides the foundation for understanding the natural world, while engineering applies this knowledge to design and build practical solutions. 3. Tools and Machines: Technology often involves the creation of tools and machin

OVERVIEW ON METAVERSE

                        Overview On Metaverse The term "metaverse" refers to a collective virtual shared space, merging physical and virtual realities, where people can interact with each other and digital objects in real time. It is a concept that has gained significant attention in recent years due to advancements in technology, particularly in areas such as virtual reality (VR), augmented reality (AR), blockchain, and the internet. Here's an overview of key aspects and components of the metaverse: 1. Virtual Worlds: The metaverse is composed of interconnected virtual worlds or environments, each with its own rules, themes, and purposes. These virtual worlds can range from realistic simulations to entirely fantastical realms. 2. Interactivity: Interactivity is a core feature of the metaverse. Users can navigate these virtual spaces using avatars and interact with other users, AI-driven characters, and digital objects. This interaction can be in the form of socializing,