SCIENCE –KEY ANSWERS SECTION –I one marks 1. One egg and one sperm 2. Polio 3. Thyroid gland 4. Aggregate fruit 5. Camel 6. All the above 7. Methane 8. Colloidal solution 9. A and B 10. 5 11. Ethene 12. 1.49611 x m10 13. It is measured using spring balance 14. Black 15. Both concave 16. Section –II Two marks 17. i) Gene ii) Allele 18. i) Vitamin ii) Stem Cell 19. Charles Darwin proposed the theory of n Principles: 1. Struggle for existence an 2. Variation leads to genetic diver evolution. 19. i) BCG II) Tuberculosis 20. a) Bipolar b) Multipolar 21.–Anther A –Filament B 22. 23. i) Leucocytes ii) diastole 24. 25 26. 27 a) protozoa Contractile vacuolar b) Coelenterates Cell membrane c) Flat worm Excretory tube d) Annelids Nephridia 28. I) Co Starch 2 ii) 29) i) Petroleum ii) scabies 30) 31 Renewable Hydrogen wind sol Non renewable Coal Narutal gas P
www.tnmanavan.blogspot.com
www.asiriyar.com
32) i) Unsaturated –16 more Solution grams of salt can be di ii) Saturated –No Solution more salt can be dissolved 33) The Phenomenon by which colloidal partic Effect. 34 gram molecular mass of Co 2 = 44g Number of particles = (Avogadro number x g molecular mass 23 23 Number of molecules x11) = (6.023x10 / 44 = 1.51 molecules x 10 -8 OH ( -8) OH = H 35. OH = 10 P = -log 10 P 8 P= 14 –8 = 6 10 36) i)Backing powder is a mixture of baking s ii)Carbonic acid is used in aerated drink 37) i) Assertion and reason are correct and r 38 39 40) i) positive ii) negative 41. i) One Newton is the force that -2 produces in an object of 1 Kilogram mass ii) Action and reaction always acts on two di 42. i) Electric fuse ’ s Heating ii) effect Joule 43 Symbols 1-3 , 2-4, 3-1,4-2 44) 45 u =-20cm f = -10.5 cm v=? 1/f =–1/u 1/v 1/v = 1/f+1/u = -1/10.5 - 1/20 = 46) i) Electromagnet ii) Dioptre 47. i) used in torches, search-lights and veh parallel beams of light. ii) Shaving mirrors to see a magnified image iii) The dentists use concave mirrors to see patients. By K.POOLOGAPANDIAN BT.ASST. KARAPETTAI NADAR HR.SEC SCHOOL TUTICORIN
No todo es blanco,. O negro: es gris. Todo depende del matiz,. Busca y aprende a distinguir. La luna puede calentar. Whoops! There was a problem loading this page. SCIENCE - KEY - 2017.pdf. SCIENCE - KEY - 2017.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying SCIENCE - KEY - 2017.pdf. Page 1 of 7.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Public-Key-Cryptography-Texts-In-Theoretical-Computer-Science-An-EATCS-Series.pdf. Public-Key-Cryptography-T
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. CSIR UGC NET ...
[dth; 26> 1950. 93. tFg;G thj .... sslc social science book back 203 multpile choice key tm.pdf. sslc social science book back 203 multpile choice key tm.pdf. Open.
The output of a single windmill is quiet small and cannot be used for commercial purposes. ii. The wind speed should be higher than 15 km per hour to maintain ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 10th Science ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.
Answer Key: 1. D. 11. A. 21. D. 31. A. 2. E. 12. C. 22. D. 32. B. 3. C. 13. D. 23. E. 33. E. 4. B. 14. A. 24. A. 34. B. 5. D. 15. C. 25. B. 35. C. 6. D. 16. E. 26. C. 36. E. 7.
Both protocols carry proofs of security in a weaker variant of the Bellare & Rogaway (1993) ...... Volume 773/1993 of Lecture Notes in Computer Science. 5.
explicitly specify a digital signature scheme. ... applies to all signature-based PK-AKE protocols. ..... protocol design and meanwhile achieve good efficiency.
in practice. For example, a mobile user and the desktop computer may hold .... require roughly 1.5L multiplications which include L square operations and 0.5L.
Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control. Haodong Wang, Bo Sheng, Chiu ...