1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
13

(p+3t/6) ÷ (p÷6) p=6 t=4

Computers and Technology
2 answers:
goblinko [34]3 years ago
6 0

Answer:

(p+3t/6) ÷ (p÷6) = 8

Explanation:

(p+3t/6) ÷ (p÷6)

Given that:

p=6       AND     t=4

Putting values of p and t in equation:

=(6+3(4)/6)/ (6/6)       First we will solve the round brackets

=(6+12/6)/(1)               As 3*4 =12

=(6+2)                        As 12/6 = 2 and anything dividing by one remains same

=8                               Answer

Verizon [17]3 years ago
5 0
Use PEMDAS.

6 + 3(4) / 6
6 + 12 / 6
6 + 2 = 8


6 / 6 = 1


8 / 1 = 8

I hope this helped.
You might be interested in
Thsi is for gacha girl5467
djyliett [7]

Answer:

lol

Explanation:

3 0
2 years ago
Read 2 more answers
Which of the following STEM discoverers is known as the “Prince of Math?”
Margarita [4]
The German mathematician & physicist ”Carl Friedrich Gauss”

Born: April 30, 1777, Brunswick, Germany
Died: February 23, 1855, Göttingen, Germany
8 0
3 years ago
Which type of portfolio might a young investor who is not afraid of risk choose?
Keith_Richards [23]
i think it would be the investment with high risk and high return such as Stocks.When investing in stock, investor analyze whether a specific company will be doing well in the time of investment (which will increase the market price of the stock) and take a profit from it.
7 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
A(n) ______ network is a system that attempts to imitate the behavior of the human brain. Group of answer choices advanced neura
larisa [96]

Answer:

Neural Networks

Explanation:

Neural networks are networks that mimic the behaviour of the human brain in which they tend to perform a task without been programmed with the task rule, although the neural network are artificial in nature and they often recognize patterns.

Neutral network have cell that enable them to carry out task together in order to produce a desired result and the cell can only solve a little part of tasks.

6 0
3 years ago
Other questions:
  • Ben assembled parts of a computer and created a fully functional desktop PC. He wants the computer to connect to the Internet. W
    10·1 answer
  • You can use ___________ to add dynamic features to a webpage such as search box that completes your search text automatically.
    12·1 answer
  • If parties in a contract are not ____, the contract can be canceled.
    12·1 answer
  • To maintain audience interest in a multimedia presentation, use animations or transition features to control when objects or tex
    13·1 answer
  • An ftp ____ is a computer that allows users to upload and/or download files using ftp.
    5·1 answer
  • Design a GUI program to find the weighted average of four test scores. The four test scores and their respective weights are giv
    5·1 answer
  • What does it mean to search an index or the web? (DONT TAKE ANSWERS FROM THE INTERNET!)
    9·2 answers
  • Question #7
    10·2 answers
  • A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph
    6·1 answer
  • Question 1 of 10
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!