Answer:
There ya go
Step-by-step explanation:
When you add negative, it’s the same as subtracting
45 - 5 - 4 + 7
40 - 4 + 7
36 + 7 = 43
The answer is D. 43
Just use substitution, y intercept is 3 so it would be 3= -2(5) I’m not an expert but I tried.
Step-by-step explanation:
1. we have to write the system specifications as:
A(x,y) give us the meaning that the consule x can be accessed when y is in a faulty condition
∀y∃A(x,y)
2. B(x,y) shows that users email has sent a message, y. Which is in the archive. C(x) shows the email address of user x is retrievable
∀x∃y[B(x,y)→c(x)]
3. D(x,y) shows that x can detect breach y'' and we have E(z) that tells us there is a compromise of z
∀y∃xD(x,y)↔ ∃zE(z)
4. F(x,y,z)
Y and z are distinct point ends which x connects
We have,
∀y∀z∃x∃a[x ≠a →F(x,y,z)^F(a,y,z)
5. G(x,y)
X knowst the password of y' and H(x) means that we have x to be a system administrator
∀x[H(x)→∀yG(x,y)] ∃x[H(x)^∀yG(x,y)]
Answer: 
Step-by-step explanation:
We can use the following formula to solve this exercise:

In this case "T" is the time in hours it takes to both taps fill the pool working together, "A" is the time in hours for the first tap filling the pool alone an "B" is the time in hours for the second tap filling the pool alone.
We can identify that:

Then, we must subsitute the known values into the formula:

And finally we must solve for "B".
Then we get:
