1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
11

Divide (10x^3 + 19x^2 + x - 7) by (5x + 2)​

Computers and Technology
1 answer:
sesenic [268]3 years ago
6 0

              2x^{2}+ 3x - 1

5x + 2\sqrt{10x^{3} + 19x^{2} + x - 7 }

        <em> </em>- 10x^{3}  - 4x^{2}<em />

        <u>                                     </u>

                       15x^{2} + x

                    -15x^{2} - 6x

       <u>                                       </u>

                                -5x - 7

                                - 5x - 2

       <u>                                       </u>

                                        -5

You might be interested in
Letters, memos, and computer printouts of numerical information are examples of formal reports.Group startsTrue or False
kati45 [8]

Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement.

<h3>What are  formal reports?</h3>

Formal reports are known to be a type of report that has elements such as a title page, a transmittal, a table of contents, etc. An example are:

  • Inspection Report.
  • Safety and Health Report.

Conclusively, Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement because  they are all examples of informal reports.

Learn more about formal reports from

brainly.com/question/11599232

6 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Match the cell reference to its definition,
Anna35 [415]

Answer:

Absolute reference- the cell remains constant when copied or moved

Relative reference- the cell changes based on the position of rows and columns

Mixed references- the cell has combination of two other types of cell references

Explanation:

4 0
2 years ago
Why are many otherwise safety-conscious people victims of internet crime?
const2013 [10]
Because <span>safety-conscious people don't install virus protectors. Hope this helps.</span>
8 0
3 years ago
Read 2 more answers
write an algorithm to settle the following question: a bank account starts out with $10,000. interest is compounded monthly at 6
svp [43]

Using the knowledge in computational language in python it is possible to write a code that write an algorithm to settle the following question.

<h3>Writting the code:</h3>

<em>original = float(raw_input("Enter initial balance: "))</em>

<em>interest = float(raw_input("Enter promised return: "))</em>

<em>expenses = float(raw_input("Enter monthly expenses: "))</em>

<em />

<em>interest = interest / 100 / 12</em>

<em>month = 0</em>

<em>balance = original</em>

<em />

<em>if balance * interest - expenses >= 0:</em>

<em>print "You don't need to worry."</em>

<em>else:</em>

<em>while balance + balance * interest - expenses >= 0: # negation of the if condition</em>

<em>balance = balance + interest * balance # in one month</em>

<em>balance = balance - expenses</em>

<em>month = month + 1</em>

<em>print month, balance</em>

<em />

<em>print month / 12, "years and", month % 12, "months"</em>

See  more about python at brainly.com/question/18502436

#SPJ1

7 0
2 years ago
Other questions:
  • A(n) ____ database is an application appropriate for an object-oriented database that contains text links to other types of docu
    7·1 answer
  • What is an enterprise system
    14·2 answers
  • Si han visto el anime death note esta chido si no lo han visto veanlo es bien vacano
    6·1 answer
  • Use the Internet to gather information on four filesystems compatible with Linux. For each filesystem, list the situations for w
    12·1 answer
  • Identify the false statement.
    8·1 answer
  • 100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from
    6·1 answer
  • int sequence[10] = { 3, 4, 5, 6, 7, 8, 9, 10, 1, 2 }; Write a C++ program to ask the user to enter a number, if the number can b
    10·1 answer
  • Write code to create a list of numbers from 0 to 67 and assign that list to the variable nums. Do not hard code the list. Save &
    5·1 answer
  • You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to
    9·1 answer
  • While working with style formatting for a Microsoft Word document, when you change the text or paragraph formatting of a single
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!