Answer:
y = 1/5x -3
Step-by-step explanation:
Use y = mx +b as your model. We plug in our slope for me and our y-intercept for b.
Answer:
Step-by-step explanation:
another math-based concept used in cybersecurity is hexadecimal math. Rather than having only two options, as in binary math, hexadecimal math is based on the idea that you can count up to any one of 16 different options. ... Cryptography is the science of codes and encryption and is based on mathematical theory
Check the picture below.
a)
so the perimeter will include "part" of the circumference of the green circle, and it will include "part" of the red encircled section, plus the endpoints where the pathway ends.
the endpoints, are just 2 meters long, as you can see 2+15+2 is 19, or the radius of the "outer radius".
let's find the circumference of the green circle, and then subtract the arc of that sector that's not part of the perimeter.
and then let's get the circumference of the red encircled section, and also subtract the arc of that sector, and then we add the endpoints and that's the perimeter.


b)
we do about the same here as well, we get the full area of the red encircled area, and then subtract the sector with 135°, and then subtract the sector of the green circle that is 360° - 135°, or 225°, the part that wasn't included in the previous subtraction.

11,220,000,000 is the answer for this question.