1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
6

Given that ∠XQR = 180° and ∠LQM = 180°, which equation could be used to solve problems involving the relationships between ∠XQM

and ∠RQM? A) 180 + (140 − 7a) = (70 − 3a) B) 180 + (70 − 3a) = (140 − 7a) C) 180 − (140 − 7a) = (70 − 3a) D) (140 − 7a) − (70 − 3a) = 180
Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
4 0

C) 180 − (140 − 7a) = (70 − 3a)

Answer:

C) 180 − (140 − 7a) = (70 − 3a)

Explanation:

i got it wrong by clicking D on usatestprep

You might be interested in
What are some ways you can work with templates? Check all that apply.
yaroslaw [1]
What are some ways you can work with templates? Check all that apply.

Answer: (A,D,E) see picture below for help also.

7 0
3 years ago
Read 2 more answers
3. A hyperlink is important because it allows you to ___________. (1 point) click on the link to go directly to a website insert
ikadub [295]
A hyperlink is a link that can direct a person to another website when clicked. So the answer would click on the link to go directly to a website. To insert an image or sound you would use something else. And a hyperlink doesn't restrict a person to just the publisher information. I hope this helps!
3 0
2 years ago
Write a query that returns the Genres that I have purchased the most tracks of. I only care about genres that I've purchased at
Murljashka [212]

Answer:

<em>SQL Query</em>

///////////////////////////////////////////////////////////////////////////////////////////////////

select Genre_Name, Number_Purchased from Genre

INNER JOIN Tracks on Genre.Genre_Name = Tracks.Genre_Name

WHERE Number_Purchased >= 10 AND Tracks.price >= 1

ORDER BY Number_Purchased ASC;

Explanation:

First off, I selected the required columns from <em>Genre</em> Table.

Then I inner joined <em>Genre</em> table with <em>Tracks</em> table, to get the <em>price</em> of tracks of the corresponding Genres.

Then the required Where conditions are written, which includes one from the <em>Tracks</em> table.

Finally, the Order by statement is written by <em>Number_Purchased</em> column in ascending (ASC) order.

6 0
3 years ago
Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices. True or false?.
kati45 [8]

Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices is a True statement.

<h3>Are embedded computers small?</h3>

Embedded computers are known to be machine that is said to be in smaller form  of their factor motherboards. An example is Mini-ITX .

Note that there are lot of Different forms of  embedded computers that has their specific innovative enclosure designs.

Therefore, based on the above, Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices is a True statement.

Learn more about Embedded computers  from

brainly.com/question/9706390

#SPJ1

5 0
1 year ago
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
Other questions:
  • When parking ur vehicle facing downhill with a curb, you should point ur front wheels?
    7·2 answers
  • Notes page view and Outline view are found in the<br> tab.<br> File<br> O Status<br> View<br> Page
    8·1 answer
  • The development of a new information system is economically justified if the _____.
    5·2 answers
  • Which one of these tasks is part of the pre-production phase of game development?
    11·2 answers
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • It is not necessary to develop strategies to separate good information and bad information on the internet. True or False
    7·1 answer
  • A company is more likely to lose current customers if:
    5·1 answer
  • What is the nearest ten cents of 453.56
    5·1 answer
  • 3.6 Code Practice Edhesive. (PYTHON LANGUAGE)
    13·1 answer
  • 0 Select the correct answer. Which is an advantage of programming with a procedural language? A. Procedural program code is easy
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!