Answer:
He is his ancestor
Explanation:
im almost postive thats the answer
Inequalities are used to represent unequal expressions.
The solution set to
is: 
The inequality is given as:

From the inequality above, we have the following observation.
- The value of variable x starts from 7/16 (inclusive)
- The value of variable x has no end (i.e. infinity)
Because, 7/16 is inclusive of the values of x, we make use of the open square bracket i.e. [
We treat
, as an exclusive value. So, we make use of the close parenthesis i.e. )
Hence, the solution set is: 
Read more about inequalities at:
brainly.com/question/20382422
Pythagorean theorem should be used to determine the length of any of the three sides of a right-angled triangle.
<h3>What is Pythagorean Theorem?</h3>
Pythagorean theorem can be defined as a fundamental mathematical equation in Euclidean geometry and it can be used to determine the length of any of the three (3) sides of a right-angled triangle.
Mathematically, Pythagorean's Theorem is given by this formula:
c² = a² + b²
<u>Where:</u>
<u>For example:</u>
c² = 3² + 4²
c² = 9 + 16
c² = 25
c = √25
c = 5 units.
Read more on Pythagorean Theorem here: brainly.com/question/16176867
The three (3) security goals that would align and prioritize security efforts to the business goals of an organization are:
1. Confidentiality
2. Integrity
3. Availability
A security goal can be defined as both the short-term and long-term strategic objectives that detects and protects the assets of a business organization from theft or misappropriation by any internal or external party.
This ultimately implies that, it is very important that security goals of a business organization are aligned with its business goals.
Generally, there are three (3) main security goals for all business organizations and these include:
- <u>Confidentiality:</u> the confidentiality of all data and assets should be well protected.
- <u>Integrity:</u> the integrity of all data and assets should be preserved.
- <u>Availability:</u> all data and assets should be provided for authorized use only.
Read more on security goals here: brainly.com/question/25734235