1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
disa [49]
3 years ago
7

Three consecutive even integers heve a sum of 66. find the integers

Computers and Technology
1 answer:
Drupady [299]3 years ago
6 0
Let us call x the smallest integer<span>. Because the next two </span>numbers<span> are </span>consecutive even integers<span>, we can call represent them as x + 2 and x + 4. We are told the </span>sum<span> of x, x+2, and x+4 is equal to 72. This means that the </span>integers<span> are 22, 24, and 26.</span>
You might be interested in
What steps are needed for word to create an index
8_murik_8 [283]

Answer:

Do this:

Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...

Click the References tab.

In the Index group, click the Insert Index button. The Index dialog box appears. ...

Click the OK button to insert the index into your document.

4 0
3 years ago
Read 2 more answers
Does any one have 2 reasons it would be a good idea to have a glow in the dark TV.
snow_lady [41]
1. be able to see function keys and input and output ports on the back
2. never lose your tv in the dark
5 0
4 years ago
What are the possible consequences of intentional virus setting?
natali 33 [55]

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

3 0
3 years ago
Bluetooth headphones does or do not use wireless data transmission
galben [10]

Answer:

To put it simply: no, using Bluetooth won't affect your cellular data in any way. Bluetooth works using short-range radio waves, not an internet connection. This means that Bluetooth will work anywhere you have two compatible devices — you don't need any sort of data plan, or even a cellular connection.

7 0
3 years ago
Choose the correct type of error.
grin007 [14]

Answer:

logical is the answer

hope it helps

4 0
3 years ago
Read 2 more answers
Other questions:
  • Create a short document titled "Guide to web searches" that Sergio can give to users of the facility he supervises. The document
    7·1 answer
  • 2. Does the government have the right to tell you what religion you should follow? Why or why not?
    9·2 answers
  • What is the difference between the audio mixer and meters panel.
    8·1 answer
  • g Write a program using integers usernum and x as input, and output usernum divided by x four times. For example, if the input i
    14·1 answer
  • A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
    8·1 answer
  • Which best describes the benefits of renting a home
    12·2 answers
  • An array A[0..n - 2] contains `n-1` integers from 1 to `n` in increasing order. (Thus one integer in this range is missing.) Des
    11·1 answer
  • I have put the question in twice and I cannot get a answer for it .. this site isn’t great in my view..
    9·1 answer
  • yo guys go sub to my channel road to i guess 20 or 30 my yt channel is called The Golden StreamerYT i have 16 subs we are almost
    10·2 answers
  • . In the ____, you justify acquiring newer and better resources to investigate computer forensics cases.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!