1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
3 years ago
14

How to solve 3(x - 2) = 9x

9x" alt="3(x - 2) = 9x" align="absmiddle" class="latex-formula">
Computers and Technology
1 answer:
LekaFEV [45]3 years ago
4 0
3x - 6 = 9x

-6 = 6x

-1 = x
You might be interested in
Bloxburg Build can anyone help me
postnew [5]
Om I would love to helpppp friend me- keabbykelp
5 0
3 years ago
Read 2 more answers
Jason logged into a banking website. A few later, he found that money from his account had been transferred to another account w
NemiM [27]
I think it’s bank fraud or cybercrime idk
8 0
3 years ago
A. Calculate the diffusion coefficient for magnesium in aluminum at 450°C.
SIZIF [17.4K]

Answer:

a) D = 4.88 * 10^(-14) m^2 / s

b)   <em>t </em>= 1.1 hr

Solution:

a) Magnesium in Aluminum diffusion:

D = Do * exp(-Qd / RT)

  =  (1.2 * 10^(-4) m^2 / s) * exp ( - 130,000 / 8.31 * 723.15)

  = 4.88 * 10^(-14) m^2 / s

D = 4.88 * 10^(-14) m^2 / s

b) The composition remains same at say the distance Xo:

(Cx - Co) / (Cs - Co) = Constant

Xo^2 / D_{550} * <em>t </em>= Xo^2 / D_{450} * 15

D_{550} * <em>t </em>= D_{450} * 15

(1.2 * 10^(-4) m^2 / s) * exp ( - 130,000 / 8.31 * 723.15) * <em>t</em>

(4.88 * 10^(-14) m^2 / s) * 15

by, solving for <em>t </em>we get:

 <em>t </em>= 1.1 hr

So, the time required is 1.1 hr.

5 0
3 years ago
What is the overall objective of an IT risk assessment? To assist IT management in establishing a budget for countermeasures To
QveST [7]
The overall objective of an IT risk assessment is to assist an organization in identifying risks and impacts.<span> The process includes discovering, correcting and preventing security problems.</span>
The IT risk assessment document identifies threats, estimates risks and determines how to manage them.
4 0
3 years ago
In a black box model are the customers told that they should be expecting to be haxked?
Licemer1 [7]
Uhhhhhhhhhhh maybe tbh i have noooo idea.
6 0
3 years ago
Other questions:
  • ( answer goes here) are pictures that you can click on to tell your computer what to do.
    10·2 answers
  • When an object is instantiated, it receives its own copy of all static variables of the class?
    14·1 answer
  • Which tab should you choose to add a picture from a file to your presentation?
    8·1 answer
  • ………………..are networks madeup of LANs connected over long distance.
    5·1 answer
  • If a class contains more than one constructor, describe how the computer determines the appropriate constructor. provide an exam
    10·1 answer
  • Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally
    5·1 answer
  • Define a function allEqual of type ''a list -&gt; bool that will return true will all element in the input list are all equal, f
    14·1 answer
  • Why does a WEB photo have a smaller/lower resolution than a PRINT photo?
    10·1 answer
  • All variables are----------------------------------------------- help please
    7·2 answers
  • An 802. 11 frame contains a number of fields. Which field describes the version of 802. 11 that is being used?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!