1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
5

A computer can sort x objects in t seconds, as modeled by the function below:

Computers and Technology
1 answer:
zavuch27 [327]3 years ago
6 0
T = 9 = 0.005x^2 + 0.002x

0.005x^2 + 0.002x - 9 = 0

To solve this quadratic equation divide by 0.005

x^2 + 0.4x - 1800 = 0

x = {-b +/- √[b^2 -4ac] } / 2a = {-0.4 +/-√[0.16 + 7200]} / 2 = { - 0.4 +/- 84.85}/2 =

Use only the positive result: x =  42.2 = 42

Answer: 42
You might be interested in
Juan copied and pasted information from a Word document
satela [25.4K]

Answer:

D. Double-clicking on the graph area, and undoing the

paste​

Explanation:

5 0
4 years ago
If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to st
USPshnik [31]

Answer:

If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.

Explanation:

Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall

6 0
4 years ago
Add this in binary numbers . (1100011+11111+111) ​
Brut [27]

see the attachment..........

8 0
2 years ago
Read 2 more answers
The objects that you place on master pages are called _____.
Studentka2010 [4]
The answer to this is A.
3 0
4 years ago
You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and
Katarina [22]

Answer:

IUYTR

Explanation:

5 0
3 years ago
Other questions:
  • Which program has an indexed version of the NIST NSRL of MD5 hashes that can be imported to enhance searching for and eliminatin
    10·1 answer
  • A(n) _____ is essentially a flash-based replacement for an internal hard drive.
    13·1 answer
  • Employers will check you out on social media sites like Facebook, MySpace, and Twitter.
    6·2 answers
  • Methods can be ____ correctly by providing different parameter lists for methods with the same name.
    7·1 answer
  • Which of the following best describes how to measure the spread of the data? a) The IQR is a better measure of spread for badmin
    5·1 answer
  • CAD software example​
    5·1 answer
  • What is the deffirentiates in organs from tissues
    11·1 answer
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
  • 3) Controls on a form or report that describe each field—often the field name—in the underlying table
    7·1 answer
  • Write an application that allows a user to enter a filename and an integer representing a file position. Assume that the file is
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!