1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
3 years ago
11

What is the inverse function of d(x ) = -2x - 6?

Computers and Technology
1 answer:
PtichkaEL [24]3 years ago
7 0

Answer:

-\frac{x}{2} - 3

Explanation:

d(x) = -2x - 6

to find the inverse of a function, you need to follow these steps:

1. set d(x) = y

2. interchange the variables, so y becomes x and x becomes y

3. solve the equation for y

<u>step 1:</u> set d(x) = y

y = -2x -6

<u>step 2:</u> interchanging the variables

y = -2x - 6 turns into x = -2y - 6

<u>step 3:</u> solving for y

x = -2y - 6 < add 6 to both sides to get rid of it on the right

x + 6 = -2y < divide both sides by -2 to get y alone

x + 6 / -2 = -\frac{x}{2} - 3

-2y / -2 = y

-\frac{x}{2} - 3 = y

so the inverse of the function is -\frac{x}{2} - 3

You might be interested in
Adding transitions to slides in a presentation.
8090 [49]

B.) The addition of slide transitions

4 0
3 years ago
Read 2 more answers
MoonieStardust Here is the rest of the picture from my last question you answered.
Oliga [24]

Answer:

the two on the bottom and the two on the top

Explanation:

move the two on the bottom apart and the two on the top inward

6 0
2 years ago
Read 2 more answers
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
2 years ago
You are creating a table on a web page for your company's web site. your web team leader has directed you to add more white spac
lorasvet [3.4K]
You increase the cell padding
6 0
3 years ago
Complete each statement by choosing the correct answer from the drop-down menu.
mihalych1998 [28]

Answers for edg:

1- speaking and listening

2- nonverbal communication

3. gestures often have multiple interpretations

4. interpreting body language and behavior

Explanation: hope this helped! i just did them and they were right :)

7 0
3 years ago
Read 2 more answers
Other questions:
  • Assume that getPlayer2Move works as specified, regardless of what you wrote in part (a) . You must use getPlayer1Move and getPla
    14·1 answer
  • To join two or more objects to make a larger whole is to _____________ them.
    8·2 answers
  • Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
    10·1 answer
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • 1. If this traffic signal is turned on after the red light, it means you may cross the intersection, but you _______ wait until
    12·2 answers
  • Which letter would appear in the third position of the standard wheel marking of a hard-grade wheel?
    10·2 answers
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initializatio
    13·1 answer
  • Please choose odd one out please tell fast ​
    13·2 answers
  • What is the output from main (below) after the following function is called. void calculateCost(int count, double&amp; subTotal,
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!