1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
9

Solve the following quadratic equation y=6x^2-12x+1

Computers and Technology
1 answer:
Tanya [424]3 years ago
4 0

x = 1 -   \frac{ \sqrt{6(y + 5)} }{6}
or
1 +  \frac{ \sqrt{6(y + 5)} }{6}
You might be interested in
In what ways are computers being used to improve our quality of life
serg [7]

Explanation:

makes info easy to get

improves communication

enhances education

etc

plsss mark me brainliesttt

3 0
3 years ago
How to write a program to draw 1000 random points on a frame in python language for coding?
ioda

Answer: it

Explanation: you should it

6 0
3 years ago
You use a web browser to search for “winter sweaters” on your laptop. Later, you are playing a game on your phone and an ad show
melomori [17]

Answer:

C

data mining

Explanation:

they are seeing what you are interested in and creating personalized adds

8 0
2 years ago
Read 2 more answers
The Windows security feature called User Account Control requires you to login as a user that is a member of Server Operators be
Galina-37 [17]

Answer:

false

Explanation:

Is a good practice and recommends not to enable the built-in Administrator account on the client computer, we must use the standard user account and User Account Control (UAC).

If we want to enable the built-in Administrator, in this case, for security reasons you should also enable Admin Approval Mode.

6 0
3 years ago
How can you avoid becoming a victim of identity theft?
Anna007 [38]
1. change your pw every month. 
2. dont give out your pw.


I hope this helps and have a wonderful day!!

<3
6 0
3 years ago
Read 2 more answers
Other questions:
  • Use semaphore(s) to solve the following problem. There are three processes: P1, P2, and P3. Each process Pi has a segment of cod
    11·1 answer
  • Computer a sends a packet intended to reach computer f. along its path it arrives at computer
    15·1 answer
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • 5. Which one of the following statements is true for spell checkers? A. Most spell checkers flag inappropriate word usage. B. A
    5·1 answer
  • Pda bkhhksejc pnwjoynelp dwo xaaj ajykzaz ywj ukq zaykza ep???<br><br><br> The Key Value is 22
    12·1 answer
  • The first computer program was used to help the analytical engine calculate numbers. Who invented that program?
    6·1 answer
  • This method adds newValue to the list at the specified index. If the index is invalid for the list, throw an IndexOutOfBoundsExc
    13·1 answer
  • Given two Strings String s1 = "11223351638791377189728193"; String s2 = "983763978669976862724569282405742578"; and String varia
    15·1 answer
  • Select the correct answer from each drop-down menu. A company is recruiting for a web designer. What kind of candidate should th
    14·2 answers
  • Which of the following terms means the computer operating system automatically detects and installs the proper driver for a new
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!