1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
4 years ago
14

If a*b = 2a - 56, calculate the value of3 * 4​

Computers and Technology
1 answer:
tino4ka555 [31]4 years ago
3 0

Answer:

A=34

Explanation:

Rewrite the equation as 2a−56=3⋅4

2a−56=3⋅4

Multiply 3 by 4

2a−56=12

Move all terms not containing a to the right side of the equation.

2a=68

Divide each term by 2

and simplify.

a=34

You might be interested in
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
1) what are two functions of a pick or count condition?
viktelen [127]
1.  The best option is C) pick an object at random, and keep track of how many copies of an object are left in a game.
2.   The best option is D) clockwise and counterclockwise.
3.    your 3rd question does not seem to be clear to me.
3 0
3 years ago
1. Implement the function dict_intersect, which takes two dictionaries as parameters d1 and d2, and returns a new dictionary whi
stich3 [128]

Answer:

1  

def dict_intersect(d1,d2): #create dictionary

  d3={} #dictionaries

  for key1,value1 in d1.items():       #iterate through the loop  

      if key1 in d2:   #checking condition

          d3[key1]=(d1[key1],d2[key1])   #add the items into the dictionary  

  return d 3

print(dict_intersect({'a': 'apple', 'b': 'banana'}, {'b': 'bee', 'c': 'cat'})) #display

2

def consolidate(*l1):  #create consolidate

  d3={} # create dictionary

  for k in l1:       #iterate through the loop

      for number in k:   #iterate through  the loop                               d3[number]=d3.get(number,0)+1   #increment the value

             return d 3 #return

print(consolidate([1,2,3], [1,1,1], [2,4], [1])) #display

Explanation:

1

Following are  the description of program

  • Create a dictionary i.e"dict_intersect(d1,d2) "   in this dictionary created a dictionary d3 .
  • After that iterated the loop and check the condition .
  • If the condition is true then add the items into the dictionary and return the dictionary d3 .
  • Finally print them that are specified in the given question .

2

Following are  the description of program

  • Create a dictionary  consolidate inside that created a dictionary "d3" .
  • After that iterated the loop outer as well as inner loop and increment the value of items .
  • Return the d3 dictionary and print the dictionary as specified in the given question .

5 0
4 years ago
Which one you choosing? PS5 OR THE XBOX SERIES X???
love history [14]

Answer:

PS5

Explanation:

It gooder

3 0
3 years ago
Read 2 more answers
You company has decided to start using AppLocker GPOs to control application access. Jeff, Stormwind’s IT Manager, would like to
miv72 [106K]

Answer:

In the Group Policy Manager, enforce the new AppLocker policy in Audit Only mode.

Explanation:

The organization has chosen to run employing AppLocker GPOs to secure access to applications. Jeff, the Information Technology Manager at the following company, also wants to evaluate the AppLocker strategy until it is implemented.  

So, In Group Policy Manager, Jeff enforces the latest AppLocker strategy to evaluate the AppLocker policy in the Audit-Only zone because he is the IT manager of the company and he wanted to check the following policy.

3 0
3 years ago
Other questions:
  • Mobile providers can be susceptible to poor coverage indoors as a result of: a high degree of latency. network congestion that c
    8·1 answer
  • A. When executing System.out.println(a1), the toString() method in the Object class is invoked.
    14·1 answer
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft A. overlap.B. lobe separat
    6·1 answer
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action?
    15·1 answer
  • The sound cards is a digital to____________ converter.
    11·1 answer
  • What is alphabet symmetry
    12·2 answers
  • What is a burned edge ?
    8·1 answer
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
  • QUESTION 9 / 10
    13·1 answer
  • 9.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!