1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
12

What equation is the inverse of

Mathematics
1 answer:
ivolga24 [154]3 years ago
4 0
Last option. but idk
You might be interested in
I really need help for these pleaseee!!!
Naddik [55]

Answer:

pat

Step-by-step explanation:

5 0
3 years ago
(k^8+8k^2+10k+21) / (k+7)
Serga [27]

Answer:

Step-by-step explanation:

\frac{k^8+8k^2+10k+21}{k+7} is already simplified.

5 0
2 years ago
Need help on this math problem
Lyrx [107]

Answer:

the expression would be 20h+25

Step-by-step explanation:


3 0
3 years ago
A group of 4 friends have a bag of 49 sweets. They divide the sweets equally between them. a) How many sweets does each friend g
jasenka [17]

Answer:

a) Each friend gets 12 sweets

b) There is 1 sweet left

Step-by-step explanation:

When you divide 49 by 4 you will get 12 with a remainder 1.

49 ÷ 4 = 12 R1

The remainder is the left over while the total result is how much each friend gets.

8 0
3 years ago
Read 2 more answers
The _________ setting in the option profile automatically closes any open vulnerabilities on ports that are no longer targeted i
hoa [83]

The name which is given to the setting in the option profile which  automatically closes any open vulnerabilities on ports that are no longer targeted in your scan job is:

  • Vulnerability Detection

Based on the given question, we can see that in network security, there are certain protocols which has to be followed to ensure that there is security and that unauthorised access does not occur.

As a result of this, the Vulnerability Detection is used to set in the option profile to help to close the open vulnerability on the ports which are not targeted in the scan job.

Therefore, the correct answer is Vulnerability Detection

Read more about vulnerabilities here:

brainly.com/question/18088367

6 0
2 years ago
Other questions:
  • Based on his past record, Luke, an archer for a college archeny practice L auke wesent the number on his past record, Luke, an a
    7·1 answer
  • Scientific notation<br>I write<br>104200oooo.​
    8·1 answer
  • I need both of these help!
    7·1 answer
  • Which are vertical angles? Check all that apply. ∠EAB and ∠BAC ∠EAB and ∠CAD ∠CAD and ∠FAE ∠CAB and ∠DAE ∠DAC and ∠DAE
    14·2 answers
  • In a study of
    9·1 answer
  • -4w(w+2) can someone help me find the answer to this please ;c
    5·1 answer
  • What is The slope of the line passes through (0,-3) and (2,13).
    13·1 answer
  • Solve -5w = -80 for w.<br><br> w =
    12·2 answers
  • 1). Simplify: |8 – 3|
    11·2 answers
  • What is the range of possible sizes for side x? 2.8 height and 2.8 cm
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!