2.89
Graph each side of the equation. The solution is the x-value or the point intersection.
Given:
- The product of two numbers is (-9/16).
- One of the numbers is (-4/15)
To find: The other number.
Answer:
Let's assume the unknown number to be 'x'.
(-4/15) × x = (-9/16)
× = (-9/16) ÷ (-4/15)
When we divide a fraction by another fraction, the divisor will be taken in its reciprocal form.
x = (-9/16) × (-15/4)
x = 135/64
Therefore, the other number is 135/64.
Hope it helps. :)
Answer:
True
Step-by-step explanation:
Bcs, in the equation x+(-x)=0 you do x-x ( which is basically x+ -x) and they cancel each other out. This means your equation is 0=0
Answer:
a = 36°
b = 144°
Step-by-step explanation:
<h3><u>Method 1</u></h3>
Number of sides = n = 10
Sum of interior angles = (n - 2) × 180°
= (10 - 2) × 180°
= 8 × 180°
= 1440°
Interior angle = b = sum of interior angles ÷ number of sides
b = 1440 ÷ 10
b = 144°
a + b = 180° (Sum of angles in the straight line)
a + 144° = 180°
a + 144° - 144° = 180° - 144°
a = 36°
<h3><u>Method 2</u></h3>
Number of sides = 10
Exterior angle = a = 360° ÷ Number of sides
a = 360° ÷ 10
a = 36°
a + b = 180° (Sum of angles in the straight line)
36° + b = 180°
36° + b - 36° = 180° - 36°
b = 144°
B. DEVELOPING A TIME LOG is the first step in beginning to control you time.
A. A COMBINATION OF LETTERS AND NUMBERS password is used to ensure security.
Time log is basically you recording or logging the activities you have done in a certain time of a day. As you do this daily and check on the log for a few days, you will notice that you have done things that are either unimportant and time consuming, in short time was wasted.
Time log is very helpful especially is you are very busy. It will not only help you manage your tasks in any given time, it will also show you the things you can do in a shorter amount of time and allow you to schedule time for relaxation.
Passwords should be composed of a combination of letter and numbers. Other use special characters just to tighten password security. It is better that users create passwords that may form a special meaning to them so that they will not forget it regardless of length and combination.