1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
3 years ago
11

Find the slope of a parallel line 2y=-8+4/5x

Mathematics
1 answer:
marysya [2.9K]3 years ago
4 0

Answer:

2x-5y-20=0

Step-by-step explanation:

2y=-8+4/5x

2y+8-4/5x=0

10y+40-4x=0

5y+20-2x=0

-2x+5y+20=0

2x-5y-20=0

You might be interested in
If C (Circumfrence) = 314 m, what is the area?
IRINA_888 [86]

Answer:

   7850 m^2

Step-by-step explanation:

The circumference of a circle is given by

C = 2*pi *r

314 = 2 * 3.14 *r

314 = 6.28 r

Divide each side by 6.28

314/6.28 = 6.28 r/6.28

50  m= r

Now we need to find the area

A = pi * r^2

A = 3.14 *r^2

A = 3.14 (50)^2

  = 3.14 (2500)

   7850 m^2

8 0
3 years ago
The number to which a base is raised to is called the____. This tells you how many times to multiply the base together
Lunna [17]

Answer:

exponent. eg: 2³ - 2 is the base, 3 is the exponent

7 0
4 years ago
An m-bit password is required to access a system. a hacker systematically works through all possible m-bit patterns. let x be th
GREYUIT [131]
<span>(a) Describe the underlying sample space S . Ans : Let a represent the correct m -bit pattern. Then S = { ( x 1 ,..., x n , a ) } (3) where x i 6 = a , i = 1 ,...,n , and n = 0 , 1 ,..., 2 m . The m -bit pattern x i is the i -th pattern tried by the hacker. So assuming he keeps track of the patterns tried, we also have that x i not equal to xj i.e i not equal to j ( b) Show the mapping from S to S X . Ans : The mapping is X (( x 1 ,..., x n , a )) = n + 1 , with S X = { 1 , 2 ,..., 2 m } (c) Find the PMF of X . Ans : For convenience, let A k = “ k -th attempt is correct”. Then p X ( n ) = P " A n n - 1 \ i =1 A c i # . It should be clear that p X (1) = P [ A 1 ] = 2 - m , since there are 2 m possible passwords, and the hacker tries them randomly. We also have p X (2) = P [ A 2 | A c 1 ] P [ A c 1 ] (4) = 1 2 m - 1 2 m - 1 2 m (5) = 1 = 2 m Similarly, p X (3) = P [ A 3 | A c 2 A c 1 ] P [ A c 2 | A c 1 ] P [ A c 1 ] (7) = 1 2 m - 2 2 m - 2 2 m - 1 2 m - 1 2 m (8) = 1 2 m . (9) Proceeding in this way, we quickly see that X is in fact uniformly distributed in S X = { 1 , 2 ,..., 2 m } . The average number of attempts needed to break an m -bit password is thus 2 m - 1 . For a typical password of ten 8-bit ASCII characters, i.e. 80 bits, it will take 2 79 = 6 . 04 × 10 23 attempts on average</span>
5 0
3 years ago
Find the perimeter and area of the figure
Nimfa-mama [501]

Answer:

D.

Step-by-step explanation:

Use Pythagoras to solve for the longest side of the triangle

Add up the side lengths to find the perimeter

Multiply half the base by the height for the area

4 0
3 years ago
Help me please answer neede asap
PolarNik [594]
1 and 1 half oz (I DID IT YAY!!!!)
4 0
3 years ago
Other questions:
  • Rewrite the equation below so that is does not have fractions
    9·1 answer
  • In a survey of 3,803 adults concerning complaints about​restaurants, 1,470 complained about dirty or​ ill-equipped bathrooms and
    13·1 answer
  • Using the piling method, which of the following can be constructed from polygons alone and discs alone
    5·2 answers
  • Solve 3n2 = 9n.<br> What does n =
    15·1 answer
  • What is the theoretical probability of choosing a consonant? Show work.
    9·1 answer
  • Can somebody help me?
    10·2 answers
  • WILL GIVE BRAINLIST A surfboard was originally priced at $199. The store reduced the price by 10%. A customer bought the surfboa
    13·1 answer
  • Choose the correct option
    10·1 answer
  • Some one help me pls
    5·1 answer
  • The limits of the class intervals are
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!