1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Solnce55 [7]
4 years ago
8

2x + 3y = 11y = x-3​

Computers and Technology
2 answers:
Serga [27]4 years ago
5 0

Explanation:

2x+3y=11       y=x-3

2x+3(x-3)=11

2x+3x-9=11

5x=20/:5

x=4

y=x-3

y=4-3

y=1

MakcuM [25]4 years ago
5 0

Answer:

x=4 and y=1

Explanation:

Let's solve your system by substitution.

2x+3y=11;y=x−3

Rewrite equations:

y=x−3;2x+3y=11

Step: Solve y=x−3 for y:

y=x−3

Step: Substitute x−3 for y in 2x+3y=11:

2x+3y=11

2x+3(x−3)=11

5x−9=11 (Simplify both sides of the equation)

5x−9+9=11+9( Add 9 to both sides)

5x=20

5x/5=20/5

(Divide both sides by 5)

x=4

Step: Substitute 4 for x in y=x−3:

y=x−3

y=4−3

y=1(Simplify both sides of the equation)

Answer:

x=4 and y=1

You might be interested in
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
krok68 [10]

Answer:

have the same SSID but different channels

Explanation:

Based on the information provided within the question it can be said that the best option to accomplish this would be to have the same SSID but different channels. This would maintain the users connected to the same network name (SSID) but still be able to roam and jump from one access point to the other.

7 0
3 years ago
Read 2 more answers
The commands available from a menu do not change. True or false
jeka94

i believe this will be false


3 0
3 years ago
Read 2 more answers
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
Which system procedure is normally done with both hand valves opened on a gauge manifold connected to a refrigeration system?
mars1129 [50]

Answer:

The answer is "Evacuation".

Explanation:

The evacuation in coolants was its removal from the coolant of heat, air, and non-condensable toxic gases. Its seal HVAC system is drawn to a vacuum and use a pressure washer throughout this process.  

  • It loses the air and water vapor throughout the coolant point is called it.
  • The two primary goals are accomplished by evacuating, that are eliminates content and hydrates.
8 0
3 years ago
Can someone give me a song I can make a dance too not a school related question
erastova [34]

try an anime song and move around like a noodle, no im just kidding try shawn mendes he has rlly good songs

5 0
3 years ago
Read 2 more answers
Other questions:
  • The icons to insert pictures and clip art in the PowerPoint application are located in the _____ grouping on the Insert tab.
    7·1 answer
  • Which statements are true about making formatting changes to cells in Excel? (Select all that apply)
    11·1 answer
  • One random part of Chess is whether the white side or the black side moves first? A. True B. False
    10·2 answers
  • Maria is developing an online gaming website. She is working on an interactive game that has a central character guiding the vis
    14·2 answers
  • Assume:
    14·1 answer
  • ________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are
    10·1 answer
  • Dedicated server hosting and dedicated web dedicated is the same ??????
    14·1 answer
  • You decide to bulk upload your multiple business locations to Google My Business. Some of the locations in your upload were disa
    7·1 answer
  • When you open a program, the hard drive
    7·1 answer
  • what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!