1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Solnce55 [7]
4 years ago
8

2x + 3y = 11y = x-3​

Computers and Technology
2 answers:
Serga [27]4 years ago
5 0

Explanation:

2x+3y=11       y=x-3

2x+3(x-3)=11

2x+3x-9=11

5x=20/:5

x=4

y=x-3

y=4-3

y=1

MakcuM [25]4 years ago
5 0

Answer:

x=4 and y=1

Explanation:

Let's solve your system by substitution.

2x+3y=11;y=x−3

Rewrite equations:

y=x−3;2x+3y=11

Step: Solve y=x−3 for y:

y=x−3

Step: Substitute x−3 for y in 2x+3y=11:

2x+3y=11

2x+3(x−3)=11

5x−9=11 (Simplify both sides of the equation)

5x−9+9=11+9( Add 9 to both sides)

5x=20

5x/5=20/5

(Divide both sides by 5)

x=4

Step: Substitute 4 for x in y=x−3:

y=x−3

y=4−3

y=1(Simplify both sides of the equation)

Answer:

x=4 and y=1

You might be interested in
Katrina needs to send her database to colleagues, but she does not want them to access anything except the
tensa zangetsu [6.8K]

Answer: D

Explanation:

3 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
QUESTION 1
PilotLPTM [1.2K]

1. c

2.a

3.c

hope this helps

plz mark brainliest

6 0
3 years ago
Please solve this in JAVA<br><br> Please see the attachment
Alina [70]

Answer:

I'm going to do it but you should try these things for yourself or else you won't learn.

Explanation:

-First create a project (I'm using Netbeans 14 and the project is a Maven, but the code should work on any IDE)


-Name the project 'ShoppingCartPrinter' and leave the package name as it is. This is the main class so the main method is gonna be there already.

-Then you will create a second class named 'ItemToPurchase'. So I'll leave the code in the attachment (at the bottom of my answer it's written 'Download txt') or else brainly will think it's some sort of redirection to another websites because of the 'dots' and won't let me post it.






Download txt
3 0
1 year ago
Eu fui pegar meu ChormeBook(é tipo uma versão de notebook) e aí eu acenei forçando um pouco a tela com o polegar e deu nisso, eu
Aliun [14]

Answer:

It's not good in reality to touch the Chromebook's screen with your finger, a pencil, a pen or anything like your thumb. They might start looking blurred or if you touch them very hard then they might crack as well. If this happens, report to the authorized store immediately, and if warranty prevails you will get it repaired at no extra cost. However, take this as a warning, and keep in mind the precautions mentioned in the explanation.

Explanation:

Never put extra pressure on the Chromebook screen, and even when it is not open.

Always store it in a closed position.

Always keep the things that can put pressure away from your Chromebook.

Never poke your screen with something that put a mark or a kind of scratch on the surface of the screen.

Never ever, place something on the keyboard like pens, disks or pencils prior to shutting the lid.

5 0
4 years ago
Other questions:
  • The _____ lets you see what styles have been applied to specific parts of a document, such as headings.
    9·1 answer
  • A binary gap within a positive integer N is any maximal sequence of consecutive zeros that is surrounded by ones at both ends in
    13·1 answer
  • Please help! i need to answer this soon!
    13·1 answer
  • Juan copied and pasted information from a Word document
    8·1 answer
  • Why are some geo satellites not usually used for transmitting tcp/ip information?
    5·1 answer
  • Accessing disk is much slower than accessing memory. As a result, many file systems have been designed with various optimization
    7·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • What are the specifications of mine shaft head gear​
    11·2 answers
  • You text file begins with the following rows. The pattern is a description of the item to be repaired, its color, and the issue.
    14·1 answer
  • Anyone here good with Alice? I need help ASAP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!