1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
6

Use the Law of Sines to solve the triangle. Round your answers to two decimal places.

Computers and Technology
1 answer:
iris [78.8K]3 years ago
5 0

Answer: 37.1

Explanation: The Law of sines states that there is a proportionality between a side of triangle and its correspondent angle, i.e.:

\frac{a}{sinA} = \frac{b}{sinB} = \frac{c}{sinC}

where:

a, b and c are sides

A, B and C are angles

In the question, there is a triangle with 27.4 as a measure of side a, angles A and C. So, it wants the side c:

\frac{a}{sinA} = \frac{c}{sinC}

\frac{27.4}{sin(99.7)} = \frac{c}{sin(20.4)}

c = \frac{27.4.sin(20.4)}{sin(99.7)}

c = 37.1

The side c is 37.1

You might be interested in
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
2 years ago
Which of the following is part of the 6-by-6 rule?<br><br> i need help!!!!!
Digiron [165]
No more than six lines, and no more than six words in a 6 by 6 rule.
5 0
2 years ago
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
mylen [45]

Answer:

The program to this question can be described as follows:

Program:

num= int(input('Enter a number: ')) #input value by user

st = '' #defining string variable

while num > 0: #define loop to calculte values binary number

   val= num % 2 # holding remainder (0 or 1) in val variable

   st =st+str(val) # store value in str variable

   num = num//2 #calculte quotient value

print("binary number is: ",st)

Output:

Enter a number: 5

binary number is:  101

Explanation:

Program description as follows:

Firstly the "num" variable is declared, for user input, then an "st" variable is declared, to calculates user input value binary number.

In the next step, a while loop is declared, inside the loop, another variable "Val" is declared, that holds value remainders, which is added on the "st" variable.

Outside the loop, the print method is used, that prints st variable holds value.

3 0
3 years ago
An application team plans to follow the 10-phase SDLC model. After the team identifies both functionality and security requireme
Valentin [98]

Answer:

The team did not adequately formalize the software's design

Explanation:

The most logical reason for this confusion is the fact that the team did not adequately formalize the the software design.

The design approach has to do with clearly defining the architectural modules of the application. The requirements in the software requirement specification document would serve as input for the next phase. The documents are prepared and they give a definition of the overall system architecture.

The team got confused because they did not go through this phase of the 10-phase SDLC model.

3 0
2 years ago
What is used to switch to Outline View?
Yuri [45]
<span>What is used to switch to Outline View?

the Insert tab
the status bar
the Mailings tab
the Page Layout bar</span>

Actually, it is found in the VIEW TAB which is in the STATUS BAR. Coincidentally, all of those tabs can be found in the status bar.

7 0
3 years ago
Read 2 more answers
Other questions:
  • A hard drive cannot be partitioned until the device _________ is set.
    5·2 answers
  • what aspect should you consider before adding pictures to a document? you should structure the first before you search for a rel
    15·2 answers
  • Peter has recently bought a media player and a digital camera he wants to buy a memory card and then use devices which memory do
    11·2 answers
  • A _________ is automatically launched by some trigger and appears in front of the active window
    12·1 answer
  • Please select the word from the list that best fits the definition Asking for review material for a test
    14·2 answers
  • Why is John Von Neumann to a remarkable name?<br>si​
    15·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • 1. If an android phone is out of date or outdated and it requires an update. Explain the steps how I can update this phone.
    15·2 answers
  • Help pls<br> cmu cs 0<br> 4.1.2.1 Creating Groups checkpoint 1
    11·2 answers
  • you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not al
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!