1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dedylja [7]
2 years ago
13

when solving the equation x^2-8x-7=0 by completing the square which equation is a step in the process

Mathematics
2 answers:
grigory [225]2 years ago
7 0

Step-by-step explanation:

hope it's helpful.........

xxTIMURxx [149]2 years ago
5 0
X^2-8x-7=0
Add 7 to both sides
X^2-8x=7
Now use formula
(B/2a)^2
(-8/2)^2= 16
Add 16 to left subtract from right to get
X^2-8x+16=-9
Now factor into
(X-4)^2=-9
For your final answer
You might be interested in
Write the polynomial in standard form. Then find its degree and the leading coefficient.
Contact [7]

Answer:

6c^5+4c−301, assuming that you meant 6c^5  

3 0
2 years ago
Consider this sphere inside the cylinder. A sphere is inside of a cylinder with a same radius and height. Which statements are t
sashaice [31]

Answer:

A,C,E

Step-by-step explanation:

8 0
3 years ago
Read 2 more answers
44. Express each of these system specifications using predicates, quantifiers, and logical connectives. a) Every user has access
DENIUS [597]

Answer:

a. ∀x (User(x) → (∃y (Mailbox(y) ∧ Access(x, y))))

b. FileSystemLocked → ∀x Access(x, SystemMailbox)

c. ∀x ∀y ((Firewall(x) ∧ Diagnostic(x)) → (ProxyServer(y) → Diagnostic(y))

d. ∀x (ThroughputNormal ∧(ProxyServer(x)∧ ¬Diagnostic(x))) → (∃y Router(y)∧Functioning(y))

Step-by-step explanation:

a)  

Let the domain be users and mailboxes. Let User(x) be “x is a user”, let Mailbox(y) be “y is a mailbox”, and let Access(x, y) be “x has access to y”.  

∀x (User(x) → (∃y (Mailbox(y) ∧ Access(x, y))))  

(b)

Let the domain be people in the group. Let Access(x, y) be “x has access to y”. Let FileSystemLocked be the proposition “the file system is locked.” Let System Mailbox be the constant that is the system mailbox.  

FileSystemLocked → ∀x Access(x, SystemMailbox)  

(c)  

Let the domain be all applications. Let Firewall(x) be “x is the firewall”, and let ProxyServer(x) be “x is the proxy server.” Let Diagnostic(x) be “x is in a diagnostic state”.  

∀x ∀y ((Firewall(x) ∧ Diagnostic(x)) → (ProxyServer(y) → Diagnostic(y))  

(d)

Let the domain be all applications and routers. Let Router(x) be “x is a router”, and let ProxyServer(x) be “x is the proxy server.” Let Diagnostic(x) be “x is in a diagnostic state”. Let ThroughputNormal be “the throughput is between 100kbps and 500 kbps”. Let Functioning(y) be “y is functioning normally”.  

∀x (ThroughputNormal ∧(ProxyServer(x)∧ ¬Diagnostic(x))) → (∃y Router(y)∧Functioning(y))

4 0
3 years ago
Simplity (4.5)(5)(-2)<br> O45<br> 045<br> 0-45<br> -45
AveGali [126]
The answer is -42 just just multiply
7 0
3 years ago
3. Solve for x. Round to the nearest tenth *<br> 25<br> 16<br> 22<br> Your answer
Ipatiy [6.2K]
Where’s the problem
6 0
3 years ago
Other questions:
  • Which fraction has repeating decimal as it’s decimal expansion
    5·1 answer
  • Plz help with the first and second one❤️
    6·1 answer
  • Which equation represents a parabola that has a focus of (0 0) and a directrix of y = 2
    14·2 answers
  • Find the volume of a cone with base area 36π ft2 and a height equal to twice the radius. Give your answers both in terms of π an
    7·1 answer
  • I need the volume of this triangular prism as soon as possible
    12·1 answer
  • Convert the following to mixed numbers
    6·2 answers
  • Which segments are congruent?
    7·1 answer
  • An IV infiltrates with 330 mL remaining in the bag. It was restarted at 1015 at a rate of 30 mL/hr. What is the IV completion ti
    13·1 answer
  • What is 5 dogs + 180 cats?
    12·2 answers
  • How would you describe the correlation in the data? Explain your reasoning. (2 points).
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!