1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
11

Write an expression to compute the quartic root of x. the quartic root of a number is the square root of its square root. exampl

es: for example, the quartic root of 16.0 is 2.0 because: the square root of 16.0 is 4.0 and the square root of 4.0 is 2.0. another example: the quartic root of 81.0 is 3.0 because the square root of 81.0 is 9.0 and the square root of 9.0 is 3.0. thus, to find the quartic root of a number you take the square root of the number and then take the square root of that. in this exercise you must find the quartic root of x in a single expression -- you must not write any statements . also, you may only use the sqrt() function-- no other functions.
Computers and Technology
1 answer:
UNO [17]3 years ago
5 0
Answer = sqrt(sqrt(x))

Is this what ur looking for?
You might be interested in
1. Some of the music in the 1960s was used to protest social and political issues. Is music still used as a form of protest? Why
Nastasia [14]
It can be used as a form of protest still today, in fact many artists (drake,xxxtentacion,etc. rappers) protest in their rap today, like how donald glover in the song "this is america" was in a way protesting america by singing about the police brutality towards black people and how they are treated unfairly, he even did the jim crow dance in the song as well.
3 0
3 years ago
Question2.<br> What are the functions of information technology?
vovangra [49]

Answer:

I) infrastructure

ii) communication

iii) introduces and maintains computerized systems to process data efficiency , etc

3 0
2 years ago
Which of the following statements is FALSE?
valentinak56 [21]
B. Late breaking news typically goes to television coverage before the Internet because of accessibility
4 0
3 years ago
Read 2 more answers
use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
Kobotan [32]

Answer:

It is essential for the existence of a helicopter administration over all other users on the system.

 

Explanation:

A system account is a computer user account that is generated by an operating system (OS) during installation of the OS and that is utilized by the user in accordance to the parameters with which it has been designed and the purpose which it was created.

A System account is usually referred to as a privileged account because it comes with full control on one or more directories. A directory is simply a location for file storage on a computer. Full access or control includes the ability to:

  1. read directories
  2. write to directories
  3. make changes to and delete files, folder and subfolders.
  4. alter authorization settings for all files and subdirectories.

Besides control on the directory level, System Accounts which are also called Super Accounts which in addition to the above have permission to

  • install  and remove software applications
  • update and or upgrade the computers operating system
  • access directories and files which normal users cannot and should not.

System Accounts are therefore important for security reasons. They are configured to act as a supervisory account which can create, authorise and terminate other accounts and processes.

Some of their merits include the ability to:

  1. Oversee, audit, and completely control all other privileges.
  2. forestall cyber attacks on the system from internal users or insiders.
  3. Establish and provide evidence for compliance with regulatory codes

Cheers

8 0
3 years ago
A personal career profile for can be used to match what you know about yourself to what you know about different careers
mel-nik [20]

Answer:

B

Explanation:

give answers next time pls so i can help you!!

3 0
4 years ago
Read 2 more answers
Other questions:
  • A Chief Information Officer (CIO) recently saw on the news that a significant security flaws exists with a specific version of a
    5·1 answer
  • What is the name of the keyboard developed in the 1930s?
    13·1 answer
  • Why are fixed resistors’ values indicated by color bands rather than printing the numeric value on their exterior?
    13·1 answer
  • (Display nonduplicate words in ascending order)
    11·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    6·1 answer
  • Using computers in place of paper to design components, products, and processes is referred to as ______.
    11·1 answer
  • When doing career research online, you always want to make sure you are viewing a reliable source, what factors about the websit
    10·2 answers
  • The biggest risk for the elderly when considering technology is
    11·1 answer
  • How is an API different from a web application?
    10·1 answer
  • Tape is magnetic tape which sound ca be recorded , true or false?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!