1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
3 years ago
7

Help pleasex + 1 = –x + (–5)​

Computers and Technology
1 answer:
blsea [12.9K]3 years ago
4 0

Explanation:

x + 1 =  - x + ( - 5) \\ x + 1 =  - x - 5 \\ x + x =  - 1 - 5 \\ 2x =  - 6 \\  \\ x = -   \frac{6}{2}  \\  \\ x =  - 3

You might be interested in
sara has just started using the Internet. She would like to be more efficient . In 3-4, give sara some advice about how to be mo
natta225 [31]

Hello,

Well my advice for Sara when using the web would be 3 things.

1: Never tell anyone where you live,Your name, Or any other personal information.

This is important as it will keep you safe and others that are in your family.

2: Get anti virus hardware on your devise.

This will help to stop bad people, and bugs/glitches,this will also protect you from information thieves.

3: Make sure to keep your passwords saved on paper.

I know a lot of people use, google(ect.) to save there passwords to make everything easy, but a good way to never loss them is to wright them down.

Have a great day!



7 0
3 years ago
Definition of laptop
zaharov [31]
A device that sucks bc mien broke
7 0
2 years ago
Read 2 more answers
What term is used to identify the visual interface that displays information it receives from the computer?
olga nikolaevna [1]
The answer to this question is A
7 0
3 years ago
The technique of ________ uses three columns that allows the entrepreneur to weigh both the advantages and the disadvantages of
Mekhanik [1.2K]
Force-field analysis
5 0
3 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
2 years ago
Read 2 more answers
Other questions:
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • A modern information-processing model that views memories as emerging from particular activation patterns within neural networks
    6·1 answer
  • Write a function named "higher_lower" that takes an int as a parameter and returns "higher" if 14 is greater than the input and
    11·1 answer
  • Please help me. Adnan also wants to add a photograph of a bridge. It is on another PowerPoint presentation that is open in a dif
    11·1 answer
  • Which of the following correctly declares and initializes a Scanner object that will use input from the keyboard as its data sou
    13·2 answers
  • Which of these parts serves as the rear cross structure of a vehicle?
    12·1 answer
  • Un producto tecnológico puede ser tangible o intangible?
    6·1 answer
  • Do yall think I should be lonely and quit life!!
    8·2 answers
  • The RGB value below produces a shade of purple. What does the number 175
    15·2 answers
  • Say true or false
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!