1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
13

Have you searched Buzz Ch.at on playstore​

Computers and Technology
1 answer:
deff fn [24]3 years ago
3 0

Answer:

Reorder terms.

y=52x−1

Cancel the common factor of 22.Factor 22 out of −2-2.

y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))

Cancel the common factor.

y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)

Rewrite the expression.

y−4=5x2+5⋅−1y-4=5x2+5⋅-1

Multiply 55 by −1-1.

y−4=5x2−5

You might be interested in
Many application controls are useful for enhancing the reliability of both transaction data and master record data. This applica
Rzqust [24]

Answer:

True

Explanation:

In most accounting software like SAP, Application control performs what is known as validity check.

And Validity check is when this application control compares the data entered into a field for a transaction to that in a master record to verify the data entered exists.

With above definition we can infer that the question statement is true.

5 0
3 years ago
Pseudocode of creating a program to convert to IEEE 754 to a real number
Eduardwww [97]

Answer:

  • Step1: Check If the number is Positive or Negative.  
  • Step2: If it is positive then save the sign of it as 0.  
  • Step3: If it is negative then save the sign of it as 1.
  • Step4: Covert the negative number to Positive.
  • Step5: Convert the IEEE 754 to Binary.
  • Step6: convert the integer part into binary form  
  • Step7: Convert fractional part into binary form
  • Step8: To convert Integer part, Devide the number by 2 and note down the reminder and Keep deviding unless dividend is less than 2
  • Step9: copy all the reminders together
  • Step10: Multiply decimal part by 2 unless fractional part is 0.
  • Step11: By noting down integral part, keep multiplying decimal part by new value of 2 untill perfect number is reached.
  • Step6: Find the Mantissa.
  • Step7: Concatinate the Sign, exponent and the mantissa.

Explanation:

For Example : 20.75

First step (converting 50 (in base 10) to binary):

  • No is Positive
  • By dividing 20 by 2, which gives 10 with no remainder 0.
  • Now Devide 10 by 2, which gives 5 with a remainder of 0.
  • Now Devide 5 by 2, which gives 2 the reminder as 1
  • Now Devide 2 by 2, which gives 1 with reminder as 0
  • Now devide 1 by 2, which gives 0 with reminder as 1
  • We read the result from bottom to top  which is 10100

Second part is to convert 0.75 to binary:

  • We have to multiply 0.75 by 2, which gives 1.5. We keep only the integer part, which is 1.  
  • Now, we do 1.5 - 1, which gives 0.5. Now, We multiply 0.5 by 2, which gives 1.  
  • Now we do 1 - 1, which gives 0.
  • Reading from Top to bottom will give 110

Final Answer is : 10100.110

8 0
3 years ago
What type of switch is used to combine multiple network connections into a single link?a. core switchb. gateway switchc. aggrega
hichkok12 [17]

Answer:

C. Aggregation switch.

Explanation:

Aggregation switch is a type of switch used to combine multiple network connections into a single link.

In Computer Networking, Aggregation switches are primarily designed to be used for connecting the Top-of-Rack (ToR) switches to a core switch or router, as the case may be.

Generally, the core switch is typically placed at the top of the data center network architecture topology.

An aggregation switch is usually designed to be large in size and has a lot of interfaces or ports for the connection of multiple networks into a single logical link.

<em>Additionally, the connections are mainly done in parallel in order to prevent total downtime or redundancy in a network, as well as to enhance the throughput than what is obtainable in a single network. </em>

8 0
3 years ago
Suppose that f is a function with a prototype like this:
GrogVix [38]

Answer:

C. node*.

Explanation:

A linked list is a linear data structure where which contains elements stored at non contiguous memory location.They are linked to each other.Every node in a linked list is a pointer.Node consists of a data element and a pointer of node type which contains the address of the next node.

So to connect all the nodes we need the node to be a pointer.That's how we can connect them by address.

8 0
3 years ago
B) The company's chief financial officer recognizes the need for an upgrade to the smart watches, but does not understand why th
wlad13 [49]
There isn’t much to say either than it’s a high budgeted thing to upgrade from a software to another and with it comes time and shipping fees if so
6 0
3 years ago
Other questions:
  • What is the purpose of a title slide? A) To add titles to each slide B) To introduce the presentation C) To describe the resolut
    12·2 answers
  • PLEASE HELP!! HELP ME
    10·1 answer
  • What features should you look for in a printer? describe at least four in detail.?
    12·1 answer
  • Is "all swans are white" a statement
    6·1 answer
  • Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
    10·1 answer
  • Investigar las oportunidades de empleo y el autoempleo dentro del área de la especialidad<br>​
    14·1 answer
  • Any action that causes harm to your computer is called a
    15·1 answer
  • Decribe the advantages of using emails compared with physical faxing ?
    8·1 answer
  • If any one answered this i will give brilientst what is stimulation program​
    6·1 answer
  • List 10 ways how can graphic design help the community
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!