1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
5

How to the inverse function of f(x)=x2 +1 ,x>o

Computers and Technology
1 answer:
Sindrei [870]3 years ago
5 0
    f(x) = x² + 1, x > 0
       y = x² + 1
       x = y² + 1
   x - 1 = y²
√x - 1 = y
√x - 1 = f(x), x > 1
You might be interested in
Question 1 (2 points)
Lyrx [107]

Answer:

.

Explanation:

.

7 0
3 years ago
Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather
soldi70 [24.7K]

Answer:

Group

Explanation:

A folder assigned to a single user can only be accessed by a single person, to get many users access a folder windows administrator shares a folder to a workgroup. using the simple steps below.

Login as the admin of the system, Right-click on the folder you want to give permission on, after clicking on properties, click on security, add user or group after clicking the edit. and your folder is shared to a group and all users in the group have access to it.

6 0
3 years ago
Over the last ten years, what has caused the audience ratio of three major networks, CBS, NBC, and ABC from 90 percent to 60 per
Goryan [66]
D is your answer good luck
5 0
4 years ago
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
When media is used to communicate with a very large audience, it is referred to as media.
Sophie [7]

Answer:

mass media

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Database management systems _____. a. include transaction-processing reports for database analysis b. are used to create, organi
    6·1 answer
  • When an instance of a class, or object, is specified as a parameter to a method, a reference to the said object is passed to the
    15·1 answer
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • PLEASE HELP !!!! WILL UPVOTE
    5·2 answers
  • A computer supply company is located in a building with three wireless networks.
    10·1 answer
  • The common channel signaling (CCS) system provides a separate network dedicated to control and signaling over the PSTN. This ena
    15·1 answer
  • NTDS Quotas store NT Directory Service quota information that limits the number of Active Directory objects a user, group, compu
    8·1 answer
  • 24. A key on a keyboard of a computer
    12·1 answer
  • which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
    11·1 answer
  • Write a program that takes a list of integers as input. The input begins with an integer indicating the number of integers that
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!