1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
3 years ago
12

For problems 14 – 21 determine all the roots of the given function.

Computers and Technology
2 answers:
Natasha2012 [34]3 years ago
8 0

GIVEN:

y(t) = t² - 3t - 40

ANSWER:

At first, we'll split the middle term.

t² - 8t + 5t - 40

t(t - 8) + 5(t - 8)

(t + 5)(t - 8).

lesya [120]3 years ago
7 0
What’s the problem ?
You might be interested in
Which of the following best describes cost-benefit analysis?
d1i1m1o1n [39]

Answer:

A

Explanation:

7 0
3 years ago
Describe security risks associated with downloading items online
AURORKA [14]

Answer:

1. Hackers could get information and sell it. 2. Hackers can get a hold of your files online. 3. Hackers can look at your photos. Download a VPN

8 0
3 years ago
So for my Game Design class I have a quiz coming up...I was wondering if someone could answer some of these practice questions,
Over [174]
1. A script or scripting language is a computer language<span> with a series of commands within a file that is capable of being executed without being compiled.
2. Software development
3. true
4. im not sure
here is a sight that might help 
https://quizlet.com/150321269/video-game-design-terms-flash-cards/
</span>
3 0
3 years ago
Read 2 more answers
Give examples of an outdated memory or storage device. what do you think is the main reason they are outdated?
omeli [17]

Answer:

floppy discs:

easily damaged, large compared to newer external storage drives, newer computers don't have a floppy disc drive

Explanation:

8 0
2 years ago
Read 2 more answers
Which shortcut key in Microsoft Word 2016 will launch Spell Checker?
Pie

Alt + F7 will launch spell checker

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which one of the following features can control left and right indents using markers?
    5·2 answers
  • how to create a program that prime number include arraylist , and if not print the prime factors of the number.
    13·1 answer
  • the UDP server described needed only one socket, whereas the TCP server needed two sockets. Why? If the TCP server were to suppo
    8·2 answers
  • Terry is building a Web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hie
    9·1 answer
  • You csn access various sites on the www by using hyperlinks or by
    7·1 answer
  • hen a computer user stored data in computer memory, it required 1,024 bytes. How many KB does this represent?
    8·1 answer
  • Which of the following statements is true of algorithms?
    15·1 answer
  • System.out.print(two.indexOf('r'));
    8·2 answers
  • The PowerPoint view in which you can edit the slide master is called ______________.
    7·1 answer
  • A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!