1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
4 years ago
15

Davia draws a shape with 5 sides. two sides are each 5 inches long. two other sides are each 4 inches long. the perimeter of the

shape is 27 inches. what is the length of the fifth side
Computers and Technology
1 answer:
kramer4 years ago
6 0
2(5) + 2(4) + x = 27
10 + 8 + x = 27
18 + x = 27
x = 27 - 18
x = 9
You might be interested in
Write an application that reads values representing a time duration in hours, minutes, and seconds and then prints the equivalen
aniked [119]

Answer:

Explanation:

def cvtToSeconds(hours,minutes,seconds):

   total_seconds=3600*hours+60*minutes+seconds;

   return total_seconds

def readData():

   hours = eval(input("Enter Hours: "))

   minutes = eval(input("Enter Minutes: "))

   seconds = eval(input("Enter Seconds: "))

   total_seconds=cvtToSeconds(hours,minutes,seconds)

   print("Total Seconds: "+str(total_seconds))

readData()

8 0
3 years ago
Which two features offered by SharePoint
olganol [36]

Answer:

Collaboration.

Content Management.

Business Intelligence

Explanation:

5 0
3 years ago
At its time of construction, one of the fastest computers in the world is referred to as a(n) _________________.​
Cerrena [4.2K]
The answer for your problem is "super computer" These types of computers can processes 1 million or more digit numbers in one second. 
4 0
3 years ago
Helppp meeeeeeeeeeeeeee
Maru [420]

Answer:

A

Explanation:

this is the god i think they worship

4 0
3 years ago
_____ is when an attacker uses bluetooth to establish a serious connection to a device allowing success to the full at command s
Furkat [3]

"Bluebugging" is when an attacker uses bluetooth to establish a serious connection to a device allowing success to the full at command set.


Nearly everybody today has a cell phone and one of the highlights that comes standard is Bluetooth capacity. Since your gadget has Bluetooth capacities, it additionally has the ability to be hacked.

On the off chance that your cell phone is hacked by means of Bluetooth association, you are possibly in danger of losing your phone's information, pictures, recordings, messages, contacts, and other data traded off.

On the off chance that a programmer Bluebugs your phone, they increase add up to access and control of your gadget. This makes it fit for them to get to all information including photographs, applications., contacts, and so forth. Bluebugging can happen when your gadget is left in the discoverable state.

6 0
4 years ago
Other questions:
  • A _____ is a digital media file distributed over the Internet using syndication feeds for playback on mobile devices and persona
    6·1 answer
  • The internet is a worldwide assembly of computer
    11·1 answer
  • Collaborative devices are applications that allow users to work together even when they are in different locations.
    14·2 answers
  • Imagine that you are preparing a series of bitmap graphics for a Website. To decrease the download time for each graphic, you ca
    5·1 answer
  • Computer input is the process of translating physical signals (light, sound, movement) into which of the following?
    8·2 answers
  • A network that typically reaches a few meters, such as up to 10 meters (33 feet), and consists of personal devices such as mobil
    14·1 answer
  • Your ad can show on the Google Search Network when someone searches for terms that are similar to your:
    6·1 answer
  • A(n) ___________________________________ is a legal contract between a vendor and a user that governs the use of a software pack
    11·1 answer
  • Hola buenas tardes, mi problema es el siguiente, en Word quiero alinear los párrafos por separado, pero, así lo sombree una line
    8·1 answer
  • Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course, I will give brainies
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!