1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
8

Solve

a1" title=" \sqrt{3 + \sqrt{3x + 2} } = 2" alt=" \sqrt{3 + \sqrt{3x + 2} } = 2" align="absmiddle" class="latex-formula">
​
Computers and Technology
1 answer:
asambeis [7]3 years ago
5 0
Here you go, let me know if it’s not clear.

You might be interested in
*Sometimes it is difficult to convince top management to commit funds to develop and implement a SIS why*
ziro4ka [17]

Step-by-step Explanation:

SIS stands for: The Student Information System (SIS).

This system (a secure, web-based accessible by students, parents and staff) supports all aspects of a student’s educational experience, and other information. Examples are academic programs, test grades, health information, scheduling, etc.

It is difficult to convince top management to commit funds to develop and implement SIS, this can be due to a thousand reasons.

The obvious is that the management don't see the need for it. They would rather have students go through the educational process the same way they did. Perhaps, they just don't trust the whole process, they feel more in-charge while using a manual process.

4 0
3 years ago
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
Write a program whose inputs are three integers, and whose outputs are the largest of the three values and the smallest of the t
Monica [59]

Answer:

int SmallestNumber(int num1, int num2, int num3){

int smallest;

if (num1 >num2){

smallest=num2;

}

else {

smallest=num1;

}

if(smallest <num3){

smallest=num3;

}

}

int LargestNumber(int num1, int num2, int num3){

int largest;

if (num1 <num2){

largest=num2;

}

else {

largest=num1;

}

if(largest>num3){

largest=num3;

}

}

void main(){

int num1,num2,num3;

printf("enter values");

scanf("%d%d%d",&num1,&num2,&num3);

int smallest=SmallestNumber(num1,num2,num3);

int largest=LargestNumber(num1,num2,num3);

}

Explanation:

we are comparing first two numbers and finding largest among those. After getting largest comparing that with remaining if it is greater then it will be largest of three. Same logic applicable to smallest also

7 0
3 years ago
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Komok [63]

Answer: Layer 3

Explanation:

The layer 3 in OSI model is the network layer which is responsible for routing the packet across the network.

So we need a switch and a router for the LAN and WAN connection and both of them has to support the same protocols at layer 3.

3 0
3 years ago
What is the difference between sound proofing a room and acoustically treating a room?
Sergio [31]
The sound proof room has no sound at all, and an acoustically treated room has small sounds.
3 0
3 years ago
Other questions:
  • The method __________ sets the font (helvetica, 20-point bold) in component
    5·1 answer
  • If a student is looking for the degree symbol (°) and it is not found on the main drop-down of symbols, what should the student
    9·2 answers
  • Which of the following is the main consideration when choosing an appropriate outlet box?
    7·2 answers
  • Which type of password would be considered secure
    13·2 answers
  • The appropriate software to use for creating research papers is ________ software. Select one: A. presentation B. word processin
    15·1 answer
  • The purpose of a report is to
    13·1 answer
  • which statement is true? O A Future games will be more context oriented. OB. Future games will be more product driven. Future ga
    13·2 answers
  • In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:
    13·1 answer
  • Explain how a magnetic hard disk drive (HDD) operates.
    12·1 answer
  • POR FAVOR AYUDENME DIGAN SOLO 10 Ejemplos de Software de Sistema. SI NO REPRUEBO Y LE DOY CORONA
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!