1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
11

The nth term of the given sequence is n(n+1)÷2.calculate the number of dots in the 8th term​

Computers and Technology
1 answer:
Bess [88]3 years ago
8 0

Answer:

the 8th term of the given series =n( n+1)÷2= 8(8+1)÷2 = (8×9)/2 = 72÷2 = 36

You might be interested in
Which of the following components does a typical two stroke engine contain
Vlada [557]
It is B- An L-type cylinder head. 
4 0
3 years ago
Read 2 more answers
Which of the following should NOT be done to keep people from slipping on floors? A) Have the proper absorbents in an easy-to-fi
RoseWind [281]

The following options helps keep people from slipping on floors

A) Have the proper absorbents in an easy-to-find place to quickly put on spills : So that accidental little spills can be cleaned right away.

C) Wear slip-resistant footwear : It is a precautionary step to follow, no matter where we go.

D) Mark a slippery area with an easy-to-use tent sign that says " Caution, Slippery floor" : This allows people to be aware of the wet area and cross it cautiously.

Leaving oil and fluids to air dry thoroughly, takes a long time and there are chances that people step over it and slip.

So, the answer is

(B) Anytime oil or fluids are spilled on the floor, leave them to thoroughly air dry.

8 0
3 years ago
Read 2 more answers
A good way to assess your CPU usage is to:_______.
inna [77]
C is likely the best answer here.
8 0
3 years ago
After adding text to a shape, a user can make the text bold and change its color using options in the
lozanna [386]

Answer:

Top area of Word, the second segment.

Explanation:

To make it bold, press the "B" button and to change the colour press the "A" underlined with a colour (normally red).

6 0
3 years ago
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
Other questions:
  • Write a program to input money in cents from user, example 12745 and display the one dollar bills and the cents. Submit source c
    12·1 answer
  • Information systems security is the collection of activities that protect the information system and the data stored in it.
    12·1 answer
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • Which of the following is not a shared characteristic of new media.
    8·1 answer
  • Cuales son los elementos de la programación?
    10·1 answer
  • What quantities are measured by the following sensors:
    9·1 answer
  • ___________ is a task pane used to correct grammar errors; opens when you click the Spelling & Grammar button in the Proofin
    15·2 answers
  • Which of these ia an example of gene flow?
    5·1 answer
  • Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure
    10·2 answers
  • What is the difference between the byte and short data types in Java?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!