Step-by-step explanation:
1. we have to write the system specifications as:
A(x,y) give us the meaning that the consule x can be accessed when y is in a faulty condition
∀y∃A(x,y)
2. B(x,y) shows that users email has sent a message, y. Which is in the archive. C(x) shows the email address of user x is retrievable
∀x∃y[B(x,y)→c(x)]
3. D(x,y) shows that x can detect breach y'' and we have E(z) that tells us there is a compromise of z
∀y∃xD(x,y)↔ ∃zE(z)
4. F(x,y,z)
Y and z are distinct point ends which x connects
We have,
∀y∀z∃x∃a[x ≠a →F(x,y,z)^F(a,y,z)
5. G(x,y)
X knowst the password of y' and H(x) means that we have x to be a system administrator
∀x[H(x)→∀yG(x,y)] ∃x[H(x)^∀yG(x,y)]
Answer: (8,0) and (0,-4)
Step-by-step explanation:
The x-intercept of an equation is when the equation touches the x-axis which is also where y = 0
So the x coordinate of the x-intercept is -2x + 0 = -16 as y = 0
x = 8 so the x-intercept is (8,0)
The y-intercept of an equation is when the equation touches the y-axis which is also where x = 0
So the y coordinate of the y-intercept is 0 + 4y = -16 as x = 0
y = -4 so the y intercept is (0,-4)
I believe the answer is A!!
Answer:
40 seconds
Step-by-step explanation:
cheetah: y=90x
antalope: y=60x+120
set them = to each other
90x=60x+120
30x=120
x=40
Answer:
k² + 10k + 24
Step-by-step explanation:
First, the square has side length k. Now in rectangle,
l= k+6
b= k+4
Ar. of rectangle= l×b
Eq.
(k+6)(k+4)
opening bracket,
k² + 6k + 4k + 24
k² + 10k +24