1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
15

Done yay !!!!!!!!!!!!!!

Mathematics
2 answers:
Alex3 years ago
7 0

Adjacent, cosine again.

a = c cos B = 13 cos(16+45/60) = 13 cos(16.75) = 12.448

Choice a

Dahasolnce [82]3 years ago
5 0

Answer:

A

Step-by-step explanation:

cosine rule

You might be interested in
Tim sold half of his comic books and then bought 9 more. He now has 17 . How many did he begin with
Agata [3.3K]

Answer:

16

Step-by-step explanation:

17-9=8

8*2=16

Because had 8 but bought 9 more to where he then had 17 but if you take 8 times 2 then your answer is 16 and that's how many comic books he began with.

Hope this helps


3 0
3 years ago
Read 2 more answers
PLS HELP..DUE IN LIKE 2 MINUTES The coordinates of the endpoints of CE are C(-3, -7) and E(7,-2). Point M(3,-4) is in CE. What i
TiliK225 [7]
Answer: 3:2
The ratio is 3:2
7 0
3 years ago
HEEEELLLLP PPPPLLLLLZZZZ T^T
Rashid [163]

Answer:

1st pic: -25<-20

2nd pic: point c

Step-by-step explanation:

7 0
3 years ago
Read 2 more answers
Hiiooo! Can someone please help me ❤️❤️:)
shusha [124]

Answer:

50

Step-by-step explanation:

6 0
3 years ago
Read 2 more answers
Express each of these system specifications using predicates, quantifiers, and logical connectives, if necessary.
Alja [10]

Step-by-step explanation:

1. we have to write the system specifications as:

A(x,y) give us the meaning that the consule x can be accessed when y is in a faulty condition

∀y∃A(x,y)

2. B(x,y) shows that users email has sent a message, y. Which is in the archive. C(x) shows the email address of user x is retrievable

∀x∃y[B(x,y)→c(x)]

3. D(x,y) shows that x can detect breach y'' and we have E(z) that tells us there is a compromise of z

∀y∃xD(x,y)↔ ∃zE(z)

4. F(x,y,z)

Y and z are distinct point ends which x connects

We have,

∀y∀z∃x∃a[x ≠a →F(x,y,z)^F(a,y,z)

5. G(x,y)

X knowst the password of y' and H(x) means that we have x to be a system administrator

∀x[H(x)→∀yG(x,y)] ∃x[H(x)^∀yG(x,y)]

6 0
3 years ago
Other questions:
  • A ship traveled for a total of 72 miles over the course of 6 hours. Heading south, the ship traveled at an average speed of 13 m
    5·1 answer
  • What is half of 6.75
    9·2 answers
  • If f(x)=2x^2+3x and g(x)=x-2 what is (f+g)(2)
    14·2 answers
  • Ben is 20 years older than Daniel. Ben and Daniel first met two years ago. Three years ago, Ben was 33 times as old as Daniel.
    6·2 answers
  • 1. m∠ABD=50°, m∠DBC=40° Given 2. m∠ABD+m∠DBC=m∠ABC Response area 3. Response area Substitution Property of Equality 4. Response
    15·1 answer
  • The angles below are supplementary. What is the value of x?
    9·2 answers
  • A community swimming pool is a rectangular prism that is 30 feet long, 12 feet wide, and 5 feet deep. The wading pool is half as
    10·1 answer
  • The length of the hypotenuse of a right angled triangle exceeds the length of the base by 2cm and exceeds twice the length of th
    8·1 answer
  • Please help if you can :)
    13·1 answer
  • Triangles MNQ and MOP are similar. What is the slope of segment MO?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!