1.q=p-2n
2.q=75000-2*20000
q=75000-40000
q=35000
3.p=90000+2*25000
p=90000+50000
p=140000
Hope this helps :)
Step-by-step explanation:
1. we have to write the system specifications as:
A(x,y) give us the meaning that the consule x can be accessed when y is in a faulty condition
∀y∃A(x,y)
2. B(x,y) shows that users email has sent a message, y. Which is in the archive. C(x) shows the email address of user x is retrievable
∀x∃y[B(x,y)→c(x)]
3. D(x,y) shows that x can detect breach y'' and we have E(z) that tells us there is a compromise of z
∀y∃xD(x,y)↔ ∃zE(z)
4. F(x,y,z)
Y and z are distinct point ends which x connects
We have,
∀y∀z∃x∃a[x ≠a →F(x,y,z)^F(a,y,z)
5. G(x,y)
X knowst the password of y' and H(x) means that we have x to be a system administrator
∀x[H(x)→∀yG(x,y)] ∃x[H(x)^∀yG(x,y)]
X=2
Explanation:
2x+14=18
-14 -14
2x=4
Divide 2 with 4 which makes the 2 with the x cancel out. The two 14s cancel out by the way.
So 4 divided by 2 equals 2.
Answer:
Let's solve your equation step-by-step.
x−7=−2
Step 1: Add 7 to both sides.
x−7+7=−2+7
x=5
Step-by-step explanation:
Step 1: Add 7 to both sides.
x−7+7=−2+7
x=5