1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
3 years ago
8

\\" alt="\sqrt{3} +\sqrt{x} =3\\" align="absmiddle" class="latex-formula">
Computers and Technology
2 answers:
Alchen [17]3 years ago
4 0

Answer:

in place of x there will be 6

Likurg_2 [28]3 years ago
4 0

▪▪▪▪▪▪▪▪▪▪▪▪▪  {\huge\mathfrak{Answer}}▪▪▪▪▪▪▪▪▪▪▪▪▪▪

value of x is equal to ~

\boxed{30 - 6 \sqrt{3} }

\large \boxed{ \mathfrak{Step\:\: By\:\:Step\:\:Explanation}}

Let's solve for x ~

  • \sqrt{3}  +  \sqrt{x}  = 3

  • \sqrt{x}  = 3 -  \sqrt{3}

  • {(\sqrt{x} ) }^{2}  = (3 -  \sqrt{3} ) {}^{2}

  • x = 3 {}^{2}  +  (\sqrt{3} ) {}^{2}  - (2 \times 3 \times  \sqrt{3} )

  • x = 27 + 3 - 6 \sqrt{3}

  • x = 30 - 6 \sqrt{3}  \:  \: or \:  \: 6(5 -  \sqrt{3} )

You might be interested in
In an internal combustion engine, the gasoline is combined with _______.
timurjin [86]
C, air.

The gasoline and air are mixed together in precise portions and then this mixture combusts in the engine.
8 0
3 years ago
Enlist few database you use often.
sveticcg [70]

Answer: Oracle Database

MySQL

Microsoft SQL Server

social media

Explanation:

4 0
3 years ago
Read 2 more answers
Differentiate between symmetric and asymmetric encryption
Shalnov [3]

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

8 0
2 years ago
Read 2 more answers
To deny traffic destined to a specific tcp port you will need to apply a __________ access control list.
Fiesta28 [93]
The correct answer for the fill-in-the-blank is [user]3
4 0
4 years ago
Ai biết cách tra code đáp án trên LMS, Moodle/Quiz không ạ??
mariarad [96]

Answer:

không nhé học đi bạn đừng có cheat hỏng người đấy

Explanation:

4 0
3 years ago
Other questions:
  • Write a program that calls fork(). Before calling fork(), have the main process access a variable (e.g., x) and set its value to
    5·1 answer
  • One metric ton is approximately 2,205 pounds.
    6·1 answer
  • To increase the view of a document on the screen, use the _____. View icon Zoom slider full-screen reading boldface font
    9·1 answer
  • Which utility would you use to return the common name of the computer you're at? Execute this command and submit screen shots.
    11·1 answer
  • To add another worksheet to an Excel file, click on the _____
    15·1 answer
  • Email, instant messaging and most web traffic go across the internet in the clear; that is, anyone who can capture that informat
    15·2 answers
  • Wireshark is an example of what type of utility? A) Packet sniffer B) Port scanner C) Vulnerability scanner D) Content filter
    11·1 answer
  • Talia was a scientist whose research compared the birth rates of young
    12·2 answers
  • Cuales son mis fortalezas como estudiantes
    14·1 answer
  • LAST TIME ASKING FOR APPS THAT ARE FREE THAT I DONT NEED TO PAY THE APPS HAVE TO HELP ME STOP VIRUSES FROM MY PHONE PLZ HELP THE
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!