Answer:
y = 1/2x -3
x=-2 ⇒ y = -4
x=-1 ⇒ y = -3.5
x=0 ⇒ y = -3
x=1 ⇒ y = -2.5
x=2 ⇒ y = -2
Step-by-step explanation:
Hi, to answer this question we have to isolate y:
x - 2y = 6
-2y =6-x
y = (6-x)/-2
y = -3+1/2x
y = 1/2x -3
Now, we have to create a table with the next values (see attachment)
x=-2 ⇒ y = 1/2x -3 = 1/2(-2)-3= -4
x=-1 ⇒ y = 1/2x -3 = 1/2(-1)-3= -3.5
x=0 ⇒ y = 1/2x -3 = 1/2(0)-3= -3
x=1 ⇒ y = 1/2x -3 = 1/2(1)-3= -2.5
x=2 ⇒ y = 1/2x -3 = 1/2(2)-3= -2
Feel free to ask for more if needed or if you did not understand something.
Answer:
1. Security Technology. ...
2. Security Personnel. ...
3. Inventory Audits. ...
4. Just-in-Time Inventory.
Step-by-step explanation:
Reviewing a few examples of safeguarding inventory can shed light on common inventory security methodologies, helping you to implement the ideal inventory safeguards for your business.
Security Technology. ...
Security Personnel. ...
Inventory Audits. ...
Just-in-Time Inventory.
R(t) = 4t
A(r) = π(r^2)
a) A(t) = A[r(t)] = π[r(t)]^2 = π[4t]^2 = 16π(t^2)
b) t = 4,
A(4) = 16*3.14*(16)^2 = 12,861.44
138.43-19.99=118.44
118.44/0.94=126.
Hope this helps :)