1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
2 years ago
6

Explain how you can compare the size of a product to the size of a factor when multiplying fractions without actually doing the

multiplication. Include a model
Mathematics
1 answer:
TEA [102]2 years ago
3 0
Here is the answer hope it helps and pls brainlest!!! -Have a great day bye!-

You might be interested in
What equivalent to 5m(m+3)
Lostsunrise [7]

Answer:

5m^2 + 15m

Step-by-step explanation:

use distributive property:

5m(m) is 5m^2

5m(3) is 15m

which is 5m^2 + 15m

3 0
3 years ago
Subtract 9 from 15 then multiply by 5
nlexa [21]
(15-9)*5= 30
The answer is 30
5 0
3 years ago
Read 2 more answers
What is the apparent slope of the line graphed below
maria [59]
I think the answer would be -2.5 because 0-5=-5 and 4-2=2 you subtract the perfect points X1-x2 with y2-y1
4 0
3 years ago
Help please<br><br> Factorise<br><br> x²-x-56<br><br> its due in 4 minutes
Iteru [2.4K]

Answer:

(x-8)(x+7)

Step-by-step explanation:

using quadratic formula we have

x=  \frac{-b+-\sqrt{b^{2}-4*a*c}}{2*a}

we have:

x^2-x-56=0

a= 1 b=-1 c=-56

so we have:

x=(-(-1)+-sqrt(1^1-4*(1)*(-56)))/(2*1)

x=1+-sqrt(1-4*(-56))/(2)

x=(1+-sqrt(225))/2

x=(1+-15)/2

so we have the roots:

x1=(1+15)/2 =8

x2=(1-15)/2=-7

so the answer is (x-8)(x+7)

7 0
2 years ago
Read 2 more answers
How will you graphically represent data in cyber security with math?
qaws [65]

Answer:

Step-by-step explanation:

another math-based concept used in cybersecurity is hexadecimal math. Rather than having only two options, as in binary math, hexadecimal math is based on the idea that you can count up to any one of 16 different options. ... Cryptography is the science of codes and encryption and is based on mathematical theory

3 0
2 years ago
Other questions:
  • Please help me with this question:/
    14·2 answers
  • The width of a rectangle is 3 feet shorter than its length. The perimeter is 306 feet. Let x equal the length of the rectangle.
    15·1 answer
  • Mark and joan worked together to sell a $12,000 air conditioning unit for an apartment building they agreed to split the 12% com
    6·1 answer
  • 8(x+6)-3x=18 please help
    6·2 answers
  • X + 15y - 8c + 6<br> What are the coefficients?
    11·2 answers
  • Scale on a map of Ireland is 1.2 000000 how many square centimetres are represented on the map by the province of Munster.
    15·1 answer
  • A country club bought some single golf carts that cost $7,000 each, and some double golf carts that cost $11,000 each. A
    15·2 answers
  • Melanie wants to create a pattern using a transformation that will change the orientation of a figure but not the orientation of
    10·1 answer
  • Sarah buys 5 rulers and 4 pens work out how much she will pay give your answer in £
    10·1 answer
  • How many times can 5/9 go into 1
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!