eisaplayz7
eisaplayz7
Today at 10:17 PM
Mathematics
Answered
please help with this :D
Answer :
Ryan92824
Ryan92824
Today at 10:22 PM
Answer:
130°-85°=45°
x=45°
Hope it will help you
Answer Link
VIEW ALL ANSWERS ( 48+ )
Other Questions
Place the following steps of phagocytosis in the order that they occur: Endosome fuses with lysozome Dendritic cell engulfs Rhinovirus Epitopes are attached to
Which of the following is a function of vitamin C? a) It helps form collagen. b) It is involved in energy metabolism. c) It helps rid the body of antioxidants.
In general, a woman with a waist circumference greater than inches and men with a waist circumference of greater than inches have a high risk of central-obesity
Place the following steps of phagocytosis in the order that they occur: Endosome fuses with lysozome Dendritic cell engulfs Rhinovirus Epitopes are attached to
Weight maintenance may require a person to expend a minimum of kcalories in physical activity per week. a) 500 b) 1250 c) 1500 d) 2500 e) 3500
types of education and modernization
suggest the ways to access rentation of children in school
When ashish turns up 1 on the dice which side they will move the token
Please help Maths. Please!!!!Do it in a Copy. If you do this you are A good human..
explain zamindari system in easy words and also give the meaning of term zamindars andzamindari bandobast ......
A circle is the collection of points in a plane that are the same distance from the radius. True or false?
Bell-LaPadula is an example of what type of access control model? a. DAC b. RBAC c. MAC d. ABAC
What OASIS standard markup language is used to generate provisioning requests both within organizations and with third parties? a. SAML b. SPML c. XACML d. SOA
A Type 2 authentication factor that generates dynamic passwords based on a time- or algorithm-based system is what type of authenticator? a. A PIV b. A smart ca
What RAID level is also known as disk mirroring? a. RAID 0 b. RAID 1 c. RAID 3 d. RAID 5
The large business that Jack works for has been using noncentralized logging for years. They have recently started to implement centralized logging, however, an
If we output through the planetary carrier we get a (an) ? Ratio
How many possible keys exist when using a cryptographic algorithm that has an 8-bit binary encryption key? a. 16 b. 128 c. 256 d. 512
Fred's new employer has hired him for a position with access to their trade secrets and confidential internal data. What legal tool should they use to help prot
Ed's organization has 5 IP addresses allocated to them by their ISP but needs to connect over 100 computers and network devices to the Internet. What technology