darnellmichele
darnellmichele
Today at 10:32 PM
Mathematics
Answered
Find the value of x.
Answer :
HaQuangThang
HaQuangThang
Today at 10:37 PM
Answer: x=67,5
Step-by-step explanation: 45 + x + x = 180 --> x=67,5
Answer Link
VIEW ALL ANSWERS ( 32+ )
Other Questions
What word in the sentence provides a context clue to help find the meaning of the word “episode”?
in this food web what is represented by the chains of arrows from the grass to the foxes , hawks and snakes ?
The name Mesopotamia comes from Greek and means between two rivers which are the two rivers referenced in the name
-1 3/8 divided by (-1 4/7) simplified in a fraction form
in this food web what is represented by the chains of arrows from the grass to the foxes , hawks and snakes ?
Plz help me on making the project on various irrigatin practices in the village and the change on cropping pattern in last decade
ch 16. water4. How can 'better management of water resources' help in conservation of water? 5. Write in brief, about the basic details and the role of the'sew
limit gauges are used to
How can you change template
Given chemical species and their charges:- $ \text Cl}^{-1}
There is overwhelming research in psychology that supports the idea of the integrated self which argues that there is a balance of nurturing and nature that mak
What theory holds that individuals and states alike act according to the iron logic of self-interest?
The human genome is a diploid genome. However, when germ-line cells produce gametes, these specialized cells are haploid. What is the total number of chromosome
A vehicle factory manufactures cars. The unit cost (the cost in dollars to make each car) depends on the number of cars made. If cars are made, then the unit co
Which two characters do you use to tell the command that you are finished providing options and that the remaining data on the command line is arguments
The parking lot at a grocery store has 90 cars in it. 90% of the cars are blue. How many cars are blue? a 10 cars b 81 cars c 810 cars d 100 cars
Remote access connections must be secured using authentication and encryption software. software confirms the identity of the user or computer system.
What is the name of the practice that consists of requiring pickers to gather the items for several orders at once, but keep them separate in separate totes?
Debt that is callable by the creditor in the upcoming year, but is not expected to be called, is reported as
The malicious use of computer code to modify the normal operations of a computer or network is called a .