cfwscsevcfcv
cfwscsevcfcv
Today at 7:40 AM
Mathematics
Answered
can someone find angle BC????
Answer :
musiclover10045
musiclover10045
Today at 7:44 AM
BC = 11/sin(45) = 11 sqrt2 ft
so D is the answer
Answer Link
VIEW ALL ANSWERS ( 52+ )
Other Questions
Which of the following is not a postabsorptive state reaction? a) Breakdown of liver glycogen b) Lipogenesis c) Gluconeogensis using lactic acid d) Gluconeogens
hygiene product needed when the body matures
The average velocity for a trip has a positive value. Isit possible for the instantaneous velocity at any point during thetrip to have a negative value? Justify
Which of the following is not a part of adaptive immunity? a. Inflammation and fever. b. Antibodies. c. Cell-mediated immunity. d. B lymphocytes. e. Humoral imm
Which of the following is not a true statement? a. When the diaphragm relaxes, it returns to a domelike shape. b. When the diaphragm contracts, it pulls the flo
By dividing x³-x²-x+1 by x-1,then quotient and remainder are
అందరికి ఒకటే కులము సమాన హక్కు ఎందుకు e ఉnడవు
Consider the equation cos θ = − 3 2 \cos \theta = -\frac{\
Essay on health resorts of kashmir
ಜಲಸಂರಕ್ಷಣೆಯ ಪ್ರಾಮುಖ್ಯತೆ
A bar of 75 mm diameter is reduced to 73mm by a cutting tool while cutting orthogonally. If the mean length of the cut chip is 73.5 mm, find the cutting ratio.
In an orthogonal cutting operation, the 0.250 in wide tool has a rake angle of 5º. The lathe is set so the chip thickness before the cut is 0.010 in. After the
A(n) can be a spreadsheet showing all the costs to be incurred by the system and all the benefits that are expected from its operation.
Explain the benefits a recursive algorithm can provide. Use an example from a process in your organization or with which you are familiar.
A group of related files is stored in a(n
What happened in 1877 that signified the official end of Reconstruction?
. A collection of programs designed to create and manage databases is called a(n))
Why are random-access files preferable to sequential-access files in performance- oriented situations?
Please list the computer data hierarchy from bit to database
. What is an APT? What are some practical strategies to protect yourself from an APT?