Apply the rules for reciprocals to the following problems:

1. Take the reciprocal of 5.
2. Take the reciprocal of 3x.
3. Take the reciprocal of x / y.
4. Take the reciprocal of 1/5.
5. Take the reciprocal of 1/6.
6. Multiply 4 by the reciprocal of 2
7. Take the reciprocal of the reciprocal of 3. 8. Express the reciprocal of 8/7 as a fraction. 9. Express the reciprocal of 5/3 as a fraction. 10. Multiply the number 12,345 by its


![15018|755x241](upload://701fztN7C82MeDeiXU1khzbADxJ.jpeg)

Computer Science & Information Technology

You might also like to view...

____________________ is the process of marking a file or files for exclusion when the commands Put, Get, Synchronize, Check In, or Check Out are used.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ____ mask functions and can be used exactly like a layer mask.

A. spot B. shadow C. motion D. filter

Computer Science & Information Technology

Which of the following is a characteristic of the parallel approach to information security?

A. Compliance is discretionary. B. Security is the responsibility of the IT department. C. Little or no organizational accountability exists. D. All the above.

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which of the following technologies is your new inventory tracking system at your small business most likely to use?

A. TCP/IP B. Bluetooth C. IrDA D. UWB

Computer Science & Information Technology