Put the following equations into the slop-intercept form (y = + b) and read the value of the slope and y-intercept.

y = —3x —2

Already in standard form Slope = — 3


y-intercept = — 2

Computer Science & Information Technology

You might also like to view...

_________ provides the highest level of wireless networking authentication security

a. WEP b. WPA2-Enterprise c. 802.11 d. TCP/IP

Computer Science & Information Technology

The default setting for text boxes you insert is for text not to wrap.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Adding a file as a(n) ____________________ enables you to open, edit, and save the file in the original program (if you have that program installed on your computer), and to view the alterations in your composition.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When creating a new user, the "User cannot change password" option can't be used in conjunction with what other option?

A. Password never expires B. Account is disabled C. User logon name (Pre-Windows 2000) D. User must change password at next logon

Computer Science & Information Technology