7x² - 19x + 10 = 0 7x² - 14x – 5x + 10 = 0 7x (x - 2) – 5 (x - 2) = 0 x = 2, 5/7 II. 8y² + 2y – 3 = 0 8y² + 6y – 4y – 3 = 0 2y(4y + 3) – 1 (4y + 3) = 0 y = −3/4, 1/2 Hence, x > y Alternate Method: if signs of quadratic equation is -ve and +ve respectively then the roots of equation will be +ve and +ve. So, roots of first equation = x = 2, 5/7 if signs of quadratic equation is +ve and -ve respectively then the roots of equation will be -ve and +ve. (note: -ve sign will come in larger root) So, roots of second equation = y = -3/4, ½ After comparing roots of quadratic equation we can conclude that x> y.
There is a BST and below is the Pre order of the BST, What will be it’s In order
150 70 60 80 250 200 350
Which web application vulnerability is most commonly exploited through code injection, allowing attackers to manipulate database queries?
Which of the following is a critical component of data protection in both Windows and Unix/Linux environments?
___________________ is the amount of time taken to fulfill the request by the process. It can be calculated by taking the difference between the complet...
Why does paging incur memory overhead in operating systems?
Which of the following statements accurately describes the use of the SQL CREATE statement?
What was the term "Monitor" used to describe in the context of early operating systems?
Which of the following best describes the concept of ‘Concurrency’ in the context of Operating Systems?
What is the primary purpose of the fork() system call in Unix-based operating systems?
Which is best fit for blank space 17?