Предмет: Математика, автор: khohlovnik4

ПОМОГИТЕ РЕШИТЬ ЗАДАЧУ

в школьной библиотеке в четверг выдали 17 книг в пятницу на 15 больше а в суботу в 2 раза больше чем в предыдушие два дня сколько книг взяли ребята в библиотеке за 3 дня

Ответы

Автор ответа: ArinaSolnce1
0
1)17+15 = 32(к)выдали в пятницу
2)17+32 = 49(к)выдали за два дня
3)49*2 = 96(к)за 3 дня
Автор ответа: Владусёнка
0
1 действие: 17+15=32 - в пятницу
2 действие: 17+32=49 - в четверг и пятницу
3 действие: 49 × 2 = 98 - в субботу
4 действие: 17+32+98 = 147 - за 3 дня.
Ответ: 147 книг 
Похожие вопросы
Предмет: Английский язык, автор: badim2011
1. What is Internet security?
2. What does it involve?
3. What is it used for?
4. What methods are used to protect the transfer of data?
5. What is more important, protection or prevention?

Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level, as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing, online viruses, trojans, worms and more.
Various methods have been used to prevent online attacks and enhance internet security. Among the newly emerging methods is high level tracking of incoming risks. Some of the cyber-attacks arrive from sources already known to intelligence, e.g., from belligerent nations, dark web servers, hackers, or arrive in conjunction with real terror threats. With the rise of extremist groups' online activity, including Muslim Jihadist activities, there has been growth in the number of cyber-terror attacks against western targets. In many cases there is a close link between terror and cyberterror threats, as more and more terrorists go beyond physical terror and harness cyberspace to compromise online and offline security of western targets. Many methods are used to protect the transfer of data, including encryption and from-the-ground-up engineering. The current focus is on prevention as much as on real time protection against well known and new threats.