Answer:
They sold 60 hamburgers
Step-by-step explanation:
2 times 300 equals 600 plus 180 equals 780 hope this helps
Answer: 259/260 or 0.99615 (depending on which answer format your teacher wants)
There are 10 numbers in the set {0, 1, 2, ..., 9}. There are 26 letters in the set {A, B, C, ..., Z}. Multiply those values: 10*26 = 260. So there are 260 ways to pick a number followed by a letter. One example is 7P.
There is only one way Matthew can get the correct answer, and there are 260 - 1 = 259 ways to get the wrong answer. We divide 259 over 260 to get the probability of getting the incorrect answer, which is 259/260.
If you need this fraction in decimal form, then use a calculator to find that 259/260 = 0.99615 approximately
Answer:
D) 1
Step-by-step explanation:
When you start raising i to certain powers, you begin to notice a pattern.

This cycle repeats forever. Since 84 is a multiple of 4, i^84 must be 1. Hope this helps!
Answer: Angle bisectors
Step-by-step explanation:
The incenter is the point forming the origin of a circle inscribed inside the triangle. Like the centroid, the incenter is always inside the triangle. It is constructed by taking the intersection of the angle bisectors of the three vertices of the triangle.
B. DEVELOPING A TIME LOG is the first step in beginning to control you time.
A. A COMBINATION OF LETTERS AND NUMBERS password is used to ensure security.
Time log is basically you recording or logging the activities you have done in a certain time of a day. As you do this daily and check on the log for a few days, you will notice that you have done things that are either unimportant and time consuming, in short time was wasted.
Time log is very helpful especially is you are very busy. It will not only help you manage your tasks in any given time, it will also show you the things you can do in a shorter amount of time and allow you to schedule time for relaxation.
Passwords should be composed of a combination of letter and numbers. Other use special characters just to tighten password security. It is better that users create passwords that may form a special meaning to them so that they will not forget it regardless of length and combination.