1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
3 years ago
5

Which option best describes the cheapest way to file your federal income taxes?

Computers and Technology
1 answer:
Triss [41]3 years ago
3 0
<span>C. Complete it yourself using pencil and paper. For most people it is relatively simple to file taxes, barring any factors like retirement accounts or other income like capital gains. Online software can be useful, too, but often carries unforeseen fees that can be avoided by simply filing the tax paperwork yourself.</span>
You might be interested in
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
3 years ago
What are the different ways to represent compounds? Check all that apply. a structural formula a ball model a space-filling mode
bagirrra123 [75]

Answer:

Compound can be represented as a molecular formula,empirical formula, structural formula,ball and stick model, space filling model.

Explanation:

Compounds can be represented as a chemical formula and a molecular model.

A chemical formula shows the number of atoms present in a compound. Whereas, the molecular model shows the geometry of a compound.

The chemical formula can be further divided into 3 types:

1)molecular formula: indicates the actual number of atoms in a compound.

2)empirical formula: indicates the relative number of atoms present in a compound.

3)structural formula: is illustrated in the forms of lines which actually shows the bond(such as covalent bond) and also shows how atoms are connected to each other in a molecule.

Molecular model is preferably a better way to represent a molecule. It is categorised into the following:

1)a ball and stick model: its a three dimensional representation of a compound. The atom(s) in a compound is represented by ball while, their chemical bonds are shown by sticks.

2)A space filling model: its a three dimensional structure,it represents the size and shape of the whole molecule,showing relatively how much space each atom in a molecule occupies.

7 0
3 years ago
Read 2 more answers
You must lower your high beams when within how many feet of an approaching vehicle?
drek231 [11]

2000 feet of any vehicle

7 0
3 years ago
The groups_per_user function receives a dictionary, which contains group names with the list of users. Users can belong to multi
Akimi4 [234]

The groups_per_user function receives a dictionary, which contains group names with the list of users.

Explanation:

The blanks to return a dictionary with the users as keys and a list of their groups as values is shown below :

def groups_per_user(group_dictionary):

   user_groups = {}

   # Go through group_dictionary

   for group,users in group_dictionary.items():

       # Now go through the users in the group

       for user in users:

       # Now add the group to the the list of

         # groups for this user, creating the entry

         # in the dictionary if necessary

         user_groups[user] = user_groups.get(user,[]) + [group]

   return(user_groups)

print(groups_per_user({"local": ["admin", "userA"],

       "public":  ["admin", "userB"],

       "administrator": ["admin"] }))

3 0
3 years ago
Which of the following cryptographic attack refers to extraction of cryptographic secrets (e.g. the password to an encrypted fil
masya89 [10]

Answer:Rubber Hose Attack

Explanation:Rubber hose attack is the illegal act that refers to the technique in which the encryption of data or text that is usually done which is referred with the term "secret".It is usually encrypts or hides the data like passwords, highly confidential data, sometimes illegal information etc from being decrypted or disclosed.

Therefore,the correct option is rubber hose attack.

4 0
4 years ago
Other questions:
  • Do all accounts use the same routing number
    12·1 answer
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • Send me friend rq ;)
    14·2 answers
  • : Show that the propositions (p ∨ q) ∧ (¬p ∨ r) and (p ∧ r) ⊕ (¬p ∧ q) are logically equivalent.
    6·1 answer
  • Which of the following is not a method of the history object?
    11·1 answer
  • Please help explain this calculator code.
    15·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • 11 Select the correct answer. Which external element groups items in a design?
    9·1 answer
  • When a number gets assigned to a variable that already has a value __________. the new number overwrites the previous value at t
    9·1 answer
  • Variables that can take only 2 variables are referred to as which one of the following?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!