1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
3 years ago
12

Which of the following criteria would not make a person eligible to receive medicare benefits?Which of the following criteria wo

uld not make a person eligible to receive medicare benefits?
a.

The person is 65 years of age or older.


b.

The person has a terminal illness.


c.

The person has a qualifying disability.


d.

The person has end stage renal disease.
Computers and Technology
2 answers:
Mumz [18]3 years ago
4 0
B terminal illness .....
ale4655 [162]3 years ago
4 0

The answer is: B. The person has a terminal illness

An illness would be considered as 'terminal' if the medical professionals have no method to adequately treated and there is a high likelihood that it would be resulted in death.

People with terminal illness tend to not receive medicare benefit and the funding would be allocated to other people with higher expectation of living.

You might be interested in
You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
bearhunter [10]
Hey there!

Memory (RAM) is considered to be hardware since it is a physical component that makes up the computer and is accessed through the CPU rather than internal code that makes the computer run (which is software). Therefore, if you are having issues with the memory, it is likely a problem with a memory chip, making it a hardware issue. 

Hope this helped you out! :-)
8 0
3 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
_______are a set of track sectors, ranging from 2 to 32 or more, depending on the formatting scheme in use.
Nadusha1986 [10]

Answer:

pretty sure it's d. clusters

if not it's also probably a. cylinders

Explanation:

7 0
2 years ago
Code a program that gets all possible solutions of a string using 3 for loops. Actual question attached
Nikitich [7]

\tt x=int(input("Enter\:first\:no:"))

\tt y=int(input("Enter\:second\:no:"))

\tt z=int(input("Enter\:third\:no:"))

\tt for\:x\:in\: range (3):

\quad\tt for\:y\:in\:range(3):

\quad\quad\tt for\:z\:in\:range(3):

\quad\quad\quad\tt if\:x!=y\:and\:y!=z\:and\:z!=x:

\quad\quad\quad\quad\tt print(x,y,z)

8 0
2 years ago
If they spend all night writing computer programs, Laurence can write 10 programs while Carrie Anne can write 5. If they spend a
kondaur [170]

Answer:

Laurence can write 10 programs while Carrie Anne can write 5.

Laurence can make 6 sunglasses while Carrie Anne can make 4

Explanation:

3 0
2 years ago
Other questions:
  • Which cloud computing service model will enable an application developer to develop, manage, and test their applications without
    15·1 answer
  • Name three types of data stored on a computer’s hard disk
    11·1 answer
  • For a new version of processor, suppose the capacitive load remains, how much more energy will the processor consume if we incre
    11·1 answer
  • Is it possible for the front and rear references in a circular array implementation to be equal?
    8·1 answer
  • Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the
    12·1 answer
  • How do I install another part on campaign call of duty cold war? please help.(best answer will get branliest.)
    15·2 answers
  • KAPWING Video Editing Software allows you to use existing You Tube Videos in your design.
    8·1 answer
  • Which generation computer supported GUI operating system?​
    11·1 answer
  • Dominic list his camera for sale on an online auction site Chloe is the highest bitter and purchase as the camera how does the a
    14·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!