1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
13

Four workers take an extra half-hour for lunch, at a cost of $14/ hour

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
8 0

Answer:

whats the rest ?

Explanation:

whats the rest ?

You might be interested in
Spreadshet formula to add totals​
frozen [14]

Answer:

=SUM(Range value)

like =SUM(A1:A7) or =SUM(A1:H1)

Explanation:

We need to make use of the SUM function, and then we need to mention the cells or range value that references a series of cells row-wise or column-wise. Like a range value of A1:A7 means A1,A2,A3,A4,A5,A6,A7 and the range value of A1:H1 means A1, B1,C1,D1,E1,F1,G1,H1. And similarly, you can represent various cells depending upon the code you come up it, and finally, you need to sum them all using the SUM function.

7 0
3 years ago
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
belka [17]

<em>Answer:</em>

<em>A loosely organized collection of citizens and engineers who communicate mostly by email. </em>

Explanation:

6 0
3 years ago
Find the area of square whose perimeter is 260.8m​
inessss [21]
4251.04

The perimeter (260.8) over 4 is equal to each side length (65.2)

65.2^2 = 4251.04
5 0
2 years ago
In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
Brrunno [24]

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

5 0
3 years ago
Read 2 more answers
Please help! Game design!
kvasek [131]

Answer:

player vs anonymous players

4 0
3 years ago
Other questions:
  • I can't wait until school ends
    9·2 answers
  • Blank spaces or unseen control characters in a data file are referred to as
    5·2 answers
  • Its a zoom call
    7·1 answer
  • A ________ topology uses more than one type of topology when building a network. crossover multiple-use fusion hybrid
    11·1 answer
  • Which ORDER BY clause causes 10 rows to be retrieved from the result set, starting with the 20th row?
    5·1 answer
  • Which of these is an aggregator?
    9·2 answers
  • 2. Used to drive in or remove screws that fasten electrical wires or other electrical accessories. A. Pliers C. Screwdrivers B.
    15·1 answer
  • 31
    10·1 answer
  • A plan budget time for studying and activities is referred to as?
    11·1 answer
  • I need app ideas for basic everyday problems​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!