1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
5

A diet to contain at least 2400 units of vitamins, 1800 units of minerals, and 1200 calories two foods , Food A and Food B are t

o be purchased. Each unit of Food A provides 50 units of vitamins, 30 units of minerals and 10 calories. Each unit of food B provides 20 units of vitamins, 20 units of minerals and 40 calories. If Food A costs $2 per unit and Food B costs $1 per unit, how many units of each food should be purchased to keep costs at a minimum?
Computers and Technology
1 answer:
Firdavs [7]3 years ago
8 0

Answer:

30 units of Food A and 45 units of Food B are to be purchased to keep costs at the minimum $105.

Explanation:

X = Amount of food A

Y = Amount of food B

Z= 2X+Y..... minimum cost equation

50X + 20Y > 2400 .................Vitamins .......(1)

30X + 20Y > 1800 ...................Minerals.......(2)

10X + 40Y > 1200 .................Calories ..........(3)

X  > 0

y  > 0

X=30  and Y = 45

Z= 2(30) + 45 = $105

You might be interested in
How to understand why driving is considered a privilege?
Mnenie [13.5K]
Driving is considered a privilege because you have to be a certain age to start driving and be able to drive by yourself legally. Driving can be dangerous if you are not a safe driver and if you do illegal things while behind the wheel. Driving is also a privilege because you have to be responsible when driving, because the people that are around you or with you, their lives are in your hands.

Your answer is: You need to carry the responsibility of being safe and not harming yourself or others. 

Have an amazing day!
3 0
3 years ago
Which of the following are true about algorithms? (You may select more than one)
koban [17]

Answer:

Operations that can be done by a computer

Explanation:

An algorithm is a specific procedure for solving a well-defined computational problem. ... It requires an understanding of the alternatives available for solving a computational problem, including the hardware, networking, programming language, and performance constraints that accompany any particular solution

3 0
3 years ago
Given coins of denominations (value) 1 = v1 < v2< … < vn, we wish to make change for an amount A using as few coins as
astraxan [27]

Answer:

Answer given below

Explanation:

a) 10 coins ( 25*8 + 1*2)

b) 14 coins (27*10 + 12*1 + 7*1 + 3*1 + 1*1)

<u></u>

<u>Source Code in C++: </u>

#include <iostream>

using namespace std;

//main function

int main()

{

int n,n1;

cout << "Enter the amount : "; //taking amount as input

cin >> n;

if(n<=0)

{

cout << "Fatal Error : Input Failure." << endl;

return 1;

}

cout << "Enter the number of denominations : "; //taking number of denominations as input

cin >> n1;

if(n1<=0)

{

cout << "Fatal Error : Input Failure." << endl;

return 1;

}

int a[n1],c[n1],sum=0; //array to keep count of each amount, and sum to store total coins

cout << "Enter the denominations in descending order : ";

for(int i=0;i<n1;i++)

{

cin >> a[i];

}

for(int i=0;i<n1;i++)

{

c[i]=n/a[i];

sum=sum+c[i];

n=n%a[i];

}

for(int i=0;i<5;i++)

{

cout << a[i] << " : " << c[i] << endl;

}

return 0;

}

3 0
3 years ago
An owner of a small publishing company allowed a friend who was starting a machine embroidery business to load the publishing co
klio [65]

Answer/Explanation:

Allowed or sanctioned by the Business Software Alliance. This is due to the fact that only one copy is to be transferred or transmitted.

3 0
4 years ago
IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or she appears to be someone else.
WINSTONCH [101]

Answer: A) Direct TTL probes technique

Explanation:Direct TTL probe technique that is technique that is used when the attacker is accessing from any smaller part of IP address that is known as subnet. This technique is successful because it sends the packet to the particular host and time to live(TTL) of the return message is not equal to the packet checking processing, then the IP spoof is present in the packet.

Therefore, the correct option is option(A).

4 0
3 years ago
Other questions:
  • You want to find information about Paris, France in the last five years, written in English. What is the best way to search for
    5·2 answers
  • How do you bookmark a website in each of the internet browsers?
    9·1 answer
  • What is virtualization?
    11·2 answers
  • The part of the computer that contains the brain, or central processing unit, is also known as
    5·1 answer
  • Why is Thomas Jefferson considered an accomplished man , or a Renaissance man?​
    5·1 answer
  • (1) The Format Painter ___.
    5·1 answer
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • .A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected
    6·1 answer
  • Jose has 3/5 kilogram of peppermints and 2/3 kilogram of candy canes. How many kilograms of candy does he have?
    10·1 answer
  • What is ICT?Write down the uses of ICT​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!