1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
9

Ted has $55.00 in his pocket. Which purchase will he be able to pay for with cash?

Computers and Technology
2 answers:
snow_tiger [21]3 years ago
5 0

Answer:

D

Explanation:

Hope it helps :)

Alex73 [517]3 years ago
3 0
You just need a little bit of math to solve this. Add up the items and see which one would be equal to $55.00 or less. 

A = $59.90 so this is not the answer
B = $60.94 so this is not the answer
C = $55.99 so this is not the answer

D = $50.97 

D is the correct answer.
You might be interested in
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
List five things that could cause premature bearing failure
Wewaii [24]
Smoking, Drinking, Use of drugs, problems with uterus, Problems with cervix or placenta.


6 0
3 years ago
One critique of determining the effectiveness of the psychodynamic perspective is that its theories are too vague to test. t/f
Feliz [49]
TRUE

Psychodynamic theories are usually too vague to allow a clear scientific test. Modest support for central psychodynamic hypotheses has been provided by Empirical studies. Critics have in the past disputed very many aspects of psychoanalysis including whether it is indeed a science or not. However much this is so, psychoanalysis is a great idea in personality that should never be overlooked.






3 0
3 years ago
Read 2 more answers
Cuáles son las partes más importantes de una flor​
castortr0y [4]

Answer:

estas son

Explanation:

El cáliz. Está formado por los sépalos, que son un conjunto de hojas verdes en la base de la flor.

La corola. Está formada por los pétalos que son hojas coloreadas en el interior de los sépalos.

Los estambres. Son los órganos masculinos de la flor. ...

El pistilo. Es el órgano femenino de la flor.

7 0
3 years ago
Intellectual property does not include which of the following
liq [111]
I'd have to say C. the steel as this is very physical as the others aren't as much which makes it stand out 
8 0
3 years ago
Other questions:
  • Categories of general purpose application software and examples each​
    13·1 answer
  • Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
    10·1 answer
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
    14·1 answer
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·2 answers
  • Carol typed a memo to send to everyone in her department. To create this memo, she used a _____.
    8·2 answers
  • Yuygiihjiujjhuuuuykjyt​
    13·1 answer
  • What is presentation
    15·2 answers
  • Immigrants are allowed to enter the country to work when they have a(n)
    10·1 answer
  • Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the pr
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!