1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
6

Match the expenses to their respective categories.

Computers and Technology
2 answers:
madam [21]3 years ago
7 0

Needs: Staple foods, and Education

Wants: Lambo, Vacation, and wedding

satela [25.4K]3 years ago
4 0
Lambo , vacation and lavish weddings in want the other two in needs
You might be interested in
Basic engine operation can be divided into four stages. These stages are
denis-greek [22]
C. Intake, Compression, Power, and Exhaust. hope this helps
6 0
3 years ago
When an object is instantiated, it receives its own copy of all static variables of the class?
Sloan [31]
No.

A static variable belongs to the class, not an instance of it. Therefore there only exists one copy of said variable at any given time.
8 0
3 years ago
A company database consists of 10,000 sorted names, 40% of whom are known as good customers and who together account for 60% of
vladimir2022 [97]

Answer:

The answer is "binary search= 5.111 and Linear seacrch= 6400".

Explanation:

Following are the description of this question:

  • Binary Search-The performance with single arrays is log 10000 = 4, through the use of two arrays (60/100)*log4000 + (40/100)*(log4000 + log6000) = 5.111.  
  • In the linear search: while doing static searches, 10000 would be performed, and (60/100)*4000 + (40/100)*6000 = 6400 will be used with two arrays.  
  • It's a special case, that will be used in one of the arrays in a binary search. Whereas good case uses linear frames, two frames are used, as indicated above.
7 0
3 years ago
1) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly
devlian [24]

Answer: C) Crisis- mapping

Explanation:

Crisis mapping gather all the information from different sources like e-mail, tweets and text messages.

It makes the information and data publicly available for use in many emergencies. it also analysis the data and display it during crisis.

The advantage of this method is that it basically increases the awareness among all the public so that they can easily report the information and improve the data management.  

Therefore, Option (C) is correct.

8 0
3 years ago
Consider a three sequentially stepped process named as Process A, Process B and Process C. Input comes into Process A. Output fo
Novay_Z [31]

Answer: The process B is at the maximum steady state. A process is said to be at steady state if the variables that define the behavior of the system are unchanging

Explanation: From the Above

Process A takes 2 minutes per unit and hence can process (60/2) = 30 units per hour. Process B can process only (60/3) = 20 units per hour. Process C can handle (60/1) = 60 units per hour. the steady state output from this system is the smallest of the three, that is process B 20 units per hour

4 0
4 years ago
Other questions:
  • Speech on inventors and inventions
    14·1 answer
  • Rearrange the statements in the following order so that the program prompts the user to input: a. The height of the base of a cy
    12·1 answer
  • If you want a user to actively participate in an online activity, create a web ______________.
    12·2 answers
  • What is the difference between cout and cerr?
    14·2 answers
  • What are the file sharing copyright laws in your area? Are they more strict or less strict than those in other areas of the worl
    9·1 answer
  • Katla is a project manager. One of the programmers on her team comes to her and says that he permanently deleted some code mista
    5·1 answer
  • For each compound below, identify any polar covalent bonds and indicate the direction of the dipole moment using the symbols δ +
    12·1 answer
  • Hardware refers to programs and protocols used on a computer system.<br><br> True<br> False
    8·2 answers
  • Which of the following is NOT a font style? Color Bold Italic Regular
    10·2 answers
  • What are three major events in computer science history?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!