1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
3 years ago
8

Sandra earns $22,000 per year. Her earnings put her in the 20% tax rate. What is her tax owed?

Social Studies
2 answers:
Pachacha [2.7K]3 years ago
8 0

Answer: $4,400

Explanation: Multiply her earnings ($22,000) by .20 (20%) to get $4,400.

SIZIF [17.4K]3 years ago
3 0
<span>The question is asking the following: Sandra earns $22,000 per year. Her earnings put her in the 20% tax rate. What is her tax owed? We can easily rephrase the question: what is 20% of 22000? 20% is actually one firth, so we can divide 22000 by 5. First, 20 000 by 5 is 4000 and 2000 by 5 is 400. We sum it up: 4000+400=4400, and that's the correct answer!</span>
You might be interested in
Which sentence describes an example of natural selection?
vlada-n [284]
The answer is D. <span>Cheetahs with longer legs are more likely to capture prey.</span>
7 0
3 years ago
Read 2 more answers
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Why was Georgia an ideal place for military training camps?
zheka24 [161]

Georgia was an ideal place for military training camps for a number of reason.

The chief reason was/is climate. Georgia has a mild climate, enabling training year round.

Georgia has also had strong politicians enabling base protection and financial investment.

3 0
3 years ago
How to make taco meat like mexican restaurants?
nika2105 [10]
Well you should start off with ground beef and you mush it up with your hands then you get seasoning most stores have seasoning but if you don't have that look for Tex Mex or any other seasoning you have. cook it on a pan. get a bowl put your beef in the bowl and put your seasoning on it and mix. Please use this platform for homework but nevertheless, hopefully I helped.
3 0
3 years ago
How did the battle of Trenton change the war? Was the primary impact a military one or social one?
adoni [48]

The battle of Trenton changed the war and the primary impact was that of military reasons and the Hessians army was crushed and they lost their soldiers.

Explanation:

In the American Revolutionary war battle of Trenton was important and it was fought between the Americans and the Hessians army in Trenton. They used many artifacts and techniques to handle the war. Musket were the main gun which was used by both the troops.

George Washington was the leader of the American troops and colonel Rahl led the Hessians troop. The victory in this war helped the Americans to build a new nation and the American troops sailed on the river Delaware to get to the British troops

3 0
3 years ago
Other questions:
  • Why did the countries of north america sign NAFTA
    9·2 answers
  • Which was a motivation behind the issuing of the Monroe doctrine
    8·1 answer
  • Nations with industrializing economies, particularly in urban areas, and with moderate levels of national and personal income, a
    10·1 answer
  • Please help me<br> Who suffered in the Crusades? Did anyone benefit?
    6·1 answer
  • Why unemployed people not having money to spend would affect other people who were employed.
    5·1 answer
  • ____ are collections of individuals who come together to attempt to win something, to set a record, or to be the best at some ta
    10·1 answer
  • Use the chart to answer the following question.
    5·1 answer
  • Explain what happens during the emotional reaction in each scenario using the three primary theories of emotion. You watch the N
    10·1 answer
  • 3.4 What is the rule of law?​
    8·1 answer
  • What important changes did the Bantu bring with them to Swahili, Kongo, and Great Zimbabwe? (3-4 complete sentences)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!