1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
11

In a Java Script language. create a two-dimension array consisting of numbers representing costs. After creating the array, prin

t out the values with a sales tax of 9% added to each cost.
Computers and Technology
1 answer:
Tanzania [10]3 years ago
5 0

Answer:

Can you elaborate more?

Explanation:

You might be interested in
what is the molarity of a solution prepared by dissolving 15.0g of sodium hydroxide in enough water to make a total of 225 ml of
Reptile [31]

Answer:

1.6666 g/mol = 1 \frac{2}{3} g/mol

Explanation:

Molar mass of NaOH= 23+16+1 =40g/mol

Mols in 15g = 15/40 mol

If this was dissolved in 225ml of water molarity of the solution is

\frac{15}{40} ÷ 225 x 1000 = 1.6666 g/mol = 1 \frac{2}{3} g/mol

5 0
3 years ago
What's wrong with SontungMTP's song?
Anettt [7]

Answer:

A

Explanation:

7 0
3 years ago
Read 2 more answers
What is a key consideration when evaluating platforms?
kotegsom [21]

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

7 0
2 years ago
Help pleaseee got 15 points on this
miskamm [114]
I belive it is vtr deck
4 0
3 years ago
Two double quotation marks with no space in between is referred to as the ____ string.
Andrew [12]
Empty
................
7 0
3 years ago
Other questions:
  • Plz answer and dont put a random thing for the points
    11·1 answer
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • A function may return a pointer, but the programmer must ensure that the pointer:
    14·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • What is an instruction set architecture​
    7·2 answers
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • The MAC address is a _____ bit number.
    10·2 answers
  • Where do animators work?
    8·1 answer
  • Which of the following methodologies might be most appropriate if you have a system project with:unclear user requirements; unfa
    12·1 answer
  • Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!