1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
8

Tricia listed her assets and liabilities. Credit Card Bill Car Loan Bonds Piano Bank Account Bicycle Which are Tricia’s liabilit

ies? Check all that apply.
Computers and Technology
2 answers:
DIA [1.3K]3 years ago
7 0
<span>Her liabilities are her credit card bill and her car loan. These are things that she owes and has to pay off, so they are liabilities due to the fact that she owes for these items. Her bonds, piano, bank account, and bicycle are counted as assets.</span>
MA_775_DIABLO [31]3 years ago
6 0

Answer

Credit Card Bill

Car Loan

Explanation

Liabilities are things which someone is responsible for, especially amount of money owed. In the case of Tricia the car loan is a liability because she is the borrower and once the borrower is credited with deposit in his/her account, this incurs a liability for the amount of the loan.

A credit card is a payment card issued to users to enable them  pay a merchant for goods and services based on the cardholder's promise to the card issuer to pay them for the amounts so paid plus the other agreed charges.

The  credit card debt is a type of unsecured liability which is incurred through credit card loans. Unsecured liability means that a debt is not secured by an asset.

You might be interested in
Which term refers to a shorthand method for identifying network and host bits in an ip address?
zloy xaker [14]

A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

<h3>What is CIDR Notation?</h3>

This is known to be a term that was devised in 1993 by the IETF. The  CIDR is said to be a  shorthand method for knowing network and host bits in an IP address.

Therefore, one can say that A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

Learn more about CIDR Notation from

brainly.com/question/14985928

#SPJ12

7 0
2 years ago
If you have cable internet service, what protocol is used between the head end connection and the cable company's network
julsineya [31]
The answer would be (DOCSIS). :)

Have a blessed day and hope this helps!
7 0
3 years ago
All of the following are true about solid axles, EXCEPT:
irakobra [83]
Except that solid axles do. It have a break in it
5 0
3 years ago
Pls due soon
Natasha_Volkova [10]

Answer:

Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel. And end-user program development may be discouraged by lack of support by the manufacturer.

Explanation:

5 0
3 years ago
Direct solar power is when:
creativ13 [48]
The answer is c the sun is used to directly do a job 
4 0
3 years ago
Other questions:
  • A Hierarchy Custom Setting stores a specific URL for each profile in Salesforce. Which statement can a developer use to retrieve
    5·1 answer
  • Laws differ from theories because laws do not provide
    13·1 answer
  • X2/3-2x1/3-35=0
    14·1 answer
  • A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
    11·1 answer
  • A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is
    9·1 answer
  • You have dinner with your family and tell them that you have taken bcis. your mother tells you that she is proud of you and that
    9·1 answer
  • A server would experience a __________ attack when a hacker compromises it to acquire information from it from a remote location
    13·1 answer
  • A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibili
    5·1 answer
  • Which statement describing the arcade games played in the 1970s is true?
    14·1 answer
  • The _____ layer addresses how the software will execute on specific computers and networks.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!