1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
8

Lazarus Consulting is a large computer consulting company in New York. Pete Lazarus, theà CEOà and founder, is well known for hi

s philanthropic efforts. Pete knows that most of his employees contribute to nonprofit organizations and wants to reward them for their efforts while encouraging others to contribute to charities. Pete began a program that matches 50 percent of each employee donation. The only stipulations are that the charity must be a nonprofit organization and the company will match only up to $2,000 per year per employee.
Use the à data fileà provided to determine the following:
What was the total donation amount per organization?
What were the average donations per organization?
Computers and Technology
1 answer:
sergij07 [2.7K]3 years ago
4 0

Answer:

There are too many weird characters in this question, so I am unable to fix it, comment on this with the correct characters so I can submit a correct answer.

You might be interested in
Often, the symptoms of withdrawal are __________.
guapka [62]
I would say none of the above as A, B, and C do not seem like sensible answers.
3 0
3 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar. What will be the ou
lord [1]

Answer:

2

Explanation:

The output of the Java program is 2. The public Vehicle class is defined with the class variable 'counter'. When a Vehicle class object is instantiated, the counter variable increments by one.

In the program, the two instances of the class are created, incrementing the counter variable to two, the print statement outputs 2 as the result of the program.

8 0
3 years ago
how many bits must be flipped (i.e. changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase 'a' that’s represente
lianna [129]
Lowercase a is decimal 97 ; upper case is decimal 65

It's easier to think of them in octal, however: a = octal 141, and A is octal 101

octal to binary is easy, each digit is three bits. 
141 = 001 100 001 
101 = 001 000 001

So, how many bits are changed above? 
4 0
3 years ago
What is a database query?
lana [24]
C.a form used to create a new tables for the database
8 0
2 years ago
Read 2 more answers
Other questions:
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • To hide the ribbon, ______ on any one of the tabs of the ribbon.
    10·1 answer
  • The type of database that is connected by a company's local area networks is a(n:
    11·1 answer
  • Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Pleas
    11·1 answer
  • One of the most common uses of spreadsheet are
    8·1 answer
  • Radar devices are used by law enforcement to be sure that individuals are driving safely. They tell the officer how fast the veh
    12·1 answer
  • What does the -pwd switch do? how can you make dsadd bring up a prompt asking for the users password?
    10·1 answer
  • What is the component on the motherboard that confirms all devices are in working order once the computer is turned on?
    13·1 answer
  • The relationship between social media and the Internet is complex. Individual Internet behavior involves a myriad of factors tha
    6·1 answer
  • A pseudo code that asks the user for their forename and their surname , and then outputs both, separated by a space to the user​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!