1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
11

Your friend's job pays $5.00 per hour, and he works 20 hours per week. His tax rate is 20 percent. Assuming he works 50 weeks of

the year, his yearly gross income is
Computers and Technology
2 answers:
kompoz [17]3 years ago
5 0
<span>Assuming Weeks in a year as 52, your gross income would be 40*10*52=20800

</span>
Karo-lina-s [1.5K]3 years ago
5 0

C. $5,000 will be the answer

You might be interested in
What is probably the most revolutionary innovation since the printing press?
BARSIC [14]

Answer:

The Internet

Explanation:

Why? The internet has done twice if not thrice what the printing press has done. The printing press allowed for dissemination of information and knowledge to the population through its mechanical movable printing capability and speed of book publishing. However its reach was highly limited by the physical attributes of the machines and having to transfer books and papers in spreading them to certain destinations. This limitation has been eliminated by the internet as one is able to receive a book written today in seconds and not physically but through electronic means. In other words, information need not be transferred physically, also accessbility and cost of getting information has been highly improved with the internet.

7 0
3 years ago
Write a Java program that reads two numbers from the console. Based on the example in the textbook, write five methods (min, max
makvit [3.9K]

Answer:

import java.util.Scanner;

public class num6 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter first number");

       int a = in.nextInt();

       System.out.println("Enter second number");

       int b = in.nextInt();

       //Calling the methods inside the output statement

       System.out.println("Min is "+min(a,b));

       System.out.println("Max is "+ max(a,b));

       System.out.println("Sum is "+sum(a,b));

       System.out.println("Product is "+product(a,b));

       System.out.println("Absolute difference is "+difference(a,b));

   }

   //Min Method

   static int min(int a, int b){

       if (a<b){

           return a;

       }

       else {

           return b;

       }

   }

   //Max Method

   static int max(int a, int b){

       if (a>b){

           return a;

       }

       else {

           return b;

       }

   }

   //Sum Method

   static int sum(int a, int b){

       return a+b;

   }

   //Diference Method

   static int difference(int a, int b){

       int diff = Math.abs(a-b);

       return diff;

   }

   //Product Method

   static int product(int a, int b){

       int prod = a*b;

       return prod;

   }

}

Explanation:

  • Using Java programming language
  • Use the scanner class to prompt and receive two values from the user (integers a and b)
  • Create the four methods as required (Please see the comments in the code)
  • In the difference method use Math.abs() to get the absolute value of the subtraction ensuring that you get a positive number returned
4 0
3 years ago
Read 2 more answers
What is the relationship between a folder and a subfolder?
zhannawk [14.2K]

A sub folder is one layer under the folder - hence the prefix sub

3 0
3 years ago
EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
Bond [772]

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

7 0
3 years ago
Justify the first two paragraphs and the tips list.
Ket [755]

Answer:

dont mind me just hwere is your question i literaly can see it anywhere

Explanation:

4 0
3 years ago
Other questions:
  • HELP! Answer to question 2?
    12·1 answer
  • All of the following are examples of a web application except for ______.
    12·2 answers
  • What is the most consistent item regardless of the software used in BI?
    5·1 answer
  • Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wan
    6·1 answer
  • A​ _______ helps us understand the nature of the distribution of a data set.
    10·1 answer
  • The Knowledge Consistency Checker (KCC) ensures the maximum number of hops between any two domain controllers does not exceed wh
    12·1 answer
  • ALGUEM SABE COMO MUDA O NOME DE PERFIL!?!?!? SE SOUBER ME AJUDA!!
    14·1 answer
  • How do I turn on your asus chromebook flip?
    12·1 answer
  • ___________ is a technique that uses IT to develop an ongoing relationship with the purchasers or buyers of an organization's pr
    13·1 answer
  • Cloud computing is an old phenomenon in computing infrastructure dating back to the early days of the Internet that involves mov
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!