1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jobisdone [24]
3 years ago
15

Recently, Walmart offered a wireless data contract based on bandwidth used, with a minimum monthly charge of $42 for up to 5 gig

abytes (GB) of use. Additional GB can be purchased at the following rates: $12 for an additional 1 GB, $28 for an additional 3 GB, and $44 for a capacity of 10 GB. What is the cost for a user who is expecting to use 9 GB
Computers and Technology
1 answer:
nekit [7.7K]3 years ago
7 0

Answer:

For 9GB of data the user would pay $82 monthly!

Explanation:

To start off, our end goal is 9GB. We have the equation 9 = ? We can add up to our solutions with 1GB, 3GB, and 10GB. We can immediately rule out 10GB, since 9GB ≠ 10GB. To cost the least amount of money we can add up             3GB and 1GB = 4GB + 5GB = 9GB!

So, our equation is 3GB + 1GB + 5GB = 9GB, now lets figure out the cost!

                                $28 + $12 + $42 = $82

For 9GB of data the user would pay $82 monthly!

Hope this Helps! :)

<em>Have any questions? Ask below in the comments and I will try my best to answer. </em>

-SGO

You might be interested in
To adjust the margins on a page, users will navigate to the _____ tab.
sashaice [31]
It should be layout or header
6 0
3 years ago
Read 2 more answers
Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
MAXImum [283]

Answer:

Cultural bias

Explanation:

Certain verifiable studies have been made across the United States of America on traffic stops, which revealed significant cases of cultural/racial bias. Black people were 20 percent more likely to be stopped and searched by the police than white people.  

Within a six-year period, starting from 2011, researchers studied over 100 million traffic stops cases which were carried out by twenty-one state patrol agencies.

7 0
3 years ago
List four types of Web browsers<br>​
Mazyrski [523]

Answer:

interent just turn on chrome explore fire fox yahhoo

Explanation:

7 0
3 years ago
Read 2 more answers
In this assignment you'll write a program that encrypts the alphabetic letters in a file using the Vigenère cipher. Your program
solniwko [45]

Answer:

C code is given below

Explanation:

// Vigenere cipher

#include <ctype.h>

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

/**

* Reading key file.

*/

char *readFile(char *fileName) {

   FILE *file = fopen(fileName, "r");

   char *code;

   size_t n = 0;

   int c;

   if (file == NULL) return NULL; //could not open file

   code = (char *)malloc(513);

   while ((c = fgetc(file)) != EOF) {

      if( !isalpha(c) )

          continue;

      if( isupper(c) )

          c = tolower(c);

      code[n++] = (char)c;

   }

   code[n] = '\0';

  fclose(file);

   return code;

}

int main(int argc, char ** argv){  

   // Check if correct # of arguments given

   if (argc != 3) {

       printf("Wrong number of arguments. Please try again.\n");

       return 1;

   }

 

  // try to read the key file

  char *key = readFile(argv[1]);

  if( !key ) {

      printf( "Invalid file %s\n", argv[1] );

      return 1;

  }

 

  char *data = readFile(argv[2]);

  if( !data ) {

      printf("Invalid file %s\n", argv[2] );

      return 1;

  }

 

   // Store key as string and get length

   int kLen = strlen(key);

  int dataLen = strlen( data );

 

  printf("%s\n", key );

  printf("%s\n", data );

 

  int paddingLength = dataLen % kLen;

  if( kLen > dataLen ) {

      paddingLength = kLen - dataLen;

  }

  for( int i = 0; i < paddingLength && dataLen + paddingLength <= 512; i++ ) {

      data[ dataLen + i ] = 'x';

  }

 

  dataLen += paddingLength;

 

   // Loop through text

   for (int i = 0, j = 0, n = dataLen; i < n; i++) {          

       // Get key for this letter

       int letterKey = tolower(key[j % kLen]) - 'a';

     

       // Keep case of letter

       if (isupper(data[i])) {

           // Get modulo number and add to appropriate case

           printf("%c", 'A' + (data[i] - 'A' + letterKey) % 26);

         

           // Only increment j when used

           j++;

       }

       else if (islower(data[i])) {

           printf("%c", 'a' + (data[i] - 'a' + letterKey) % 26);

           j++;

       }

       else {

           // return unchanged

           printf("%c", data[i]);

       }

      if( (i+1) % 80 == 0 ) {

          printf("\n");

      }

   }

 

   printf("\n");

 

   return 0;

}

4 0
3 years ago
Read 2 more answers
Consider the eight bit signed binary number 1110 0101. Convert it to signed decimal from assuming the signed binary number is re
alukav5142 [94]

Answer:    -26

Explanation:

We have:  1 1 1 0   0 1 0 1

Since it’s one’s complement representation, then we check the very first digit to state if the number is negative or positive. Since the very first digit to the left is 1, then the number will be negative.

When it is negative, we now flip the bits, so that we get:

0 0 0 1   1 0 1 0

Notice we just turn the 1’s into 0’s and vice versa.

We now convert this binary into decimal:

We assign to each digit the corresponding power of 2.  

See it in a table:

\begin{matrix}0&0&0&1&1&0&1&0\\2^7&2^6&2^5&2^4&2^3&2^2&2^1&2^0 \end{matrix}

Then multiplying each digit by its corresponding power of 2 and then adding the results, we get:

2^4+2^3+2^1

We get:

16+8+2=26

Since we stated that the number is negative, then, the final result is: -26

4 0
3 years ago
Other questions:
  • I am doing Microsoft Excel and I have do formulas, Can some please explain to me how do them?
    14·1 answer
  • Which VPN protocol does not support using Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (C
    14·1 answer
  • Write a dialogue between two friends who are debating on popularity or property​
    6·1 answer
  • When using the =SUM formula, you can add multiple cells together.<br><br> ☐ True<br> ☐ False
    7·1 answer
  • A programmer writing code in class Point attempts to override the following inherited method:public boolean equals( Object o ) {
    12·1 answer
  • Imagine you are responsible for making a presentation that includes a representation of the logic flow through a process. You un
    11·1 answer
  • Sensitive data is always classified true or false
    14·1 answer
  • What is the purpose of a forecast worksheet?
    15·1 answer
  • Irene is creating a wireframe of a website she is working on to show her client. In which phase of the development process is sh
    13·1 answer
  • Which key combination should you use
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!