1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
11

What type of expense generally covers performing and producing elements?

Computers and Technology
1 answer:
Paraphin [41]3 years ago
7 0

Answer:

You might think expenses are expenses. If the money's going out, it's an expense. But here at Fiscal Fitness, we like to think of your expenses in four distinct ways: fixed, recurring, non-recurring, and whammies (the worst kind of expense, by far).

You might be interested in
IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
elixir [45]

Answer: True

Explanation:

System development is the process in which a system is developed,planned, designed,tested, modified etc. Analysis of design,internal structure and external factors is done for implementation to creation of system.

  • An IT professional is responsible for performing various tasks in system development.He/she has to analyze and detect that the developed system is convenient for user.
  • Involvement of user also plays an important part in system development through various ways such as improvement in system, smooth implementation,innovation,enhancing quality etc.
  • So, user can be involved in official or unofficial manner for betterment of system development.
  • Thus, the given statement is true.
3 0
3 years ago
Write a function called mul_time that takes a Time_Elapsed object and a number and returns a new Time_Elapsed object that contai
lisov135 [29]

# Write a function called mul_time that takes a Time object and a number and

# returns a new Time object that contains the product of the original Time and

# the number.

# Then use mul_time to write a function that takes a Time object that

# represents the finishing time in a race, and a number that represents the

# distance, and returns a Time object that represents the average pace (time

# per mile).

# Current Status: Complete

class Time(object):

   """ represents the time of day.

   attributes: hour, minute, second"""

time = Time()

time.hour = 3

time.minute = 0

time.second = 0

def time_to_int(time):

   minutes = time.hour * 60 + time.minute

   seconds = minutes * 60 + time.second

   return seconds

def int_to_time(seconds):

   new_time = Time()

   minutes, new_time.second = divmod(seconds, 60)

   time.hour, time.minute = divmod(minutes, 60)

   return time

def mul_time(time, multicand):

   time_int = time_to_int(time) * multicand

   new_time = int_to_time(time_int)

   if new_time.hour > 12:

       new_time.hour = new_time.hour % 12

#    print ("New time is: %.2d:%.2d:%.2d"

#    % (new_time.hour, new_time.minute, new_time.second))

   return new_time

# mul_time(time, 2)

def race_stats(time, distance):

   print ("The finish time was %.2d:%.2d:%.2d"

         % (time.hour, time.minute, time.second))

   print "The distance was %d miles" % (distance)

   average = mul_time(time, (1.0 / distance))

   print ("The average is: %.2d:%.2d:%.2d per mile"

         % (average.hour, average.minute, average.second))

race_stats(time, 3)

7 0
2 years ago
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
Is Using programming libraries is one way of incorporating existing code into new programs true
postnew [5]

Yes, Using programming libraries is one way of incorporating existing code into new programs  is a true statement.

<h3>What function do libraries provide in programming?</h3>

Programming libraries are helpful resources that can speed up the work of a web developer. They offer prewritten, reuseable portions of code so that programmers can easily and quickly create apps. Consider building a program that enables users to enroll in and pay for courses.

Therefore, Using a code library often saves developers from having to create everything from scratch. It can take less time to develop projects and have more reliable software if the catalog of programming resources is kept up well.

Learn more about libraries from

brainly.com/question/17960151
#SPJ1

6 0
1 year ago
How can i learn about networks
timama [110]

Answer:

1. Clients and servers—how services such as e-mail and web pages connect using networks.

2. IP addresses—how devices on a network can be found.

3. Network hubs, switches and cables—the hardware building blocks of any network.

4. Routers and firewalls—how to organize and control the flow of traffic on a network.

3 0
3 years ago
Other questions:
  • Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
    13·1 answer
  • Movies may depict larger-than-life situations, such as calamities, superheroes, and spaceships. A helps show such extraordinary
    11·1 answer
  • Text that has equal left and right margins is said to be
    14·2 answers
  • Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
    6·2 answers
  • A lack of financial literacy can cause you to lose your
    10·1 answer
  • If cells A1=90,A2=85,A3=80,A4=75, A5=75.What will be the formula if you are going to get the formula total
    5·1 answer
  • I need to change the subject before they get onto me. I am only revealing info today if you are a friend.
    5·1 answer
  • Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last
    15·1 answer
  • Supplies/material used in iron​
    11·1 answer
  • In order to preview an attachment in an e-mail, click the attachment in the ______
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!