1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
12

If the tax percent is 15% and tax is $36 and percent discount is 10, what is the cost price?​

Computers and Technology
1 answer:
fomenos3 years ago
4 0
$36.26 because tax is $4.40 and the discount would be $4.14 | so 40-14 is 26
You might be interested in
Match the definitions of different business communication to the type of document
Sladkaya [172]

Answer:

Convey more factual data that helps facilitate decision making  - REPORTS

Reports are made with factual data to show the condition of the subject so convey more factual data that helps in decision making.

Are one page long  - MEMORANDUMS

Memorandums are used to convey new information and are usually brief which means they take one or two pages.

Are written in a block style, with the body text aligned along the left margin  - BUSINESS LETTERS

Business letters are to be as formal as possible and this includes writing them block style and aligning the text to the left margin.

Allow attachments of files, such as images  - EMAILS

As emails are softcopy and computer based, they allow for the attachment of other files such as images, documents, audio, etc.

8 0
3 years ago
Read 2 more answers
You are manually configuring a tcp/ip host. another administrator gives you the router's ip address. what is the tcp/ip term for
Nuetrik [128]
Answer: Default Gateway address
5 0
3 years ago
Read 2 more answers
Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
-Dominant- [34]

Answer:

The answer is "True".

Explanation:

Integration control is a system selection, which is important to ensure the proper coordination of the different components of the programs. Analogies between conflicting goals and solutions must be made to meet or surpass the needs and wishes of participant groups. This mechanisms use events for identifying, defining, combining, unifying and coordinating software development procedures and events, that's why the given statement is true.

6 0
3 years ago
Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at U
Tresset [83]

Use an AppExchange product that does fingerprint scanning with native Salesforce Identity  Confirmation

8 0
3 years ago
Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to
mihalych1998 [28]

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

7 0
3 years ago
Other questions:
  • What is the most efficient way to include a space after each paragraph?
    13·2 answers
  • Casting is one of the oldest known manufacturing processes. <br> True or false
    6·2 answers
  • A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB seri
    5·1 answer
  • Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a bu
    11·1 answer
  • What is the difference between KE an PE
    8·1 answer
  • Who wants brainlyest! NO LINKS how do you message someone on brainly
    10·2 answers
  • Pls help will give brainlest!!! The image shows a line graph. Which scientist is most likely to use this visual aid in a present
    15·1 answer
  • What is computer assisted translation​
    9·1 answer
  • IM a bit confused on what this is asking for exactly.
    14·1 answer
  • Complete the sentence.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!