1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
12

In your own words, how are sources of income and expenses related to

Computers and Technology
2 answers:
Olin [163]3 years ago
6 0

Answer:

They are related because...

Explanation:

Your income becomes your budget and depending on how high your budget is it shows how much can you spend and the amount of money you spend is your expenses

Mama L [17]3 years ago
6 0
They are related to budgets because you need to know how to balance your expenses and have an average income a year for those expenses and budget.
You might be interested in
Which is one of the modes of game advertising?
-BARSIC- [3]

Answer:

I'm pretty sure its A

Explanation:

The Media it the biggest platform rn

7 0
3 years ago
Read 2 more answers
After a failover cluster is created, which of the following is a task to be performed when configuring the failover cluster? (Ch
Lynna [10]

Answer: (B) Configure the cluster networks

               (C) Configure the quorum model

Explanation:

 When the fail-over cluster has been created then, configure the cluster network and quorum model tasks performed during configuring the fail-over cluster.

The quorum model are flexible in the window server. We can configure the quorum model when we need to modified the quorum model configuration for the cluster. The software cluster are automatically configure quorum model for the new cluster that is based on the availability of the share storage.

When configuring the fail-over cluster we can perform various cluster network tasks in the system.  

 

 

 

8 0
3 years ago
Ik this isnt an assignment question, but can ya'all friend me? Im lonely ;-; lol
Elan Coil [88]

Answer:hi I’m lonely too

Explanation

:)

4 0
3 years ago
List at least four items that security policy should include
forsale [732]

Answer:

Purpose.

Audience.

Information security objectives.

Authority and access control policy.

Data classification.

Data support and operations.

Security awareness and behavior.

Encryption policy.

4 0
2 years ago
Create a program named Auction that allows a user to enter an amount bid on an online auction item. Include three overloaded met
Olin [163]

Answer:

Explanation:

The following code is written in Java and creates the overloaded methods as requested. It has been tested and is working without bugs. The test cases are shown in the first red square within the main method and the output results are shown in the bottom red square...

class Auction {

   public static void main(String[] args) {

       bid(10);

       bid(10.00);

       bid("10 dollars");

       bid("$10");

       bid("150 bills");

   }

   public static void bid(int bid) {

       if(bid >= 10) {

           System.out.println("Bid Accepted");

       } else {

           System.out.println("Bid not high enough");

       }

   }

   public static void bid(double bid) {

       if(bid >= 10) {

           System.out.println("Bid Accepted");

       } else {

           System.out.println("Bid not high enough");

       }

   }

   public static void bid(String bid) {

       if (bid.charAt(0) == '$') {

           if (Integer.parseInt(bid.substring(1, bid.length())) > 0) {

               System.out.println("Bid Accepted");

               return;

           } else {

               System.out.println("Bid not in correct Format");

               return;

           }

       }

       int dollarStartingPoint = 0;

       for (int x = 0; x < bid.length(); x++) {

           if (bid.charAt(x) == 'd') {

               if (bid.substring(x, x + 7).equals("dollars")) {

                   dollarStartingPoint = x;

               } else {

                   break;

               }

           }

       }

       if (dollarStartingPoint > 1) {

           if (Integer.parseInt(bid.substring(0, dollarStartingPoint-1)) > 0) {

               System.out.println("Bid Accepted");

               return;

           } else {

               System.out.println("Bid not in correct format");

               return;

           }

       } else {

           System.out.println("Bid not in correct format");

           return;

       }

   }

}

3 0
3 years ago
Other questions:
  • True or false A ClassB fire involves live electrical equipment
    5·1 answer
  • You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).
    6·1 answer
  • . Find four different commands in Internet Explorer and identify their keyboard shortcuts. A. B. C. D.
    10·1 answer
  • An extract report lists ____________.
    14·1 answer
  • What do you use the Pygame library for?
    6·1 answer
  • Which one Bc I’m struggling
    11·2 answers
  • Select the correct text in the passage.
    12·1 answer
  • Write a function that simulates the roll of a six-sided dice. The name of the function is rollDice. The function accepts no para
    8·1 answer
  • Which string method returns true if the character is a lowercase letter?
    9·1 answer
  • Code is the code or instructions used to create a Web page or<br> program.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!