1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
10

If i paid $37.20 for 12 gallons of ice cream how many would 1 quart of ice cream cost

Computers and Technology
2 answers:
Lapatulllka [165]3 years ago
5 0

Answer:

$0.78

Explanation:

Nata [24]3 years ago
5 0
There are 4 quarts in a gallon, so you can use
12 gallons• 4 quarts= 48 quarts for 12 gallons

Now, you can divide 48 from $37.20 to find the price of 1 quart.

$37.20 / 48 quarts = 0.775, written as $0.76 per quart of ice cream.

Answer: $0.76 per quart of ice cream

You might be interested in
Name two primary goals of quality assurance and control programs:
bulgar [2K]

Answer:

The two main goals are to reach CMM level 5, and when the company can be termed as optimized.

The second goal is to minimize the bugs at the current level as well. And this is important, as improvement is one thing, and ensuring you are correct at the current time is another, and which is essential for survival. And you can think of improvement only if you survive.

Explanation:

The dream of all companies is to become Optimized. And they always try to reach CMM level 5, such that they can serve their clients in the best possible manner. And it is the quality assurance team that keeps an eye on the working of the company and keeps on giving their feedback so that the team can provide better service to the clients in the future, and probably reach the CMMI level 5.

The control program makes the operating system better through the development of an environment in which one can run various other programs. And it, in general, formulates the graphical interface and leverage you to run various programs at one time in various windows. And the control programs are also being known as the operating environment.

5 0
3 years ago
You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.
kherson [118]

Answer:

in

Explanation:

Not an explanation, but here's an example:

if "mouth" in "mouthwatering":

   print("It is.")

else:

   pass

Another example:

if "water" in "mouthwatering":

   print("Yes.")

else:

   pass

6 0
3 years ago
Kyle is running out of disk space on his hard drive on a Windows XP Professional system. He has installed and configured a third
Varvara68 [4.7K]

Answer:

The answer is "Disk utility".

Explanation:

It'll work well go over to Disk utility before updating the drivers like diskmgmt.msc throughout the Running box, or right-click Device icon, and pick Manage. Click Rescan Disks on the key decision-makers. It's not essential to reconnect until the machine recognizes the latest disc.

  • In each disc setup as storage properties is a reactive drive. Almost every dynamic disk is separated into quantities.
  • It is the season, spanned, and strip volume forms will be included.
5 0
3 years ago
Read 2 more answers
You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone betwe
lorasvet [3.4K]

Answer:

A and C

Explanation:

From the above scenario, the Ethernet standards that meet the above guidelines are:

A. 1000BaseSX; and

C. 10GBaseSR.

Cheers

3 0
3 years ago
Where could an identity theft access your personal information?
noname [10]
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the term for an element on a Webpage that contains data and procedures for how that item will react when activated
    14·1 answer
  • What are the basic tools for coding HTML manually?
    9·2 answers
  • What is constructive criticism?
    5·1 answer
  • Additional chemical hazards training must be provided to employees:
    12·1 answer
  • Using PowerPoint or Impressed guarantees that your presentation will do which of the following?
    6·1 answer
  • Any executable files???
    5·1 answer
  • What are the trinity of the computer system
    10·1 answer
  • Cine stie repede va rog mult si repede
    9·1 answer
  • Q2
    7·2 answers
  • You find information that you know to be classified on the internet. What should you do.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!