1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
2 years ago
10

If the bookstore sold 8 books for $66 at that rate how much was one book

Computers and Technology
2 answers:
Dennis_Churaev [7]2 years ago
5 0

$8.25

Explanation:

To find the amount of money one book costs, we have to divide 66 by 8.

66÷8= 8.25

1 book costs $8.25

Ann [662]2 years ago
5 0

Answer:

8.25$ per book

Explanation:

So, $66 for 8 books and we can get the rate by dividing 66/8 which gives us 8.25$

You might be interested in
the_____ tool is used to change the select text to capital letters or small letters (change case /grow font)​
solong [7]

Answer:

on word you can use shortcut "Shift+f3" to change uppercase lowercase and title case if that is what you are asking for

3 0
3 years ago
Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the f
Andru [333]

user_str1 = str ( input ("Please enter a phrase: "))

user_str2 = str ( input("Please enter a second phrase: "))

def strcmp (word):

user_in1 = int (len(user_str1))

user_in2 = int (len(user_str2))

if user_in1 > user_in2:

return "Your first phrase is longer"

elif user_in1 < user_in2:

return "Your second phrase is longer"

else:

return "Your phrases are of equal length"

3 0
3 years ago
Which architecture for deploying a firewall is most commonly used in businesses today? Why?
zmey [24]

Answer:Screened Subnet Firewall

Explanation:Screened Subnet Firewalls is the firewall deploying mechanism that is used at the present time in the organizational area.It is used as because it is supposed to be a good option as it protects the networks and DMZ operating system from any kind of virus that can damage the connection. It works as the security section and protects the system.

8 0
4 years ago
Why does it say error on that last line of code
wel

Answer:

i have no clue

Explanation:

8 0
3 years ago
Read 2 more answers
(03.05 LC) Match the term with its description. (4 points) Column A 1. Acid : Acid 2. Alkaline : Alkaline 3. pH : pH 4. Ion : Io
Nady [450]

Answer:

Follows are the matching to this question:

Explanation:

Column  A            Column B

     1                           c

     2                          d

     3                          b

     4                          a

Description of the matching:

  • In 1(Acid) the correct choice is (c) because the acid (HCl) dissociates to both the H+ ion and the Cl- ion as a solution.  
  • In 2(Alkaline ) the correct choice is (d) because alkaline NaOH is a solution that differentiates between the ions ( OH-) and Na+.  
  • In 3(pH ) the correct choice is (b) because for an A compound of less than 7 is an acid and an alkaline pH compound of more than 7. For neutral compounds, a pH of 7 is applicable.
  • In 4(Ion) the correct choice is (a) because Na+ ion is loaded positive, and Cl-ion is loaded negatively.
8 0
3 years ago
Other questions:
  • Cameron wants to impress the owner of the company. He creates a graph that shows the improved productivity at the company over t
    13·2 answers
  • How is a cell named?
    9·1 answer
  • Analytical processing uses multi-levelaggregates, instead of record level access.? True? False
    12·1 answer
  • The _ are the devices that allow a computer system to communicate and interact with the outside world as well as store informati
    11·1 answer
  • From an IT perspective, which of the following best describes BI and BI apps?
    13·1 answer
  • Friedman (1999) argues that "we are wrong to base health promotion in all societies on a Western framework for human development
    11·1 answer
  • Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
    15·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • Describe a cellular network, its principle<br> components and how it works.
    7·1 answer
  • Question in photo below
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!