Helena set the price of her scarves at $20. How is she using money?

Answers

Answer 1

Helena is using money as a unit of account.

Money is anything that is accepted and used as a means of payment for products and it used to repay debts.

Functions of money

Unit of account : it is used to value goods and services. Helena values her scarves as $20. Medium of exchange : money can be used to exchange for goods and services. For example, the person who buys the scarves for $20 uses money as a medium of exchange.  Store of value : money can be kept for extended periods and it would not lose its value.

To learn more about store of value, please check: https://brainly.com/question/25965295


Related Questions

Which string method returns true if the character is a numeric character?
letter = input("Enter a letter: ")

A. isDigit(letter)
B. isdigit(letter)
C. letter.isDigit()
D. letter.isdigit()

Answers

Answer:

It is D. letter.isdigit()

Explanation:

reason being is that there is only very few scenarions that require a capital letter in them and most of those that have scenarions are to input a operation into the program.

In the given options, the method that will return true when an input charater is a numeric is optionC. letter.isDigit()

Methods In Programming

Basically what this function does it to check whether the input variable letter is a numeric character, if true then the function returns true.

Hence, the functions input parameter is a string and it returns and boolean

it should be noted that there is a sligth difference between and method and a function in programming.

Learn more about programming here:

https://brainly.com/question/1538272

what is the full form of BASIC​

Answers

Answer:

BASIC, in fullBeginner's All-purpose Symbolic Instruction Code, computer programming language developed by John G.

is a virtue by which you need to secure information by limiting computer access to authorized personnel only.

Answers

Answer:

ummmmmmmmm

Explanation:

Confidentiality is a virtue which states that you need to secure information by limiting computer access to authorized personnel only.

Keeping confidential data is crucial especially if your business deals with very important information about a person and his security.

Trust is built between a company and a client. The client trusts the company to keep his information secure and confidential from outside parties. Once the confidentiality of the company is compromised, the business will suffer because clients will no longer trust the company to keep their data secure.

What is this on googel documents and how do I fix it

Answers

Answer:

if you're trying to take off the words on the side, when you hover over it, an "X" will appear and you can delete it

Explanation:

! (( i > ( f + 1)) es verdadero o falso segun la logica de programación.

Answers

Answer:

yeajadaj

Explanation:

Q44. Cell A20 displays an orange background when its value is 5. Changing the value to 6 changes the background color to green. What type of formatting is applied to cell A20

Answers

The type of formatting that is applied to cell A20 is called conditional formatting.

Conditional formatting in Excel Sheet enables an easier method of highlighting noteworthy cells or ranges of cells, displaying data by employing data bars, color scales, and icon sets that match particular variations in data.

A conditional format modifies the look of cells based on the conditions you set. The cell range will be formatted provided that the conditions are true; if otherwise, it will be false and the cell range will not form.

Learn more about conditional formatting here:

https://brainly.com/question/25051360

The WordPress Widgets submenu is located where on the WordPress site?


Themes

Appearances

Background

Customize

Answers

Answer:

Appearances

Explanation:

In your dashboard, click on Appearance → Customize → Widgets. Choose the location where you'd like to place the widget on your site. Common options here include the Footer and Sidebar, but this may be different depending on your theme..

Go to Appearance > Widgets in the WordPress Administration Screens. Choose a Widget and either drag it to the sidebar where you wish it to appear, or click the widget, (select a destination sidebar if your theme has more than one) and click the Add Widget button.

[ RevyBreeze ]

Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.

Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.

How should Jacob format the Notes Master so it will be most helpful to his audience?

Do not include a slide image, leaving the maximum room to take notes.
Do not include a notes pane because graphics do not need to be annotated.
*Make the slide image large so the charts can be seen clearly.
Make the text pane large so the audience can draw their own charts.

Answers

Answer:

C. Make the slide image large so the charts can be seen clearly.

Explanation: Edg

what types of activities are ideal for a robot to perform?

Answers

The type of activities that are ideal for a robot to perform are; Repetitive tasks

Robots are machines that are programmable by a computer which have the capacity of automatically carrying out a complex series of actions.

Now, robots are used in a wide array of industries which include manufacturing, assembly and packaging, transport, earth and space exploration, e.t.c.

The most common use are found primarily in the automobile industry where they are used to carry out repetitive tasks and those that are difficult or hazardous for humans.

Read more about robots at; https://brainly.com/question/9145476

PLEASE ANSWER (CODING IN PYTHON)


Ask what kind of pet the user has. If they enter cat, print “Too bad...”, if they enter

dog, print “Lucky you!" (You can change the messages if you like). Once this works,

add other pets. (Iguana, Pig, Rabbit...)

Answers

Answer:

Explanation:

a = input("what kind of pet the user has")

if a == 'cat':

  print("Too bad")

elif a == 'dog':

   print("Lucky you!")

The program based on the information is given below.

What's the program about?

def main():

   pet = input("What kind of pet do you have? ").lower()

   if pet == "cat":

       print("Too bad...")

   elif pet == "dog":

       print("Lucky you!")

   elif pet == "iguana":

       print("That's interesting!")

   elif pet == "pig":

       print("Oink oink!")

   elif pet == "rabbit":

       print("Hop hop!")

   else:

       print("I'm not familiar with that pet.")

if __name__ == "__main__":

   main()

Learn more about program

https://brainly.com/question/26642771

#SPJ2

what is Q-Basic statement​

Answers

A statement (for the QBASIC) is a set of instructions written by using keywords or commands of QBASIC. Every programming language uses keywords as a statement with certain syntax. The statements are the first stored in the memory and executed only when the RUN command is given

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

This is an Image of the ......... Topology.


The person who got it right ,i will mark hem or her as brainly.​

Answers

Answer:

Bus Topology

Explanation:

[tex]{}[/tex]

Can someone help me please and please answer all the questions and explain :D

Answers

Answer:

1. is A. 2. is C.  3. is A.

Explanation:

Filters remove all data that does not match the requirements.

Can someone help me with this please

Answers

Answer:

D

Explanation:

Filters and the Sort feature can be applied in any order. 

given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list. do not modify play_list.

Answers

Answer:

new_list = play_list[0:4]

Explanation:

new_list = play_list[0:4] is an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list.

What do you mean by an expression?

A syntactic item in a programming language that may be evaluated to discover its value is known as an expression in computer science. Statement, a grammatical construct that has no meaning, is frequently contrasted with expression.

It is a grouping of one or more constants, variables, functions, and operators that the programming language interprets and calculates (in accordance with its own principles of precedence and association). For mathematical expressions, this procedure is known as evaluation.

In straightforward contexts, the outcome is typically one of several primitive kinds, such as a complex data type, a complex data string, a complex data Boolean type, or another type.

A function, and hence an expression that contains a function, may have side effects in many programming languages. Normally, a side effect-containing phrase lacks referential transparency. Expressions can be converted into expression statements in various languages by adding a semicolon (;) at the end.

Learn more about expression, here

https://brainly.com/question/16804733

#SPJ5

how does microsoft label mac addresses in the windows utilities that show you the mac address?

Answers

Based on computer analysis, Microsoft labels mac addresses in the windows utilities "by showing the MAC address in the 'Physical Address' field."

What is MAC Address?

MAC Address is the acronym for media access control address. A distinct identifier is allocated to a network interface controller (NIC).

MAC address is used as a network address in communications within a network component.

There are two ways to check for a MAC address in the Windows Utilities which is either through Command Prompt or Network Setting.

Hence, in this case, it is concluded that the correct answer is "by showing the MAC address in the 'Physical Address' field."

Learn more about MAC Address here: https://brainly.com/question/24812654

The numbers of bit that's can be transferred per second over a given transmission medium . Finding single technical term

Answers

As we all know that 1024 are the mega bite in computer

In the program to evaluate passwords, you gradually built a message to display to the user. What did you add to the end of each message string to start each message on a new line?

message = message + "Your password needs an uppercase letter. _____ "

\endline

\e

\n

\newline

Answers

You need to add \n to start a new line

The option that one need to add to the end of each message string to start each message on a new line is \n.

What is a message string?

This is known to be a kind of running aspect of text messages that relates to one topic or any question.

Based on the program written above, the option that one need to add to the end of each message string to start each message on a new line is \n as it is the one that will give the best result.

Learn more about program  from

https://brainly.com/question/1538272

#SPJ2

when a driver receives a text while driving, what can 2022 versa’s hands-free text messaging assistant do?

Answers

Answer:

It can translate text to voice

Explanation:

What does

mean in computer science

Answers

Answer:

i think the answer is a character or characters that determine the action that is to be performed or considered.

Explanation:

hope this helps

What is the maximum possible value of num after the code has been run?

Answers

Answer:

the maximum value from the first line is 20 - 0 = 20

and from the second 20-5 and 20+5 so the maximum is 25

Where are 'if' and 'else' statements shown when printing a document in a word processor?

Answer the question and then your task is to:

Write an algorithm or sequence of instructions that include the IF statement for the document being printed.

Answers

Explanation:

cpt price

The voltage/potential difference in a circuit is 12 volts, calculate the current that is flowing through the circuit if the resistance is 48 Ohms.

Answers

Current (I) = 0.25 ampere (A)

Power (P) = 3 watt (W)

Current (I) = 0.25 ampere (A) Power (P) = 3 watt (W) Steps: I = V R = 12 volt 48 ohm =  0.25 ampere (A) P = V2 R = (12 volt)2 48 ohm =  3 watt (W)

Can someone plss help me!!

Answers

Answer:

HTML elements are delineated by tags, written using angle brackets.

Explanation:

Tags such as <img /> and <input /> directly introduce content into the page.

Match each type of option on the left with a corresponding function on the right.

Answers

Answer:

yes. the above is correct

Explanation: q posted

Answer: Anwer is correctly shown!!!!!!!!

Explanation:

HOPE IT HELPS Y'ALL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Y’all got your tickets for Spider-Man No Way Home? I do

Answers

Answer:

IS IT THE NEW MARVEL MVOIE

Explanation:

algorithm to find the difference between two numbers second number is greater than first
Plzzz solve this problem ​

Answers

Answer:

You should concentrate yourself

Explanation:

1=x

2=y

x<y

hence proved solved thank me later


[tex]{\huge{\underline{\bf{\pink{Question}}}}}[/tex]

: Given a matrix, we need to count all paths from top left to bottom right of MxN matrix. You can either move down or right.​

Answers

Answer:

[1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

Based on the information given, the correct option will be [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

A matrix simply means a set of numbers that are laid out on rows and columns. The numbers in matrix can represent either data or mathematical equations

It should also be noted that matrix can be used as way of providing quick approximation of calculations.

In conclusion, the correct option is [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

Learn more about matrix on:

https://brainly.com/question/1821869

I have a problem. I can't cycle between game packs on my strike pack, I've watched so many vids I'm on Xböx and I'm holding the left button and clicking right paddle and it does nothing! If you could help it would be appreciated

if anyone knows how to help please do some people might not even know what a strike pack is only respond if you do please ​

Answers

Answer:

Maybe if u put the disk back in, or restart it if it doesn't do anything hope this helped.

Explanation:

Maybe if u put the disk back in, or restart it if it doesn't do anything hope this helped.

Other Questions
What is the greatest multiple of 99 that is less than 0? Which reason does the author give for presenting thefalse dilemma that people should either own a dog orno pet at all?O Dogs are superior to all other animals as pets.O Dogs are more reliant on their owners than otherpets.O People who own dogs are more mature than peoplewho own other pets.O People who own dogs are more knowledgeable thanthose who own other pets. the president is most likely to use an executive order to make important policy when: 10. Which of the following is the best financial situation? Ms. Trowbridge will receive a 40% discount off her first cell phone bill. Her monthly cell phone plan charges a flat monthly fee of $25. 00 plus $0. 20 per minute. If ms. Trowbridge talks on her cell phone for 300 minutes during the first month of cell phone service, what will be the amount of her first cell phone bill?. which of the following is the correct order from earliest to latest of the revolution Which source of evidence did Wegener use to support his theory of continental drift?fossils found on Earthmagnetic fields of Earthsatellite mapping of the tropical islandsglaciers found near the poles can anyone help me please Discuss the concept of inserting a gene from marine algae into food crops. If researchers are successful in this endeavor, salt water is then an option for food crop irrigation. Discuss possible pros and cons of this idea. This response should be a minimum of 3 paragraphs to discuss all parts of the discussion question. Each paragraph should be a minimum of 5-7 well developed sentences. Assume running consumes 93 calories per mile. If you run 8 - minute miles, what is your average power output, in watts? Jean-Paul Sartre won the Nobel Prize in Literature in 1964 but he declined to except the award for personal reasons what is a common obstacle that every civilization must face c) What are the causes of Green House Effect? Blacks car has traveled 100 miles in 1 an 1/4 hours. How many miles per hour in Blacks car traveling? Read this excerpt from Vachel Lindsays "In Praise of Johnny Appleseed. " Self-scourged, like a monk, with a throne for wages, Stripped like the iron-souled Hindu sages, Draped like a statue, in strings like a scarecrow, His helmet-hat an old tin pan, But worn in the love of the heart of man. The author most likely uses the allusions in this excerpt to indicate Appleseeds intelligence. Explain Appleseeds religious faith. Depict Appleseeds love of agriculture. Illustrate Appleseeds humble station. Which of the following best describes the maya civilization?. 5. (27:21) Harry says there are 5 families gone onone block alone. If there are 12 families on thatblock, how many families might you expect to begone on a street with 60 families? Write an equation of each sentence. Use n to represent the unknown number. You can use the back page for your solution. (2 points each) 11. Six increased by a number is twenty. 12. A number decreased by seven is four. 13. The sum of two consecutive numbers is thirty-one. 14. The sum of twice a number and two is thirteen. 15. One less than a number is eighteen. 16. The square of a number increased by four is twice the number. 17. Twice a number is one-half. 18. The product of a number and its half is eighteen. 19. The average of a number and ninety is seventy. 20. Two more than a number is twelve.PLEASE HELP Me in all organisms, certain genes are expressed at any given time while other genes are not. both prokaryotes and eukaryotes regulate gene expression at the transcription stage. however, the greater complexity of eukaryotic cells makes it possible for gene expression to be regulated at many other stages as well. the diagram below shows different stages at which gene expression may be regulated in eukaryotes. what is the difference between a population distribution and a sampling distribution