1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
14

python Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program wi

th two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12.
Computers and Technology
2 answers:
devlian [24]3 years ago
7 0

Answer:

current_price = int(input("Enter current price: "))

last_months_price = int(input("Enter last month's price: "))

print("This house is $%d. The change is a $%d since last month." % (current_price, current_price - last_months_price))

print("The estimated monthly mortgage is $%d." % int(current_price*0.045/12))

Explanation:

- Ask the user to enter the values for <em>current_price</em> and <em>last_months_price</em>.

- Print the current price.

- Calculate change from last month (current_price - last_months_price) and print it.

- Calculate the mortgage (using given formula (current_price * 0.051) / 12) and print it.

professor190 [17]3 years ago
5 0

Answer:

finalprice= current_price-last_months_price

monthly= (current_price*0.051)/12

print('This house is', '$''{:.0f}'.format(current_price),end='.')

print(' ''The change is', '$''{:.0f}'.format(finalprice), 'since last month.')

print('The estimated monthly mortgage is', '$''{:.2f}'.format(monthly),end='.''\n')

Explanation:

You might be interested in
True or false you have no control over who views your social network information
cestrela7 [59]
<span>This statement is false. Privacy is a very high-stakes concern for many social networks, who have gone to great lengths to put in place certain restrictions, such as the ability to make ones profile private or hide a profile from certain individuals.</span>
4 0
3 years ago
Identify the software in the computer that will receive and manage all interrupt signals.
vfiekz [6]

Answer:

cookies

Explanation:

3 0
2 years ago
Freya has queued up some transactions to email to customers and others to print. What steps should she take to select all the sa
il63 [147K]

Considering the situation described above, the steps Freya should take to select all the sales transactions to email is "<u>Filter the sales transaction list using Delivery Method set to Email, and then click the checkbox to the left of the table header row</u>."

<h3>The Process of Filter to batch print or email</h3>

This process follows the steps below:

  • From the Delivery method dropdown menu, select Send later or Print later, then Apply.

  • Select the checkboxes for the transactions to email or print.

  • Select the checkbox at the top of the list to mark all.

Hence, in this case, it is concluded that there is a process to follow QuickBooks to carry out Filter to batch print or email.

Learn more about QuickBooks use here: brainly.com/question/25592743

7 0
2 years ago
A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
icang [17]

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

8 0
3 years ago
2. You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this a
storchak [24]
First, you can backup all of your very important files in a hard drive or a USB that has a big memory. The data that should be stored inside your hard drive are not so important data. The data that you can let go of. Do not save any personal information in your hard drive. After that, you can download a software that can be used to totally wipe out data. A recommended software would be Active Killdisk. This process is called refurbishing. 
5 0
3 years ago
Other questions:
  • 15. What type of presentation includes information created in a different Office application?
    7·1 answer
  • _____ can be used to convert digitized documents into ASCII (American Standard Code for Information Interchange) text that can b
    11·1 answer
  • The official record of a high school student's performance is called:
    6·1 answer
  • To improve performance on an iSCSI SAN, a network technician configured an MTU value of 9000 on the Ethernet LAN. What did the t
    5·1 answer
  • A simulation system is a technology that enables you to take over a customer’s screen, mouse, or other connected device in order
    13·1 answer
  • What does considering scale mean in science?
    15·1 answer
  • Point giveaway and brainliest
    7·2 answers
  • Is anybody willing to gift me V bucks? Gamer tag: SpiffyPlop
    13·2 answers
  • How does the dns help the world wide web scale so that billions of users can access billions of web pages?.
    6·1 answer
  • LAB: Parsing dates Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1,
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!